skip to main content
research-article

Explainable AI: A Multispectral Palm-Vein Identification System with New Augmentation Features

Authors Info & Claims
Published:15 November 2021Publication History
Skip Abstract Section

Abstract

Recently, as one of the most promising biometric traits, the vein has attracted the attention of both academia and industry because of its living body identification and the convenience of the acquisition process. State-of-the-art techniques can provide relatively good performance, yet they are limited to specific light sources. Besides, it still has poor adaptability to multispectral images. Despite the great success achieved by convolutional neural networks (CNNs) in various image understanding tasks, they often require large training samples and high computation that are infeasible for palm-vein identification. To address this limitation, this work proposes a palm-vein identification system based on lightweight CNN and adaptive multi-spectral method with explainable AI. The principal component analysis on symmetric discrete wavelet transform (SMDWT-PCA) technique for vein images augmentation method is adopted to solve the problem of insufficient data and multispectral adaptability. The depth separable convolution (DSC) has been applied to reduce the number of model parameters in this work. To ensure that the experimental result demonstrates accurately and robustly, a multispectral palm image of the public dataset (CASIA) is also used to assess the performance of the proposed method. As result, the palm-vein identification system can provide superior performance to that of the former related approaches for different spectrums.

REFERENCES

  1. [1] Liu Yun-Fu, Guo Jing-Ming, Hsia Chih-Hsien, Su Sheng-Yao, and Lee Hua. 2014. Sample space dimensionality refinement for symmetrical object detection. IEEE Transactions on Information Forensics and Security 9, 11 (2014), 19531961. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. [2] Sanchez-Riera Jordi, Srinivasan Kathiravan, Hua Kai-Lung, Cheng Wen-Huang, Anwar Hossain M., and Alhamid Mohammed F.. 2018. Robust rgb-d hand tracking using deep learning priors. IEEE Transactions on Circuits and Systems for Video Technology 28, 9 (2018), 22892301.Google ScholarGoogle ScholarCross RefCross Ref
  3. [3] Guo Jing-Ming, Hsia Chih-Hsien, Liu Yun-Fu, Yu Jie-Cyun, Chu Mei-Hui, and Le Thanh-Nam. 2012. Contact-free hand geometry-based identification system. Expert Systems with Applications 39, 14 (2012), 1172811736. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. [4] Hollingsworth Karen P., Bowyer Kevin W., and Flynn Patrick J.. 2011. Improved iris recognition through fusion of hamming distance and fragile bit distance. IEEE Transactions on Pattern Analysis and Machine Intelligence 33, 12 (2011), 24652476. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. [5] Prabhakar Salil, Jain Anil K., and Pankanti Sharath. 2003. Learning fingerprint minutiae location and type. Pattern Recognition 36, 8 (2003), 18471857.Google ScholarGoogle ScholarCross RefCross Ref
  6. [6] Štruc Vitomir and Pavešić Nikola. 2009. Phase congruency features for palm-print verification. IET Signal Processing 3, 4 (2009), 258268.Google ScholarGoogle ScholarCross RefCross Ref
  7. [7] Lin Yan-Ching, Hu Min-Chun, Cheng Wen-Huang, Hsieh Yung-Huan, and Chen Hong-Ming. 2012. Human action recognition and retrieval using sole depth information. In 2012 ACM 20th International Conference on Multimedia. ACM, 10531056. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. [8] Xie Hong-Xia, Lo Ling, Shuai Hong-Han, and Cheng Wen-Huang. 2020. AU-assisted graph attention convolutional network for micro-expression recognition. In 2020 ACM 28th International Conference on Multimedia. ACM, 28712880. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. [9] Hsia Chih-Hsien. 2017. New verification strategy for finger-vein recognition system. IEEE Sensors Journal 18, 2 (2017), 790797.Google ScholarGoogle ScholarCross RefCross Ref
  10. [10] Arora Parul, Srivastava Smriti, Hanmandlu Madasu, and Bhargava Sandeep. 2018. Robust authentication using dorsal hand vein images. IEEE Intelligent Systems 34, 2 (2018), 2535. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. [11] Wu Wei, Elliott Stephen John, Lin Sen, and Yuan Weiqi. 2019. Low-cost biometric recognition system based on nir palm vein image. IET Biometrics 8, 3 (2019), 206214.Google ScholarGoogle ScholarCross RefCross Ref
  12. [12] Bontrager Philip, Roy Aditi, Togelius Julian, Memon Nasir, and Ross Arun. 2018. Deepmasterprints: Generating masterprints for dictionary attacks via latent variable evolution. In 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS). IEEE, 19.Google ScholarGoogle ScholarCross RefCross Ref
  13. [13] Tirunagari Santosh, Poh Norman, Windridge David, Iorliam Aamo, Suki Nik, and Ho Anthony T. S.. 2015. Detection of face spoofing using visual dynamics. IEEE Transactions on Information Forensics and Security 10, 4 (2015), 762777.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. [14] Menotti David, Chiachia Giovani, Pinto Allan, Schwartz William Robson, Pedrini Helio, Falcao Alexandre Xavier, and Rocha Anderson. 2015. Deep representations for iris, face, and fingerprint spoofing detection. IEEE Transactions on Information Forensics and Security 10, 4 (2015), 864879.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. [15] Farmanbar Mina and Toygar Önsen. 2017. Spoof detection on face and palmprint biometrics. Signal, Image and Video Processing 11, 7 (2017), 12531260.Google ScholarGoogle ScholarCross RefCross Ref
  16. [16] Wu Jian-Da and Ye Siou-Huan. 2009. Driver identification using finger-vein patterns with radon transform and neural network. Expert Systems with Applications 36, 3 (2009), 57935799. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. [17] Dong Wengong, Ren Jianwen, Su Yahui, Wang Chunyi, Sun Xiongwei, Zhu Zede, and Zeng Xinhua. 2017. Research on multi-spectral adaptive method for palm vein capturing based on image quality. In 2017 32nd Youth Academic Annual Conference of Chinese Association of Automation (YAC). IEEE, 11541157.Google ScholarGoogle ScholarCross RefCross Ref
  18. [18] Zhou Yingbo and Kumar Ajay. 2011. Human identification using palm-vein images. IEEE Transactions on Information Forensics and Security 6, 4 (2011), 12591274. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. [19] Kang Wenxiong and Wu Qiuxia. 2014. Contactless palm vein recognition using a mutual foreground-based local binary pattern. IEEE Transactions on Information Forensics and Security 9, 11 (2014), 19741985. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. [20] Piciucco Emanuela, Maiorana Emanuele, and Campisi Patrizio. 2018. Palm vein recognition using a high dynamic range approach. IET Biometrics 7, 5 (2018), 439446.Google ScholarGoogle ScholarCross RefCross Ref
  21. [21] Jhong Sin-Ye, Tseng Po-Yen, Siriphockpirom Natnuntnita, Hsia Chih-Hsien, Huang Ming-Shih, Hua Kai-Lung, and Chen Yung-Yao. 2020. An Automated biometric identification system using cnn-based palm vein recognition. In 2020 IEEE 8th International Conference on Advanced Robotics and Intelligent Systems (ARIS). IEEE, 16.Google ScholarGoogle ScholarCross RefCross Ref
  22. [22] Kumar Ajay and Zhou Yingbo. 2011. Human identification using finger images. IEEE Transactions on Image Processing 21, 4 (2011), 22282244. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. [23] Song Jong Min, Kim Wan, and Park Kang Ryoung. 2019. Finger-vein recognition based on deep densenet using composite image. IEEE Access 7 (2019), 6684566863.Google ScholarGoogle ScholarCross RefCross Ref
  24. [24] Xie Cihui and Kumar Ajay. 2017. Finger vein identification using convolutional neural network and supervised discrete hashing. In Deep Learning for Biometrics. Springer, 109132.Google ScholarGoogle ScholarCross RefCross Ref
  25. [25] Wang Jun, Pan Zaiyu, Wang Guoqing, Li Ming, and Li Yulian. 2018. Spatial pyramid pooling of selective convolutional features for vein recognition. IEEE Access 6 (2018), 2856328572.Google ScholarGoogle ScholarCross RefCross Ref
  26. [26] Suarez Pascual J. Enrique, Uriarte-Antonio Jaime, Sanchez-Reillo Raul, and Lorenz Michael G.. 2010. Capturing hand or wrist vein images for biometric authentication using low-cost devices. In 2010 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE, 318322. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. [27] Toygar Ö., Babalola F. O., and Bi̇ti̇ri̇m Y.. 2020. FYO: A novel multimodal vein database with palmar, dorsal and wrist biometrics. IEEE Access 8 (2020), 8246182470.Google ScholarGoogle ScholarCross RefCross Ref
  28. [28] Zhang Hengyi, Tang Chaoying, Kong Adams Wai-Kin, and Craft Noah. 2012. Matching vein patterns from color images for forensic investigation. In 2012 IEEE 5th International Conference on Biometrics: Theory, Applications and Systems (BTAS). IEEE, 7784.Google ScholarGoogle ScholarCross RefCross Ref
  29. [29] Miura Naoto, Nagasaka Akio, and Miyatake Takafumi. 2004. Feature extraction of finger-vein patterns based on repeated line tracking and its application to personal identification. Machine Vision and Applications 15, 4 (2004), 194203. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. [30] Mirmohamadsadeghi Leila and Drygajlo Andrzej. 2014. Palm vein recognition with local texture patterns. IET Biometrics 3, 4 (2014), 198206.Google ScholarGoogle ScholarCross RefCross Ref
  31. [31] Li Xueyan, Guo Shuxu, Gao Fengli, and Li Ye. 2007. Vein pattern recognitions by moment invariants. In 2007 1st International Conference on Bioinformatics and Biomedical Engineering. IEEE, 612615.Google ScholarGoogle ScholarCross RefCross Ref
  32. [32] Kang Wenxiong, Liu Yang, Wu Qiuxia, and Yue Xishun. 2014. Contact-free palm-vein recognition based on local invariant features. PloS One 9, 5 (2014), e97548.Google ScholarGoogle ScholarCross RefCross Ref
  33. [33] Wang Guoqing and Wang Jun. 2017. Sift based vein recognition models: Analysis and improvement. Computational and Mathematical Methods in Medicine 17 (2017), 114.Google ScholarGoogle Scholar
  34. [34] Radzi Syafeeza Ahmad, Mani Mohamed Khalil, and Bakhteri Rabia. 2016. Finger-vein biometric identification using convolutional neural network. Turkish Journal of Electrical Engineering & Computer Sciences 24, 3 (2016), 18631878.Google ScholarGoogle ScholarCross RefCross Ref
  35. [35] Simard Patrice Y., Steinkraus David, and Platt John C.. 2003. Best practices for convolutional neural networks applied to visual document analysis. In Icdar 3, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. [36] Hong Hyung Gil, Lee Min Beom, and Park Kang Ryoung. 2017. Convolutional neural network-based finger-vein recognition using nir image sensors. Sensors 17, 6 (2017), 1297.Google ScholarGoogle ScholarCross RefCross Ref
  37. [37] Simonyan Karen, and Zisserman Andrew. 2015. Very deep convolutional networks for large-scale image recognition. In International Conference on Learning Representations (ICLR). 7784.Google ScholarGoogle Scholar
  38. [38] Piciucco Das Emanuela, Maiorana Emanuele, and Campisi Patrizio. 2018. Convolutional neural network for finger-vein- vein-based biometric identification. IEEE Transactions on Information Forensics and Security 14, 2 (2018), 360373.Google ScholarGoogle Scholar
  39. [39] Krizhevsky Alex, Sutskever Ilya, and Hinton Geoffrey E.. 2017. Imagenet classification with deep convolutional neural networks. Communications of the ACM 60, 6 (2017), 8490. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. [40] Yuxun Fang, Qiuxia Wu, and Wenxiong Kang. 2018. A novel finger vein verification system based on two-stream convolutional network learning. Neurocomputing 290, 17 (2018), 100107.Google ScholarGoogle Scholar
  41. [41] Li Xiang, Chen Shuo, Hu Xiaolin, and Yang Jian. 2019. Understanding the disharmony between dropout and batch normalization by variance shift. In 2019 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). IEEE, 26772685.Google ScholarGoogle ScholarCross RefCross Ref
  42. [42] Ribeiro Marco Tulio, Singh Sameer, and Guestrin Carlos. 2016. Why should I trust you?" explaining the predictions of any classifier. In 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 11351144. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. [43] CASIA public database. Retrieved from http://biometrics.idealtest.org/.Google ScholarGoogle Scholar
  44. [44] Cubuk E. D., Zoph B., Mané D., Vasudevan V., and Le Q. V.. 2019. AutoAugment: learning augmentation strategies from data. 2019 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). IEEE, 113123.Google ScholarGoogle ScholarCross RefCross Ref
  45. [45] Cubuk E. D., Zoph B., Shlens J., and Le Q. V.. 2020. Randaugment: Practical automated data augmentation with a reduced search space. 2020 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). IEEE, 30083017.Google ScholarGoogle ScholarCross RefCross Ref
  46. [46] Bhilare Shruti, Jaswal Gaurav, Kanhangad Vivek, and Nigam Aditya. 2018. Single-sensor hand-vein multimodal biometric recognition using multiscale deep pyramidal approach. Machine Vision and Applications 18, 7 (2018), 12691286. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. [47] Thapar Daksh, Jaswal Gaurav, Nigam Aditya, and Kanhangad Vivek. 2019. Pvsnet: Palm-vein authentication Siamese network trained using triplet loss and adaptive hard mining by learning enforced domain specific features. In 2019 IEEE 5th International Conference on Identity, Security, and Behavior Analysis (ISBA). IEEE, 18.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Explainable AI: A Multispectral Palm-Vein Identification System with New Augmentation Features

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Multimedia Computing, Communications, and Applications
      ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 17, Issue 3s
      October 2021
      324 pages
      ISSN:1551-6857
      EISSN:1551-6865
      DOI:10.1145/3492435
      Issue’s Table of Contents

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 15 November 2021
      • Revised: 1 May 2021
      • Accepted: 1 May 2021
      • Received: 1 November 2020
      Published in tomm Volume 17, Issue 3s

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    View Full Text

    HTML Format

    View this article in HTML Format .

    View HTML Format
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!