{"id":"https://openalex.org/W7118022265","doi":"https://doi.org/10.1109/tifs.2025.3650391","title":"A Comprehensive Framework for Palm Vein Anti-Spoofing With Preprocessing Pipeline, Dataset, and Benchmark","display_name":"A Comprehensive Framework for Palm Vein Anti-Spoofing With Preprocessing Pipeline, Dataset, and Benchmark","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7118022265","doi":"https://doi.org/10.1109/tifs.2025.3650391"},"language":null,"primary_location":{"id":"doi:10.1109/tifs.2025.3650391","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3650391","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5121833741","display_name":"Caiping Yan","orcid":null},"institutions":[{"id":"https://openalex.org/I163151501","display_name":"Hangzhou Normal University","ror":"https://ror.org/014v1mr15","country_code":"CN","type":"education","lineage":["https://openalex.org/I163151501"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Caiping Yan","raw_affiliation_strings":["School of Information Science and Technology, Hangzhou Normal University, Hangzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-5559-258X","affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, Hangzhou Normal University, Hangzhou, China","institution_ids":["https://openalex.org/I163151501"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121797438","display_name":"Zhi Lan","orcid":null},"institutions":[{"id":"https://openalex.org/I4210090158","display_name":"Hangzhou Quality and Technical Supervision and Testing Institute","ror":"https://ror.org/00ahhj040","country_code":"CN","type":"other","lineage":["https://openalex.org/I4210090158"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhi Lan","raw_affiliation_strings":["Hangzhou Insvision Technology Company Ltd., Hangzhou, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Hangzhou Insvision Technology Company Ltd., Hangzhou, China","institution_ids":["https://openalex.org/I4210090158"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121783044","display_name":"Hong Li","orcid":null},"institutions":[{"id":"https://openalex.org/I4210090158","display_name":"Hangzhou Quality and Technical Supervision and Testing Institute","ror":"https://ror.org/00ahhj040","country_code":"CN","type":"other","lineage":["https://openalex.org/I4210090158"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hong Li","raw_affiliation_strings":["Hangzhou Insvision Technology Company Ltd., Hangzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-8149-9047","affiliations":[{"raw_affiliation_string":"Hangzhou Insvision Technology Company Ltd., Hangzhou, China","institution_ids":["https://openalex.org/I4210090158"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121791337","display_name":"Yuqi Li","orcid":null},"institutions":[{"id":"https://openalex.org/I4210090158","display_name":"Hangzhou Quality and Technical Supervision and Testing Institute","ror":"https://ror.org/00ahhj040","country_code":"CN","type":"other","lineage":["https://openalex.org/I4210090158"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuqi Li","raw_affiliation_strings":["Hangzhou Insvision Technology Company Ltd., Hangzhou, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Hangzhou Insvision Technology Company Ltd., Hangzhou, China","institution_ids":["https://openalex.org/I4210090158"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034089388","display_name":"Zonglin Meng","orcid":"https://orcid.org/0000-0002-0592-0135"},"institutions":[{"id":"https://openalex.org/I161318765","display_name":"University of California, Los Angeles","ror":"https://ror.org/046rm7j60","country_code":"US","type":"education","lineage":["https://openalex.org/I161318765"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zonglin Meng","raw_affiliation_strings":["University of California, Los Angeles, California, U.S"],"raw_orcid":"https://orcid.org/0000-0002-0592-0135","affiliations":[{"raw_affiliation_string":"University of California, Los Angeles, California, U.S","institution_ids":["https://openalex.org/I161318765"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5121833741"],"corresponding_institution_ids":["https://openalex.org/I163151501"],"apc_list":null,"apc_paid":null,"fwci":37.0522,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.98227236,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"21","issue":null,"first_page":"945","last_page":"959"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9697999954223633,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9697999954223633,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11866","display_name":"Reconstructive Facial Surgery Techniques","score":0.01720000058412552,"subfield":{"id":"https://openalex.org/subfields/2746","display_name":"Surgery"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}},{"id":"https://openalex.org/T10392","display_name":"Cutaneous Melanoma Detection and Management","score":0.0008999999845400453,"subfield":{"id":"https://openalex.org/subfields/2730","display_name":"Oncology"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/preprocessor","display_name":"Preprocessor","score":0.7982000112533569},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.7001000046730042},{"id":"https://openalex.org/keywords/unavailability","display_name":"Unavailability","score":0.6707000136375427},{"id":"https://openalex.org/keywords/pipeline","display_name":"Pipeline (software)","score":0.6460999846458435},{"id":"https://openalex.org/keywords/discriminative-model","display_name":"Discriminative model","score":0.5968000292778015},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.42579999566078186},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.39989998936653137},{"id":"https://openalex.org/keywords/face","display_name":"Face (sociological concept)","score":0.3978999853134155},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.388700008392334}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8909000158309937},{"id":"https://openalex.org/C34736171","wikidata":"https://www.wikidata.org/wiki/Q918333","display_name":"Preprocessor","level":2,"score":0.7982000112533569},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.7001000046730042},{"id":"https://openalex.org/C2780505938","wikidata":"https://www.wikidata.org/wiki/Q17093282","display_name":"Unavailability","level":2,"score":0.6707000136375427},{"id":"https://openalex.org/C43521106","wikidata":"https://www.wikidata.org/wiki/Q2165493","display_name":"Pipeline (software)","level":2,"score":0.6460999846458435},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5983999967575073},{"id":"https://openalex.org/C97931131","wikidata":"https://www.wikidata.org/wiki/Q5282087","display_name":"Discriminative model","level":2,"score":0.5968000292778015},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4551999866962433},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4366999864578247},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.42579999566078186},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.39989998936653137},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.3978999853134155},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.388700008392334},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.3880999982357025},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.37770000100135803},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.367000013589859},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.35850000381469727},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3492000102996826},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.3479999899864197},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.34119999408721924},{"id":"https://openalex.org/C10551718","wikidata":"https://www.wikidata.org/wiki/Q5227332","display_name":"Data pre-processing","level":2,"score":0.3402999937534332},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.3375000059604645},{"id":"https://openalex.org/C2776836416","wikidata":"https://www.wikidata.org/wiki/Q1364844","display_name":"False alarm","level":2,"score":0.3269999921321869},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.322299987077713},{"id":"https://openalex.org/C2780513914","wikidata":"https://www.wikidata.org/wiki/Q18210350","display_name":"Bottleneck","level":2,"score":0.3009999990463257},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.2888000011444092},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.28870001435279846},{"id":"https://openalex.org/C75294576","wikidata":"https://www.wikidata.org/wiki/Q5165192","display_name":"Contextual image classification","level":3,"score":0.27630001306533813},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.2761000096797943},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.2533999979496002}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2025.3650391","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3650391","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Reduced inequalities","score":0.6870723962783813,"id":"https://metadata.un.org/sdg/10"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":51,"referenced_works":["https://openalex.org/W1498436455","https://openalex.org/W1512403036","https://openalex.org/W1889383825","https://openalex.org/W1965520420","https://openalex.org/W1982199619","https://openalex.org/W1982209341","https://openalex.org/W2001412060","https://openalex.org/W2021442396","https://openalex.org/W2022386491","https://openalex.org/W2031337792","https://openalex.org/W2037829978","https://openalex.org/W2119416456","https://openalex.org/W2129313573","https://openalex.org/W2144025519","https://openalex.org/W2194775991","https://openalex.org/W2602244503","https://openalex.org/W2734903045","https://openalex.org/W2790392345","https://openalex.org/W2796314858","https://openalex.org/W2962858109","https://openalex.org/W2963446712","https://openalex.org/W2964245886","https://openalex.org/W2979603993","https://openalex.org/W2982083293","https://openalex.org/W3006377070","https://openalex.org/W3021558250","https://openalex.org/W3034429256","https://openalex.org/W3067220347","https://openalex.org/W3096672325","https://openalex.org/W3121127014","https://openalex.org/W3156511322","https://openalex.org/W3193546077","https://openalex.org/W3199153801","https://openalex.org/W4232109309","https://openalex.org/W4285061161","https://openalex.org/W4312443924","https://openalex.org/W4312730671","https://openalex.org/W4316035538","https://openalex.org/W4380318404","https://openalex.org/W4384133267","https://openalex.org/W4385804927","https://openalex.org/W4385805084","https://openalex.org/W4386065890","https://openalex.org/W4387042228","https://openalex.org/W4392910465","https://openalex.org/W4395097349","https://openalex.org/W4403722933","https://openalex.org/W4407784264","https://openalex.org/W4409326045","https://openalex.org/W4409367235","https://openalex.org/W4409642247"],"related_works":[],"abstract_inverted_index":{"Non-contact":[0],"palm-vein":[1,42,278],"recognition":[2],"has":[3],"been":[4],"widely":[5],"adopted":[6],"in":[7],"security-critical":[8],"applications":[9],"owing":[10],"to":[11,25,72,118,134,218,229,256,271],"its":[12],"contact-free":[13],"acquisition":[14],"paradigm":[15],"and":[16,75,85,161,164,206,248,266,276],"exceptional":[17],"discriminative":[18],"power.":[19],"However,":[20],"these":[21,91],"systems":[22],"remain":[23],"susceptible":[24],"a":[26,64,103,124,170],"spectrum":[27],"of":[28,54,66,79,90,130,139,172,191,252],"presentation":[29],"attacks":[30,167],"(PAs),":[31],"creating":[32],"significant":[33],"security":[34],"risks":[35],"that":[36,108],"require":[37],"urgent":[38],"mitigation.":[39],"Progress":[40],"on":[41],"anti-spoofing":[43,73,200,279],"is":[44],"currently":[45],"impeded":[46],"by":[47,116,187,239,245],"three":[48,189],"fundamental":[49],"gaps:":[50],"(i)":[51],"the":[52,77,96,250,253],"absence":[53],"an":[55],"open-source,":[56],"end-to-end":[57],"pipeline":[58,107],"for":[59,231],"preprocessing":[60,106,263],"liveness-detection":[61],"data;":[62],"(ii)":[63],"lack":[65],"publicly":[67],"available":[68],"datasets":[69],"specifically":[70],"tailored":[71],"evaluation;":[74],"(iii)":[76],"unavailability":[78],"benchmark":[80,267],"studies":[81,275],"employing":[82],"standardized":[83],"protocols":[84],"reference":[86],"implementations.":[87],"In":[88],"light":[89],"key":[92],"issues,":[93],"we":[94,101,121,235],"make":[95],"following":[97],"four":[98],"contributions.":[99],"Firstly,":[100],"propose":[102],"new":[104,125],"open-source":[105],"can":[109],"significantly":[110],"improve":[111],"model":[112],"performance,":[113],"reducing":[114],"errors":[115],"up":[117],"53.3%.":[119],"Secondly,":[120],"introduce":[122],"PVASD,":[123],"largest":[126],"known":[127],"dataset":[128],"comprised":[129],"1,187,519":[131],"images":[132,144,150],"belonging":[133],"5,515":[135],"subjects,":[136],"which":[137,223],"consists":[138],"880,241":[140],"live":[141],"palm":[142,219],"vein":[143,220],"along":[145],"with":[146],"307,278":[147],"spoof":[148,221,242],"attack":[149,154],"including":[151],"16":[152],"different":[153],"types":[155,190],"\u2013":[156],"both":[157],"2d":[158],"(printed":[159],"stuff)":[160],"3d":[162],"(gloves":[163],"prosthesis":[165],"models)":[166],"captured":[168],"under":[169],"variety":[171],"environments":[173],"using":[174],"off-the-shelf":[175],"commercial-grade":[176],"sensors":[177],"at":[178,269],"five":[179],"resolutions.":[180],"Lastly,":[181],"comprehensive":[182],"benchmarks":[183],"are":[184],"also":[185,236],"created":[186],"evaluating":[188],"representative":[192],"methods":[193,201],"namely":[194],"classical":[195],"image":[196],"classification":[197],"models,":[198],"face":[199,204],"adapted":[202],"from":[203],"domain":[205],"anomaly-detection-based":[207],"approaches,":[208],"while":[209],"our":[210,262],"experimental":[211],"results":[212],"reveal":[213],"unique":[214],"characteristics":[215],"intrinsic":[216],"only":[217],"attacks,":[222],"will":[224,260],"hopefully":[225],"provide":[226],"valuable":[227],"guidance":[228],"researchers":[230],"further":[232],"investigation.":[233],"Furthermore,":[234],"expanded":[237],"PVASD":[238],"adding":[240],"20,000":[241],"samples":[243],"generated":[244],"artificial":[246],"intelligence,":[247],"evaluated":[249],"vulnerability":[251],"existing":[254],"models":[255],"deepfake":[257],"attacks.":[258],"We":[259],"release":[261],"pipeline,":[264],"dataset,":[265],"codes":[268],"https://github.com/valhongli/PVASD":[270],"advance":[272],"future":[273],"reproducible":[274],"accelerate":[277],"algorithmic":[280],"research.":[281]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-04-25T08:17:42.794288","created_date":"2026-01-02T00:00:00"}
