Image Histogram: Preliminary Findings of Anti-Spoofing Mechanism for Hand Biometrics Acquisition
Keywords:Anti-spoofing, Hand Biometrics, Image Acquisition, Near-Infrared Illumination,
AbstractBiometrics data are prone to spoofing activities especially on its sensor levels where fake biometrics data can be generated to imitate genuine biometrics data. Fake biometrics are false biometrics data that resemble genuine biometrics characteristics. If fake biometrics is accepted by a biometrics system, the possibility of personal information and data to be stolen is high. The consequences lie in the unwanted access, and the public may become insecure to use biometrics as an authentication tool. Biometrics acquisition process with an added detection mechanism can help distinguish between genuine and fake biometrics data. It is possible by the use of near-infrared (NIR) light during acquisition process because the interaction between NIR light with human skin and fake biometrics are different; due to the living trait property possessed by a human. This paper shares preliminary findings of image histogram for both genuine and fake biometrics images acquired by NIR illumination. Observation on the image histogram reveals that there are differences to the image properties that can be used to distinguish the genuine and fake biometrics data. The approach can be extended to its usage as a detection mechanism for other biometrics data as well. The main principle lies in the difference of image response between genuine and fake biometrics data acquired by the NIR illumination.
J. A. Unar, W. C. Seng, and A. Abbasi, “A Review of Biometric Technology Along with Trends and Prospects,” Pattern Recognit., Feb. 2014.
S. Marcel, M. S. Nixon, and S. Z. Li, Eds., Handbook of Biometric Anti-Spoofing. Springer, 2014.
Z. Akhtar, C. Micheloni, and G. L. Foresti, “Biometric Liveness Detection: Challenges and Research Opportunities,” IEEE Secur. Priv., vol. 13, no. 5, pp. 63–72, 2015.
S. C. Joshi and A. Kumar, “Design of Multimodal Biometrics System Based on Feature Level Fusion,” in 2016 10th International Conference on Intelligent Systems and Control (ISCO), 2016, pp. 1–6.
A. Maheshwari and M. A. Dorairangaswamy, “Multimodal Biometrics Security System for Authentication,” in 2016 2nd International Conference on Science Technology Engineering and Management (CONSTEM), 2016, pp. 146–150.
M. Haghighat, M. Abdel-Mottaleb, and W. Alhalabi, “Discriminant Correlation Analysis for Feature Level Fusion With Application to Multimodal Biometrics,” in 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2016, pp. 1866– 1870.
S. Juric and B. Zalik, “An Innovative Approach to Near-Infrared Spectroscopy Using a Standard Mobile Device and Its Clinical Application in The Real-Time Visualization of Peripheral Veins,” BMC Med. Inform. Decis. Mak., vol. 14, no. 100, pp. 1–9, 2014.
A. K. Jain, K. Nandakumar, and A. Ross, “50 Years of Biometric Research: Accomplishments, Challenges, and Opportunities,” Pattern Recognit. Lett., vol. 79, pp. 80–105, 2016.
E. Marasco, M. Shehab, and B. Cukic, “A Methodology for Prevention of Biometric Presentation Attacks,” IEEE Seventh Latin-American Symp. Dependable Comput., pp. 1–6, 2016.
J. Galbally, S. Marcel, and J. Fierrez, “Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition,” IEEE Trans. Image Process., vol. 23, no. 2, pp. 710–724, 2014.
I. Chingovska, A. R. Dos Anjos, and S. Marcel, “Biometrics Evaluation Under Spoofing Attacks,” IEEE Trans. Inf. Forensics Secur., vol. 9, no. 12, pp. 2264–2276, 2014.
L. Wang, G. Leedham, and S.-Y. Cho, “Infrared Imaging of Hand Vein Patterns for Biometric Purposes,” IET Comput. Vis., vol. 1, no. 3, pp. 113–122, Dec. 2007.
M. Moreno-Moreno, J. Fierrez, and J. Ortega-Garcia, “Biometrics Beyond the Visible Spectrum: Imaging Technologies and Applications,” Biometric ID Manag. Multimodal Commun., pp. 154– 161, 2009.
A. Shahzad, M. N. Saad, N. Walter, A. S. Malik, and F. Meriaudeau, “Hyperspectral Venous Image Quality Assessment for Optimum Illumination Range Selection Based on Skin Tone Characteristics,” Biomed. Eng. Online, vol. 13, no. 109, pp. 1–13, 2014.
P. V. Reddy, A. Kumar, S. M. K. Rahman, and T. S. Mundra, “A New Antispoofing Approach for Biometric Devices,” IEEE Trans. Biomed. Circuits Syst., vol. 2, no. 4, pp. 328–337, 2008.
T. Duarte, J. P. Pimentao, P. Sousa, and S. Onofre, “Biometric Access Control Systems: A Review Technologies to Improve Their Efficiency,” in 2016 IEEE International Power Electronics and Motion Control Conference (PEMC), 2016, pp. 795–800.
B. Bhaskar and S. Veluchamy, “Hand Based Multibiometric Authentication Using Local Feature Extraction,” in 2014 International Conference on Recent Trends in Information Technology, 2014, pp. 1– 5.
R. Raghavendra, J. Surbiryala, and C. Busch, “Hand Dorsal Vein Recognition: Sensor, Algorithms and Evaluation,” in 2015 IEEE International Conference on Imaging Systems and Techniques (IST), 2015, pp. 1–6.
Z. M. Noh, A. R. Ramli, M. I. Saripan, and M. Hanafi, “Overview and Challenges of Palm Vein Biometric System,” Int. J. Biom., vol. 8, no. 1, pp. 2–18, 2016.
R. Raghavendra and C. Busch, “A Low Cost Wrist Vein Sensor for Biometric Authentication,” in 2016 IEEE International Conference on Imaging Systems and Techniques (IST), 2016, pp. 201–205.
K. Syazana-Itqan, A. R. Syafeeza, N. M. Saad, N. A. Hamid, and W. H. Mohd Saad, “A Review of Finger-Vein Biometrics Identification Approaches,” Indian J. Sci. Technol., vol. 9, no. 32, 2016.
A. Kumar, S. Garg, and M. Hanmandlu, “Biometric Authentication Using Finger Nail Plates,” Expert Syst. Appl., vol. 41, no. 2, pp. 373– 386, 2014.
J. Kim, K. Oh, A. B.-J. Teoh, and K.-A. Toh, “Finger-Knuckle-Print for Identity Verification Based on Difference Images,” in Proceedings of the 2016 IEEE 11th Conference on Industrial Electronics and Applications (ICIEA), 2016, pp. 1073–1077.
OpenCV Development Team, “OpenCV Documentation,” 2015. [Online]. Available: http://docs.opencv.org/.
How to Cite
TRANSFER OF COPYRIGHT AGREEMENT
The manuscript is herewith submitted for publication in the Journal of Telecommunication, Electronic and Computer Engineering (JTEC). It has not been published before, and it is not under consideration for publication in any other journals. It contains no material that is scandalous, obscene, libelous or otherwise contrary to law. When the manuscript is accepted for publication, I, as the author, hereby agree to transfer to JTEC, all rights including those pertaining to electronic forms and transmissions, under existing copyright laws, except for the following, which the author(s) specifically retain(s):
- All proprietary right other than copyright, such as patent rights
- The right to make further copies of all or part of the published article for my use in classroom teaching
- The right to reuse all or part of this manuscript in a compilation of my own works or in a textbook of which I am the author; and
- The right to make copies of the published work for internal distribution within the institution that employs me
I agree that copies made under these circumstances will continue to carry the copyright notice that appears in the original published work. I agree to inform my co-authors, if any, of the above terms. I certify that I have obtained written permission for the use of text, tables, and/or illustrations from any copyrighted source(s), and I agree to supply such written permission(s) to JTEC upon request.