ABSTRACT
Iris-based identification methods have been popularly used in real-world applications due to the unique characteristics of iris when compared to other biometric characteristics like face and fingerprint. As technological advances and low-cost artefacts are becoming more available, vulnerabilities to iris biometrics due to presentation attacks (PAs) are becoming a challenging problem. Presentation attack detection (PAD) algorithms have been employed in biometric capture devices and it has been an active research topic in the past years. In this study, a detailed survey and evaluation of state-of-the-art texture-based iris PAD methods are performed. Five different PAD methods are tested on four different datasets consisting of print and contact lens presentation attacks. Extensive experiments are performed on four different scenarios of presentation attack and results are presented. The properties of PAD algorithms like the quality of the database, the generalization abilities are mainly discussed in this work. It has been observed that fusion-based PAD methods perform better than other methods.
- Ahmad N Al-Raisi and Ali M Al-Khouri. 2008. Iris recognition and the challenge of homeland and border control security in UAE. Telematics and Informatics 25, 2(2008), 117--132. Google ScholarDigital Library
- Anna Bosch, Andrew Zisserman, and Xavier Munoz. 2007. Representing shape with a spatial pyramid kernel. In Proceedings of the 6th ACM international conference on Image and video retrieval. ACM, 401--408. Google ScholarDigital Library
- Kevin W Bowyer and James S Doyle. 2014. Cosmetic contact lenses and iris recognition spoofing. Computer 47, 5 (2014), 96--98. Google ScholarDigital Library
- Deng Cai, Xiaofei He, and Jiawei Han. 2007. Efficient kernel discriminant analysis via spectral regression. In Data Mining, 2007. ICDM 2007. Seventh IEEE International Conference on. IEEE, 427--432. Google ScholarDigital Library
- Adam Czajka and Kevin W Bowyer. 2018. Presentation Attack Detection for Iris Recognition: An Assessment of the State of the Art. arXiv preprint arXiv.1804.00194 (2018). Google ScholarDigital Library
- John Daugman. 2009. How iris recognition works. In The essential guide to image processing. Elsevier, 715--739.Google Scholar
- James S Doyle and Kevin W Bowyer. 2015. Robust detection of textured contact lenses in iris recognition using BSIF. IEEE Access 3 (2015), 1672--1683.Google ScholarCross Ref
- Diego Gragnaniello, Giovanni Poggi, Carlo Sansone, and Luisa Verdoliva. 2014. Contact lens detection and classification in iris images through scale invariant descriptor. In Signal-Image Technology and Internet-Based Systems (SITIS), 2014 Tenth International Conference on. IEEE, 560--565. Google ScholarDigital Library
- Xiaofu He, Shujuan An, and Pengfei Shi. 2007. Statistical texture analysis-based approach for fake iris detection using support vector machines. In International Conference on Biometrics. Springer, 540--546. Google ScholarDigital Library
- Zhaofeng He, Zhenan Sun, Tieniu Tan, and Zhuoshi Wei. 2009. Efficient iris spoof detection via boosted local binary patterns. In International Conference on Biometrics. Springer, 1080--1090. Google ScholarDigital Library
- Yang Hu, Konstantinos Sirlantzis, and Gareth Howells. 2016. Iris liveness detection using regional features. Pattern Recognition Letters 82 (2016), 242--250. Google ScholarDigital Library
- ISO/IEC JTC1 SC37 Biometrics. 2017. ISO/IEC FDIS 30107--3. Information Technology - Biometric presentation attack detection - Part 3: Testing and Reporting. International Organization for Standardization.Google Scholar
- Naman Kohli, Daksha Yadav, Mayank Vatsa, Richa Singh, and Afzel Noore. 2016. Detecting medley of iris spoofing attacks using DESIST. In Biometrics Theory, Applications and Systems (BTAS), 2016 IEEE 8th International Conference on. IEEE, 1--6.Google Scholar
- Jukka Komulainen, Abdenour Hadid, and Matti Pietikäinen. 2014. Generalized textured contact lens detection by extracting bsif description from cartesian iris images. In Biometrics (IJCB), 2014 IEEE International Joint Conference on. IEEE, 1--7.Google ScholarCross Ref
- Stan Z Li and Anil K Jain. 2009. Encyclopedia of Biometrics: I-Z. Vol. 1. Springer Science & Business Media. Google ScholarDigital Library
- Ana Carolina Lorena and André CPLF De Carvalho. 2010. Building binary-tree-based multiclass classifiers using separability measures. Neurocomputing 73, 16-18(2010), 2837--2845. Google ScholarDigital Library
- Hareesh Mandalapu, Raghavendra Ramachandra, and Christoph Busch. 2018. Image Quality and Texture-Based Features for Reliable Textured Contact Lens Detection (article in press). In Signal Imaging Technology and Internet Based Systems, 2018. SITIS 2018. 14th International Conference on. IEEE.Google Scholar
- Anish Mittal, Anush Krishna Moorthy, and Alan Conrad Bovik. 2012. No-reference image quality assessment in the spatial domain. IEEE Transactions on Image Processing 21, 12 (2012), 4695--4708. Google ScholarDigital Library
- Aythami Morales, Julian Fierrez, Javier Galbally, and Marta Gomez-Barrero. 2019. Introduction to iris presentation attack detection. In Handbook of Biometric Anti-Spoofing. Springer, 135--150.Google Scholar
- Ramachandra Raghavendra and Christoph Busch. 2015. Robust scheme for iris presentation attack detection using multiscale binarized statistical image features. IEEE Transactions on Information Forensics and Security 10, 4 (2015), 703--715.Google ScholarCross Ref
- Ramachandra Raghavendra, Kiran B Raja, and Christoph Busch. 2014. Ensemble of statistically independent filters for robust contact lens detection in iris images. In Proceedings of the 2014 Indian Conference on Computer Vision Graphics and Image Processing. ACM, 24. Google ScholarDigital Library
- Ramachandra Raghavendra, Kiran B Raja, and Christoph Busch. 2017. Contlen-snet: Robust iris contact lens detection using deep convolutional neural networks. In Applications of Computer Vision (WACV), 2017 IEEE Winter Conference on. IEEE, 1160--1167.Google ScholarCross Ref
- Kiran B Raja, Ramachandra Raghavendra, and Christoph Busch. 2014. Binarized statistical features for improved iris and periocular recognition in visible spectrum. In Biometrics and Forensics (IWBF), 2014 International Workshop on. IEEE, 1--6.Google ScholarCross Ref
- Kiran B Raja, Ramachandra Raghavendra, and Christoph Busch. 2016. Color Adaptive Quantized Patterns for Presentation Attack Detection in Ocular Biometric Systems. In Proceedings of the 9th International Conference on Security of Information and Networks. ACM, 9--15. Google ScholarDigital Library
- Zhenan Sun, Hui Zhang, Tieniu Tan, and Jianyu Wang. 2014. Iris image classification based on hierarchical visual codebook. IEEE Transactions on pattern analysis and machine intelligence 36, 6 (2014), 1120--1133. Google ScholarDigital Library
- Anna Bori Toth and Javier Galbally. 2015. Anti-spoofing, Iris. Encyclopedia of Biometrics (2015), 87--97.Google Scholar
- Sushma Venkatesh, R Raghavendra, Kiran B. Raja, and Christoph Busch. 2018. A New Multi-spectral Iris Acquisition Sensor for Biometric Verification and Presentation Attack Detection.Google Scholar
- Hong Wei, Lulu Chen, and James Ferryman. 2013. Biometrics in ABC: counter-spoofing research. (2013).Google Scholar
- Juefei Xu, Miriam Cha, Joseph L Heyman, Shreyas Venugopalan, Ramzi Abiantun, and Marios Savvides. 2010. Robust local binary pattern feature sets for periocular biometric identification. In Biometrics: Theory Applications and Systems (BTAS), 2010 Fourth IEEE International Conference on. IEEE, 1--8.Google ScholarCross Ref
- Daksha Yadav, Naman Kohli, James S Doyle, Richa Singh, Mayank Vatsa, and Kevin W Bowyer. 2014. Unraveling the effect of textured contact lenses on iris recognition. IEEE Transactions on Information Forensics and Security 9, 5 (2014), 851--862. Google ScholarDigital Library
- Hui Zhang, Zhenan Sun, and Tieniu Tan. 2010. Contact lens detection based on weighted LBP. In Pattern Recognition (ICPR), 2010 20th International Conference on. IEEE, 4279--4282. Google ScholarDigital Library
Index Terms
- Empirical Evaluation of Texture-Based Print and Contact Lens Iris Presentation Attack Detection Methods
Recommendations
Iris Print Attack Detection using Eye Movement Signals
ETRA '22: 2022 Symposium on Eye Tracking Research and ApplicationsIris-based biometric authentication is a wide-spread biometric modality due to its accuracy, among other benefits. Improving the resistance of iris biometrics to spoofing attacks is an important research topic. Eye tracking and iris recognition devices ...
Presentation Attack Detection for Iris Recognition: An Assessment of the State-of-the-Art
Iris recognition is increasingly used in large-scale applications. As a result, presentation attack detection for iris recognition takes on fundamental importance. This survey covers the diverse research literature on this topic. Different categories of ...
Presentation attack detection system for fake Iris: a review
AbstractThe real-time solicitations of biometric systems have been extensively used for several things with the growing necessities of higher security level. There are numerous biometric traits used for person identification. In recent years, iris ...
Comments