skip to main content
10.1145/3345336.3345341acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicbeaConference Proceedingsconference-collections
research-article

Empirical Evaluation of Texture-Based Print and Contact Lens Iris Presentation Attack Detection Methods

Authors Info & Claims
Published:29 May 2019Publication History

ABSTRACT

Iris-based identification methods have been popularly used in real-world applications due to the unique characteristics of iris when compared to other biometric characteristics like face and fingerprint. As technological advances and low-cost artefacts are becoming more available, vulnerabilities to iris biometrics due to presentation attacks (PAs) are becoming a challenging problem. Presentation attack detection (PAD) algorithms have been employed in biometric capture devices and it has been an active research topic in the past years. In this study, a detailed survey and evaluation of state-of-the-art texture-based iris PAD methods are performed. Five different PAD methods are tested on four different datasets consisting of print and contact lens presentation attacks. Extensive experiments are performed on four different scenarios of presentation attack and results are presented. The properties of PAD algorithms like the quality of the database, the generalization abilities are mainly discussed in this work. It has been observed that fusion-based PAD methods perform better than other methods.

References

  1. Ahmad N Al-Raisi and Ali M Al-Khouri. 2008. Iris recognition and the challenge of homeland and border control security in UAE. Telematics and Informatics 25, 2(2008), 117--132. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Anna Bosch, Andrew Zisserman, and Xavier Munoz. 2007. Representing shape with a spatial pyramid kernel. In Proceedings of the 6th ACM international conference on Image and video retrieval. ACM, 401--408. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Kevin W Bowyer and James S Doyle. 2014. Cosmetic contact lenses and iris recognition spoofing. Computer 47, 5 (2014), 96--98. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Deng Cai, Xiaofei He, and Jiawei Han. 2007. Efficient kernel discriminant analysis via spectral regression. In Data Mining, 2007. ICDM 2007. Seventh IEEE International Conference on. IEEE, 427--432. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Adam Czajka and Kevin W Bowyer. 2018. Presentation Attack Detection for Iris Recognition: An Assessment of the State of the Art. arXiv preprint arXiv.1804.00194 (2018). Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. John Daugman. 2009. How iris recognition works. In The essential guide to image processing. Elsevier, 715--739.Google ScholarGoogle Scholar
  7. James S Doyle and Kevin W Bowyer. 2015. Robust detection of textured contact lenses in iris recognition using BSIF. IEEE Access 3 (2015), 1672--1683.Google ScholarGoogle ScholarCross RefCross Ref
  8. Diego Gragnaniello, Giovanni Poggi, Carlo Sansone, and Luisa Verdoliva. 2014. Contact lens detection and classification in iris images through scale invariant descriptor. In Signal-Image Technology and Internet-Based Systems (SITIS), 2014 Tenth International Conference on. IEEE, 560--565. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Xiaofu He, Shujuan An, and Pengfei Shi. 2007. Statistical texture analysis-based approach for fake iris detection using support vector machines. In International Conference on Biometrics. Springer, 540--546. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Zhaofeng He, Zhenan Sun, Tieniu Tan, and Zhuoshi Wei. 2009. Efficient iris spoof detection via boosted local binary patterns. In International Conference on Biometrics. Springer, 1080--1090. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Yang Hu, Konstantinos Sirlantzis, and Gareth Howells. 2016. Iris liveness detection using regional features. Pattern Recognition Letters 82 (2016), 242--250. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. ISO/IEC JTC1 SC37 Biometrics. 2017. ISO/IEC FDIS 30107--3. Information Technology - Biometric presentation attack detection - Part 3: Testing and Reporting. International Organization for Standardization.Google ScholarGoogle Scholar
  13. Naman Kohli, Daksha Yadav, Mayank Vatsa, Richa Singh, and Afzel Noore. 2016. Detecting medley of iris spoofing attacks using DESIST. In Biometrics Theory, Applications and Systems (BTAS), 2016 IEEE 8th International Conference on. IEEE, 1--6.Google ScholarGoogle Scholar
  14. Jukka Komulainen, Abdenour Hadid, and Matti Pietikäinen. 2014. Generalized textured contact lens detection by extracting bsif description from cartesian iris images. In Biometrics (IJCB), 2014 IEEE International Joint Conference on. IEEE, 1--7.Google ScholarGoogle ScholarCross RefCross Ref
  15. Stan Z Li and Anil K Jain. 2009. Encyclopedia of Biometrics: I-Z. Vol. 1. Springer Science & Business Media. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Ana Carolina Lorena and André CPLF De Carvalho. 2010. Building binary-tree-based multiclass classifiers using separability measures. Neurocomputing 73, 16-18(2010), 2837--2845. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Hareesh Mandalapu, Raghavendra Ramachandra, and Christoph Busch. 2018. Image Quality and Texture-Based Features for Reliable Textured Contact Lens Detection (article in press). In Signal Imaging Technology and Internet Based Systems, 2018. SITIS 2018. 14th International Conference on. IEEE.Google ScholarGoogle Scholar
  18. Anish Mittal, Anush Krishna Moorthy, and Alan Conrad Bovik. 2012. No-reference image quality assessment in the spatial domain. IEEE Transactions on Image Processing 21, 12 (2012), 4695--4708. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Aythami Morales, Julian Fierrez, Javier Galbally, and Marta Gomez-Barrero. 2019. Introduction to iris presentation attack detection. In Handbook of Biometric Anti-Spoofing. Springer, 135--150.Google ScholarGoogle Scholar
  20. Ramachandra Raghavendra and Christoph Busch. 2015. Robust scheme for iris presentation attack detection using multiscale binarized statistical image features. IEEE Transactions on Information Forensics and Security 10, 4 (2015), 703--715.Google ScholarGoogle ScholarCross RefCross Ref
  21. Ramachandra Raghavendra, Kiran B Raja, and Christoph Busch. 2014. Ensemble of statistically independent filters for robust contact lens detection in iris images. In Proceedings of the 2014 Indian Conference on Computer Vision Graphics and Image Processing. ACM, 24. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Ramachandra Raghavendra, Kiran B Raja, and Christoph Busch. 2017. Contlen-snet: Robust iris contact lens detection using deep convolutional neural networks. In Applications of Computer Vision (WACV), 2017 IEEE Winter Conference on. IEEE, 1160--1167.Google ScholarGoogle ScholarCross RefCross Ref
  23. Kiran B Raja, Ramachandra Raghavendra, and Christoph Busch. 2014. Binarized statistical features for improved iris and periocular recognition in visible spectrum. In Biometrics and Forensics (IWBF), 2014 International Workshop on. IEEE, 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  24. Kiran B Raja, Ramachandra Raghavendra, and Christoph Busch. 2016. Color Adaptive Quantized Patterns for Presentation Attack Detection in Ocular Biometric Systems. In Proceedings of the 9th International Conference on Security of Information and Networks. ACM, 9--15. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Zhenan Sun, Hui Zhang, Tieniu Tan, and Jianyu Wang. 2014. Iris image classification based on hierarchical visual codebook. IEEE Transactions on pattern analysis and machine intelligence 36, 6 (2014), 1120--1133. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Anna Bori Toth and Javier Galbally. 2015. Anti-spoofing, Iris. Encyclopedia of Biometrics (2015), 87--97.Google ScholarGoogle Scholar
  27. Sushma Venkatesh, R Raghavendra, Kiran B. Raja, and Christoph Busch. 2018. A New Multi-spectral Iris Acquisition Sensor for Biometric Verification and Presentation Attack Detection.Google ScholarGoogle Scholar
  28. Hong Wei, Lulu Chen, and James Ferryman. 2013. Biometrics in ABC: counter-spoofing research. (2013).Google ScholarGoogle Scholar
  29. Juefei Xu, Miriam Cha, Joseph L Heyman, Shreyas Venugopalan, Ramzi Abiantun, and Marios Savvides. 2010. Robust local binary pattern feature sets for periocular biometric identification. In Biometrics: Theory Applications and Systems (BTAS), 2010 Fourth IEEE International Conference on. IEEE, 1--8.Google ScholarGoogle ScholarCross RefCross Ref
  30. Daksha Yadav, Naman Kohli, James S Doyle, Richa Singh, Mayank Vatsa, and Kevin W Bowyer. 2014. Unraveling the effect of textured contact lenses on iris recognition. IEEE Transactions on Information Forensics and Security 9, 5 (2014), 851--862. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Hui Zhang, Zhenan Sun, and Tieniu Tan. 2010. Contact lens detection based on weighted LBP. In Pattern Recognition (ICPR), 2010 20th International Conference on. IEEE, 4279--4282. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Empirical Evaluation of Texture-Based Print and Contact Lens Iris Presentation Attack Detection Methods

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICBEA 2019: Proceedings of the 2019 3rd International Conference on Biometric Engineering and Applications
      May 2019
      82 pages
      ISBN:9781450363051
      DOI:10.1145/3345336

      Copyright © 2019 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 29 May 2019

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader