The vulnerability of finger vein recognition to spoofing attacks has emerged as a crucial security problem in the recent years mainly due to the high security applications where biometric technology is used. Recent works shown that finger vein biometrics is vulnerable to spoofing attacks, pointing out the importance to investigate counter-measures against this type of fraudulent actions. The goal of the 1st Competition on Counter Measures to Finger Vein Spoofing Attacks is to challenge researchers to create counter-measures that can detect printed attacks effectively. The submitted approaches are evaluated on the Spoofing-Attack Finger Vein Database and the achieved results are presented in this paper
Finger vein system refers to the recognition of finger vein for authentication and identification pu...
The domain of presentation attacks (PA), including vulnerability studies and detection (PAD) remains...
This chapter is focused on giving a comprehensive description of the state-of-the-art in biometric-b...
The vulnerability of finger vein recognition to spoofing attacks has emerged as a crucial security p...
The vulnerability of finger vein recognition to spoofing attacks has emerged as a crucial security p...
The vulnerability of finger vein recognition to spoofing attacks has emerged as a crucial security p...
The vulnerability of finger vein recognition to spoofing attacks has emerged as a crucial security p...
The vulnerability of finger vein recognition to spoofing attacks has emerged as a crucial security p...
The vulnerability of finger vein recognition to spoofing attacks has emerged as a crucial security p...
The vulnerability of finger vein recognition to spoofing attacks has emerged as a crucial security p...
The vulnerability of finger vein recognition to spoofing attacks has emerged as a crucial security p...
The vulnerability of finger vein recognition to spoofing attacks has emerged as a crucial security p...
The vulnerability of finger vein recognition to spoofing is studied in this paper. A collection of s...
The vulnerability of palm vein recognition to spoofing at-tacks is studied in this paper. A collecti...
Anti-spoofing may be defined as the pattern recognition problem of automatically differentiating bet...
Finger vein system refers to the recognition of finger vein for authentication and identification pu...
The domain of presentation attacks (PA), including vulnerability studies and detection (PAD) remains...
This chapter is focused on giving a comprehensive description of the state-of-the-art in biometric-b...
The vulnerability of finger vein recognition to spoofing attacks has emerged as a crucial security p...
The vulnerability of finger vein recognition to spoofing attacks has emerged as a crucial security p...
The vulnerability of finger vein recognition to spoofing attacks has emerged as a crucial security p...
The vulnerability of finger vein recognition to spoofing attacks has emerged as a crucial security p...
The vulnerability of finger vein recognition to spoofing attacks has emerged as a crucial security p...
The vulnerability of finger vein recognition to spoofing attacks has emerged as a crucial security p...
The vulnerability of finger vein recognition to spoofing attacks has emerged as a crucial security p...
The vulnerability of finger vein recognition to spoofing attacks has emerged as a crucial security p...
The vulnerability of finger vein recognition to spoofing attacks has emerged as a crucial security p...
The vulnerability of finger vein recognition to spoofing is studied in this paper. A collection of s...
The vulnerability of palm vein recognition to spoofing at-tacks is studied in this paper. A collecti...
Anti-spoofing may be defined as the pattern recognition problem of automatically differentiating bet...
Finger vein system refers to the recognition of finger vein for authentication and identification pu...
The domain of presentation attacks (PA), including vulnerability studies and detection (PAD) remains...
This chapter is focused on giving a comprehensive description of the state-of-the-art in biometric-b...