The vulnerability of palm vein recognition to spoofing at-tacks is studied in this paper. A collection of spoofing palm vein images has been created from real palm vein samples. Palm vein images are printed using a commercial printer and then, presented at a contactless palm vein sensor. Ex-periments are carried out using an extensible framework, which allows fair and reproducible benchmarks. Results are presented comparing two automatic segmentations. Ex-perimental results lead to a spoofing false accept rate of 65%, thus showing that palm vein biometrics is vulnerable to spoofing attacks, pointing out the importance to inves-tigate countermeasures against this type of fraudulent ac-tions. A study based on the number of the enrolment sam-p...
Palm vein authentication has high level of accuracy because it is located inside the body and does n...
Biometric may be a precocious theme of personal authentication victimization palm vein. The infrared...
The domain of presentation attacks (PA), including vulnerability studies and detection (PAD) remains...
The vulnerability of finger vein recognition to spoofing is studied in this paper. A collection of s...
The vulnerability of finger vein recognition to spoofing attacks has emerged as a crucial security p...
VERA Spoofing PalmVein is a dataset for palmvein presentation attack detection (anti-spoofing), The ...
The vulnerability of finger vein recognition to spoofing attacks has emerged as a crucial security p...
The vulnerability of finger vein recognition to spoofing attacks has emerged as a crucial security p...
The vulnerability of finger vein recognition to spoofing attacks has emerged as a crucial security p...
The vulnerability of finger vein recognition to spoofing attacks has emerged as a crucial security p...
The vulnerability of finger vein recognition to spoofing attacks has emerged as a crucial security p...
The vulnerability of finger vein recognition to spoofing attacks has emerged as a crucial security p...
The vulnerability of finger vein recognition to spoofing attacks has emerged as a crucial security p...
The vulnerability of finger vein recognition to spoofing attacks has emerged as a crucial security p...
The vulnerability of finger vein recognition to spoofing attacks has emerged as a crucial security p...
Palm vein authentication has high level of accuracy because it is located inside the body and does n...
Biometric may be a precocious theme of personal authentication victimization palm vein. The infrared...
The domain of presentation attacks (PA), including vulnerability studies and detection (PAD) remains...
The vulnerability of finger vein recognition to spoofing is studied in this paper. A collection of s...
The vulnerability of finger vein recognition to spoofing attacks has emerged as a crucial security p...
VERA Spoofing PalmVein is a dataset for palmvein presentation attack detection (anti-spoofing), The ...
The vulnerability of finger vein recognition to spoofing attacks has emerged as a crucial security p...
The vulnerability of finger vein recognition to spoofing attacks has emerged as a crucial security p...
The vulnerability of finger vein recognition to spoofing attacks has emerged as a crucial security p...
The vulnerability of finger vein recognition to spoofing attacks has emerged as a crucial security p...
The vulnerability of finger vein recognition to spoofing attacks has emerged as a crucial security p...
The vulnerability of finger vein recognition to spoofing attacks has emerged as a crucial security p...
The vulnerability of finger vein recognition to spoofing attacks has emerged as a crucial security p...
The vulnerability of finger vein recognition to spoofing attacks has emerged as a crucial security p...
The vulnerability of finger vein recognition to spoofing attacks has emerged as a crucial security p...
Palm vein authentication has high level of accuracy because it is located inside the body and does n...
Biometric may be a precocious theme of personal authentication victimization palm vein. The infrared...
The domain of presentation attacks (PA), including vulnerability studies and detection (PAD) remains...