scispace - formally typeset
Proceedings ArticleDOI

Detecting medley of iris spoofing attacks using DESIST

TLDR
A novel structural and textural feature based iris spoofing detection framework (DESIST) is proposed which combines multi-order dense Zernike moments and Local Binary Pattern with Variance for representing textural changes in a spoofed iris image.
Abstract
Human iris is considered a reliable and accurate modality for biometric recognition due to its unique texture information. However, similar to other biometric modalities, iris recognition systems are also vulnerable to presentation attacks (commonly called spoofing) that attempt to conceal or impersonate identity. Examples of typical iris spoofing attacks are printed iris images, textured contact lenses, and synthetic creation of iris images. It is critical to note that majority of the algorithms proposed in the literature are trained to handle a specific type of spoofing attack. These algorithms usually perform very well on that particular attack. However, in real-world applications, an attacker may perform different spoofing attacks. In such a case, the problem becomes more challenging due to inherent variations in different attacks. In this paper, we focus on a medley of iris spoofing attacks and present a unified framework for detecting such attacks. We propose a novel structural and textural feature based iris spoofing detection framework (DESIST). Multi-order dense Zernike moments are calculated across the iris image which encode variations in structure of the iris image. Local Binary Pattern with Variance (LBPV) is utilized for representing textural changes in a spoofed iris image. The highest classification accuracy of 82.20% is observed by the proposed framework for detecting normal and spoofed iris images on a combined iris spoofing database.

read more

Citations
More filters
Journal ArticleDOI

Intra and Cross-spectrum Iris Presentation Attack Detection in the NIR and Visible Domains Using Attention-based and Pixel-wise Supervised Learning

TL;DR: This chapter presents a novel attention-based deep pixel-wise binary supervision (A-PBS) method that generalizes well across databases and capture spectra in iris PAD systems.
DissertationDOI

On Generative Adversarial Network Based Synthetic Iris Presentation Attack And Its Detection

Naman Kohli
TL;DR: In this thesis, a novel iris presentation attack using deep learning based synthetically generated iris images is presented and a novel structural and textural feature-based iri presentation attack detection framework (DESIST) is proposed.
References
More filters
Journal ArticleDOI

How iris recognition works

TL;DR: Algorithms developed by the author for recognizing persons by their iris patterns have now been tested in many field and laboratory trials, producing no false matches in several million comparison tests.
Proceedings ArticleDOI

How iris recognition works

TL;DR: Algorithms developed by the author for recognizing persons by their iris patterns have now been tested in many field and laboratory trials, producing no false matches in several million comparison tests.
Journal ArticleDOI

Rotation invariant texture classification using LBP variance (LBPV) with global matching

TL;DR: The experimental results on representative databases show that the proposed LBPV operator and global matching scheme can achieve significant improvement, sometimes more than 10% in terms of classification accuracy, over traditional locally rotation invariant LBP method.
Journal ArticleDOI

Deep Representations for Iris, Face, and Fingerprint Spoofing Detection

TL;DR: This work assumes a very limited knowledge about biometric spoofing at the sensor to derive outstanding spoofing detection systems for iris, face, and fingerprint modalities based on two deep learning approaches based on convolutional networks.
Journal ArticleDOI

Comparison and combination of iris matchers for reliable personal authentication

TL;DR: It is suggested that the performance from the Haar wavelet and Log-Gabor filter based phase encoding is the most promising among all the four approaches considered in this work and the combination of these two matchers is most promising, both in terms of performance and the computational complexity.
Related Papers (5)