Info: Zenodo’s user support line is staffed on regular business days between Dec 23 and Jan 5. Response times may be slightly longer than normal.

Published March 25, 2015 | Version v1
Dataset Restricted

VERA Spoofing PalmVein

  • 1. Idiap Research Institute

Description

VERA Spoofing PalmVein is a dataset for palmvein presentation attack detection (anti-spoofing), The dataset contains 1000 NIR images of presentation attacks (spoofing attacks) to 50 clients of the VERA PalmVein dataset that can be used to study vulnerability of vein recognition systems or to develop presentation attack detection techniques.

 

Database Description

All the attacks have been recorded using the same open palm vein sensor used to record the Idiap Research Institute VERA Palmvein Database.

Images are labeled as follow: ID_hand_session_shot.png where "ID" is a 3 digits number that stands for client's ID, "hand" stands for the considered hand which can be "R" or "L" ("Right" or "Left"), and "session" stands for the considered session number which can be "1" or "2" (2 session per hand), and finally, "shot" stands for the considered shot number which can be "1" to "5" (5 shots per palm).

Images from the same client are regrouped into a single folder labeled as follow: ID-Gender, where "ID" is a 3 digits number that stands for client's ID and "Gender" stands for client's gender which can be "M" or "F" ("Male" or "Female").

Two different folders are provided "raw" and "roi". The "raw" stands the full palm vein image captured by the sensor and the "roi" stands the region of interest generated by the sensor in the acquisition process.

The format of the images is PNG.
Size of the images is 480 x 680 pixels.
Size of the files is around 165 kbytes per images.

 

Database Protocol

The 1000 palmvein images from the 50 first clients from the Idiap Research Institute VERA Palmvein Database have been printed and presented to the sensor to record the 1000 images of the Idiap Research Institute VERA Palmvein Spoofing Database.

The precise protocol for elaborating the spoofing palmvein images is as follows:

  1. Reshape to 380 x 525
  2. Pre-processing the raw images using histogram equalisation and adding a padding array 50 black pixels
  3. Printing at real palm size the pre-processed images on a thick 80 g/m2 white paper
  4. The sensor leds are recovered by layer of 100 g/m2 white paper to attenuate intensity
  5. The paper attack is presented to the sensor and recorded.

 

Reference

If you use this database, please cite the following publication:

Pedro Tome and Sébastien Marcel, "On the Vulnerability of Palm Vein Recognition to Spoofing Attacks", IAPR International Conference on Biometrics (ICB), 2015
10.1109/ICB.2015.7139056

Files

Restricted

The record is publicly accessible, but files are restricted to users with access.

Request access

If you would like to request access to these files, please fill out the form below.

You need to satisfy these conditions in order for this request to be accepted:

Access to the dataset is based on an End-User License Agreement. The use of the dataset is strictly restricted to non-commercial research.

Please provide us the following information about the authorized signatory (MUST hold a permanent position):

  • Full name
  • Name of organization
  • Position / job title
  • Academic / professional email address
  • URL where we can verify the information details

Only academic/professional email addresses from the same organization as the signatory are accepted for the online request. All online requests coming from generic email providers such as gmail will be rejected.

You are currently not logged in. Do you have an account? Log in here

Additional details

Related works

Is documented by
Conference paper: 10.1109/ICB.2015.7139056 (DOI)

Funding

BEAT – Biometrics Evaluation and Testing 284989
European Commission