This is a pre-production deployment of Warehouse, however changes made here WILL affect the production instance of PyPI.
Latest Version Dependencies status unknown Test status unknown Test coverage unknown
Project Description

This package provides the source code to run the experiments published in the paper The 1st Competition on Counter Measures to Finger Vein Spoofing Attacks. It relies on some satellite packages from Bob to compute the evaluation.


Currently, this package only works in Unix-like environments and under MacOS. Due to limitations of the Bob library, MS Windows operating systems are not supported. We are working on a port of Bob for MS Windows, but it might take a while. In the meanwhile you could use our VirtualBox images that can be downloaded here.


The installation of this package relies on the BuildOut system. By default, the command line sequence:

$ ./python
$ ./bin/buildout

There are a few exceptions, which are not automatically downloaded:


To install Bob, please visit and follow the installation instructions. Please verify that you have at least version 2.0 of Bob installed. If you have installed Bob in a non-standard directory, please open the buildout.cfg file from the base directory and set the prefixes directory accordingly.


The experiments that we report in the Paper were generated with Bob version 2.0. If you use different versions of either of these packages, the results might differ slightly. For example, we are aware that, due to some initialization differences, the results using Bob 1.2.0 and 1.2.1 are not identical, but similar.

Image Databases

The experiments are run on external image database. We do not provide the images from the database itselve. Hence, please contact the database owners to obtain a copy of the images. The database used in the competition can be downloaded here:


After downloading the databases, you will need to tell our software, where it can find them by changing the file. In particular, please update the PATHDATABASE to indicate the directory of the dataset: PATHDATABASE=”YOUR_PATH/FVspoofingAttack”.

Please let all other configuration parameters unchanged as this might influence the competition analysis and, hence, the reproducibility of the results.

Getting help

In case anything goes wrong, please feel free to open a new ticket in our GitLab page, or send an email to

Recreating the results of the Paper

After successfully setting up the databases, you are now able to run the anti-spoofing finger vein evaluation as explained in the Paper.

Running the experiments

The competition results are run using the file.

Additionally, the individual scripts used can be found in bin/ directory. See ./bin/ --help and ./bin/ --help for a complete list of options.

  1. Run the competition results on the Spoofing-Attack Finger Vein database:

    $ ./


All output directories of the scripts will be automatically generated if they do not exist yet. The submissions folder contains the score files submitted to the competition.

Cite our paper

If you use the results in any of your contributions, please cite the following paper:

       author = {Tome, Pedro and Raghavendra, R. and Busch, Christoph and Tirunagari, Santosh and Poh, Norman and Shekar, B. H. and Gragnaniello, Diego and Sansone, Carlo and Verdoliva, Luisa and Marcel, S{\'{e}}bastien},
     keywords = {Biometrics, Finger vein, Spoofing Attacks, Competition},
        month = dec,
        title = {The 1st Competition on Counter Measures to Finger Vein Spoofing Attacks},
    booktitle = {International Conference on Biometrics (ICB)},
       series = {},
       volume = {},
         year = {2015},
        pages = {},
     location = {Thailand},
          url = {}
Release History

Release History


This version

History Node

TODO: Figure out how to actually get changelog content.

Changelog content for this version goes here.

Donec et mollis dolor. Praesent et diam eget libero egestas mattis sit amet vitae augue. Nam tincidunt congue enim, ut porta lorem lacinia consectetur. Donec ut libero sed arcu vehicula ultricies a non tortor. Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Show More

Download Files

Download Files

TODO: Brief introduction on what you do with files - including link to relevant help section.

File Name & Checksum SHA256 Checksum Help Version File Type Upload Date (30.9 kB) Copy SHA256 Checksum SHA256 Source Mar 9, 2015

Supported By

WebFaction WebFaction Technical Writing Elastic Elastic Search Pingdom Pingdom Monitoring Dyn Dyn DNS HPE HPE Development Sentry Sentry Error Logging CloudAMQP CloudAMQP RabbitMQ Heroku Heroku PaaS Kabu Creative Kabu Creative UX & Design Fastly Fastly CDN DigiCert DigiCert EV Certificate Rackspace Rackspace Cloud Servers DreamHost DreamHost Log Hosting