Skip to main content
This is a pre-production deployment of Warehouse. Changes made here affect the production instance of PyPI (
Help us improve Python packaging - Donate today!

Running the competition results: "The 1st Competition on Counter Measures to Finger Vein Spoofing Attacks".

Project Description

This package provides the source code to run the experiments published in the paper The 1st Competition on Counter Measures to Finger Vein Spoofing Attacks. It relies on some satellite packages from Bob to compute the evaluation.


Currently, this package only works in Unix-like environments and under MacOS. Due to limitations of the Bob library, MS Windows operating systems are not supported. We are working on a port of Bob for MS Windows, but it might take a while. In the meanwhile you could use our VirtualBox images that can be downloaded here.


The installation of this package relies on the BuildOut system. By default, the command line sequence:

$ ./python
$ ./bin/buildout

There are a few exceptions, which are not automatically downloaded:


To install Bob, please visit and follow the installation instructions. Please verify that you have at least version 2.0 of Bob installed. If you have installed Bob in a non-standard directory, please open the buildout.cfg file from the base directory and set the prefixes directory accordingly.


The experiments that we report in the Paper were generated with Bob version 2.0. If you use different versions of either of these packages, the results might differ slightly. For example, we are aware that, due to some initialization differences, the results using Bob 1.2.0 and 1.2.1 are not identical, but similar.

Image Databases

The experiments are run on external image database. We do not provide the images from the database itselve. Hence, please contact the database owners to obtain a copy of the images. The database used in the competition can be downloaded here:


After downloading the databases, you will need to tell our software, where it can find them by changing the file. In particular, please update the PATHDATABASE to indicate the directory of the dataset: PATHDATABASE=”YOUR_PATH/FVspoofingAttack”.

Please let all other configuration parameters unchanged as this might influence the competition analysis and, hence, the reproducibility of the results.

Getting help

In case anything goes wrong, please feel free to open a new ticket in our GitLab page, or send an email to

Recreating the results of the Paper

After successfully setting up the databases, you are now able to run the anti-spoofing finger vein evaluation as explained in the Paper.

Running the experiments

The competition results are run using the file.

Additionally, the individual scripts used can be found in bin/ directory. See ./bin/ --help and ./bin/ --help for a complete list of options.

  1. Run the competition results on the Spoofing-Attack Finger Vein database:

    $ ./


All output directories of the scripts will be automatically generated if they do not exist yet. The submissions folder contains the score files submitted to the competition.

Cite our paper

If you use the results in any of your contributions, please cite the following paper:

       author = {Tome, Pedro and Raghavendra, R. and Busch, Christoph and Tirunagari, Santosh and Poh, Norman and Shekar, B. H. and Gragnaniello, Diego and Sansone, Carlo and Verdoliva, Luisa and Marcel, S{\'{e}}bastien},
     keywords = {Biometrics, Finger vein, Spoofing Attacks, Competition},
        month = dec,
        title = {The 1st Competition on Counter Measures to Finger Vein Spoofing Attacks},
    booktitle = {International Conference on Biometrics (ICB)},
       series = {},
       volume = {},
         year = {2015},
        pages = {},
     location = {Thailand},
          url = {}

Release History

This version
History Node


Download Files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Filename, Size & Hash SHA256 Hash Help File Type Python Version Upload Date
(30.9 kB) Copy SHA256 Hash SHA256
Source None Mar 9, 2015

Supported By

Elastic Elastic Search Pingdom Pingdom Monitoring Dyn Dyn DNS Sentry Sentry Error Logging CloudAMQP CloudAMQP RabbitMQ Heroku Heroku PaaS Kabu Creative Kabu Creative UX & Design Fastly Fastly CDN DigiCert DigiCert EV Certificate Google Google Cloud Servers