Abstract
Iris recognition is increasingly used in large-scale applications. As a result, presentation attack detection for iris recognition takes on fundamental importance. This survey covers the diverse research literature on this topic. Different categories of presentation attack are described and placed in an application-relevant framework, and the state of the art in detecting each category of attack is summarized. One conclusion from this is that presentation attack detection for iris recognition is not yet a solved problem. Datasets available for research are described, research directions for the near- and medium-term future are outlined, and a short list of recommended readings is suggested.
- Krzysztof Adamiak, Dominik Żurek, and Krzysztof Ślot. 2015. Liveness detection in remote biometrics based on gaze direction estimation. In Federated Conference on Computer Science and Information Systems (FedCSIS’15). IEEE, 225--230.Google ScholarCross Ref
- Zahid Akhtar, Christian Michelon, and Gian Luca Foresti. 2014. Liveness detection for biometric authentication in mobile applications. In IEEE International Carnahan Conference on Security Technology (ICCST’14). IEEE, 1--6.Google ScholarCross Ref
- Zahid Akhtar, Christian Micheloni, and Gian Luca Foresti. 2015. Biometric liveness detection: Challenges and research opportunities. IEEE Security Privacy 13, 5 (Sept. 2015), 63--72.Google ScholarDigital Library
- Zahid Akhtar, Christian Micheloni, Claudio Piciarelli, and Gian Luca Foresti. 2014. MoBio_LivDet: Mobile biometric liveness detection. In IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS’14). IEEE, 187--192.Google Scholar
- Ahmad N. Al-Raisi and Ali M. Al-Khouri. 2008. Iris recognition and the challenge of homeland and border control security in UAE. Telematics and Informatics 25, 2 (2008), 117--132. Google ScholarDigital Library
- Fernando Alonso-Fernandez and Josef Bigün. 2014. Exploiting periocular and RGB information in fake iris detection. In International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO’14). IEEE, 1354--1359.Google Scholar
- André Anjos, Laurent El-Shafey, and Sébastien Marcel. 2017. BEAT: An open-source web-based open-science platform. arXiv:cs.SE/1704.02319. Retrieved July 18, 2018 from https://arxiv.org/pdf/1704.02319Google Scholar
- Sarah E. Baker, Amanda Hentz, Kevin W. Bowyer, and Patrick J. Flynn. 2009. Contact lenses: Handle with care for iris recognition. In IEEE International Conference on Biometrics: Theory Applications and Systems (BTAS’09). IEEE, 1--8. Google ScholarDigital Library
- Amrit Pal Singh Bhogal, Dominik Söllinger, Pauline Trung, and Andreas Uhl. 2017. Non-reference image quality assessment for biometric presentation attack detection. In International Workshop on Biometrics and Forensics. IEEE, 1--6.Google Scholar
- BIPLab -- Biometric and Image Processing Lab, University of Salerno. 2014. Mobile Iris CHallenge Evaluation I (MICHE-I) Database. Retrieved August 8, 2017 from http://biplab.unisa.it/MICHE/database/.Google Scholar
- David S. Bolme, Ryan A. Tokola, Chris B. Boehnen, Tiffany B. Saul, Kelly A. Sauerwein, and Dawnie Wolfe Steadman. 2016. Impact of environmental factors on biometric matching during human decomposition. In IEEE International Conference on Biometrics: Theory Applications and Systems (BTAS’16). IEEE, 1--8.Google ScholarDigital Library
- Bernhard E. Boser, Isabelle M. Guyon, and Vladimir N. Vapnik. 1992. A training algorithm for optimal margin classifiers. In The 5th Annual Workshop on Computational Learning Theory (COLT’92). ACM, New York, 144--152. Google ScholarDigital Library
- Kevin W. Bowyer and James S. Doyle. 2014. Cosmetic contact lenses and iris recognition spoofing. IEEE Computer 47, 5 (May 2014), 96--98. Google ScholarDigital Library
- Cunjian Chen and Arun Ross. 2018. A multi-task convolutional neural network for joint iris detection and presentation attack detection. In IEEE Winter Conference on Applications of Computer Vision (WACV’18). 44--51.Google ScholarCross Ref
- Rui Chen, Xirong Lin, and Tianhuai Ding. 2012. Liveness detection for iris recognition using multispectral images. Pattern Recognition Letters 33, 12 (2012), 1513--1519. Google ScholarDigital Library
- Chinese Academy of Sciences. 2004. CASIA-Iris-Syn v4. Retrieved March 21, 2018 from http://biometrics.idealtest.org/dbDetailForUser.do?id=4.Google Scholar
- CITeR. 2006. Synthetic Iris Textured Based. Retrieved March 21, 2018 from https://citer.clarkson.edu/biometric-dataset-collections/synthetic-iris-textured-based/.Google Scholar
- CITeR. 2007. Synthetic Iris Model Based. Retrieved March 21, 2018 from https://citer.clarkson.edu/biometric-dataset-collections/synthetic-iris-model-based/.Google Scholar
- Jonathan Connell, Nalini Ratha, James Gentile, and Ruud Bolle. 2013. Fake iris detection using structured light. In IEEE International Conference on Acoustics, Speech and Signal Processing. IEEE, 8692--8696.Google ScholarCross Ref
- Adam Czajka. 2013. Database of iris printouts and its application: Development of liveness detection method for iris recognition. In IEEE International Conference on Methods and Models in Automation and Robotics (MMAR’13). IEEE, 28--33.Google ScholarCross Ref
- Adam Czajka. 2015. Pupil dynamics for iris liveness detection. IEEE Trans. Inf. Forens. Security 10, 4 (April 2015), 726--735.Google ScholarDigital Library
- Adam Czajka. 2016. Iris liveness detection by modeling dynamic pupil features. In Handbook of Iris Recognition, Kevin W. Bowyer and Mark J. Burge (Eds.). Springer London, London, 439--467.Google Scholar
- Adam Czajka and Benedict Becker. 2018. Application of dynamic features of the pupil for iris presentation attack detection. In Handbook of Biometric Anti-Spoofing (2nd ed., to appear), Sébastien Marcel, Mark Nixon, Julian Fierrez, and Nicholas Evans (Eds.). Springer International Publishing AG, 1--17.Google Scholar
- Adam Czajka, Kevin W. Bowyer, Michael Krumdick, and Rosaura G. VidalMata. 2017. Recognition of image-orientation-based iris spoofing. IEEE Trans. Inf. Forens. Security PP, 99 (2017), 1--1.Google Scholar
- Adam Czajka, Andrzej Pacut, and Marcin Chochowski. 2011. Method of eye aliveness testing and device for eye aliveness testing. United States Patent, US 8,061,842, Filed on August 30, 2007. Issued on November 22, 2011.Google Scholar
- Adam Czajka, Przemek Strzelczyk, and Andrzej Pacut. 2007. Making iris recognition more reliable and spoof resistant. SPIE Newsroom (June 2007).Google Scholar
- Abhijit Das, Umapada Pal, Miguel Angel Ferrer, and Michael Blumenstein. 2016. A framework for liveness detection for direct attacks in the visible spectrum for multimodal ocular biometrics. Pattern Recognition Letters 82 (2016), 232--241. An insight on eye biometrics. Google ScholarDigital Library
- John Daugman. 1994. Biometric personal identification system based on iris analysis. United States Patent, US 5,291,560, Filed on July 15, 1991. Issued on March 1, 1994.Google Scholar
- John Daugman. 2000. Wavelet demodulation codes, statistical independence, and pattern recognition. In 2nd IMA-IP Institute of Mathematics and its Applications. IMA, 244--260.Google Scholar
- John Daugman. 2003. Demodulation by complex-valued wavelets for stochastic pattern recognition. Int. J. Wavelets, Multiresolut. Inf. Process. 1 (2003), 1--17.Google ScholarCross Ref
- James S. Doyle and Kevin W. Bowyer. 2015. Robust detection of textured contact lenses in iris recognition using BSIF. IEEE Access 3 (2015), 1672--1683.Google ScholarCross Ref
- James S. Doyle, Kevin W. Bowyer, and Patrick J. Flynn. 2013. Variation in accuracy of textured contact lens detection based on sensor and lens pattern. In IEEE International Conference on Biometrics: Theory Applications and Systems (BTAS’13). IEEE, 1--7.Google Scholar
- James S. Doyle, Patrick J. Flynn, and Kevin W. Bowyer. 2013. Automated classification of contact lens type in iris images. In 2013 International Conference on Biometrics (ICB’13). IEEE, 1--6.Google Scholar
- Pawel Drozdowski, Christian Rathgeb, and Christoph Busch. 2017. Sic-Gen: A synthetic iris-code generator. In International Conference of the Biometrics Special Interest Group (BIOSIG’17). IEEE, 1--6.Google ScholarCross Ref
- Ted Dunstone and Geoff Poulton. 2011. Vulnerability assessment. Biometric Technology Today 2011, 5 (May 2011), 5--7.Google ScholarCross Ref
- Sarah E.Baker, Amanda Hentz, Kevin W. Bowyer, and Patrick J. Flynn. 2010. Degradation of iris recognition performance due to non-cosmetic prescription contact lenses. Computer Vision and Image Understanding 114, 9 (Sept. 2010), 1030--1044. Google ScholarDigital Library
- Waleed S.-A. Fathy and Hanaa S. Ali. 2017. Entropy with local binary patterns for efficient iris liveness detection. Wireless Personal Communications (04 Dec. 2017), 1--14.Google Scholar
- Waleed S.-A. Fathy, Hanaa S. Ali, and Imbaby I. Mahmoud. 2017. Statistical representation for iris anti-spoofing using wavelet-based feature extraction and selection algorithms. In National Radio Science Conference (NRSC’17). IEEE, 221--229.Google Scholar
- Javier Galbally, Julian Fierrez, and Javier Ortega-Garcia. 2007. Vulnerabilities in biometric systems: Attacks and recent advances in liveness detection. In Spanish Workshop on Biometrics (SWB’07). Springer, 1--8.Google Scholar
- Javier Galbally and Marta Gomez-Barrero. 2016. A review of iris anti-spoofing. In International Conference on Biometrics and Forensics (IWBF’16). IEEE, 1--6.Google ScholarCross Ref
- Javier Galbally and Marta Gomez-Barrero. 2017. Presentation attack detection in iris recognition. In Iris and Periocular Biometric Recognition, Christian Rathgeb and Christoph Busch (Eds.). IET, London, UK, Chapter 11, 235--263. https://www.theiet.org/resources/books/security/irisper.cfm.Google Scholar
- Javier Galbally, Sebastien Marcel, and Julian Fierrez. 2014. Image quality assessment for fake biometric detection: Application to iris, fingerprint, and face recognition. IEEE Trans. Image Process. 23, 2 (Feb. 2014), 710--724. Google ScholarDigital Library
- Javier Galbally, Jaime Ortiz-Lopez, Julian Fierrez, and Javier Ortega-Garcia. 2012. Iris liveness detection based on quality related features. In 2012 5th IAPR International Conference on Biometrics (ICB’12). IEEE, 271--276.Google ScholarCross Ref
- Javier Galbally, Arun Ross, Marta Gomez-Barrero, Julian Fierrez, and Javier Ortega-Garcia. 2013. Iris image reconstruction from binary templates: An efficient probabilistic approach based on genetic algorithms. Computer Vision and Image Understanding 117, 10 (2013), 1512--1525. Google ScholarDigital Library
- Javier Galbally, Marios Savvides, Shreyas Venugopalan, and Arun A. Ross. 2016. Iris image reconstruction from binary templates. In Handbook of Iris Recognition, Kevin W. Bowyer and Mark J. Burge (Eds.). Springer, London, 469--496.Google Scholar
- Diego Gragnaniello, Giovanni Poggi, Carlo Sansone, and Luisa Verdoliva. 2014. Contact lens detection and classification in iris images through scale invariant descriptor. In International Conference on Signal-Image Technology Internet-Based Systems (SITIS’14). IEEE, 560--565. Google ScholarDigital Library
- Diego Gragnaniello, Giovanni Poggi, Carlo Sansone, and Luisa Verdoliva. 2015. An investigation of local descriptors for biometric spoofing detection. IEEE Trans. Inf. Forens. Security 10, 4 (April 2015), 849--863.Google ScholarDigital Library
- Diego Gragnaniello, Giovanni Poggi, Carlo Sansone, and Luisa Verdoliva. 2016. Using iris and sclera for detection and classification of contact lenses. Pattern Recognition Letters 82 (2016), 251--257. An insight on eye biometrics. Google ScholarDigital Library
- Diego Gragnaniello, Carlo Sansone, Giovanni Poggi, and Luisa Verdoliva. 2016. Biometric spoofing detection by a domain-aware convolutional neural network. In International Conference on Signal-Image Technology Internet-Based Systems (SITIS’16). IEEE, 193--198.Google ScholarCross Ref
- Diego Gragnaniello, Carlo Sansone, and Luisa Verdoliva. 2015. Iris liveness detection for mobile devices based on local descriptors. Pattern Recognition Letters 57 (2015), 81--87. Mobile Iris {CHallenge} Evaluation part I (MICHE I). Google ScholarDigital Library
- Priyanshu Gupta, Shipra Behera, Mayank Vatsa, and Richa Singh. 2014. On iris spoofing using print attack. In International Conference on Pattern Recognition (ICPR’14). IEEE, 1681--1686. Google ScholarDigital Library
- Lingxiao He, Haiqing Li, Fei Liu, Nianfeng Liu, Zhenan Sun, and Zhaofeng He. 2016. Multi-patch convolution neural network for iris liveness detection. In 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS’16). IEEE, 1--7.Google ScholarDigital Library
- Xiaofu He, Shujuan An, and Pengfei Shi. 2007. Statistical texture analysis-based approach for fake iris detection using support vector machines. In Advances in Biometrics: International Conference (ICB’07), Seong-Whan Lee and Stan Z. Li (Eds.). Springer, Berlin, 540--546. Google ScholarDigital Library
- Xiaofu He, Yue Lu, and Pengfei Shi. 2008. A fake iris detection method based on FFT and quality assessment. In Chinese Conference on Pattern Recognition. IEEE, 1--4.Google ScholarCross Ref
- Xiaofu He, Yue Lu, and Pengfei Shi. 2009. A new fake iris detection method. In IEEE International Conference on Biometrics (ICB’09), Massimo Tistarelli and Mark S. Nixon (Eds.). Springer, Berlin, 1132--1139. Google ScholarDigital Library
- Zhaofeng He, Zhenan Sun, Tieniu Tan, and Zhuoshi Wei. 2009. Efficient iris spoof detection via boosted local binary patterns. In IEEE International Conference on Biometrics (ICB’09), Massimo Tistarelli and Mark S. Nixon (Eds.). Springer, Berlin, 1080--1090. Google ScholarDigital Library
- Corey D. Holland and Oleg V. Komogortsev. 2013. Complex eye movement pattern biometrics: The effects of environment and stimulus. IEEE Trans. Inf. Forens. Security 8, 12 (Dec. 2013), 2115--2126. Google ScholarDigital Library
- Sheng-Hsun Hsieh, Yung-Hui Li, Wei Wang, and Chung-Hao Tien. 2018. A novel anti-spoofing solution for iris recognition toward cosmetic contact lens attack using spectral ICA analysis. Sensors 18, 3 (2018), 1--15.Google ScholarCross Ref
- Xinyu Huang, Changpeng Ti, Qi zhen Hou, Alade Tokuta, and Ruigang Yang. 2013. An experimental study of pupil constriction for liveness detection. In IEEE Workshop on Applications of Computer Vision (WACV’13). IEEE, 252--258. Google ScholarDigital Library
- Ken Hughes and Kevin W. Bowyer. 2013. Detection of contact-lens-based iris biometric spoofs using stereo imaging. In 2013 46th Hawaii International Conference on System Sciences. IEEE, 1763--1772. Google ScholarDigital Library
- Image Analysis and Biometrics Lab. 2016. IIITD Contact Lens Iris Database, Iris Combined Spoofing Database. Retrieved August 8, 2017 from http://iab-rubric.org/resources.html.Google Scholar
- Anil K. Jain, Karthik Nandakumar, and Abhishek Nagar. 2008. Biometric template security. EURASIP J. Adv. Signal Process. 2008 (Jan. 2008), Article 113, 17 pages. Google ScholarDigital Library
- Peter Johnson, Bin Tan, and Stephanie Schuckers. 2010. Multimodal fusion vulnerability to non-zero effort (spoof) imposters. In IEEE International Workshop on Information Forensics and Security. IEEE, 1--5.Google ScholarCross Ref
- Masashi Kanematsu, Hironobu Takano, and Kiyomi Nakamura. 2007. Highly reliable liveness detection method for iris recognition. In SICE Annual Conference. IEEE, 361--364.Google ScholarCross Ref
- Juho Kannala and Esa Rahtu. 2012. BSIF: Binarized statistical image features. In The 21st International Conference on Pattern Recognition (ICPR’12). IEEE, 1363--1366.Google Scholar
- R. Karunya and S. Kumaresan. 2015. A study of liveness detection in fingerprint and iris recognition systems using image quality assessment. In International Conference on Advanced Computing and Communication Systems. IEEE, 1--5.Google Scholar
- Naman Kohli, Daksha Yadav, Mayank Vatsa, and Richa Singh. 2013. Revisiting iris recognition with color cosmetic contact lenses. In IEEE International Conference on Biometrics (ICB’13). IEEE, 1--7.Google ScholarCross Ref
- Naman Kohli, Daksha Yadav, Mayank Vatsa, Richa Singh, and Afzel Noore. 2016. Detecting medley of iris spoofing attacks using DESIST. In IEEE International Conference on Biometrics: Theory Applications and Systems (BTAS’16). IEEE, 1--6.Google ScholarDigital Library
- Iasonas Kokkinos and Alan Yuille. 2008. Scale invariance without scale selection. In IEEE International Conference on Computer Vision and Pattern Recognition (CVPR’08). IEEE, 1--8.Google ScholarCross Ref
- Oleg Komogortsev. 2014. Eye Tracker Print-Attack Database (ETPAD) v1. Retrieved August 8, 2017 from http://cs.txstate.edu/ ok11/etpad_v1.html.Google Scholar
- Oleg Komogortsev. 2014. Eye Tracker Print-Attack Database (ETPAD) v2. Retrieved August 8, 2017 from http://cs.txstate.edu/ ok11/etpad_v2.html.Google Scholar
- Oleg V. Komogortsev and Alex Karpov. 2013. Liveness detection via oculomotor plant characteristics: Attack of mechanical replicas. In IEEE International Conference on Biometrics (ICB’13). IEEE, 1--8.Google Scholar
- Oleg V. Komogortsev, Alexey Karpov, and Corey D. Holland. 2015. Attack of mechanical replicas: Liveness detection with eye movements. IEEE Trans. Inf. Forens. Security 10, 4 (April 2015), 716--725.Google ScholarDigital Library
- Jukka Komulainen, Abdenour Hadid, and Matti Pietikäinen. 2014. Generalized textured contact lens detection by extracting BSIF description from Cartesian iris images. In IEEE International Joint Conference on Biometrics (IJCB’14). IEEE, 1--7.Google ScholarCross Ref
- Jukka Komulainen, Abdenour Hadid, and Matti Pietikäinen. 2017. Contact lens detection in iris images. In Iris and Periocular Biometric Recognition, Christian Rathgeb and Christoph Busch (Eds.). IET, London, UK, Chapter 12, 265--290. https://www.theiet.org/resources/books/security/irisper.cfm.Google Scholar
- Mohit Kumar and Niladri Bihari Puhan. 2015. Iris liveness detection using texture segmentation. In National Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG’15). IEEE, 1--4.Google ScholarCross Ref
- Yann LeCun, Leon Bottou, Yoshua Bengio, and Patrick Haffner. 1998. Gradient-based learning applied to document recognition. Proc. IEEE 86, 11 (Nov. 1998), 2278--2324.Google ScholarCross Ref
- Eui Chul Lee and Kang Ryoung Park. 2010. Fake iris detection based on 3D structure of iris pattern. Int. J. Imaging Syst. Technol. 20, 2 (2010), 162--166. Google ScholarDigital Library
- Eui Chul Lee, Kang Ryoung Park, and Jaihie Kim. 2005. Fake iris detection by using Purkinje image. In Lecture Notes in Computer Science, David Zhang and Anil K. Jain (Eds.). Springer, Berlin, 397--403. Google ScholarDigital Library
- Sung Joo Lee, Kang Ryoung Park, and Jaihie Kim. 2006. Robust fake iris detection based on variation of the reflectance ratio between the iris and the Sclera. In Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference. IEEE, 1--6.Google ScholarCross Ref
- Aaron Lefohn, Brian Budge, Peter Shirley, Richard Caruso, and Erik Reinhard. 2003. An ocularist’s approach to human iris synthesis. IEEE Comput. Graph. Appl. 23, 6 (Nov. 2003), 70--75. Google ScholarDigital Library
- Lovish, Aditya Nigam, Balender Kumar, and Phalguni Gupta. 2015. Robust contact lens detection using local phase quantization and binary Gabor pattern. In International Conference on Computer Analysis of Images and Patterns (CAIP’15), G. Azzopardi and N. Petkov (Eds.). Springer, 702--714.Google Scholar
- Maria De Marsico, Chiara Galdi, Michele Nappi, and Daniel Riccio. 2014. FIRME: Face and iris recognition for mobile engagement. Image Vision Comput. 32, 12 (2014), 1161--1172. Google ScholarDigital Library
- Maria De Marsico, Michele Nappi, Daniel Riccio, and Harry Wechsler. 2015. Mobile iris challenge evaluation (MICHE)-I, biometric iris dataset and protocols. Pattern Recognition Letters 57 (2015), 17--23. Mobile Iris CHallenge Evaluation part I (MICHE I). Google ScholarDigital Library
- Libor Masek and Peter Kovesi. 2003. MATLAB Source Code for a Biometric Identification System Based on Iris Patterns. Retrieved January 3, 2018 from http://www.peterkovesi.com/studentprojects/libor/sourcecode.html.Google Scholar
- Peter William Matthew. January 2016. Novel approaches to biometric security with an emphasis on liveness and coercion detection.Google Scholar
- David Menotti, Giovani Chiachia, Allan Pinto, William Robson Schwartz, Helio Pedrini, Alexandre Xavier Falcao, and Anderson Rocha. 2015. Deep representations for iris, face, and fingerprint spoofing detection. IEEE Trans. Inf. Forens. Security 10, 4 (April 2015), 864--879.Google ScholarDigital Library
- Aythami Morales, Julian Fierrez, Javier Galbally, and Marta Gomez-Barrero. 2018. Introduction to iris presentation attack detection. In Handbook of Biometric Anti-Spoofing (2nd ed., to appear), Sébastien Marcel, Mark Nixon, Julian Fierrez, and Nicholas Evans (Eds.). Springer International Publishing AG, 1--15.Google Scholar
- NISLab, NTNU. 2016. GUC - VIsible Spectrum Smartphone Iris Video (VISSIV) Database. Retrieved August 10, 2017 from http://www.nislab.no/biometrics_lab/vissiv_db.Google Scholar
- NISLab, NTNU. 2016. GUC Light Field Visible Spectrum Iris Artefact Database (GUC-LF-VIAr-DB). Retrieved August 8, 2017 from http://www.nislab.no/biometrics_lab/guc_lf_viar_db.Google Scholar
- NISLab, NTNU. 2016. GUC Visible Spectrum Iris Artefact (VSIA) Database. Retrieved August 8, 2017 from http://www.nislab.no/biometrics_lab/vsia_db.Google Scholar
- NISLab, NTNU. 2016. PAVID - Presentation Attack Video Iris Database. Retrieved August 8, 2017 from http://www.nislab.no/biometrics_lab/pavid_db.Google Scholar
- Kristin Adair Nixon, Valerio Aimale, and Robert K. Rowe. 2008. Spoof detection schemes. In Handbook of Biometrics, Anil K. Jain, Patrick Flynn, and Arun A. Ross (Eds.). Springer US, Boston, MA, 403--423.Google Scholar
- Timo Ojala, Matti Pietikäinen, and David Harwood. 1994. Performance evaluation of texture measures with classification based on Kullback discrimination of distributions. In 12th International Conference on Pattern Recognition, Vol. 1. IEEE, 582--585.Google ScholarCross Ref
- Jaime Ortiz-Lopez, Javier Galbally, Julian Fierrez, and Javier Ortega-Garcia. 2011. Predicting iris vulnerability to direct attacks based on quality related features. In IEEE International Carnahan Conference on Security Technology (ICCST’11). IEEE, 1--6.Google ScholarCross Ref
- Andrzej Pacut and Adam Czajka. 2006. Aliveness detection for iris biometrics. In IEEE International Carnahan Conference on Security Technology (ICCST’06). IEEE, 122--129.Google ScholarCross Ref
- Federico Pala and Bir Bhanu. 2017. Iris liveness detection by relative distance comparisons. In The IEEE Conference on Computer Vision and Pattern Recognition (CVPR) Workshops. IEEE, 664--671.Google ScholarCross Ref
- Jong Hyun Park and Moon Gi Kang. 2005. Iris recognition against counterfeit attack using gradient based fusion of multi-spectral images. In Advances in Biometric Person Authentication: International Wokshop on Biometric Recognition Systems (IWBRS’05), Stan Z. Li, Zhenan Sun, Tieniu Tan, Sharath Pankanti, Gérard Chollet, and David Zhang (Eds.). Springer, Berlin, 150--156. Google ScholarDigital Library
- Jong Hyun Park and Moon Gi Kang. 2007. Multispectral iris authentication system against counterfeit attack using gradient-based image fusion. Optical Engineering 46, 11 (2007), 117003-1--117003-14.Google ScholarCross Ref
- Kang Ryoung Park. 2006. Robust fake iris detection. In 4th International Conference on Articulated Motion and Deformable Objects (AMDO’06), Francisco J. Perales and Robert B. Fisher (Eds.). Springer, Berlin, 10--18. Google ScholarDigital Library
- Vishal M. Patel, Nalini K. Ratha, and Rama Chellappa. 2015. Cancelable biometrics: A review. IEEE Signal Processing Magazine 32, 5 (Sept. 2015), 54--65.Google ScholarCross Ref
- Allan Pinto, Helio Pedrini, Michael Krumdick, Benedict Becker, Adam Czajka, Kevin W. Bowyer, and Anderson Rocha. 2018. Counteracting presentation attacks in face, fingerprint, and iris recognition. In Deep Learning in Biometrics, Angshul Majumdar Mayank Vatsa and Richa Singh (Eds.). CRC Press, Boca Raton, 245--293. https://www.crcpress.com/Deep-Learning-in-Biometrics/Vatsa-Singh-Majumdar/p/book/9781138578234Google Scholar
- Niladri Bihari Puhan, Sudha Natarajan, and A. Suhas Hegde. 2011. A new iris liveness detection method against contact lens spoofing. In IEEE International Symposium on Consumer Electronics (ISCE’11). IEEE, 71--74.Google Scholar
- George W. Quinn, Patrick Grother, and James Matey. 2018. IREX IX Part One: Performance of Iris Recognition Algorithms. Technical Report. NIST. Interagency Report 7629.Google Scholar
- Ramachandra Raghavendra and Christoph Busch. 2014. Presentation attack detection algorithm for face and iris biometrics. In European Signal Processing Conference (EUSIPCO’14). IEEE, 1387--1391.Google Scholar
- Ramachandra Raghavendra and Christoph Busch. 2014. Presentation attack detection on visible spectrum iris recognition by exploring inherent characteristics of light field camera. In IEEE International Joint Conference on Biometrics (IJCB’14). IEEE, 1--8.Google ScholarCross Ref
- Ramachandra Raghavendra and Christoph Busch. 2015. Robust scheme for iris presentation attack detection using multiscale binarized statistical image features. IEEE Trans. Inf. Forens. Security 10, 4 (April 2015), 703--715.Google ScholarDigital Library
- Ramachandra Raghavendra, Kiran B. Raja, and Christoph Busch. 2014. Ensemble of statistically independent filters for robust contact lens detection in iris images. In The 2014 Indian Conference on Computer Vision Graphics and Image Processing (ICVGIP’14). ACM, Article 24, 7 pages. Google ScholarDigital Library
- Ramachandra Raghavendra, Kiran B. Raja, and Christoph Busch. 2017. ContlensNet: Robust iris contact lens detection using deep convolutional neural networks. In IEEE Winter Conference on Applications of Computer Vision (WACV’17). IEEE, 1160--1167.Google ScholarCross Ref
- Kiran B. Raja, R. Raghavendra, Jean-Noel Braun, and Christoph Busch. 2016. Presentation attack detection using a generalizable statistical approach for periocular and iris systems. In International Conference of the Biometrics Special Interest Group (BIOSIG’16), Arslan Brömme, Christoph Busch, Christian Rathgeb, and Andreas Uhl (Eds.). Gesellschaft für Informatik e.V., Bonn, 111--122.Google Scholar
- Kiran B. Raja, Ramachandra Raghavendra, and Christoph Busch. 2015. Presentation attack detection using Laplacian decomposed frequency response for visible spectrum and near-infra-red iris systems. In IEEE International Conference on Biometrics: Theory Applications and Systems (BTAS’15). IEEE, 1--8.Google ScholarCross Ref
- Kiran B. Raja, Ramachandra Raghavendra, and Christoph Busch. 2015. Video presentation attack detection in visible spectrum iris recognition using magnified phase information. IEEE Trans. Inf. Forens. Security 10, 10 (Oct. 2015), 2048--2056.Google ScholarDigital Library
- Kiran B. Raja, Ramachandra Raghavendra, and Christoph Busch. 2016. Color adaptive quantized patterns for presentation attack detection in ocular biometric systems. In International Conference on Security of Information and Networks (SIN’16). ACM, New York, 9--15. Google ScholarDigital Library
- Christian Rathgeb and Christoph Busch. 2017. On the feasibility of creating morphed iris-codes. In IEEE International Joint Conference on Biometrics (IJCB’17). IEEE, 152--157.Google ScholarCross Ref
- Christian Rathgeb and Andreas Uhl. 2010. Attacking iris recognition: An efficient hill-climbing technique. In International Conference on Pattern Recognition (ICPR’10). IEEE, 1217--1220. Google ScholarDigital Library
- Christian Rathgeb and Andreas Uhl. 2011. A survey on biometric cryptosystems and cancelable biometrics. EURASIP J. Inf. Security 2011, 1 (23 Sept. 2011), 3.Google Scholar
- Ioannis Rigas and Oleg V. Komogortsev. 2014. Gaze estimation as a framework for iris liveness detection. In IEEE International Joint Conference on Biometrics (IJCB’14). IEEE, 1--8.Google Scholar
- Ioannis Rigas and Oleg V. Komogortsev. 2015. Eye movement-driven defense against iris print-attacks. Pattern Recognition Letters 68, Part 2 (2015), 316--326. Special Issue on “Soft Biometrics.” Google ScholarDigital Library
- Virginia Ruiz-Albacete, Pedro Tome-Gonzalez, Fernando Alonso-Fernandez, Javier Galbally, Julian Fierrez, and Javier Ortega-Garcia. 2008. Direct attacks using fake images in iris verification. In Lecture Notes in Computer Science, Vol. 5372. Springer, Roskilde, Denmark, 181--190. Google ScholarDigital Library
- Alora Sansola. 2015. Postmortem iris recognition and its application in human identification. Master’s thesis. Boston University, Boston, MA.Google Scholar
- Kelly Sauerwein, Tiffany B. Saul, Dawnie Wolfe Steadman, and Chris B. Boehnen. 2017. The effect of decomposition on the efficacy of biometrics for positive identification. J. Forens. Sci. 62, 6 (2017), 1599--1602.Google ScholarCross Ref
- Ana F. Sequeira, Lulu Chen, James Ferryman, Peter Wild, Fernando Alonso-Fernandez, Josef Bigun, Kiran B. Raja, Ramachandra Raghavendra, Christoph Busch, Tiago de Freitas Pereira, Sebastien Marcel, Sushree Sangeeta Behera, Mahesh Gour, and Vivek Kanhangad. 2017. Cross-eyed 2017: Cross-spectral iris/periocular recognition competition. In IEEE International Joint Conference on Biometrics (IJCB’17). IEEE, 725--732.Google ScholarCross Ref
- Ana F. Sequeira, João C. Monteiro, Ana Rebelo, and Hélder P. Oliveira. 2014. MobBIO: A multimodal database captured with a portable handheld device. In IEEE International Conference on Computer Vision Theory and Applications (VISAPP’14), Vol. 3. IEEE, 133--139.Google Scholar
- Ana F. Sequeira, Juliano Murari, and Jaime S. Cardoso. 2014. Iris liveness detection methods in mobile applications. In IEEE International Conference on Computer Vision Theory and Applications (VISAPP’14), Vol. 3. IEEE, 22--33.Google Scholar
- Ana F. Sequeira, Juliano Murari, and Jaime S. Cardoso. 2014. Iris liveness detection methods in the mobile biometrics scenario. In IEEE International Joint Conference on Neural Networks (IJCNN’14). IEEE, 3002--3008.Google Scholar
- Ana F. Sequeira, Hélder P. Oliveira, João C. Monteiro, João P. Monteiro, and Jaime S. Cardoso. 2014. MobILive 2014 - Mobile iris liveness detection competition. In IEEE International Joint Conference on Biometrics (IJCB’14). IEEE, 1--6.Google Scholar
- Ana F. Sequeira, Shejin Thavalengal, James Ferryman, Peter Corcoran, and Jaime S. Cardoso. 2016. A realistic evaluation of iris presentation attack detection. In International Conference on Telecommunications and Signal Processing (TSP’16). IEEE, 660--664.Google Scholar
- Samir Shah and Arun Ross. 2006. Generating synthetic irises by feature agglomeration. In 2006 International Conference on Image Processing. IEEE, 317--320.Google ScholarCross Ref
- Nazariy K. Shaydyuk and Timothy Cleland. 2016. Biometric identification via retina scanning with liveness detection using speckle contrast imaging. In IEEE International Carnahan Conference on Security Technology (ICCST’16). IEEE, 1--5.Google Scholar
- Pedro Silva, Eduardo Luz, Rafael Baeta, Helio Pedrini, Alexandre Xavier Falcao, and David Menotti. 2015. An approach to iris contact lens detection based on deep image representations. In Conference on Graphics, Patterns and Images (SIBGRAPI’15). IEEE, 157--164. Google ScholarDigital Library
- Avantika Singh, Vishesh Mistry, Dhananjay Yadav, and Aditya Nigam. 2018. GHCLNet: A generalized hierarchically tuned contact lens detection network. In IEEE International Conference on Identity, Security and Behavior Analysis (ISBA’18). IEEE, Singapore, 1--6.Google ScholarCross Ref
- Yogendra Narain Singh and Sanjay Kumar Singh. 2011. Vitality detection from biometrics: State-of-the-art. In World Congress on Information and Communication Technologies. IEEE, 106--111.Google ScholarCross Ref
- Brian A. Smith, Qi Yin, Steven K. Feiner, and Shree K. Nayar. 2013. Columbia Gaze Data Set. Retrieved August 8, 2017 from http://www.cs.columbia.edu/CAVE/databases/columbia_gaze.Google Scholar
- Brian A. Smith, Qi Yin, Steven K. Feiner, and Shree K. Nayar. 2013. Gaze locking: Passive eye contact detection for human-object interaction. In Annual ACM Symposium on User Interface Software and Technology (UIST’13). ACM, New York, 271--280. Google ScholarDigital Library
- SOCIA Lab. - Soft Computing and Image Analysis Group. 2004. Noisy Visible Wavelength Iris Image Databases (UBIRIS). Retrieved January 19, 2018 from http://iris.di.ubi.pt.Google Scholar
- Dominik Söllinger, Pauline Trung, and Andreas Uhl. 2018. Non-reference image quality assessment and natural scene statistics to counter biometric sensor spoofing. IET Biometrics (Jan. 2018), 1--11.Google Scholar
- Zhenan Sun and Tieniu Tan. 2014. Iris anti-spoofing. In Handbook of Biometric Anti-Spoofing: Trusted Biometrics under Spoofing Attacks, Sébastien Marcel, Mark S. Nixon, and Stan Z. Li (Eds.). Springer London, London, 103--123.Google Scholar
- Zhenan Sun, Hui Zhang, Tieniu Tan, and Jianyu Wang. 2014. Iris image classification based on hierarchical visual codebook. IEEE Trans. Pattern Anal. Mach. Intell. 36, 6 (June 2014), 1120--1133. Google ScholarDigital Library
- Hironobu Takano and Kiyomi Nakamura. 2009. Rotation independent iris recognition by the rotation spreading neural network. In IEEE International Symposium on Consumer Electronics. IEEE, 651--654.Google ScholarCross Ref
- Lisa Thalheim, Jan Krissler, and Peter-Michael Ziegler. 2002. Biometric Access Protection Devices and their Programs Put to the Test, available online in c’t Magazine, No. 11/2002, p. 114.Google Scholar
- Shejin Thavalengal and Peter Corcoran. 2016. User authentication on smartphones: Focusing on iris biometrics. IEEE Consumer Electron. Mag. 5, 2 (April 2016), 87--93.Google ScholarCross Ref
- Shejin Thavalengal, Tudor Nedelcu, Petronel Bigioi, and Peter Corcoran. 2016. Iris liveness detection for next generation smartphones. IEEE Trans. Cons. Elect. 62, 2 (May 2016), 95--102. Google ScholarDigital Library
- Shejin Thavalengal, Ruxandra Vranceanu, Razvan G. Condorovici, and Peter Corcoran. 2014. Iris pattern obfuscation in digital images. In IEEE International Joint Conference on Biometrics (IJCB’14). IEEE, 1--8.Google ScholarCross Ref
- Inmaculada Tomeo-Reyes and Vinod Chandran. 2013. Iris based identity verification robust to sample presentation security attacks. Interntional Journal of Information Science and Intelligent System 2, 1 (June 2013), 27--41. https://eprints.qut.edu.au/60842/Google Scholar
- Anna Bori Toth and Javier Galbally. 2015. Anti-spoofing, iris. In Encyclopedia of Biometrics, Stan Z. Li and Anil Jain (Eds.). Springer US, New York, 87--97. http://www.springer.com/us/book/9781489974877.Google Scholar
- Bori Toth. 2009. Liveness detection: Iris. In Encyclopedia of Biometrics, Stan Z. Li and Anil Jain (Eds.). Springer US, Boston, MA, 931--938.Google Scholar
- Mateusz Trokielewicz and Ewelina Bartuzi. 2016. Cross-spectral iris recognition for mobile applications using high-quality color images. J. Telecommun. Inf. Technol. 3 (2016), 91--97.Google Scholar
- Mateusz Trokielewicz, Adam Czajka, and Piotr Maciejewicz. 2016. Human iris recognition in post-mortem subjects: Study and database. In IEEE International Conference on Biometrics: Theory Applications and Systems (BTAS’16). IEEE, 1--6.Google ScholarDigital Library
- Mateusz Trokielewicz, Adam Czajka, and Piotr Maciejewicz. 2016. Post-mortem human iris recognition. In IEEE International Conference on Biometrics (ICB’16). IEEE, 1--6.Google ScholarCross Ref
- Shreyas Venugopalan and Marios Savvides. 2011. How to generate spoofed irises from an iris code template. IEEE Trans. Inf. Forens. Security 6, 2 (June 2011), 385--395. Google ScholarDigital Library
- Fabiola M. Villalbos-Castaldi and Ernesto Suaste-Gómez. 2014. In the use of the spontaneous pupillary oscillations as a new biometric trait. In International Workshop on Biometrics and Forensics. IEEE, 1--6.Google Scholar
- Warsaw University of Technology. 2013. Warsaw Datasets Webpage. Retrieved August 10, 2017 from http://zbum.ia.pw.edu.pl/EN/node/46.Google Scholar
- Hong Wei, Lulu Chen, and James Ferryman. 2013. Biometrics in ABC: Counter-spoofing research. In FRONTEX 2nd Global Conference on Future Developments of Automated Border Control. FRONTEX, 1--4.Google Scholar
- Zhuoshi Wei, Xianchao Qiu, Zhenan Sun, and Tieniu Tan. 2008. Counterfeit iris detection based on texture analysis. In International Conference on Pattern Recognition (ICPR’08). IEEE, 1--4.Google Scholar
- Zhuoshi Wei, Tieniu Tan, and Zhenan Sun. 2008. Synthesis of large realistic iris databases using patch-based sampling. In International Conference on Pattern Recognition (ICPR’08). IEEE, 1--4.Google Scholar
- Daksha Yadav, Naman Kohli, James S. Doyle, Richa Singh, Mayank Vatsa, and Kevin W. Bowyer. 2014. Unraveling the effect of textured contact lenses on iris recognition. IEEE Trans. Inf. Forens. Security 9, 5 (May 2014), 851--862. Google ScholarDigital Library
- Daksha Yadav, Naman Kohli, Mayank Vatsa, Richa Singh, and Afzel Noore. 2017. Unconstrained visible spectrum iris with textured contact lens variations: Database and benchmarking. In IEEE International Joint Conference on Biometrics (IJCB’17). IEEE, 1--6.Google ScholarCross Ref
- David Yambay, Benedict Becker, Naman Kohli, Daksha Yadav, Adam Czajka, Kevin W. Bowyer, Stephanie Schuckers, Richa Singh, Mayank Vatsa, Afzel Noore, Diego Gragnaniello, C. Sansone, L. Verdoliva, Lingxiao He, Yiwei Ru, Haiqing Li, Nianfeng Liu, Zhenan Sun, and Tieniu Tan. 2017. LivDet iris 2017 -- Iris liveness detection competition 2017. In IEEE International Joint Conference on Biometrics (IJCB’17). IEEE, 1--6.Google ScholarCross Ref
- David Yambay, James S. Doyle, Kevin W. Bowyer, Adam Czajka, and Stephanie Schuckers. 2014. LivDet-iris 2013 - Iris liveness detection competition 2013. In IEEE International Joint Conference on Biometrics (IJCB’14). IEEE, 1--8.Google ScholarCross Ref
- David Yambay and Stephanie Schuckers. 2018. Review of iris presentation attack detection competitions. In Handbook of Biometric Anti-Spoofing (2nd ed., to appear), Sébastien Marcel, Mark Nixon, Julian Fierrez, and Nicholas Evans (Eds.). Springer International Publishing AG, 1--16.Google Scholar
- David Yambay, Brian Walczak, Stephanie Schuckers, and Adam Czajka. 2017. LivDet-iris 2015 - Iris liveness detection competition 2015. In IEEE International Conference on Identity, Security and Behavior Analysis (ISBA’17). IEEE, 1--6.Google ScholarCross Ref
- Hui Zhang, Zhenan Sun, and Tieniu Tan. 2010. Contact lens detection based on weighted LBP. In International Conference on Pattern Recognition (ICPR’10). IEEE, 4279--4282. Google ScholarDigital Library
- Jinyu Zuo, Natalia A. Schmid, and Xiaohan Chen. 2007. On generation and analysis of synthetic iris images. IEEE Trans. Inf. Forens. Security 2, 1 (March 2007), 77--90. Google ScholarDigital Library
Index Terms
- Presentation Attack Detection for Iris Recognition: An Assessment of the State-of-the-Art
Recommendations
Presentation attack detection system for fake Iris: a review
AbstractThe real-time solicitations of biometric systems have been extensively used for several things with the growing necessities of higher security level. There are numerous biometric traits used for person identification. In recent years, iris ...
Video Presentation Attack Detection in Visible Spectrum Iris Recognition Using Magnified Phase Information
The gaining popularity of the visible spectrum iris recognition has sparked the interest in adopting it for various access control applications. Along with the popularity of visible spectrum iris recognition comes the threat of identity spoofing, ...
A survey of attacks on iris biometric systems
Biometric recognition has several applications that provide reliable solutions to the user authentication problem. Its widespread use and popularity is itself making it prone to several vulnerabilities. Iris is emerging as one of the most popular and ...
Comments