Estimation of Fractal Dimension and Detection of Fake Finger-Vein Images for Finger-Vein Recognitionopen access
- Authors
- Kim, Seung Gu; Hong, Jin Seong; Kim, Jung Soo; Park, Kang Ryoung
- Issue Date
- Nov-2024
- Publisher
- MDPI
- Keywords
- spoof attack; spoof detection; finger-vein recognition; fractal dimension estimation; generative adversarial network; convolutional neural network
- Citation
- Fractal and Fractional, v.8, no.11, pp 1 - 32
- Pages
- 32
- Indexed
- SCIE
SCOPUS
- Journal Title
- Fractal and Fractional
- Volume
- 8
- Number
- 11
- Start Page
- 1
- End Page
- 32
- URI
- https://scholarworks.dongguk.edu/handle/sw.dongguk/56352
- DOI
- 10.3390/fractalfract8110646
- ISSN
- 2504-3110
2504-3110
- Abstract
- With recent advancements in deep learning, spoofing techniques have developed and generative adversarial networks (GANs) have become an emerging threat to finger-vein recognition systems. Therefore, previous research has been performed to generate finger-vein images for training spoof detectors. However, these are limited and researchers still cannot generate elaborate fake finger-vein images. Therefore, we develop a new densely updated contrastive learning-based self-attention generative adversarial network (DCS-GAN) to create elaborate fake finger-vein images, enabling the training of corresponding spoof detectors. Additionally, we propose an enhanced convolutional network for a next-dimension (ConvNeXt)-Small model with a large kernel attention module as a new spoof detector capable of distinguishing the generated fake finger-vein images. To improve the spoof detection performance of the proposed method, we introduce fractal dimension estimation to analyze the complexity and irregularity of class activation maps from real and fake finger-vein images, enabling the generation of more realistic and sophisticated fake finger-vein images. Experimental results obtained using two open databases showed that the fake images by the DCS-GAN exhibited Frechet inception distances (FID) of 7.601 and 23.351, with Wasserstein distances (WD) of 18.158 and 10.123, respectively, confirming the possibility of spoof attacks when using existing state-of-the-art (SOTA) frameworks of spoof detection. Furthermore, experiments conducted with the proposed spoof detector yielded average classification error rates of 0.4% and 0.12% on the two aforementioned open databases, respectively, outperforming existing SOTA methods for spoof detection.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - College of Engineering > Department of Electronics and Electrical Engineering > 1. Journal Articles

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.