IEEE Spectrum
Active shape models—their training and application
Computer Vision and Image Understanding
Inside risks: the uses and abuses of biometrics
Communications of the ACM
Biometric Identification through Hand Geometry Measurements
IEEE Transactions on Pattern Analysis and Machine Intelligence
IEEE Transactions on Pattern Analysis and Machine Intelligence
Numerical Methods Using MATLAB
Numerical Methods Using MATLAB
ACM Transactions on Graphics (TOG)
An Introduction to Text-to-Speech Synthesis
An Introduction to Text-to-Speech Synthesis
Visual Identification by Signature Tracking
IEEE Transactions on Pattern Analysis and Machine Intelligence
Generation of Signatures by Deformations
BSDIA '97 Proceedings of the First Brazilian Symposium on Advances in Document Image Analysis
Handbook of Fingerprint Recognition
Handbook of Fingerprint Recognition
Learning-based Cursive Handwriting Synthesis
IWFHR '02 Proceedings of the Eighth International Workshop on Frontiers in Handwriting Recognition (IWFHR'02)
Linear generalization probe samples for face recognition
Pattern Recognition Letters
An Iris Image Synthesis Method Based on PCA and Super-Resolution
ICPR '04 Proceedings of the Pattern Recognition, 17th International Conference on (ICPR'04) Volume 4 - Volume 04
COMBINING FINGERPRINT, PALMPRINT AND HAND-SHAPE FOR USER AUTHENTICATION
ICPR '06 Proceedings of the 18th International Conference on Pattern Recognition - Volume 04
Style-preserving English handwriting synthesis
Pattern Recognition
From Template to Image: Reconstructing Fingerprints from Minutiae Points
IEEE Transactions on Pattern Analysis and Machine Intelligence
A survey of biometric technology based on hand shape
Pattern Recognition
Palmprint verification using binary orientation co-occurrence vector
Pattern Recognition Letters
On the vulnerability of face verification systems to hill-climbing attacks
Pattern Recognition
Image and Vision Computing
An evaluation of direct attacks using fake fingers generated from ISO templates
Pattern Recognition Letters
Palm vein extraction and matching for personal authentication
VISUAL'07 Proceedings of the 9th international conference on Advances in visual information systems
Comparison of distance-based features for hand geometry authentication
BioID_MultiComm'09 Proceedings of the 2009 joint COST 2101 and 2102 international conference on Biometric ID management and multimodal communication
BioID'11 Proceedings of the COST 2101 European conference on Biometrics and ID management
Introduction to Biometrics
Biometrics: a tool for information security
IEEE Transactions on Information Forensics and Security
Hand-Geometry Recognition Using Entropy-Based Discretization
IEEE Transactions on Information Forensics and Security
On Generation and Analysis of Synthetic Iris Images
IEEE Transactions on Information Forensics and Security
Characterization of palmprints by wavelet signatures via directional context modeling
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Fingerprint Image Reconstruction from Standard Templates
IEEE Transactions on Pattern Analysis and Machine Intelligence
A high performance fingerprint liveness detection method based on quality related features
Future Generation Computer Systems
IEEE Transactions on Image Processing
Personal recognition using hand shape and texture
IEEE Transactions on Image Processing
MPEG-7 visual shape descriptors
IEEE Transactions on Circuits and Systems for Video Technology
How to Generate Spoofed Irises From an Iris Code Template
IEEE Transactions on Information Forensics and Security
Hand-Shape Biometrics Combining the Visible and Short-Wave Infrared Bands
IEEE Transactions on Information Forensics and Security
Quality Measures in Biometric Systems
IEEE Security and Privacy
Automated Biometrics: Technologies and Systems
Automated Biometrics: Technologies and Systems
Hi-index | 0.07 |
The present work proposes a novel probabilistic method to reconstruct a hand shape image from its template. We analyse the degree of similarity between the reconstructed images and the original samples in order to determine whether the synthetic hands are able to deceive hand recognition systems. This analysis is made through the estimation of the success chances of an attack carried out with the synthetic samples against an independent system. The experimental results show that there is a high chance of breaking a hand recognition system using this approach. Furthermore, since it is a probabilistic method, several synthetic images can be generated from each original sample, which increases the success chances of the attack.