scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

Unconstrained visible spectrum iris with textured contact lens variations: Database and benchmarking

01 Oct 2017-International Journal of Central Banking (IEEE)-pp 574-580
TL;DR: The first contact lens database in visible spectrum, Unconstrained Visible Contact Lens Iris (UVCLI) Database, is introduced, containing samples from 70 classes with subjects wearing textured contact lenses in indoor and outdoor environments across multiple sessions and shows that there is a significant scope of improvement in developing efficient PAD algorithms for detection of texturedContact lenses in unconstrained visible spectrum iris images.
Abstract: Iris recognition in visible spectrum has developed into an active area of research This has elevated the importance of efficient presentation attack detection algorithms, particularly in security based critical applications In this paper, we present the first detailed analysis of the effect of textured contact lenses on iris recognition in visible spectrum We introduce the first contact lens database in visible spectrum, Unconstrained Visible Contact Lens Iris (UVCLI) Database, containing samples from 70 classes with subjects wearing textured contact lenses in indoor and outdoor environments across multiple sessions We observe that textured contact lenses degrade the visible spectrum iris recognition performance by over 25% and thus, may be utilized intentionally or unintentionally to attack existing iris recognition systems Next, three iris presentation attack detection (PAD) algorithms are evaluated on the proposed database and highest PAD accuracy of 8285%c is observed This illustrates that there is a significant scope of improvement in developing efficient PAD algorithms for detection of textured contact lenses in unconstrained visible spectrum iris images
Citations
More filters
Journal ArticleDOI
TL;DR: In this paper, different categories of presentation attack are described and placed in an application-relevant framework, and the state-of-the-art in detecting each category of attack is summarized.
Abstract: Iris recognition is increasingly used in large-scale applications. As a result, presentation attack detection for iris recognition takes on fundamental importance. This survey covers the diverse research literature on this topic. Different categories of presentation attack are described and placed in an application-relevant framework, and the state of the art in detecting each category of attack is summarized. One conclusion from this is that presentation attack detection for iris recognition is not yet a solved problem. Datasets available for research are described, research directions for the near- and medium-term future are outlined, and a short list of recommended readings is suggested.

83 citations

Journal ArticleDOI
TL;DR: An overview of the existing publicly available datasets and their popularity in the research community using a bibliometric approach is provided to help investigators conducting research in the domain of iris recognition to identify relevant datasets.
Abstract: Research on human eye image processing and iris recognition has grown steadily over the last few decades. It is important for researchers interested in this discipline to know the relevant datasets in this area to (i) be able to compare their results and (ii) speed up their research using existing datasets rather than creating custom datasets. In this paper, we provide a comprehensive overview of the existing publicly available datasets and their popularity in the research community using a bibliometric approach. We reviewed 158 different iris datasets referenced from the 689 most relevant research articles indexed by the Web of Science online library. We categorized the datasets and described the properties important for performing relevant research. We provide an overview of the databases per category to help investigators conducting research in the domain of iris recognition to identify relevant datasets.

28 citations

Posted Content
TL;DR: Different categories of presentation attack are described and placed in an application-relevant framework, and the state of the art in detecting each category of attack is summarized.
Abstract: Iris recognition is increasingly used in large-scale applications. As a result, presentation attack detection for iris recognition takes on fundamental importance. This survey covers the diverse research literature on this topic. Different categories of presentation attack are described and placed in an application-relevant framework, and the state of the art in detecting each category of attack is summarized. One conclusion from this is that presentation attack detection for iris recognition is not yet a solved problem. Datasets available for research are described, research directions for the near- and medium-term future are outlined, and a short list of recommended readings are suggested.

24 citations

Proceedings ArticleDOI
01 Oct 2019
TL;DR: A general taxonomy of presentation attacks is proposed to cover different biometric modalities considering the attacker’s intention and the presentation instrument and mechanisms that aim to eliminate or mitigate those attacks are also taxonomized.
Abstract: Biometric-based recognition has been replacing conventional recognition methods in security systems. Modern electronic devices such as smartphones and online services have been employing biometric systems because of their security, acceptability, and usability. However, the wide deployment of Biometrics raises security concerns including attacks that aim to interfere with a system’s operation. This paper provides a review of potential threats which may affect biometric systems’ security, particularly, Presentation Attack (PA). A general taxonomy of presentation attacks is proposed to cover different biometric modalities considering the attacker’s intention and the presentation instrument. Moreover, Presentation Attack Detection (PAD) mechanisms that aim to eliminate or mitigate those attacks are also taxonomized. The taxonomy analyzes PAD mechanisms wherein the biometric trait pattern is considered to classify PAD methods. A state of the art study has been carried out to investigate PA and PAD for six biological and behavioral modalities.

14 citations

Journal ArticleDOI
TL;DR: Deep Convolutional Neural Networks are used to detect spoofing techniques with superior results as compared to the existing state-of-the-art techniques on iris recognition.
Abstract: Iris recognition is used in various applications to identify a person. However, presentation attacks are making such systems vulnerable. Intruders can impersonate an individual to get entry into a system. In this paper, we have focused on print attacks, in which an intruder can use various techniques like printing of iris photographs to present to the sensor. Experiments conducted on the IIIT-WVU iris dataset show that print attack images of live iris images, use of contact lenses and conjunction of both can play a significant role in deceiving the iris recognition systems. The paper makes use of deep Convolutional Neural Networks to detect such spoofing techniques with superior results as compared to the existing state-of-the-art techniques.

9 citations

References
More filters
Proceedings ArticleDOI
13 Jun 2016
TL;DR: A state-of-the-art iris segmentation framework specifically for non-ideal irises that adopts coarse-to-fine strategy to localize different boundaries and provides significant improvements in segmentation accuracy as well as in recognition performance with lower computational complexity.
Abstract: This paper presents a state-of-the-art iris segmentation framework specifically for non-ideal irises. The framework adopts coarse-to-fine strategy to localize different boundaries. In the approach, pupil is coarsely detected using an iterative search method exploiting dynamic thresholding and multiple local cues. The limbic boundary is first approximated in polar space using adaptive filters and then refined in Cartesian space. The framework is quite robust and unlike the previously reported works, does not require tuning of parameters for different databases. The segmentation accuracy (SA) is evaluated using well known measures; precision, recall and F-measure, using the publicly available ground truth data for challenging iris databases; CASIAV4-Interval, ND-IRIS-0405, and IITD. In addition, the approach is also evaluated on highly challenging periocular images of FOCS database. The validity of proposed framework is also ascertained by providing comprehensive comparisons with classical approaches as well as state-of-the-art methods such as; CAHT, WAHET, IFFP, GST and Osiris v4.1. The results demonstrate that our approach provides significant improvements in segmentation accuracy as well as in recognition performance that too with lower computational complexity.

54 citations


"Unconstrained visible spectrum iris..." refers background or methods in this paper

  • ...IrisSeg [2] has been recently introduced specifically for segmenting non-ideal irises....

    [...]

  • ...Both OSIRIS and IrisSeg are not able to detect the iris-pupil boundary, particularly, the images that were captured outdoors....

    [...]

  • ...1 [17], total variation (TV) based algorithm [22], and IrisSeg [2]....

    [...]

Journal ArticleDOI
TL;DR: Extensive evaluation of proposed presentation attack detection (PAD) scheme on the newly constructed database has shown an outstanding performance of average classification error rate = 0% supporting the robustness of the proposed PAD scheme.
Abstract: The gaining popularity of the visible spectrum iris recognition has sparked the interest in adopting it for various access control applications. Along with the popularity of visible spectrum iris recognition comes the threat of identity spoofing, presentation, or direct attack. This paper presents a novel scheme for detecting video presentation attacks in visible spectrum iris recognition system by magnifying the phase information in the eye region of the subject. The proposed scheme employs modified Eulerian video magnification (EVM) to enhance the subtle phase information in eye region and novel decision module to classify it as artefact(spoof attack) or normal presentation. The proposed decision module is based on estimating the change of phase information obtained from EVM, specially tailored to detect presentation attacks on video-based iris recognition systems in visible spectrum. The proposed scheme is extensively evaluated on the newly constructed database consisting of 62 unique iris video acquired using two smartphones—iPhone 5S and Nokia Lumia 1020. We also construct the artefact database with 62 iris acquired by replaying normal presentation iris video on iPad with retina display. Extensive evaluation of proposed presentation attack detection (PAD) scheme on the newly constructed database has shown an outstanding performance of average classification error rate = 0% supporting the robustness of the proposed PAD scheme.

50 citations

Book ChapterDOI
01 Dec 2008
TL;DR: The main point of this paper is to give a process suitable for the automatic segmentation of iris images captured at the visible wavelength, on-the-move and within a large range of image acquisition distances (between 4 and 8 meters).
Abstract: The dramatic growth in practical applications for iris biometrics has been accompanied by many important developments in the underlying algorithms and techniques. Among others, one of the most active research areas concerns about the development of iris recognition systems less constrained to users, either increasing the image acquisition distances or the required lighting conditions. The main point of this paper is to give a process suitable for the automatic segmentation of iris images captured at the visible wavelength, on-the-move and within a large range of image acquisition distances (between 4 and 8 meters). Our experiments were performed on images of the UBIRIS.v2 database and show the robustness of the proposed method to handle the types of non-ideal images resultant of the aforementioned less constrained image acquisition conditions.

39 citations


"Unconstrained visible spectrum iris..." refers background in this paper

  • ...Research in visible spectrum iris recognition [4, 10, 11, 18] has witnessed significant growth in recent years and is being actively explored....

    [...]

Proceedings ArticleDOI
TL;DR: The extensive experimental analysis on benchmark datasets shows that the BSIF description extracted from preprocessed Cartesian iris texture images yields to promising generalization capabilities across unseen texture patterns and different iris sensors with mean equal error rate of 0.14% and 0.88%, respectively.
Abstract: Textured contact lenses cause severe problems for iris biometric systems because they can be used to alter the appearance of iris texture in order to deliberately increase the false positive and, especially, false negative match rates. Many texture analysis based techniques have been proposed for detecting the presence of cosmetic contact lenses. However, it has been shown recently that the generalization capability of the existing approaches is not sufficient because they have been developed for detecting specific lens texture patterns and evaluated only on those same lens types seen during development phase. This scenario does not apply in unpredictable practical applications because unseen lens patterns will be definitely experienced in operation. In this paper, we address this issue by studying the effect of different iris image preprocessing techniques and introducing a novel approach formore generalized cosmetic contact lens detection using binarized statistical image features (BSIF).Our extensive experimental analysis on benchmark datasets shows that the BSIF description extracted from preprocessed Cartesian iris texture images yields to promising generalization capabilities across unseen texture patterns and different iris sensors with mean equal error rate of 0.14%and 0.88%, respectively. The findings support the intuition that the textural differences between genuine iris texture and fake ones are best described by preserving the regular structure of different printing signatures without transforming the iris images into polar coordinate system.

26 citations


"Unconstrained visible spectrum iris..." refers background in this paper

  • ...Studies have also focused on developing algorithms for detection of contact lenses in iris images captured in NIR spectrum [1, 7, 20]....

    [...]

Proceedings ArticleDOI
TL;DR: This paper delivers a new database of iris images collected in visible light using a mobile phone's camera and presents results of experiments involving existing commercial and open-source iris recognition methods, namely: Iri-Core, VeriEye, MIRLIN and OSIRIS, showing that such images can be used with the existing biometric solutions with minimum additional effort required.
Abstract: This paper delivers a new database of iris images collected in visible light using a mobile phone's camera and presents results of experiments involving existing commercial and open-source iris recognition methods, namely: IriCore, VeriEye, MIRLIN and OSIRIS. Several important observations are made. First, we manage to show that after simple preprocessing, such images offer good visibility of iris texture even in heavily-pigmented irides. Second, for all four methods, the enrollment stage is not much affected by the fact that different type of data is used as input. This translates to zero or close-to-zero Failure To Enroll, i.e., cases when templates could not be extracted from the samples. Third, we achieved good matching accuracy, with correct genuine match rate exceeding 94.5% for all four methods, while simultaneously being able to maintain zero false match rate in every case. Correct genuine match rate of over 99.5% was achieved using one of the commercial methods, showing that such images can be used with the existing biometric solutions with minimum additional effort required. Finally, the experiments revealed that incorrect image segmentation is the most prevalent cause of recognition accuracy decrease. To our best knowledge, this is the first database of iris images captured using a mobile device, in which image quality exceeds this of a near-infrared illuminated iris images, as defined in ISO/IEC 19794-6 and 29794-6 documents. This database will be publicly available to all researchers.

20 citations


"Unconstrained visible spectrum iris..." refers background in this paper

  • ...Visible spectrum iris recognition has also gained popularity due to its potential application in the field of mobile biometrics [15, 19]....

    [...]

  • ...v2 [12], MICHE [8], mobile phonebased [19], and VSSIRIS [15]....

    [...]