{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T19:15:11Z","timestamp":1774379711338,"version":"3.50.1"},"reference-count":69,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,7,20]],"date-time":"2023-07-20T00:00:00Z","timestamp":1689811200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,7,20]],"date-time":"2023-07-20T00:00:00Z","timestamp":1689811200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"DOI":"10.1007\/s11416-023-00492-z","type":"journal-article","created":{"date-parts":[[2023,7,20]],"date-time":"2023-07-20T11:02:15Z","timestamp":1689850935000},"page":"383-396","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Parametric study of hand dorsal vein biometric recognition vulnerability to spoofing attacks"],"prefix":"10.1007","volume":"20","author":[{"given":"Pavel V.","family":"Mizinov","sequence":"first","affiliation":[]},{"given":"Natalia S.","family":"Konnova","sequence":"additional","affiliation":[]},{"given":"Mikhail A.","family":"Basarab","sequence":"additional","affiliation":[]},{"given":"Ekaterina S.","family":"Pleshakova","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,20]]},"reference":[{"key":"492_CR1","unstructured":"FacePay [Electronic Resource]. https:\/\/ru.wikipedia.org\/wiki\/ FacePay (visited on 04\/19\/2023)."},{"key":"492_CR2","unstructured":"Unified Biometric System: new stage of development [Electronic Resource]. 2023. https:\/\/www.cbr.ru\/eng\/press\/event\/?id=9413 visited on 04\/19\/2023."},{"key":"492_CR3","doi-asserted-by":"publisher","unstructured":"Singhal, S.K.: Security analysis of aadhaar authentication process and way forward. In: 2021 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N). IEEE, 2021. 1304\u20131307. https:\/\/doi.org\/10.1109\/icac3n53548.2021.9725391.","DOI":"10.1109\/icac3n53548.2021.9725391"},{"key":"492_CR4","doi-asserted-by":"publisher","first-page":"2497","DOI":"10.1109\/tifs.2022.3188149","volume":"17","author":"A Liu","year":"2022","unstructured":"Liu, A., Zhao, C., Yu, Z., Wan, J., Su, A., Liu, X., Zhang, D.: Contrastive context-aware learning for 3d high-fidelity mask face presentation attack detection. IEEE Trans. Inf. Forens. Security 17, 2497\u20132507 (2022). https:\/\/doi.org\/10.1109\/tifs.2022.3188149","journal-title":"IEEE Trans. Inf. Forens. Security"},{"key":"492_CR5","doi-asserted-by":"publisher","unstructured":"Kulikov, A.A.: Application of biometric systems in face identification technologies. Russ. Technol. J. 9(3), 7\u201314 (2021). (In Russ.) https:\/\/doi.org\/10.32362\/2500-316X-2021-9-3-7-14","DOI":"10.32362\/2500-316X-2021-9-3-7-14"},{"issue":"5","key":"492_CR6","doi-asserted-by":"publisher","first-page":"1987","DOI":"10.1109\/jbhi.2021.3107735","volume":"26","author":"JD Lin","year":"2021","unstructured":"Lin, J.D., Lin, H.H., Dy, J., Chen, J.C., Tanveer, M., Razzak, I., Hua, K.L.: Lightweight face anti-spoofing network for telehealth applications. IEEE J. Biomed. Health Inform. 26(5), 1987\u20131996 (2021). https:\/\/doi.org\/10.1109\/jbhi.2021.3107735","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"492_CR7","doi-asserted-by":"publisher","first-page":"115883","DOI":"10.1016\/j.eswa.2021.115883","volume":"187","author":"L Birla","year":"2022","unstructured":"Birla, L., Gupta, P.: PATRON: Exploring respiratory signal derived from non-contact face videos for face anti-spoofing. Exp. Syst. Appl. 187, 115883 (2022). https:\/\/doi.org\/10.1016\/j.eswa.2021.115883","journal-title":"Exp. Syst. Appl."},{"key":"492_CR8","doi-asserted-by":"publisher","unstructured":"Wu, H., Kuo, H. C., Zheng, N., Hung, K. H., Lee, H. Y., Tsao, Y., Meng, H.: Partially fake audio detection by self-attention-based fake span discovery. In: ICASSP 2022\u20132022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 9236\u20139240 (2022). https:\/\/doi.org\/10.1109\/icassp43922.2022.9746162.","DOI":"10.1109\/icassp43922.2022.9746162"},{"key":"492_CR9","doi-asserted-by":"publisher","unstructured":"Gonzalez-Soler, L. J., Gomez-Barrero, M., Kamble, M., Todisco, M., Busch, C.:Dual-stream temporal convolutional neural network for voice presentation attack detection. In: 2022 International Workshop on Biometrics and Forensics (IWBF). IEEE, 2022. 1\u20136. https:\/\/doi.org\/10.1109\/iwbf55382.2022","DOI":"10.1109\/iwbf55382.2022"},{"issue":"1","key":"492_CR10","doi-asserted-by":"publisher","first-page":"012119","DOI":"10.1088\/1742-6596\/2224\/1\/012119","volume":"2224","author":"SFA Zaidi","year":"2022","unstructured":"Zaidi, S.F.A., Xu, L.: Implementation of multiple feature selection algorithms for speech spoofing detection. J. Phys. Conf. Ser.. 2224(1), 012119 (2022). https:\/\/doi.org\/10.1088\/1742-6596\/2224\/1\/012119","journal-title":"J. Phys. Conf. Ser.."},{"issue":"4","key":"492_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3527153","volume":"55","author":"C Yan","year":"2022","unstructured":"Yan, C., Ji, X., Wang, K., Jiang, Q., Jin, Z., Xu, W.: A survey on voice assistant security: Attacks and countermeasures. ACM Comput. Surv. 55(4), 1\u201336 (2022). https:\/\/doi.org\/10.1145\/3527153","journal-title":"ACM Comput. Surv."},{"key":"492_CR12","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/tifs.2019.2916652","volume":"15","author":"A George","year":"2019","unstructured":"George, A., Mostaani, Z., Geissenbuhler, D., Nikisins, O., Anjos, A., Marcel, S.: Biometric face presentation attack detection with multi-channel convolutional neural network. IEEE Trans. Inf. Forensics Secur. 15, 42\u201355 (2019). https:\/\/doi.org\/10.1109\/tifs.2019.2916652","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"492_CR13","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1109\/tifs.2019.2922241","volume":"15","author":"H Chen","year":"2019","unstructured":"Chen, H., Hu, G., Lei, Z., Chen, Y., Robertson, N.M., Li, S.Z.: Attention-based two-stream convolutional networks for face spoofing detection. IEEE Trans. Inf. Forensics Secur. 15, 578\u2013593 (2019). https:\/\/doi.org\/10.1109\/tifs.2019.2922241","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"492_CR14","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1109\/tbiom.2020.2973001","volume":"2","author":"S Zhang","year":"2020","unstructured":"Zhang, S., Liu, A., Wan, J., Liang, Y., Guo, G., Escalera, S., Li, S.Z.: Casia-surf: A large-scale multi-modal benchmark for face anti-spoofing. IEEE Trans. Biometrics Behav. Identity Science 2(2), 182\u2013193 (2020). https:\/\/doi.org\/10.1109\/tbiom.2020.2973001","journal-title":"IEEE Trans. Biometrics Behav. Identity Science"},{"key":"492_CR15","doi-asserted-by":"publisher","first-page":"3181","DOI":"10.1109\/tifs.2020.2985530","volume":"15","author":"W Sun","year":"2020","unstructured":"Sun, W., Song, Y., Chen, C., Huang, J., Kot, A.C.: Face spoofing detection based on local ternary label supervision in fully convolutional networks. IEEE Trans. Inf. Forensics Secur. 15, 3181\u20133196 (2020). https:\/\/doi.org\/10.1109\/tifs.2020.2985530","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"9","key":"492_CR16","doi-asserted-by":"publisher","first-page":"3005","DOI":"10.1109\/tpami.2020.3036338","volume":"43","author":"Z Yu","year":"2020","unstructured":"Yu, Z., Wan, J., Qin, Y., Li, X., Li, S.Z., Zhao, G.: NAS-FAS: Static-dynamic central difference network search for face anti-spoofing. IEEE Trans. Pattern Anal. Mach. Intell. 43(9), 3005\u20133023 (2020). https:\/\/doi.org\/10.1109\/tpami.2020.3036338","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"492_CR17","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/tifs.2020.3002390","volume":"16","author":"G Wang","year":"2020","unstructured":"Wang, G., Han, H., Shan, S., Chen, X.: Unsupervised adversarial domain adaptation for cross-domain face presentation attack detection. IEEE Trans. Inf. Forensics Secur. 16, 56\u201369 (2020). https:\/\/doi.org\/10.1109\/tifs.2020.3002390","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"492_CR18","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1109\/tifs.2020.3013214","volume":"16","author":"A George","year":"2020","unstructured":"George, A., Marcel, S.: Learning one class representations for face presentation attack detection using multi-channel convolutional neural networks. IEEE Trans. Inf. Forensics Secur. 16, 361\u2013375 (2020). https:\/\/doi.org\/10.1109\/tifs.2020.3013214","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"492_CR19","doi-asserted-by":"publisher","first-page":"937","DOI":"10.1109\/tifs.2020.3026553","volume":"16","author":"R Cai","year":"2020","unstructured":"Cai, R., Li, H., Wang, S., Chen, C., Kot, A.C.: DRL-FAS: A novel framework based on deep reinforcement learning for face anti-spoofing. IEEE Trans. Inf. Forensics Secur. 16, 937\u2013951 (2020). https:\/\/doi.org\/10.1109\/tifs.2020.3026553","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"492_CR20","doi-asserted-by":"publisher","first-page":"1038","DOI":"10.1109\/jstsp.2020.3007250","volume":"14","author":"JC Neves","year":"2020","unstructured":"Neves, J.C., Tolosana, R., Vera-Rodriguez, R., Lopes, V., Proen\u00e7a, H., Fierrez, J.: Ganprintr: Improved fakes and evaluation of the state of the art in face manipulation detection. IEEE J. Sel. Top. Signal Process. 14(5), 1038\u20131048 (2020). https:\/\/doi.org\/10.1109\/jstsp.2020.3007250","journal-title":"IEEE J. Sel. Top. Signal Process."},{"key":"492_CR21","doi-asserted-by":"publisher","first-page":"36080","DOI":"10.1109\/access.2020.2974290","volume":"8","author":"SH Yoon","year":"2020","unstructured":"Yoon, S.H., Koh, M.S., Park, J.H., Yu, H.J.: A new replay attack against automatic speaker verification systems. IEEE Access 8, 36080\u201336088 (2020). https:\/\/doi.org\/10.1109\/access.2020.2974290","journal-title":"IEEE Access"},{"key":"492_CR22","unstructured":"Oord, A., Li, Y., Babuschkin, I., Simonyan, K., Vinyals, O., Kavukcuoglu, K., Hassabis, D.: Parallel wavenet: Fast high-fidelity speech synthesis. In: J. Dy, A. Krause (eds) Proceedings of the 35th International Conference on Machine Learning. PMLR, vol. 80, pp. 3918\u20133926 (2018)."},{"key":"492_CR23","doi-asserted-by":"publisher","first-page":"1935","DOI":"10.1007\/s00034-017-0639-x","volume":"37","author":"MJ Jannati","year":"2018","unstructured":"Jannati, M.J., Sayadiyan, A.: Part-syllable transformation-based voice conversion with very limited training data. Circ. Syst. Signal Process. 37, 1935\u20131957 (2018). https:\/\/doi.org\/10.1007\/s00034-017-0639-x","journal-title":"Circ. Syst. Signal Process."},{"key":"492_CR24","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.specom.2014.10.005","volume":"66","author":"Z Wu","year":"2015","unstructured":"Wu, Z., Evans, N., Kinnunen, T., Yamagishi, J., Alegre, F., Li, H.: Spoofing and countermeasures for speaker verification: a survey. Speech Commun. 66, 130\u2013153 (2015)","journal-title":"Speech Commun."},{"key":"492_CR25","unstructured":"Hawkes, P. L., Clayden, D.O.: Veincheck research for automatic identification of people. In: Hand and Fingerprint Seminar at NPL, pp. 230\u2013236 (1993)."},{"key":"492_CR26","doi-asserted-by":"publisher","first-page":"4005","DOI":"10.1109\/access.2019.2963078","volume":"8","author":"S Cho","year":"2019","unstructured":"Cho, S., Oh, B.S., Toh, K.A., Lin, Z.: Extraction and cross-matching of palm-vein and palmprint from the RGB and the NIR spectrums for identity verification. IEEE Access 8, 4005\u20134021 (2019). https:\/\/doi.org\/10.1109\/access.2019.2963078","journal-title":"IEEE Access"},{"issue":"04","key":"492_CR27","doi-asserted-by":"publisher","first-page":"2050020","DOI":"10.1142\/s1793545820500200","volume":"13","author":"C Tang","year":"2020","unstructured":"Tang, C., Yuan, Y., Xia, S., Ma, G., Wang, B.: Visualizing veins from color skin images using convolutional neural networks. J. Innov. Opt. Health Sci. 13(04), 2050020 (2020). https:\/\/doi.org\/10.1142\/s1793545820500200","journal-title":"J. Innov. Opt. Health Sci."},{"key":"492_CR28","doi-asserted-by":"publisher","first-page":"86914","DOI":"10.1109\/access.2021.3089484","volume":"9","author":"S Cho","year":"2021","unstructured":"Cho, S., Oh, B.S., Kim, D., Toh, K.A.: Palm-vein verification using images from the visible spectrum. IEEE Access 9, 86914\u201386927 (2021). https:\/\/doi.org\/10.1109\/access.2021.3089484","journal-title":"IEEE Access"},{"issue":"9","key":"492_CR29","doi-asserted-by":"publisher","first-page":"096006","DOI":"10.1117\/1.jbo.26.9.096006","volume":"26","author":"R Jia","year":"2021","unstructured":"Jia, R., Tang, C., Wang, B.: Visualizing veins from color images under varying illuminations for medical applications. J. Biomed. Opt. 26(9), 096006\u2013096006 (2021). https:\/\/doi.org\/10.1117\/1.jbo.26.9.096006","journal-title":"J. Biomed. Opt."},{"issue":"3","key":"492_CR30","doi-asserted-by":"publisher","first-page":"1002","DOI":"10.1111\/1556-4029.15002","volume":"67","author":"C Tang","year":"2022","unstructured":"Tang, C., Zhang, Y., Han, L., Chen, X.: Vein pattern recognition based on RGB images using Monte Carlo simulation and ridge tracking. J. Forensic Sci. 67(3), 1002\u20131020 (2022). https:\/\/doi.org\/10.1111\/1556-4029.15002","journal-title":"J. Forensic Sci."},{"issue":"10","key":"492_CR31","doi-asserted-by":"publisher","first-page":"9315","DOI":"10.1364\/oe.19.009315","volume":"19","author":"N Hashimoto","year":"2011","unstructured":"Hashimoto, N., Murakami, Y., Bautista, P.A., Yamaguchi, M., Obi, T., Ohyama, N., Kosugi, Y.: Multispectral image enhancement for effective visualization. Opt. Exp. 19(10), 9315\u20139329 (2011). https:\/\/doi.org\/10.1364\/oe.19.009315","journal-title":"Opt. Exp."},{"key":"492_CR32","doi-asserted-by":"publisher","unstructured":"Peng, M., Wang, C., Chen, T., Liu, G.: A methodology for palm vein image enhancement and visualization. In: 2016 IEEE International Conference of Online Analysis and Computing Science (ICOACS), IEEE (2016). https:\/\/doi.org\/10.1109\/icoacs.2016.7563048.","DOI":"10.1109\/icoacs.2016.7563048"},{"key":"492_CR33","doi-asserted-by":"publisher","unstructured":"Chen, C., Ross, A:. An explainable attention-guided iris presentation attack detector. In: 2021 IEEE Winter Conference on Applications of Computer Vision Workshops (WACVW), pp. 97\u2013106 (2021). https:\/\/doi.org\/10.1109\/wacvw52041.2021.00015.","DOI":"10.1109\/wacvw52041.2021.00015"},{"key":"492_CR34","doi-asserted-by":"publisher","unstructured":"Rani, S., Gowroju, S., Kumar, S.: IRIS based recognition and spoofing attacks: A review. In: 2021 10th International Conference on System Modeling & Advancement in Research Trends (SMART), IEEE, pp. 2\u20136 (2021). https:\/\/doi.org\/10.1109\/smart52563.","DOI":"10.1109\/smart52563"},{"key":"492_CR35","doi-asserted-by":"publisher","unstructured":"Fang, M., Damer, N., Boutros, F., Kirchbuchner, F., Kuijper, A.: Iris presentation attack detection by attention-based and deep pixel-wise binary supervision network. In: 2021 IEEE International Joint Conference on Biometrics (IJCB). IEEE, pp. 1\u20138 (2021). https:\/\/doi.org\/10.1109\/ijcb52358.2021.","DOI":"10.1109\/ijcb52358.2021"},{"key":"492_CR36","doi-asserted-by":"crossref","unstructured":"Choudhary, M., Tiwari, V., & Venkanna, U.: Iris presentation attack detection for mobile devices. In: Information and Communication Technology for Competitive Strategies (ICTCS 2020). Springer Nature Singapore, pp. 1165\u20131173 (2021)","DOI":"10.1007\/978-981-16-0882-7_105"},{"issue":"5","key":"492_CR37","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/s09694765(21)00060-6","volume":"2021","author":"A Czajka","year":"2021","unstructured":"Czajka, A.: Is that eye dead or alive? Detecting new iris biometrics attacks. Biometric Technol. Today. 2021(5), 9\u201312 (2021). https:\/\/doi.org\/10.1016\/s09694765(21)00060-6","journal-title":"Biometric Technol. Today."},{"key":"492_CR38","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1109\/tifs.2020.3015547","volume":"16","author":"Z Fang","year":"2020","unstructured":"Fang, Z., Czajka, A., Bowyer, K.W.: Robust iris presentation attack detection fusing 2d and 3d information. IEEE Trans. Inf. Forensics Secur. 16, 510\u2013520 (2020). https:\/\/doi.org\/10.1109\/tifs.2020.3015547","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"492_CR39","doi-asserted-by":"publisher","unstructured":"Thukral, A., Kumar, M.: IRIS spoofing through print attack using SVM classification with gabor and HOG features. In: 2022 International Conference for Advancement in Technology (ICONAT). IEEE, pp. 1\u20136 (2022). https:\/\/doi.org\/10.1109\/iconat53423.","DOI":"10.1109\/iconat53423"},{"issue":"17","key":"492_CR40","doi-asserted-by":"publisher","first-page":"5686","DOI":"10.3390\/s21175686","volume":"21","author":"J Kolberg","year":"2021","unstructured":"Kolberg, J., Gl\u00e4sner, D., Breithaupt, R., Gomez-Barrero, M., Reinhold, J., Von Twickel, A., Busch, C.: On the effectiveness of impedance-based fingerprint presentation attack detection. Sensors 21(17), 5686 (2021). https:\/\/doi.org\/10.3390\/s21175686","journal-title":"Sensors"},{"issue":"4","key":"492_CR41","first-page":"117","volume":"2","author":"K Karampidis","year":"2021","unstructured":"Karampidis, K., Rousouliotis, M., Linardos, E., Kavallieratou, E.: A comprehensive survey of fingerprint presentation attack detection. J. Surveill. Secur. Saf. 2(4), 117\u2013161 (2021)","journal-title":"J. Surveill. Secur. Saf."},{"issue":"16","key":"492_CR42","doi-asserted-by":"publisher","first-page":"22129","DOI":"10.1007\/s11042021-11254-8","volume":"81","author":"D Sharma","year":"2022","unstructured":"Sharma, D., Selwal, A.: An intelligent approach for fingerprint presentation attack detection using ensemble learning with improved local image features. Multimedia Tools Appl. 81(16), 22129\u201322161 (2022). https:\/\/doi.org\/10.1007\/s11042021-11254-8","journal-title":"Multimedia Tools Appl."},{"key":"492_CR43","doi-asserted-by":"publisher","unstructured":"Zhang, W., Liu, H., Liu, F.: Fingerprint presentation attack detection by learning in frequency domain. In: 2021 IEEE 2nd International Conference on Pattern Recognition and Machine Learning (PRML). IEEE, pp. 183\u2013189 (2021). https:\/\/doi.org\/10.1109\/prml52754.2021.9520694.","DOI":"10.1109\/prml52754.2021.9520694"},{"issue":"11","key":"492_CR44","doi-asserted-by":"publisher","first-page":"12315","DOI":"10.1109\/tcyb.2021.3081764","volume":"52","author":"H Liu","year":"2021","unstructured":"Liu, H., Zhang, W., Liu, F., Wu, H., Shen, L.: Fingerprint presentation attack detector using global-local model. IEEE Trans. Cybernet. 52(11), 12315\u201312328 (2021). https:\/\/doi.org\/10.1109\/tcyb.2021.3081764","journal-title":"IEEE Trans. Cybernet."},{"issue":"6","key":"492_CR45","doi-asserted-by":"publisher","first-page":"2059","DOI":"10.3390\/s21062059","volume":"21","author":"A Husseis","year":"2021","unstructured":"Husseis, A., Liu-Jimenez, J., Sanchez-Reillo, R.: Fingerprint presentation attack detection utilizing spatio-temporal features. Sensors 21(6), 2059 (2021). https:\/\/doi.org\/10.3390\/s21062059","journal-title":"Sensors"},{"issue":"23","key":"492_CR46","doi-asserted-by":"publisher","first-page":"8547","DOI":"10.3390\/app10238547","volume":"10","author":"F Wang","year":"2020","unstructured":"Wang, F., Leng, L., Teoh, A.B.J., Chu, J.: Palmprint false acceptance attack with a generative adversarial network (GAN). Appl. Sci. 10(23), 8547 (2020). https:\/\/doi.org\/10.3390\/app10238547","journal-title":"Appl. Sci."},{"key":"492_CR47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-39512-4","author":"T Ahram","year":"2020","unstructured":"Ahram, T., Karwowski, W., Vergnano, A., Leali, F., Taiar, R.: intelligent human systems integration. Springer International Publishing, Berlin, (2020). https:\/\/doi.org\/10.1007\/978-3-030-39512-4","journal-title":"Springer International Publishing, Berlin,"},{"issue":"2","key":"492_CR48","doi-asserted-by":"publisher","first-page":"591","DOI":"10.3390\/s22020591","volume":"22","author":"Y Sun","year":"2022","unstructured":"Sun, Y., Leng, L., Jin, Z., Kim, B.G.: Reinforced palmprint reconstruction attacks in biometric systems. Sensors 22(2), 591 (2022). https:\/\/doi.org\/10.3390\/s22020591","journal-title":"Sensors"},{"key":"492_CR49","unstructured":"Tome P., Vanoni M., Marcel S.: On the vulnerability of finger vein recognition to spoofing. In: 2014 International Conference of the Biometrics Special Interest Group (BIOSIG), pp. 1\u201310 (2014)"},{"key":"492_CR50","doi-asserted-by":"publisher","unstructured":"Tome P., Marcel S.: On the vulnerability of palm vein recognition to spoofing attacks. In: Proceedings of 2015 International Conference on Biometrics, ICB 2015, IEEE, pp. 319\u2013325 (2015). https:\/\/doi.org\/10.1109\/icb.2015.7139056.","DOI":"10.1109\/icb.2015.7139056"},{"key":"492_CR51","doi-asserted-by":"publisher","unstructured":"Tome, P., Raghavendra, R., Busch, C., Tirunagari, S., Poh, N., Shekar, B.H., Marcel, S.: The 1st competition on counter measures to finger vein spoofing attacks. In: 2015 International Conference on Biometrics (ICB), IEEE, 2015, pp. 513\u2013 518 (2015). https:\/\/doi.org\/10.1109\/icb.2015.7139067.","DOI":"10.1109\/icb.2015.7139067"},{"key":"492_CR52","doi-asserted-by":"publisher","unstructured":"Debiasi, L., Kauba, C., Hofbauer, H., Prommegger, B., Uhl, A.: Presentation attacks and detection in finger-and hand-vein recognition. In: Proceedings of the Joint Austrian Computer Vision and Robotics Workshop 2020 (The Joint Austrian Computer Vision and Robotics Workshop (OAGM and ARW Workshop)). Verlag der Technischen Universit\u00a8at Graz, Graz, (2020), pp. 65\u201370. https:\/\/doi.org\/10.3217\/978-3-85125-7526-16. Visited on 11\/24\/2022","DOI":"10.3217\/978-3-85125-7526-16"},{"key":"492_CR53","doi-asserted-by":"crossref","unstructured":"Aydemir, A. K., H\u00e4mmerle-Uhl, J., Uhl, A.: Feasibility of morphing-attacks in vascular biometrics. In: 2021 IEEE International Joint Conference on Biometrics (IJCB), Shenzhen, China (2021)","DOI":"10.1109\/IJCB52358.2021.9484372"},{"key":"492_CR54","doi-asserted-by":"publisher","unstructured":"Schuiki, J., Prommegger, B., Uhl, A.: Confronting a variety of finger vein recognition algorithms with wax presentation attack artefacts. In: 2021 IEEE International Workshop on Biometrics and Forensics (IWBF) (2021 IEEE International Workshop on Biometrics and Forensics (IWBF)), Rome, Italy, IEEE,. 1\u20136 (2021). https:\/\/doi.org\/10.1109\/IWBF50991.2021.9465091.","DOI":"10.1109\/IWBF50991.2021.9465091"},{"key":"492_CR55","doi-asserted-by":"publisher","unstructured":"Wang, Y., Zhao, Z.: Liveness detection of dorsal hand vein based on the analysis of Fourier spectral. In: Lecture notes in computer science. Springer International Publishing, 322\u2013329 (2013). https:\/\/doi.org\/10.1007\/978-3-319-029610_40.","DOI":"10.1007\/978-3-319-029610_40"},{"key":"492_CR56","unstructured":"FIDIS. D6.1 Forensic Implications of Identity Management Systems [Electronic Resource]. (2006) http:\/\/www.fidis.net\/fileadmin\/fidis\/deliverables\/fidis-wp6-del6.1.forensic_implications_of_identity_management_systems.pdf. Visited on 06\/30\/2021"},{"key":"492_CR57","doi-asserted-by":"publisher","unstructured":"Patil, I., Bhilare, S., Kanhangad, V.: Assessing vulnerability of dorsal hand-vein verification system to spoofing attacks using smartphone camera. In: 2016 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA), IEEE, 1\u20136 (2016). https:\/\/doi.org\/10.1109\/isba.2016.7477232.","DOI":"10.1109\/isba.2016.7477232"},{"key":"492_CR58","doi-asserted-by":"publisher","unstructured":"Bhilare, S., Kanhangad, V., Chaudhari, N.: Histogram of oriented gradients based presentation attack detection in dorsal hand-vein biometric system. In: 2017 Fifteenth IAPR International Conference on Machine Vision Applications (MVA) (2017 Fifteenth IAPR International Conference on Machine Vision Applications (MVA)). Nagoya, Japan, IEEE, pp. 39\u201342 2017. ISBN 978\u20134\u2013901122\u201316\u20130. https:\/\/doi.org\/10.23919\/MVA.","DOI":"10.23919\/MVA"},{"key":"492_CR59","first-page":"1","volume":"2020","author":"J Schuiki","year":"2020","unstructured":"Schuiki, J., Uhl, A.: Improved liveness detection in dorsal hand vein videos using photoplethysmography. German Comput. Assoc. Bonn 2020, 1\u20135 (2020)","journal-title":"German Comput. Assoc. Bonn"},{"key":"492_CR60","doi-asserted-by":"publisher","unstructured":"Raghavendra, R., Avinash, M., Marcel, S., Busch, C.: Finger vein liveness detection using motion magnification. In: 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS). IEEE (2015). https:\/\/doi.org\/10.1109\/btas.2015.7358762.","DOI":"10.1109\/btas.2015.7358762"},{"key":"492_CR61","doi-asserted-by":"publisher","unstructured":"Patil, I., Bhilare, S., Kanhangad, V.: Assessing vulnerability of dorsal hand-vein verification system to spoofing attacks using smartphone camera. In: 2016 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA), IEEE, 1\u20136 (2016). https:\/\/doi.org\/10.1109\/isba.2016.7477232.","DOI":"10.1109\/isba.2016.7477232"},{"issue":"5","key":"492_CR62","doi-asserted-by":"publisher","first-page":"1469","DOI":"10.3390\/s20051469","volume":"20","author":"R Garcia-Martin","year":"2020","unstructured":"Garcia-Martin, R., Sanchez-Reillo, R.: Wrist vascular biometric recognition using a portable contactless system. Sensors 20(5), 1469 (2020). https:\/\/doi.org\/10.3390\/s20051469","journal-title":"Sensors"},{"key":"492_CR63","doi-asserted-by":"publisher","first-page":"104801","DOI":"10.1109\/access.2020","volume":"8","author":"R Garcia-Martin","year":"2020","unstructured":"Garcia-Martin, R., Sanchez-Reillo, R.: Vein biometric recognition on a smartphone. IEEE Access 8, 104801\u2013104813 (2020). https:\/\/doi.org\/10.1109\/access.2020","journal-title":"IEEE Access"},{"key":"492_CR64","unstructured":"ArcticEngineer. IRVeinViewer. 2021. https:\/\/play.google.com\/store\/apps\/details?id=ru.arcticengineer.irveinviewer&hl=ru&gl=US."},{"key":"492_CR65","doi-asserted-by":"publisher","unstructured":"Li, J., Hu, Y., Zhang, Y., Zhao, Z., Li, J., Zhou, W.: Finger-vein recognition based on improved Zernike moment. In: 2017 Chinese Automation Congress (CAC). \u2014 Jinan: IEEE (2017). https:\/\/doi.org\/10.1109\/cac.2017.8243129.","DOI":"10.1109\/cac.2017.8243129"},{"key":"492_CR66","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1023\/b:visi.0000029664.99615.94","volume":"60","author":"DG Lowe","year":"2004","unstructured":"Lowe, D.G.: Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vision 60, 91\u2013110 (2004). https:\/\/doi.org\/10.1023\/b:visi.0000029664.99615.94","journal-title":"Int. J. Comput. Vision"},{"key":"492_CR67","doi-asserted-by":"publisher","unstructured":"Wang, G., Wang, J.: SIFT based vein recognition models: analysis and improvement. In: Computational and Mathematical Methods in Medicine, pp. 1\u201314 (2017). https:\/\/doi.org\/10.1155\/2017\/2373818.","DOI":"10.1155\/2017\/2373818"},{"key":"492_CR68","doi-asserted-by":"publisher","unstructured":"Anjos, A., Tome, P., Marcel, S.: An introduction to vein presentation attacks and detection. In: Handbook of Biometric Anti-Spoofing: Presentation Attack Detection, 419\u2013438 (2019). https:\/\/doi.org\/10.1007\/978-3-319-92627-8_18.","DOI":"10.1007\/978-3-319-92627-8_18"},{"key":"492_CR69","doi-asserted-by":"publisher","unstructured":"Wang, Y., Qi, Q., Li, K.: Liveness detection of dorsal hand vein based on AutoRegressive model. In: 2014 IEEE Computers, Communications and IT Applications Conference, pp. 206\u2013210 (2014). IEEE. https:\/\/doi.org\/10.1109\/comcomap.2014.7017197.","DOI":"10.1109\/comcomap.2014.7017197"}],"updated-by":[{"DOI":"10.1007\/s11416-023-00496-9","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2023,8,12]],"date-time":"2023-08-12T00:00:00Z","timestamp":1691798400000}}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-023-00492-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11416-023-00492-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-023-00492-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,9]],"date-time":"2025-01-09T10:09:32Z","timestamp":1736417372000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11416-023-00492-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,20]]},"references-count":69,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2024,9]]}},"alternative-id":["492"],"URL":"https:\/\/doi.org\/10.1007\/s11416-023-00492-z","relation":{},"ISSN":["2263-8733"],"issn-type":[{"value":"2263-8733","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,20]]},"assertion":[{"value":"16 February 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 July 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 July 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 August 2023","order":4,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":5,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":6,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s11416-023-00496-9","URL":"https:\/\/doi.org\/10.1007\/s11416-023-00496-9","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest or competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}