On the vulnerability of palm vein recognition to spoofing attacks

P Tome, S Marcel - 2015 International Conference on …, 2015 - ieeexplore.ieee.org
The vulnerability of palm vein recognition to spoofing attacks is studied in this paper. A
collection of spoofing palm vein images has been created from real palm vein samples …

On the vulnerability of finger vein recognition to spoofing

P Tome, M Vanoni, S Marcel - 2014 international conference of …, 2014 - ieeexplore.ieee.org
The vulnerability of finger vein recognition to spoofing is studied in this paper. A collection of
spoofing finger vein images has been created from real finger vein samples. Finger vein …

The 1st competition on counter measures to finger vein spoofing attacks

P Tome, R Raghavendra, C Busch… - … on biometrics (ICB), 2015 - ieeexplore.ieee.org
The vulnerability of finger vein recognition to spoofing attacks has emerged as a crucial
security problem in the recent years mainly due to the high security applications where …

Special features: A new model for information security policies

KR Lindup - Computers and Security, 1995 - dl.acm.org
Special features: A new model for information security policies: Computers and Security: Vol 14,
No 8 skip to main content ACM Digital Library home ACM Association for Computing Machinery …

Palm vein authentication

M Watanabe - Advances in Biometrics: Sensors, Algorithms and …, 2008 - Springer
This chapter discusses palm vein authentication, which uses the vascular patterns of the
palm as personal identification data. Palm vein information is hard to duplicate because …

Palm vein database and experimental framework for reproducible research

P Tome, S Marcel - … conference of the biometrics special interest …, 2015 - ieeexplore.ieee.org
A palm vein database acquired by a contactless sensor together with an experimental
framework freely available for fair reproducible research purposes are described. The palm …

[PDF][PDF] Palm vein authentication technology and its applications

M Watanabe, T Endoh, M Shiohara… - Proceedings of the …, 2005 - fujitsu.com
This paper discusses the contactless palm vein authentication device that uses blood vessel
patterns as a personal identifying factor. The vein information is hard to duplicate since veins …

Contactless palm vein identification using multiple representations

Y Zhou, A Kumar - 2010 Fourth IEEE International Conference …, 2010 - ieeexplore.ieee.org
This paper investigates some promising approaches for the automated personal
identification using contactless palmvein imaging. We firstly present two new palmvein …

Presentation attack detection algorithms for finger vein biometrics: A comprehensive study

R Raghavendra, C Busch - 2015 11th International Conference …, 2015 - ieeexplore.ieee.org
Finger vein biometric systems have shown a vulnerability to presentation attacks (or direct
attack or spoof attack). The presentation attacks have raised crucial security issues for finger …

Palm vein biometric authentication using convolutional neural networks

S Chantaf, A Hilal, R Elsaleh - … of the 8th International Conference on …, 2020 - Springer
In this research, we present a new way of thinking using a Convolutional Neural Network
(CNN) for palm-vein biometric authentication. In contrary to fingerprint and face, palm vein …