2016 International Conference of the Biometrics Special Interest Group (BIOSIG) 2016
DOI: 10.1109/biosig.2016.7736921
|View full text |Cite
|
Sign up to set email alerts
|

Empirical Evaluation of LBP-Extension Features for Finger Vein Spoofing Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
9
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
3

Relationship

2
4

Authors

Journals

citations
Cited by 14 publications
(9 citation statements)
references
References 6 publications
0
9
0
Order By: Relevance
“…As for other biometric characteristics, texture patterns have been extensively analysed for finger vein PAD. In addition to the approaches presented in [71,75], [44], to finally conclude that the baseline LBP technique performs as good as its "improvements". Finally, in a combined approach, Qiu et al used total variation decomposition to divide the finger vein sample into its structural and noise components [58].…”
Section: Finger Vein Presentation Attack Detectionmentioning
confidence: 94%
See 1 more Smart Citation
“…As for other biometric characteristics, texture patterns have been extensively analysed for finger vein PAD. In addition to the approaches presented in [71,75], [44], to finally conclude that the baseline LBP technique performs as good as its "improvements". Finally, in a combined approach, Qiu et al used total variation decomposition to divide the finger vein sample into its structural and noise components [58].…”
Section: Finger Vein Presentation Attack Detectionmentioning
confidence: 94%
“…Two years later, the first competition on finger vein PAD was organised [75], where three different teams participated. Since then, different PAD approaches have been presented, based on either a video sequence and motion magnification [60], texture analysis [44,61,71], image quality metrics [7], or more recently, neural networks [52,59,63] and image decomposition [58].…”
Section: Introductionmentioning
confidence: 99%
“…Texture-based PAD techniques have been proven to be applicable to the imagery in the FV-Spoofing-Attack database [253] independent of the above-referenced competition, in particular, baseline LBP [220]. Inspired by the success of basic LBP techniques [181,253] in finger vein PAD and the availability of a wide variety of LBP extensions and generalisations in the literature, [123] has empirically evaluated different features obtained by using these more recent LBP-related feature extraction techniques for finger vein spoofing detection. Additionally, the steerable pyramid is used to extract features subsequently used for FV spoofing detection [220].…”
Section: Presentation Attack Detectionmentioning
confidence: 99%
“…However, it is still possible to spoof the finger-vein recognition system by using a stolen finger-vein image. As proven in previous research [ 23 , 24 , 25 , 26 , 27 , 28 ], the spoofing-attack can be done by printing the stolen finger-vein image on certain materials (such as paper or film) using carbon ink and attaching it on a real (live) finger during the image acquisition. Therefore, spoof detection methods, named as presentation attack detection (PAD) methods, for finger-vein biometric systems are necessary to protect the finger-vein recognition system from spoofing attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Over time, many researchers have proposed various methods for PAD for finger-vein recognition system [ 23 , 24 , 25 , 26 , 27 , 28 ]. One of the earliest studies conducted by Qin et al [ 28 ] used the dynamic information from successive images to detect the real finger-vein images.…”
Section: Introductionmentioning
confidence: 99%