scispace - formally typeset
Proceedings ArticleDOI

Detecting medley of iris spoofing attacks using DESIST

TLDR
A novel structural and textural feature based iris spoofing detection framework (DESIST) is proposed which combines multi-order dense Zernike moments and Local Binary Pattern with Variance for representing textural changes in a spoofed iris image.
Abstract
Human iris is considered a reliable and accurate modality for biometric recognition due to its unique texture information. However, similar to other biometric modalities, iris recognition systems are also vulnerable to presentation attacks (commonly called spoofing) that attempt to conceal or impersonate identity. Examples of typical iris spoofing attacks are printed iris images, textured contact lenses, and synthetic creation of iris images. It is critical to note that majority of the algorithms proposed in the literature are trained to handle a specific type of spoofing attack. These algorithms usually perform very well on that particular attack. However, in real-world applications, an attacker may perform different spoofing attacks. In such a case, the problem becomes more challenging due to inherent variations in different attacks. In this paper, we focus on a medley of iris spoofing attacks and present a unified framework for detecting such attacks. We propose a novel structural and textural feature based iris spoofing detection framework (DESIST). Multi-order dense Zernike moments are calculated across the iris image which encode variations in structure of the iris image. Local Binary Pattern with Variance (LBPV) is utilized for representing textural changes in a spoofed iris image. The highest classification accuracy of 82.20% is observed by the proposed framework for detecting normal and spoofed iris images on a combined iris spoofing database.

read more

Citations
More filters
Proceedings ArticleDOI

Generalized Iris Presentation Attack Detection Algorithm under Cross-Database Settings

Abstract: Presentation attacks are posing major challenges to most of the biometric modalities. Iris recognition, which is considered as one of the most accurate biometric modality for person identification, has also been shown to be vulnerable to advanced presentation attacks such as 3D contact lenses and textured lens. While in the literature, several presentation attack detection (PAD) algorithms are presented; a significant limitation is the generalizability against an unseen database, unseen sensor, and different imaging environment. To address this challenge, we propose a generalized deep learning-based PAD network, MVANet, which utilizes multiple representation layers. It is inspired by the simplicity and success of hybrid algorithm or fusion of multiple detection networks. The computational complexity is an essential factor in training deep neural networks; therefore, to reduce the computational complexity while learning multiple feature representation layers, a fixed base model has been used. The performance of the proposed network is demonstrated on multiple databases such as IIITD-WVU MUIPA and IIITD-CLI databases under cross-database training-testing settings, to assess the generalizability of the proposed algorithm.
Proceedings ArticleDOI

Unconstrained visible spectrum iris with textured contact lens variations: Database and benchmarking

TL;DR: The first contact lens database in visible spectrum, Unconstrained Visible Contact Lens Iris (UVCLI) Database, is introduced, containing samples from 70 classes with subjects wearing textured contact lenses in indoor and outdoor environments across multiple sessions and shows that there is a significant scope of improvement in developing efficient PAD algorithms for detection of texturedContact lenses in unconstrained visible spectrum iris images.
Journal ArticleDOI

Detection of Iris Presentation Attacks Using Feature Fusion of Thepade's Sorted Block Truncation Coding with Gray-Level Co-Occurrence Matrix Features.

TL;DR: In this paper, the iris liveness detection (ILD) method is proposed to mitigate spoofing attacks, taking global-level features of Thepade's sorted block truncation coding (TSBTC) and local level features of the gray-level co-occurrence matrix (GLCM) of the image.
Posted Content

Micro Stripes Analyses for Iris Presentation Attack Detection

TL;DR: A lightweight framework to detect iris presentation attacks by extracting multiple micro-stripes of expanded normalized iris textures that minimizes the confusion between textured (attack) and soft (bona fide) contact lens presentations is proposed.
Proceedings ArticleDOI

Micro Stripes Analyses for Iris Presentation Attack Detection

TL;DR: Zhang et al. as discussed by the authors proposed a lightweight framework to detect iris presentation attacks by extracting multiple micro-stripes of expanded normalized iris textures, which are then used for iris recognition.
References
More filters
Journal ArticleDOI

How iris recognition works

TL;DR: Algorithms developed by the author for recognizing persons by their iris patterns have now been tested in many field and laboratory trials, producing no false matches in several million comparison tests.
Proceedings ArticleDOI

How iris recognition works

TL;DR: Algorithms developed by the author for recognizing persons by their iris patterns have now been tested in many field and laboratory trials, producing no false matches in several million comparison tests.
Journal ArticleDOI

Rotation invariant texture classification using LBP variance (LBPV) with global matching

TL;DR: The experimental results on representative databases show that the proposed LBPV operator and global matching scheme can achieve significant improvement, sometimes more than 10% in terms of classification accuracy, over traditional locally rotation invariant LBP method.
Journal ArticleDOI

Deep Representations for Iris, Face, and Fingerprint Spoofing Detection

TL;DR: This work assumes a very limited knowledge about biometric spoofing at the sensor to derive outstanding spoofing detection systems for iris, face, and fingerprint modalities based on two deep learning approaches based on convolutional networks.
Journal ArticleDOI

Comparison and combination of iris matchers for reliable personal authentication

TL;DR: It is suggested that the performance from the Haar wavelet and Log-Gabor filter based phase encoding is the most promising among all the four approaches considered in this work and the combination of these two matchers is most promising, both in terms of performance and the computational complexity.
Related Papers (5)