Accessible Requires Authentication Published by Oldenbourg Wissenschaftsverlag January 14, 2020

VPID: Towards Vein Pattern Identification Using Thermal Imaging

Sarah Faltaous, Jonathan Liebers, Yomna Abdelrahman, Florian Alt ORCID logo and Stefan Schneegass
From the journal i-com

Abstract

Biometric authentication received considerable attention lately. The vein pattern on the back of the hand is a unique biometric that can be measured through thermal imaging. Detecting this pattern provides an implicit approach that can authenticate users while interacting. In this paper, we present the Vein-Identification system, called VPID. It consists of a vein pattern recognition pipeline and an authentication part. We implemented six different vein-based authentication approaches by combining thermal imaging and computer vision algorithms. Through a study, we show that the approaches achieve a low false-acceptance rate (“FAR”) and a low false-rejection rate (“FRR”). Our findings show that the best approach is the Hausdorff distance-difference applied in combination with a Convolutional Neural Networks (CNN) classification of stacked images.

References

[1] Vein recognition in Europe, Biometric Technology Today (2004). Search in Google Scholar

[2] Yomna Abdelrahman, Mohamed Khamis, Stefan Schneegass and Florian Alt, Stay cool! Understanding thermal attacks on mobile-based user authentication, in: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, CHI ’17, pp. 3751–3763, ACM, New York, NY, USA, 2017. Search in Google Scholar

[3] Yomna Abdelrahman, Alireza Sahami Shirazi, Niels Henze and Albrecht Schmidt, Investigation of material properties for thermal imaging-based interaction, in: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI ’15, pp. 15–18, ACM, New York, NY, USA, 2015. Search in Google Scholar

[4] Abdulwahid Al Abdulwahid, Nathan Clarke, Steven Furnell, Ingo Stengel and Christoph Reich, The current use of authentication technologies: an investigative review, in: 2015 International Conference on Cloud Computing (ICCC), pp. 1–8, April 2015. Search in Google Scholar

[5] Jose Anand, T. G. Arul Flora and Anu Susan Philip, Finger-vein based biometric security system, International Journal of Research in Engineering and Technology2 (2013), 197–200. Search in Google Scholar

[6] S. Belongie, J. Malik and J. Puzicha, Shape matching and object recognition using shape contexts, IEEE Trans. Pattern Anal. Mach. Intell.24 (2002), 509–522. Search in Google Scholar

[7] K. W. Cho, F. Lin, C. Song, X. Xu, F. Gu and W. Xu, Thermal handprint analysis for forensic identification using Heat-Earth Mover’s Distance, in: 2016 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA), pp. 1–8, Feb 2016. Search in Google Scholar

[8] Mark D. Corner and Brian D. Noble, Zero-interaction authentication, in: Proceedings of the 8th Annual International Conference on Mobile Computing and Networking, MobiCom ’02, pp. 1–11, ACM, New York, NY, USA, 2002. Search in Google Scholar

[9] Lynne Coventry, Antonella De Angeli and Graham Johnson, Usability and biometric verification at the ATM interface, in: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’03, pp. 153–160, ACM, New York, NY, USA, 2003. Search in Google Scholar

[10] Heather Anne Crawford, A framework for continuous, transparent authentication on mobile devices, Ph.D. thesis, University of Glasgow, 2012. Search in Google Scholar

[11] J. M. Cross and C. L. Smith, Thermographic imaging of the subcutaneous vascular network of the back of the hand for biometric identification, in: Institute of Electrical and Electronics Engineers 29th Annual 1995 International Carnahan Conference on Security Technology, 1995. Proceedings, pp. 20–35, Oct 1995. Search in Google Scholar

[12] CSID, Consumer Survey: Password Habits, A study among American consumers, 2012. Search in Google Scholar

[13] Alexander De Luca, Alina Hang, Frederik Brudy, Christian Lindner and Heinrich Hussmann, Touch me once and I know it’s you!: Implicit authentication based on touch screen patterns, in: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’12, pp. 987–996, ACM, New York, NY, USA, 2012. Search in Google Scholar

[14] Roemi Fernández and Manuel Armada, Multisensory system for the detection and localization of peripheral subcutaneous veins, Sensors17 (2017), 897. Search in Google Scholar

[15] Dinei Florencio and Cormac Herley, A large-scale study of web password habits, in: Proceedings of the 16th International Conference on World Wide Web, WWW ’07, pp. 657–666, ACM, New York, NY, USA, 2007. Search in Google Scholar

[16] Lishoy Francis, Keith Mayes, Gerhard Hancke and Konstantinos Markantonakis, A location based security framework for authenticating mobile phones, in: Proceedings of the 2Nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing, M-MPAC ’10, pp. 5:1–5:8, ACM, New York, NY, USA, 2010. Search in Google Scholar

[17] I. Fujitsu, PalmSecure-SL, 2012. Search in Google Scholar

[18] Gtattersall, Choosing the appropriate colour palette for thermal imaging in animals, Mar 2016. Search in Google Scholar

[19] Christian Holz, Senaka Buthpitiya and Marius Knaust, Bodyprint: biometric user identification on mobile devices using the capacitive touchscreen to scan body parts, in: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI ’15, pp. 3011–3014, ACM, New York, NY, USA, 2015. Search in Google Scholar

[20] Ming-Kuei Hu, Visual pattern recognition by moment invariants, IRE Transactions on Information Theory8 (1962), 179–187. Search in Google Scholar

[21] D. P. Huttenlocher, G. A. Klanderman and W. A. Rucklidge, Comparing images using the Hausdorff distance, IEEE Trans. Pattern Anal. Mach. Intell.15 (1993), 850–863. Search in Google Scholar

[22] Paul Jaccard, The distribution of the flora in the alpine zone. 1, New Phytologist11 (1912), 37–50. Search in Google Scholar

[23] Anil Jain, Lin Hong and Sharath Pankanti, Biometric identification, Commun. ACM43 (2000), 90–98. Search in Google Scholar

[24] Anil K. Jain, Arun Ross and Sharath Pankanti, Biometrics: a tool for information security, IEEE Transactions on Information Forensics and Security1 (2006), 125–143. Search in Google Scholar

[25] Alex Krizhevsky, Ilya Sutskever and Geoffrey E. Hinton, ImageNet classification with deep convolutional neural networks, in: Advances in Neural Information Processing Systems vol. 25 (F. Pereira, C. J. C. Burges, L. Bottou and K. Q. Weinberger, eds.), Curran Associates, Inc., 2012, pp. 1097–1105. Search in Google Scholar

[26] Alex Krizhevsky, Ilya Sutskever and Geoffrey E. Hinton, Imagenet classification with deep convolutional neural networks, in: Advances in Neural Information Processing Systems, pp. 1097–1105, 2012. Search in Google Scholar

[27] Ajay Kumar and K. Venkata Prathyusha, Personal authentication using hand vein triangulation and knuckle shape, IEEE Transactions on Image Processing18 (2009), 2127–2136. Search in Google Scholar

[28] Stan Kurkovsky and Ewa Syta, Digital natives and mobile phones: A survey of practices and attitudes about privacy and security, in: 2010 IEEE International Symposium on Technology and Society (ISTAS), pp. 441–449, June 2010. Search in Google Scholar

[29] Eric Larson, Gabe Cohn, Sidhant Gupta, Xiaofeng Ren, Beverly Harrison, Dieter Fox and Shwetak Patel, HeatWave: Thermal imaging for surface user interaction, in: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’11, pp. 2565–2574, ACM, New York, NY, USA, 2011. Search in Google Scholar

[30] Yann LeCun, Yoshua Bengio and Geoffrey Hinton, Deep learning, Nature521 (2015), 436. Search in Google Scholar

[31] Yann LeCun, Léon Bottou, Yoshua Bengio, Patrick Haffner andet al., Gradient-based learning applied to document recognition, Proceedings of the IEEE86 (1998), 2278–2324. Search in Google Scholar

[32] Ken Pfeuffer, Matthias J. Geiger, Sarah Prange, Lukas Mecke, Daniel Buschek and Florian Alt, Behavioural biometrics in VR: Identifying people from body motion and relations in virtual reality, in: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, CHI ’19, pp. 110:1–110:12, ACM, New York, NY, USA, 2019. Search in Google Scholar

[33] Napa Sae-Bae, Kowsar Ahmed, Katherine Isbister and Nasir Memon, Biometric-rich gestures: A novel approach to authentication on multi-touch devices, in: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’12, pp. 977–986, ACM, New York, NY, USA, 2012. Search in Google Scholar

[34] Alireza Sahami Shirazi, Yomna Abdelrahman, Niels Henze, Stefan Schneegass, Mohammadreza Khalilbeigi and Albrecht Schmidt, Exploiting thermal reflection for interactive systems, in: Proceedings of the 32nd Annual ACM Conference on Human Factors in Computing Systems, CHI ’14, pp. 3483–3492, ACM, New York, NY, USA, 2014. Search in Google Scholar

[35] Stefan Schneegass, Youssef Oualil and Andreas Bulling, SkullConduct: Biometric user identification on eyewear computers using bone conduction through the skull, in: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, CHI ’16, pp. 1379–1384, ACM, New York, NY, USA, 2016. Search in Google Scholar

[36] Karen Simonyan and Andrew Zisserman, Very deep convolutional networks for large-scale image recognition, arXiv preprint arXiv:1409.1556 (2014). Search in Google Scholar

[37] Sulochana Sonkamble, Dr Ravindra Thool and Balwant Sonkamble, Survey of biometric recognition systems and their applications, Journal of Theoretical & Applied Information Technology11 (2010). Search in Google Scholar

[38] Tran Van Tien, Pham T. H. Mien, Pham T. Dung and Huynh Quang Linh, Using near-infrared technique for vein imaging, in: 5th International Conference on Biomedical Engineering in Vietnam, Springer, pp. 190–193, 2015. Search in Google Scholar

[39] Jian-Gang Wang, Wei-Yun Yau, Andy Suwandy and Eric Sung, Person recognition by fusing palmprint and palm vein images based on “Laplacianpalm” representation, Pattern Recognition41 (2008), 1514 – 1527. Search in Google Scholar

[40] Lingyu Wang and Graham Leedham, A thermal hand vein pattern verification system, in: Pattern Recognition and Image Analysis, Springer, 2005, pp. 58–65. Search in Google Scholar

[41] Helen M. Wood, The use of passwords for controlled access to computer resources, 500, US Department of Commerce, National Bureau of Standards, 1977. Search in Google Scholar

[42] T. Y. Zhang and Ching Y. Suen, A fast parallel algorithm for thinning digital patterns, Communications of the ACM27 (1984), 236–239. Search in Google Scholar

Published Online: 2020-01-14
Published in Print: 2019-11-18

© 2019 Walter de Gruyter GmbH, Berlin/Boston