|
|||||||
| |||||||
PLUS-FV3 PALMAR Image Spoofing Data Set (PLUS-FV3 Spoof) - Download Page | |||||||
This is "The Multimedia Signal Processing and Security Lab", short WaveLab, website. We are a research group at the Artificial Intelligence and Human Interfaces (AIHI)
Department of the University of Salzburg led by Andreas Uhl.
Our research is focused on Visual Data Processing and associated security questions. Most of our work is currently concentrated on Biometrics, Media Forensics and
Media Security, Medical Image and Video Analysis, and application oriented fundamental research in digital humanities, individualised aquaculture and sustainable wood
industry.
| |||||||
PLUS-FV3 PALMAR Image Spoofing Data Set (PLUS-FV3 Spoof)The PLUS-FV3 PALMAR Image Spoofing Data Set (PLUS-FV3 Spoof) consists of finger vein images acquired from presentation attack (PA) artefacts. The body of the artefacts are made of beeswax whereas the vein pattern itself is printed on white paper. The images have been acquired using the PLUS-OpenVein Finger Vein Scanner. The source images for extracting the vein pattern have been taken from the publicly available PLUSVein-FV3 Finger Vein Data Set.
Filename and Directory Structure (todo update)Directory Structure: Filename: Placeholder:
Reference[Schuiki21a ] Confronting a Variety of Finger Vein Recognition Algorithms With Wax Presentation Attack Artefacts In Proceedings of the 9th IEEE International Workshop on Biometrics and Forensics (IWBF'21), pp. 1-6, Rome, Italy, May 6-7
Obtaining the DatabaseTo obtain the PLUSVein-FV3 Finger Vein Database you have to agree to our license agreement:PLUSVein-FV3 Consent Form Please download, fill in and sign the license agreement and send it to A. Uhl or via mail to our department. After checking the license agreement you will be provided with a download link for both, the raw finger vein images as well as the extracted ROI images. | |||||||
|