Biometric authentication received considerable attention lately. The vein pattern on the back of the hand is a unique biometric that can be measured through thermal imaging. Detecting this pattern provides an implicit approach that can authenticate users while interacting. In this paper, we present the Vein-Identification system, called VPID. It consists of a vein pattern recognition pipeline and an authentication part. We implemented six different vein-based authentication approaches by combining thermal imaging and computer vision algorithms. Through a study, we show that the approaches achieve a low false-acceptance rate (“FAR”) and a low false-rejection rate (“FRR”). Our findings show that the best approach is the Hausdorff distance-difference applied in combination with a Convolutional Neural Networks (CNN) classification of stacked images.
About the authors
Sarah Faltaous is a PhD student in the human-computer interaction group at the University of Duisburg-Essen. She holds a master degree in cognitive systems from the University of Ulm and a bachelor in digital media engineering and technology from the German University in Cairo.
Jonathan Liebers is a PhD student in the human-computer interaction group at the University of Duisburg-Esen. He holds a bachelor and master degree in Applied Computer Science - Systems Engineering from the University of Duisburg-Essen. His research interest lies mainly within the field of usable security and biometrics.
Yomna Abdelrahman is a postdoctoral researcher at the Research Institute CODE of the Bundeswehr University, Munich. In her work, she explores thermal imaging to build novel interactive systems and improve existing ones. She received a PhD from the University of Stuttgart.
Florian Alt is a professor for Usable Security and Privacy at the Resarch Institute CODE of the Bundeswehr University, Munich. Florian looks at the role of humans in security critical systems, focusing on topics related to behavioral biometrics, physiological security, social engineering, and usable security in novel application areas, such as smart homes and VR. Florian is a subcommittee chair for CHI 2020, TPC chair of Mensch und Computer 2020 and was general chair of the 2018 Conference on Mobile and Ubiquitous Multimedia. He holds a PhD in computer science from the University of Stuttgart and a diploma in Media Informatics from LMU Munich.
Stefan Schneegass is an assistant professor of computer science at the University of Duisburg-Essen. His research focuses on the crossroads of human-computer interaction and ubiquitous computing. This includes novel interaction techniques for mobile, wearable, and ubiquitous devices as well as novel approaches for implicit authentication using such devices. He holds a PhD from the University of Stuttgart.
 Vein recognition in Europe, Biometric Technology Today (2004).Search in Google Scholar
 Yomna Abdelrahman, Mohamed Khamis, Stefan Schneegass and Florian Alt, Stay cool! Understanding thermal attacks on mobile-based user authentication, in: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, CHI ’17, pp. 3751–3763, ACM, New York, NY, USA, 2017.10.1145/3025453.3025461Search in Google Scholar
 Yomna Abdelrahman, Alireza Sahami Shirazi, Niels Henze and Albrecht Schmidt, Investigation of material properties for thermal imaging-based interaction, in: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI ’15, pp. 15–18, ACM, New York, NY, USA, 2015.10.1145/2702123.2702290Search in Google Scholar
 Abdulwahid Al Abdulwahid, Nathan Clarke, Steven Furnell, Ingo Stengel and Christoph Reich, The current use of authentication technologies: an investigative review, in: 2015 International Conference on Cloud Computing (ICCC), pp. 1–8, April 2015.10.1109/CLOUDCOMP.2015.7149658Search in Google Scholar
 Jose Anand, T. G. Arul Flora and Anu Susan Philip, Finger-vein based biometric security system, International Journal of Research in Engineering and Technology 2 (2013), 197–200.10.15623/ijret.2013.0212035Search in Google Scholar
 S. Belongie, J. Malik and J. Puzicha, Shape matching and object recognition using shape contexts, IEEE Trans. Pattern Anal. Mach. Intell. 24 (2002), 509–522.10.1109/34.993558Search in Google Scholar
 K. W. Cho, F. Lin, C. Song, X. Xu, F. Gu and W. Xu, Thermal handprint analysis for forensic identification using Heat-Earth Mover’s Distance, in: 2016 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA), pp. 1–8, Feb 2016.10.1109/ISBA.2016.7477241Search in Google Scholar
 Mark D. Corner and Brian D. Noble, Zero-interaction authentication, in: Proceedings of the 8th Annual International Conference on Mobile Computing and Networking, MobiCom ’02, pp. 1–11, ACM, New York, NY, USA, 2002.10.1145/570645.570647Search in Google Scholar
 Lynne Coventry, Antonella De Angeli and Graham Johnson, Usability and biometric verification at the ATM interface, in: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’03, pp. 153–160, ACM, New York, NY, USA, 2003.10.1145/642611.642639Search in Google Scholar
 Heather Anne Crawford, A framework for continuous, transparent authentication on mobile devices, Ph.D. thesis, University of Glasgow, 2012.Search in Google Scholar
 J. M. Cross and C. L. Smith, Thermographic imaging of the subcutaneous vascular network of the back of the hand for biometric identification, in: Institute of Electrical and Electronics Engineers 29th Annual 1995 International Carnahan Conference on Security Technology, 1995. Proceedings, pp. 20–35, Oct 1995.Search in Google Scholar
 CSID, Consumer Survey: Password Habits, A study among American consumers, 2012.Search in Google Scholar
 Alexander De Luca, Alina Hang, Frederik Brudy, Christian Lindner and Heinrich Hussmann, Touch me once and I know it’s you!: Implicit authentication based on touch screen patterns, in: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’12, pp. 987–996, ACM, New York, NY, USA, 2012.10.1145/2207676.2208544Search in Google Scholar
 Roemi Fernández and Manuel Armada, Multisensory system for the detection and localization of peripheral subcutaneous veins, Sensors 17 (2017), 897.10.3390/s17040897Search in Google Scholar PubMed PubMed Central
 Dinei Florencio and Cormac Herley, A large-scale study of web password habits, in: Proceedings of the 16th International Conference on World Wide Web, WWW ’07, pp. 657–666, ACM, New York, NY, USA, 2007.10.1145/1242572.1242661Search in Google Scholar
 Lishoy Francis, Keith Mayes, Gerhard Hancke and Konstantinos Markantonakis, A location based security framework for authenticating mobile phones, in: Proceedings of the 2Nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing, M-MPAC ’10, pp. 5:1–5:8, ACM, New York, NY, USA, 2010.10.1145/1890791.1890796Search in Google Scholar
 I. Fujitsu, PalmSecure-SL, 2012.Search in Google Scholar
 Gtattersall, Choosing the appropriate colour palette for thermal imaging in animals, Mar 2016.Search in Google Scholar
 Christian Holz, Senaka Buthpitiya and Marius Knaust, Bodyprint: biometric user identification on mobile devices using the capacitive touchscreen to scan body parts, in: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI ’15, pp. 3011–3014, ACM, New York, NY, USA, 2015.10.1145/2702123.2702518Search in Google Scholar
 D. P. Huttenlocher, G. A. Klanderman and W. A. Rucklidge, Comparing images using the Hausdorff distance, IEEE Trans. Pattern Anal. Mach. Intell. 15 (1993), 850–863.10.1109/34.232073Search in Google Scholar
 Anil K. Jain, Arun Ross and Sharath Pankanti, Biometrics: a tool for information security, IEEE Transactions on Information Forensics and Security 1 (2006), 125–143.10.1109/TIFS.2006.873653Search in Google Scholar
 Alex Krizhevsky, Ilya Sutskever and Geoffrey E. Hinton, ImageNet classification with deep convolutional neural networks, in: Advances in Neural Information Processing Systems vol. 25 (F. Pereira, C. J. C. Burges, L. Bottou and K. Q. Weinberger, eds.), Curran Associates, Inc., 2012, pp. 1097–1105.Search in Google Scholar
 Alex Krizhevsky, Ilya Sutskever and Geoffrey E. Hinton, Imagenet classification with deep convolutional neural networks, in: Advances in Neural Information Processing Systems, pp. 1097–1105, 2012.Search in Google Scholar
 Ajay Kumar and K. Venkata Prathyusha, Personal authentication using hand vein triangulation and knuckle shape, IEEE Transactions on Image Processing 18 (2009), 2127–2136.10.1109/TIP.2009.2023153Search in Google Scholar PubMed
 Stan Kurkovsky and Ewa Syta, Digital natives and mobile phones: A survey of practices and attitudes about privacy and security, in: 2010 IEEE International Symposium on Technology and Society (ISTAS), pp. 441–449, June 2010.10.1109/ISTAS.2010.5514610Search in Google Scholar
 Eric Larson, Gabe Cohn, Sidhant Gupta, Xiaofeng Ren, Beverly Harrison, Dieter Fox and Shwetak Patel, HeatWave: Thermal imaging for surface user interaction, in: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’11, pp. 2565–2574, ACM, New York, NY, USA, 2011.10.1145/1978942.1979317Search in Google Scholar
 Yann LeCun, Léon Bottou, Yoshua Bengio, Patrick Haffner andet al., Gradient-based learning applied to document recognition, Proceedings of the IEEE 86 (1998), 2278–2324.10.1109/5.726791Search in Google Scholar
 Ken Pfeuffer, Matthias J. Geiger, Sarah Prange, Lukas Mecke, Daniel Buschek and Florian Alt, Behavioural biometrics in VR: Identifying people from body motion and relations in virtual reality, in: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, CHI ’19, pp. 110:1–110:12, ACM, New York, NY, USA, 2019.Search in Google Scholar
 Napa Sae-Bae, Kowsar Ahmed, Katherine Isbister and Nasir Memon, Biometric-rich gestures: A novel approach to authentication on multi-touch devices, in: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’12, pp. 977–986, ACM, New York, NY, USA, 2012.10.1145/2207676.2208543Search in Google Scholar
 Alireza Sahami Shirazi, Yomna Abdelrahman, Niels Henze, Stefan Schneegass, Mohammadreza Khalilbeigi and Albrecht Schmidt, Exploiting thermal reflection for interactive systems, in: Proceedings of the 32nd Annual ACM Conference on Human Factors in Computing Systems, CHI ’14, pp. 3483–3492, ACM, New York, NY, USA, 2014.10.1145/2556288.2557208Search in Google Scholar
 Stefan Schneegass, Youssef Oualil and Andreas Bulling, SkullConduct: Biometric user identification on eyewear computers using bone conduction through the skull, in: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, CHI ’16, pp. 1379–1384, ACM, New York, NY, USA, 2016.10.1145/2858036.2858152Search in Google Scholar
 Karen Simonyan and Andrew Zisserman, Very deep convolutional networks for large-scale image recognition, arXiv preprint arXiv:1409.1556 (2014).Search in Google Scholar
 Sulochana Sonkamble, Dr Ravindra Thool and Balwant Sonkamble, Survey of biometric recognition systems and their applications, Journal of Theoretical & Applied Information Technology 11 (2010).Search in Google Scholar
 Tran Van Tien, Pham T. H. Mien, Pham T. Dung and Huynh Quang Linh, Using near-infrared technique for vein imaging, in: 5th International Conference on Biomedical Engineering in Vietnam, Springer, pp. 190–193, 2015.10.1007/978-3-319-11776-8_46Search in Google Scholar
 Jian-Gang Wang, Wei-Yun Yau, Andy Suwandy and Eric Sung, Person recognition by fusing palmprint and palm vein images based on “Laplacianpalm” representation, Pattern Recognition 41 (2008), 1514 – 1527.10.1016/j.patcog.2007.10.021Search in Google Scholar
© 2019 Walter de Gruyter GmbH, Berlin/Boston