skip to main content
survey

Presentation Attack Detection for Iris Recognition: An Assessment of the State-of-the-Art

Published:31 July 2018Publication History
Skip Abstract Section

Abstract

Iris recognition is increasingly used in large-scale applications. As a result, presentation attack detection for iris recognition takes on fundamental importance. This survey covers the diverse research literature on this topic. Different categories of presentation attack are described and placed in an application-relevant framework, and the state of the art in detecting each category of attack is summarized. One conclusion from this is that presentation attack detection for iris recognition is not yet a solved problem. Datasets available for research are described, research directions for the near- and medium-term future are outlined, and a short list of recommended readings is suggested.

References

  1. Krzysztof Adamiak, Dominik Żurek, and Krzysztof Ślot. 2015. Liveness detection in remote biometrics based on gaze direction estimation. In Federated Conference on Computer Science and Information Systems (FedCSIS’15). IEEE, 225--230.Google ScholarGoogle ScholarCross RefCross Ref
  2. Zahid Akhtar, Christian Michelon, and Gian Luca Foresti. 2014. Liveness detection for biometric authentication in mobile applications. In IEEE International Carnahan Conference on Security Technology (ICCST’14). IEEE, 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  3. Zahid Akhtar, Christian Micheloni, and Gian Luca Foresti. 2015. Biometric liveness detection: Challenges and research opportunities. IEEE Security Privacy 13, 5 (Sept. 2015), 63--72.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Zahid Akhtar, Christian Micheloni, Claudio Piciarelli, and Gian Luca Foresti. 2014. MoBio_LivDet: Mobile biometric liveness detection. In IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS’14). IEEE, 187--192.Google ScholarGoogle Scholar
  5. Ahmad N. Al-Raisi and Ali M. Al-Khouri. 2008. Iris recognition and the challenge of homeland and border control security in UAE. Telematics and Informatics 25, 2 (2008), 117--132. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Fernando Alonso-Fernandez and Josef Bigün. 2014. Exploiting periocular and RGB information in fake iris detection. In International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO’14). IEEE, 1354--1359.Google ScholarGoogle Scholar
  7. André Anjos, Laurent El-Shafey, and Sébastien Marcel. 2017. BEAT: An open-source web-based open-science platform. arXiv:cs.SE/1704.02319. Retrieved July 18, 2018 from https://arxiv.org/pdf/1704.02319Google ScholarGoogle Scholar
  8. Sarah E. Baker, Amanda Hentz, Kevin W. Bowyer, and Patrick J. Flynn. 2009. Contact lenses: Handle with care for iris recognition. In IEEE International Conference on Biometrics: Theory Applications and Systems (BTAS’09). IEEE, 1--8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Amrit Pal Singh Bhogal, Dominik Söllinger, Pauline Trung, and Andreas Uhl. 2017. Non-reference image quality assessment for biometric presentation attack detection. In International Workshop on Biometrics and Forensics. IEEE, 1--6.Google ScholarGoogle Scholar
  10. BIPLab -- Biometric and Image Processing Lab, University of Salerno. 2014. Mobile Iris CHallenge Evaluation I (MICHE-I) Database. Retrieved August 8, 2017 from http://biplab.unisa.it/MICHE/database/.Google ScholarGoogle Scholar
  11. David S. Bolme, Ryan A. Tokola, Chris B. Boehnen, Tiffany B. Saul, Kelly A. Sauerwein, and Dawnie Wolfe Steadman. 2016. Impact of environmental factors on biometric matching during human decomposition. In IEEE International Conference on Biometrics: Theory Applications and Systems (BTAS’16). IEEE, 1--8.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Bernhard E. Boser, Isabelle M. Guyon, and Vladimir N. Vapnik. 1992. A training algorithm for optimal margin classifiers. In The 5th Annual Workshop on Computational Learning Theory (COLT’92). ACM, New York, 144--152. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Kevin W. Bowyer and James S. Doyle. 2014. Cosmetic contact lenses and iris recognition spoofing. IEEE Computer 47, 5 (May 2014), 96--98. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Cunjian Chen and Arun Ross. 2018. A multi-task convolutional neural network for joint iris detection and presentation attack detection. In IEEE Winter Conference on Applications of Computer Vision (WACV’18). 44--51.Google ScholarGoogle ScholarCross RefCross Ref
  15. Rui Chen, Xirong Lin, and Tianhuai Ding. 2012. Liveness detection for iris recognition using multispectral images. Pattern Recognition Letters 33, 12 (2012), 1513--1519. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Chinese Academy of Sciences. 2004. CASIA-Iris-Syn v4. Retrieved March 21, 2018 from http://biometrics.idealtest.org/dbDetailForUser.do?id=4.Google ScholarGoogle Scholar
  17. CITeR. 2006. Synthetic Iris Textured Based. Retrieved March 21, 2018 from https://citer.clarkson.edu/biometric-dataset-collections/synthetic-iris-textured-based/.Google ScholarGoogle Scholar
  18. CITeR. 2007. Synthetic Iris Model Based. Retrieved March 21, 2018 from https://citer.clarkson.edu/biometric-dataset-collections/synthetic-iris-model-based/.Google ScholarGoogle Scholar
  19. Jonathan Connell, Nalini Ratha, James Gentile, and Ruud Bolle. 2013. Fake iris detection using structured light. In IEEE International Conference on Acoustics, Speech and Signal Processing. IEEE, 8692--8696.Google ScholarGoogle ScholarCross RefCross Ref
  20. Adam Czajka. 2013. Database of iris printouts and its application: Development of liveness detection method for iris recognition. In IEEE International Conference on Methods and Models in Automation and Robotics (MMAR’13). IEEE, 28--33.Google ScholarGoogle ScholarCross RefCross Ref
  21. Adam Czajka. 2015. Pupil dynamics for iris liveness detection. IEEE Trans. Inf. Forens. Security 10, 4 (April 2015), 726--735.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Adam Czajka. 2016. Iris liveness detection by modeling dynamic pupil features. In Handbook of Iris Recognition, Kevin W. Bowyer and Mark J. Burge (Eds.). Springer London, London, 439--467.Google ScholarGoogle Scholar
  23. Adam Czajka and Benedict Becker. 2018. Application of dynamic features of the pupil for iris presentation attack detection. In Handbook of Biometric Anti-Spoofing (2nd ed., to appear), Sébastien Marcel, Mark Nixon, Julian Fierrez, and Nicholas Evans (Eds.). Springer International Publishing AG, 1--17.Google ScholarGoogle Scholar
  24. Adam Czajka, Kevin W. Bowyer, Michael Krumdick, and Rosaura G. VidalMata. 2017. Recognition of image-orientation-based iris spoofing. IEEE Trans. Inf. Forens. Security PP, 99 (2017), 1--1.Google ScholarGoogle Scholar
  25. Adam Czajka, Andrzej Pacut, and Marcin Chochowski. 2011. Method of eye aliveness testing and device for eye aliveness testing. United States Patent, US 8,061,842, Filed on August 30, 2007. Issued on November 22, 2011.Google ScholarGoogle Scholar
  26. Adam Czajka, Przemek Strzelczyk, and Andrzej Pacut. 2007. Making iris recognition more reliable and spoof resistant. SPIE Newsroom (June 2007).Google ScholarGoogle Scholar
  27. Abhijit Das, Umapada Pal, Miguel Angel Ferrer, and Michael Blumenstein. 2016. A framework for liveness detection for direct attacks in the visible spectrum for multimodal ocular biometrics. Pattern Recognition Letters 82 (2016), 232--241. An insight on eye biometrics. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. John Daugman. 1994. Biometric personal identification system based on iris analysis. United States Patent, US 5,291,560, Filed on July 15, 1991. Issued on March 1, 1994.Google ScholarGoogle Scholar
  29. John Daugman. 2000. Wavelet demodulation codes, statistical independence, and pattern recognition. In 2nd IMA-IP Institute of Mathematics and its Applications. IMA, 244--260.Google ScholarGoogle Scholar
  30. John Daugman. 2003. Demodulation by complex-valued wavelets for stochastic pattern recognition. Int. J. Wavelets, Multiresolut. Inf. Process. 1 (2003), 1--17.Google ScholarGoogle ScholarCross RefCross Ref
  31. James S. Doyle and Kevin W. Bowyer. 2015. Robust detection of textured contact lenses in iris recognition using BSIF. IEEE Access 3 (2015), 1672--1683.Google ScholarGoogle ScholarCross RefCross Ref
  32. James S. Doyle, Kevin W. Bowyer, and Patrick J. Flynn. 2013. Variation in accuracy of textured contact lens detection based on sensor and lens pattern. In IEEE International Conference on Biometrics: Theory Applications and Systems (BTAS’13). IEEE, 1--7.Google ScholarGoogle Scholar
  33. James S. Doyle, Patrick J. Flynn, and Kevin W. Bowyer. 2013. Automated classification of contact lens type in iris images. In 2013 International Conference on Biometrics (ICB’13). IEEE, 1--6.Google ScholarGoogle Scholar
  34. Pawel Drozdowski, Christian Rathgeb, and Christoph Busch. 2017. Sic-Gen: A synthetic iris-code generator. In International Conference of the Biometrics Special Interest Group (BIOSIG’17). IEEE, 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  35. Ted Dunstone and Geoff Poulton. 2011. Vulnerability assessment. Biometric Technology Today 2011, 5 (May 2011), 5--7.Google ScholarGoogle ScholarCross RefCross Ref
  36. Sarah E.Baker, Amanda Hentz, Kevin W. Bowyer, and Patrick J. Flynn. 2010. Degradation of iris recognition performance due to non-cosmetic prescription contact lenses. Computer Vision and Image Understanding 114, 9 (Sept. 2010), 1030--1044. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Waleed S.-A. Fathy and Hanaa S. Ali. 2017. Entropy with local binary patterns for efficient iris liveness detection. Wireless Personal Communications (04 Dec. 2017), 1--14.Google ScholarGoogle Scholar
  38. Waleed S.-A. Fathy, Hanaa S. Ali, and Imbaby I. Mahmoud. 2017. Statistical representation for iris anti-spoofing using wavelet-based feature extraction and selection algorithms. In National Radio Science Conference (NRSC’17). IEEE, 221--229.Google ScholarGoogle Scholar
  39. Javier Galbally, Julian Fierrez, and Javier Ortega-Garcia. 2007. Vulnerabilities in biometric systems: Attacks and recent advances in liveness detection. In Spanish Workshop on Biometrics (SWB’07). Springer, 1--8.Google ScholarGoogle Scholar
  40. Javier Galbally and Marta Gomez-Barrero. 2016. A review of iris anti-spoofing. In International Conference on Biometrics and Forensics (IWBF’16). IEEE, 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  41. Javier Galbally and Marta Gomez-Barrero. 2017. Presentation attack detection in iris recognition. In Iris and Periocular Biometric Recognition, Christian Rathgeb and Christoph Busch (Eds.). IET, London, UK, Chapter 11, 235--263. https://www.theiet.org/resources/books/security/irisper.cfm.Google ScholarGoogle Scholar
  42. Javier Galbally, Sebastien Marcel, and Julian Fierrez. 2014. Image quality assessment for fake biometric detection: Application to iris, fingerprint, and face recognition. IEEE Trans. Image Process. 23, 2 (Feb. 2014), 710--724. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Javier Galbally, Jaime Ortiz-Lopez, Julian Fierrez, and Javier Ortega-Garcia. 2012. Iris liveness detection based on quality related features. In 2012 5th IAPR International Conference on Biometrics (ICB’12). IEEE, 271--276.Google ScholarGoogle ScholarCross RefCross Ref
  44. Javier Galbally, Arun Ross, Marta Gomez-Barrero, Julian Fierrez, and Javier Ortega-Garcia. 2013. Iris image reconstruction from binary templates: An efficient probabilistic approach based on genetic algorithms. Computer Vision and Image Understanding 117, 10 (2013), 1512--1525. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Javier Galbally, Marios Savvides, Shreyas Venugopalan, and Arun A. Ross. 2016. Iris image reconstruction from binary templates. In Handbook of Iris Recognition, Kevin W. Bowyer and Mark J. Burge (Eds.). Springer, London, 469--496.Google ScholarGoogle Scholar
  46. Diego Gragnaniello, Giovanni Poggi, Carlo Sansone, and Luisa Verdoliva. 2014. Contact lens detection and classification in iris images through scale invariant descriptor. In International Conference on Signal-Image Technology Internet-Based Systems (SITIS’14). IEEE, 560--565. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Diego Gragnaniello, Giovanni Poggi, Carlo Sansone, and Luisa Verdoliva. 2015. An investigation of local descriptors for biometric spoofing detection. IEEE Trans. Inf. Forens. Security 10, 4 (April 2015), 849--863.Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Diego Gragnaniello, Giovanni Poggi, Carlo Sansone, and Luisa Verdoliva. 2016. Using iris and sclera for detection and classification of contact lenses. Pattern Recognition Letters 82 (2016), 251--257. An insight on eye biometrics. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Diego Gragnaniello, Carlo Sansone, Giovanni Poggi, and Luisa Verdoliva. 2016. Biometric spoofing detection by a domain-aware convolutional neural network. In International Conference on Signal-Image Technology Internet-Based Systems (SITIS’16). IEEE, 193--198.Google ScholarGoogle ScholarCross RefCross Ref
  50. Diego Gragnaniello, Carlo Sansone, and Luisa Verdoliva. 2015. Iris liveness detection for mobile devices based on local descriptors. Pattern Recognition Letters 57 (2015), 81--87. Mobile Iris {CHallenge} Evaluation part I (MICHE I). Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Priyanshu Gupta, Shipra Behera, Mayank Vatsa, and Richa Singh. 2014. On iris spoofing using print attack. In International Conference on Pattern Recognition (ICPR’14). IEEE, 1681--1686. Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Lingxiao He, Haiqing Li, Fei Liu, Nianfeng Liu, Zhenan Sun, and Zhaofeng He. 2016. Multi-patch convolution neural network for iris liveness detection. In 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS’16). IEEE, 1--7.Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Xiaofu He, Shujuan An, and Pengfei Shi. 2007. Statistical texture analysis-based approach for fake iris detection using support vector machines. In Advances in Biometrics: International Conference (ICB’07), Seong-Whan Lee and Stan Z. Li (Eds.). Springer, Berlin, 540--546. Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Xiaofu He, Yue Lu, and Pengfei Shi. 2008. A fake iris detection method based on FFT and quality assessment. In Chinese Conference on Pattern Recognition. IEEE, 1--4.Google ScholarGoogle ScholarCross RefCross Ref
  55. Xiaofu He, Yue Lu, and Pengfei Shi. 2009. A new fake iris detection method. In IEEE International Conference on Biometrics (ICB’09), Massimo Tistarelli and Mark S. Nixon (Eds.). Springer, Berlin, 1132--1139. Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Zhaofeng He, Zhenan Sun, Tieniu Tan, and Zhuoshi Wei. 2009. Efficient iris spoof detection via boosted local binary patterns. In IEEE International Conference on Biometrics (ICB’09), Massimo Tistarelli and Mark S. Nixon (Eds.). Springer, Berlin, 1080--1090. Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Corey D. Holland and Oleg V. Komogortsev. 2013. Complex eye movement pattern biometrics: The effects of environment and stimulus. IEEE Trans. Inf. Forens. Security 8, 12 (Dec. 2013), 2115--2126. Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Sheng-Hsun Hsieh, Yung-Hui Li, Wei Wang, and Chung-Hao Tien. 2018. A novel anti-spoofing solution for iris recognition toward cosmetic contact lens attack using spectral ICA analysis. Sensors 18, 3 (2018), 1--15.Google ScholarGoogle ScholarCross RefCross Ref
  59. Xinyu Huang, Changpeng Ti, Qi zhen Hou, Alade Tokuta, and Ruigang Yang. 2013. An experimental study of pupil constriction for liveness detection. In IEEE Workshop on Applications of Computer Vision (WACV’13). IEEE, 252--258. Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. Ken Hughes and Kevin W. Bowyer. 2013. Detection of contact-lens-based iris biometric spoofs using stereo imaging. In 2013 46th Hawaii International Conference on System Sciences. IEEE, 1763--1772. Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Image Analysis and Biometrics Lab. 2016. IIITD Contact Lens Iris Database, Iris Combined Spoofing Database. Retrieved August 8, 2017 from http://iab-rubric.org/resources.html.Google ScholarGoogle Scholar
  62. Anil K. Jain, Karthik Nandakumar, and Abhishek Nagar. 2008. Biometric template security. EURASIP J. Adv. Signal Process. 2008 (Jan. 2008), Article 113, 17 pages. Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. Peter Johnson, Bin Tan, and Stephanie Schuckers. 2010. Multimodal fusion vulnerability to non-zero effort (spoof) imposters. In IEEE International Workshop on Information Forensics and Security. IEEE, 1--5.Google ScholarGoogle ScholarCross RefCross Ref
  64. Masashi Kanematsu, Hironobu Takano, and Kiyomi Nakamura. 2007. Highly reliable liveness detection method for iris recognition. In SICE Annual Conference. IEEE, 361--364.Google ScholarGoogle ScholarCross RefCross Ref
  65. Juho Kannala and Esa Rahtu. 2012. BSIF: Binarized statistical image features. In The 21st International Conference on Pattern Recognition (ICPR’12). IEEE, 1363--1366.Google ScholarGoogle Scholar
  66. R. Karunya and S. Kumaresan. 2015. A study of liveness detection in fingerprint and iris recognition systems using image quality assessment. In International Conference on Advanced Computing and Communication Systems. IEEE, 1--5.Google ScholarGoogle Scholar
  67. Naman Kohli, Daksha Yadav, Mayank Vatsa, and Richa Singh. 2013. Revisiting iris recognition with color cosmetic contact lenses. In IEEE International Conference on Biometrics (ICB’13). IEEE, 1--7.Google ScholarGoogle ScholarCross RefCross Ref
  68. Naman Kohli, Daksha Yadav, Mayank Vatsa, Richa Singh, and Afzel Noore. 2016. Detecting medley of iris spoofing attacks using DESIST. In IEEE International Conference on Biometrics: Theory Applications and Systems (BTAS’16). IEEE, 1--6.Google ScholarGoogle ScholarDigital LibraryDigital Library
  69. Iasonas Kokkinos and Alan Yuille. 2008. Scale invariance without scale selection. In IEEE International Conference on Computer Vision and Pattern Recognition (CVPR’08). IEEE, 1--8.Google ScholarGoogle ScholarCross RefCross Ref
  70. Oleg Komogortsev. 2014. Eye Tracker Print-Attack Database (ETPAD) v1. Retrieved August 8, 2017 from http://cs.txstate.edu/ ok11/etpad_v1.html.Google ScholarGoogle Scholar
  71. Oleg Komogortsev. 2014. Eye Tracker Print-Attack Database (ETPAD) v2. Retrieved August 8, 2017 from http://cs.txstate.edu/ ok11/etpad_v2.html.Google ScholarGoogle Scholar
  72. Oleg V. Komogortsev and Alex Karpov. 2013. Liveness detection via oculomotor plant characteristics: Attack of mechanical replicas. In IEEE International Conference on Biometrics (ICB’13). IEEE, 1--8.Google ScholarGoogle Scholar
  73. Oleg V. Komogortsev, Alexey Karpov, and Corey D. Holland. 2015. Attack of mechanical replicas: Liveness detection with eye movements. IEEE Trans. Inf. Forens. Security 10, 4 (April 2015), 716--725.Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. Jukka Komulainen, Abdenour Hadid, and Matti Pietikäinen. 2014. Generalized textured contact lens detection by extracting BSIF description from Cartesian iris images. In IEEE International Joint Conference on Biometrics (IJCB’14). IEEE, 1--7.Google ScholarGoogle ScholarCross RefCross Ref
  75. Jukka Komulainen, Abdenour Hadid, and Matti Pietikäinen. 2017. Contact lens detection in iris images. In Iris and Periocular Biometric Recognition, Christian Rathgeb and Christoph Busch (Eds.). IET, London, UK, Chapter 12, 265--290. https://www.theiet.org/resources/books/security/irisper.cfm.Google ScholarGoogle Scholar
  76. Mohit Kumar and Niladri Bihari Puhan. 2015. Iris liveness detection using texture segmentation. In National Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG’15). IEEE, 1--4.Google ScholarGoogle ScholarCross RefCross Ref
  77. Yann LeCun, Leon Bottou, Yoshua Bengio, and Patrick Haffner. 1998. Gradient-based learning applied to document recognition. Proc. IEEE 86, 11 (Nov. 1998), 2278--2324.Google ScholarGoogle ScholarCross RefCross Ref
  78. Eui Chul Lee and Kang Ryoung Park. 2010. Fake iris detection based on 3D structure of iris pattern. Int. J. Imaging Syst. Technol. 20, 2 (2010), 162--166. Google ScholarGoogle ScholarDigital LibraryDigital Library
  79. Eui Chul Lee, Kang Ryoung Park, and Jaihie Kim. 2005. Fake iris detection by using Purkinje image. In Lecture Notes in Computer Science, David Zhang and Anil K. Jain (Eds.). Springer, Berlin, 397--403. Google ScholarGoogle ScholarDigital LibraryDigital Library
  80. Sung Joo Lee, Kang Ryoung Park, and Jaihie Kim. 2006. Robust fake iris detection based on variation of the reflectance ratio between the iris and the Sclera. In Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference. IEEE, 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  81. Aaron Lefohn, Brian Budge, Peter Shirley, Richard Caruso, and Erik Reinhard. 2003. An ocularist’s approach to human iris synthesis. IEEE Comput. Graph. Appl. 23, 6 (Nov. 2003), 70--75. Google ScholarGoogle ScholarDigital LibraryDigital Library
  82. Lovish, Aditya Nigam, Balender Kumar, and Phalguni Gupta. 2015. Robust contact lens detection using local phase quantization and binary Gabor pattern. In International Conference on Computer Analysis of Images and Patterns (CAIP’15), G. Azzopardi and N. Petkov (Eds.). Springer, 702--714.Google ScholarGoogle Scholar
  83. Maria De Marsico, Chiara Galdi, Michele Nappi, and Daniel Riccio. 2014. FIRME: Face and iris recognition for mobile engagement. Image Vision Comput. 32, 12 (2014), 1161--1172. Google ScholarGoogle ScholarDigital LibraryDigital Library
  84. Maria De Marsico, Michele Nappi, Daniel Riccio, and Harry Wechsler. 2015. Mobile iris challenge evaluation (MICHE)-I, biometric iris dataset and protocols. Pattern Recognition Letters 57 (2015), 17--23. Mobile Iris CHallenge Evaluation part I (MICHE I). Google ScholarGoogle ScholarDigital LibraryDigital Library
  85. Libor Masek and Peter Kovesi. 2003. MATLAB Source Code for a Biometric Identification System Based on Iris Patterns. Retrieved January 3, 2018 from http://www.peterkovesi.com/studentprojects/libor/sourcecode.html.Google ScholarGoogle Scholar
  86. Peter William Matthew. January 2016. Novel approaches to biometric security with an emphasis on liveness and coercion detection.Google ScholarGoogle Scholar
  87. David Menotti, Giovani Chiachia, Allan Pinto, William Robson Schwartz, Helio Pedrini, Alexandre Xavier Falcao, and Anderson Rocha. 2015. Deep representations for iris, face, and fingerprint spoofing detection. IEEE Trans. Inf. Forens. Security 10, 4 (April 2015), 864--879.Google ScholarGoogle ScholarDigital LibraryDigital Library
  88. Aythami Morales, Julian Fierrez, Javier Galbally, and Marta Gomez-Barrero. 2018. Introduction to iris presentation attack detection. In Handbook of Biometric Anti-Spoofing (2nd ed., to appear), Sébastien Marcel, Mark Nixon, Julian Fierrez, and Nicholas Evans (Eds.). Springer International Publishing AG, 1--15.Google ScholarGoogle Scholar
  89. NISLab, NTNU. 2016. GUC - VIsible Spectrum Smartphone Iris Video (VISSIV) Database. Retrieved August 10, 2017 from http://www.nislab.no/biometrics_lab/vissiv_db.Google ScholarGoogle Scholar
  90. NISLab, NTNU. 2016. GUC Light Field Visible Spectrum Iris Artefact Database (GUC-LF-VIAr-DB). Retrieved August 8, 2017 from http://www.nislab.no/biometrics_lab/guc_lf_viar_db.Google ScholarGoogle Scholar
  91. NISLab, NTNU. 2016. GUC Visible Spectrum Iris Artefact (VSIA) Database. Retrieved August 8, 2017 from http://www.nislab.no/biometrics_lab/vsia_db.Google ScholarGoogle Scholar
  92. NISLab, NTNU. 2016. PAVID - Presentation Attack Video Iris Database. Retrieved August 8, 2017 from http://www.nislab.no/biometrics_lab/pavid_db.Google ScholarGoogle Scholar
  93. Kristin Adair Nixon, Valerio Aimale, and Robert K. Rowe. 2008. Spoof detection schemes. In Handbook of Biometrics, Anil K. Jain, Patrick Flynn, and Arun A. Ross (Eds.). Springer US, Boston, MA, 403--423.Google ScholarGoogle Scholar
  94. Timo Ojala, Matti Pietikäinen, and David Harwood. 1994. Performance evaluation of texture measures with classification based on Kullback discrimination of distributions. In 12th International Conference on Pattern Recognition, Vol. 1. IEEE, 582--585.Google ScholarGoogle ScholarCross RefCross Ref
  95. Jaime Ortiz-Lopez, Javier Galbally, Julian Fierrez, and Javier Ortega-Garcia. 2011. Predicting iris vulnerability to direct attacks based on quality related features. In IEEE International Carnahan Conference on Security Technology (ICCST’11). IEEE, 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  96. Andrzej Pacut and Adam Czajka. 2006. Aliveness detection for iris biometrics. In IEEE International Carnahan Conference on Security Technology (ICCST’06). IEEE, 122--129.Google ScholarGoogle ScholarCross RefCross Ref
  97. Federico Pala and Bir Bhanu. 2017. Iris liveness detection by relative distance comparisons. In The IEEE Conference on Computer Vision and Pattern Recognition (CVPR) Workshops. IEEE, 664--671.Google ScholarGoogle ScholarCross RefCross Ref
  98. Jong Hyun Park and Moon Gi Kang. 2005. Iris recognition against counterfeit attack using gradient based fusion of multi-spectral images. In Advances in Biometric Person Authentication: International Wokshop on Biometric Recognition Systems (IWBRS’05), Stan Z. Li, Zhenan Sun, Tieniu Tan, Sharath Pankanti, Gérard Chollet, and David Zhang (Eds.). Springer, Berlin, 150--156. Google ScholarGoogle ScholarDigital LibraryDigital Library
  99. Jong Hyun Park and Moon Gi Kang. 2007. Multispectral iris authentication system against counterfeit attack using gradient-based image fusion. Optical Engineering 46, 11 (2007), 117003-1--117003-14.Google ScholarGoogle ScholarCross RefCross Ref
  100. Kang Ryoung Park. 2006. Robust fake iris detection. In 4th International Conference on Articulated Motion and Deformable Objects (AMDO’06), Francisco J. Perales and Robert B. Fisher (Eds.). Springer, Berlin, 10--18. Google ScholarGoogle ScholarDigital LibraryDigital Library
  101. Vishal M. Patel, Nalini K. Ratha, and Rama Chellappa. 2015. Cancelable biometrics: A review. IEEE Signal Processing Magazine 32, 5 (Sept. 2015), 54--65.Google ScholarGoogle ScholarCross RefCross Ref
  102. Allan Pinto, Helio Pedrini, Michael Krumdick, Benedict Becker, Adam Czajka, Kevin W. Bowyer, and Anderson Rocha. 2018. Counteracting presentation attacks in face, fingerprint, and iris recognition. In Deep Learning in Biometrics, Angshul Majumdar Mayank Vatsa and Richa Singh (Eds.). CRC Press, Boca Raton, 245--293. https://www.crcpress.com/Deep-Learning-in-Biometrics/Vatsa-Singh-Majumdar/p/book/9781138578234Google ScholarGoogle Scholar
  103. Niladri Bihari Puhan, Sudha Natarajan, and A. Suhas Hegde. 2011. A new iris liveness detection method against contact lens spoofing. In IEEE International Symposium on Consumer Electronics (ISCE’11). IEEE, 71--74.Google ScholarGoogle Scholar
  104. George W. Quinn, Patrick Grother, and James Matey. 2018. IREX IX Part One: Performance of Iris Recognition Algorithms. Technical Report. NIST. Interagency Report 7629.Google ScholarGoogle Scholar
  105. Ramachandra Raghavendra and Christoph Busch. 2014. Presentation attack detection algorithm for face and iris biometrics. In European Signal Processing Conference (EUSIPCO’14). IEEE, 1387--1391.Google ScholarGoogle Scholar
  106. Ramachandra Raghavendra and Christoph Busch. 2014. Presentation attack detection on visible spectrum iris recognition by exploring inherent characteristics of light field camera. In IEEE International Joint Conference on Biometrics (IJCB’14). IEEE, 1--8.Google ScholarGoogle ScholarCross RefCross Ref
  107. Ramachandra Raghavendra and Christoph Busch. 2015. Robust scheme for iris presentation attack detection using multiscale binarized statistical image features. IEEE Trans. Inf. Forens. Security 10, 4 (April 2015), 703--715.Google ScholarGoogle ScholarDigital LibraryDigital Library
  108. Ramachandra Raghavendra, Kiran B. Raja, and Christoph Busch. 2014. Ensemble of statistically independent filters for robust contact lens detection in iris images. In The 2014 Indian Conference on Computer Vision Graphics and Image Processing (ICVGIP’14). ACM, Article 24, 7 pages. Google ScholarGoogle ScholarDigital LibraryDigital Library
  109. Ramachandra Raghavendra, Kiran B. Raja, and Christoph Busch. 2017. ContlensNet: Robust iris contact lens detection using deep convolutional neural networks. In IEEE Winter Conference on Applications of Computer Vision (WACV’17). IEEE, 1160--1167.Google ScholarGoogle ScholarCross RefCross Ref
  110. Kiran B. Raja, R. Raghavendra, Jean-Noel Braun, and Christoph Busch. 2016. Presentation attack detection using a generalizable statistical approach for periocular and iris systems. In International Conference of the Biometrics Special Interest Group (BIOSIG’16), Arslan Brömme, Christoph Busch, Christian Rathgeb, and Andreas Uhl (Eds.). Gesellschaft für Informatik e.V., Bonn, 111--122.Google ScholarGoogle Scholar
  111. Kiran B. Raja, Ramachandra Raghavendra, and Christoph Busch. 2015. Presentation attack detection using Laplacian decomposed frequency response for visible spectrum and near-infra-red iris systems. In IEEE International Conference on Biometrics: Theory Applications and Systems (BTAS’15). IEEE, 1--8.Google ScholarGoogle ScholarCross RefCross Ref
  112. Kiran B. Raja, Ramachandra Raghavendra, and Christoph Busch. 2015. Video presentation attack detection in visible spectrum iris recognition using magnified phase information. IEEE Trans. Inf. Forens. Security 10, 10 (Oct. 2015), 2048--2056.Google ScholarGoogle ScholarDigital LibraryDigital Library
  113. Kiran B. Raja, Ramachandra Raghavendra, and Christoph Busch. 2016. Color adaptive quantized patterns for presentation attack detection in ocular biometric systems. In International Conference on Security of Information and Networks (SIN’16). ACM, New York, 9--15. Google ScholarGoogle ScholarDigital LibraryDigital Library
  114. Christian Rathgeb and Christoph Busch. 2017. On the feasibility of creating morphed iris-codes. In IEEE International Joint Conference on Biometrics (IJCB’17). IEEE, 152--157.Google ScholarGoogle ScholarCross RefCross Ref
  115. Christian Rathgeb and Andreas Uhl. 2010. Attacking iris recognition: An efficient hill-climbing technique. In International Conference on Pattern Recognition (ICPR’10). IEEE, 1217--1220. Google ScholarGoogle ScholarDigital LibraryDigital Library
  116. Christian Rathgeb and Andreas Uhl. 2011. A survey on biometric cryptosystems and cancelable biometrics. EURASIP J. Inf. Security 2011, 1 (23 Sept. 2011), 3.Google ScholarGoogle Scholar
  117. Ioannis Rigas and Oleg V. Komogortsev. 2014. Gaze estimation as a framework for iris liveness detection. In IEEE International Joint Conference on Biometrics (IJCB’14). IEEE, 1--8.Google ScholarGoogle Scholar
  118. Ioannis Rigas and Oleg V. Komogortsev. 2015. Eye movement-driven defense against iris print-attacks. Pattern Recognition Letters 68, Part 2 (2015), 316--326. Special Issue on “Soft Biometrics.” Google ScholarGoogle ScholarDigital LibraryDigital Library
  119. Virginia Ruiz-Albacete, Pedro Tome-Gonzalez, Fernando Alonso-Fernandez, Javier Galbally, Julian Fierrez, and Javier Ortega-Garcia. 2008. Direct attacks using fake images in iris verification. In Lecture Notes in Computer Science, Vol. 5372. Springer, Roskilde, Denmark, 181--190. Google ScholarGoogle ScholarDigital LibraryDigital Library
  120. Alora Sansola. 2015. Postmortem iris recognition and its application in human identification. Master’s thesis. Boston University, Boston, MA.Google ScholarGoogle Scholar
  121. Kelly Sauerwein, Tiffany B. Saul, Dawnie Wolfe Steadman, and Chris B. Boehnen. 2017. The effect of decomposition on the efficacy of biometrics for positive identification. J. Forens. Sci. 62, 6 (2017), 1599--1602.Google ScholarGoogle ScholarCross RefCross Ref
  122. Ana F. Sequeira, Lulu Chen, James Ferryman, Peter Wild, Fernando Alonso-Fernandez, Josef Bigun, Kiran B. Raja, Ramachandra Raghavendra, Christoph Busch, Tiago de Freitas Pereira, Sebastien Marcel, Sushree Sangeeta Behera, Mahesh Gour, and Vivek Kanhangad. 2017. Cross-eyed 2017: Cross-spectral iris/periocular recognition competition. In IEEE International Joint Conference on Biometrics (IJCB’17). IEEE, 725--732.Google ScholarGoogle ScholarCross RefCross Ref
  123. Ana F. Sequeira, João C. Monteiro, Ana Rebelo, and Hélder P. Oliveira. 2014. MobBIO: A multimodal database captured with a portable handheld device. In IEEE International Conference on Computer Vision Theory and Applications (VISAPP’14), Vol. 3. IEEE, 133--139.Google ScholarGoogle Scholar
  124. Ana F. Sequeira, Juliano Murari, and Jaime S. Cardoso. 2014. Iris liveness detection methods in mobile applications. In IEEE International Conference on Computer Vision Theory and Applications (VISAPP’14), Vol. 3. IEEE, 22--33.Google ScholarGoogle Scholar
  125. Ana F. Sequeira, Juliano Murari, and Jaime S. Cardoso. 2014. Iris liveness detection methods in the mobile biometrics scenario. In IEEE International Joint Conference on Neural Networks (IJCNN’14). IEEE, 3002--3008.Google ScholarGoogle Scholar
  126. Ana F. Sequeira, Hélder P. Oliveira, João C. Monteiro, João P. Monteiro, and Jaime S. Cardoso. 2014. MobILive 2014 - Mobile iris liveness detection competition. In IEEE International Joint Conference on Biometrics (IJCB’14). IEEE, 1--6.Google ScholarGoogle Scholar
  127. Ana F. Sequeira, Shejin Thavalengal, James Ferryman, Peter Corcoran, and Jaime S. Cardoso. 2016. A realistic evaluation of iris presentation attack detection. In International Conference on Telecommunications and Signal Processing (TSP’16). IEEE, 660--664.Google ScholarGoogle Scholar
  128. Samir Shah and Arun Ross. 2006. Generating synthetic irises by feature agglomeration. In 2006 International Conference on Image Processing. IEEE, 317--320.Google ScholarGoogle ScholarCross RefCross Ref
  129. Nazariy K. Shaydyuk and Timothy Cleland. 2016. Biometric identification via retina scanning with liveness detection using speckle contrast imaging. In IEEE International Carnahan Conference on Security Technology (ICCST’16). IEEE, 1--5.Google ScholarGoogle Scholar
  130. Pedro Silva, Eduardo Luz, Rafael Baeta, Helio Pedrini, Alexandre Xavier Falcao, and David Menotti. 2015. An approach to iris contact lens detection based on deep image representations. In Conference on Graphics, Patterns and Images (SIBGRAPI’15). IEEE, 157--164. Google ScholarGoogle ScholarDigital LibraryDigital Library
  131. Avantika Singh, Vishesh Mistry, Dhananjay Yadav, and Aditya Nigam. 2018. GHCLNet: A generalized hierarchically tuned contact lens detection network. In IEEE International Conference on Identity, Security and Behavior Analysis (ISBA’18). IEEE, Singapore, 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  132. Yogendra Narain Singh and Sanjay Kumar Singh. 2011. Vitality detection from biometrics: State-of-the-art. In World Congress on Information and Communication Technologies. IEEE, 106--111.Google ScholarGoogle ScholarCross RefCross Ref
  133. Brian A. Smith, Qi Yin, Steven K. Feiner, and Shree K. Nayar. 2013. Columbia Gaze Data Set. Retrieved August 8, 2017 from http://www.cs.columbia.edu/CAVE/databases/columbia_gaze.Google ScholarGoogle Scholar
  134. Brian A. Smith, Qi Yin, Steven K. Feiner, and Shree K. Nayar. 2013. Gaze locking: Passive eye contact detection for human-object interaction. In Annual ACM Symposium on User Interface Software and Technology (UIST’13). ACM, New York, 271--280. Google ScholarGoogle ScholarDigital LibraryDigital Library
  135. SOCIA Lab. - Soft Computing and Image Analysis Group. 2004. Noisy Visible Wavelength Iris Image Databases (UBIRIS). Retrieved January 19, 2018 from http://iris.di.ubi.pt.Google ScholarGoogle Scholar
  136. Dominik Söllinger, Pauline Trung, and Andreas Uhl. 2018. Non-reference image quality assessment and natural scene statistics to counter biometric sensor spoofing. IET Biometrics (Jan. 2018), 1--11.Google ScholarGoogle Scholar
  137. Zhenan Sun and Tieniu Tan. 2014. Iris anti-spoofing. In Handbook of Biometric Anti-Spoofing: Trusted Biometrics under Spoofing Attacks, Sébastien Marcel, Mark S. Nixon, and Stan Z. Li (Eds.). Springer London, London, 103--123.Google ScholarGoogle Scholar
  138. Zhenan Sun, Hui Zhang, Tieniu Tan, and Jianyu Wang. 2014. Iris image classification based on hierarchical visual codebook. IEEE Trans. Pattern Anal. Mach. Intell. 36, 6 (June 2014), 1120--1133. Google ScholarGoogle ScholarDigital LibraryDigital Library
  139. Hironobu Takano and Kiyomi Nakamura. 2009. Rotation independent iris recognition by the rotation spreading neural network. In IEEE International Symposium on Consumer Electronics. IEEE, 651--654.Google ScholarGoogle ScholarCross RefCross Ref
  140. Lisa Thalheim, Jan Krissler, and Peter-Michael Ziegler. 2002. Biometric Access Protection Devices and their Programs Put to the Test, available online in c’t Magazine, No. 11/2002, p. 114.Google ScholarGoogle Scholar
  141. Shejin Thavalengal and Peter Corcoran. 2016. User authentication on smartphones: Focusing on iris biometrics. IEEE Consumer Electron. Mag. 5, 2 (April 2016), 87--93.Google ScholarGoogle ScholarCross RefCross Ref
  142. Shejin Thavalengal, Tudor Nedelcu, Petronel Bigioi, and Peter Corcoran. 2016. Iris liveness detection for next generation smartphones. IEEE Trans. Cons. Elect. 62, 2 (May 2016), 95--102. Google ScholarGoogle ScholarDigital LibraryDigital Library
  143. Shejin Thavalengal, Ruxandra Vranceanu, Razvan G. Condorovici, and Peter Corcoran. 2014. Iris pattern obfuscation in digital images. In IEEE International Joint Conference on Biometrics (IJCB’14). IEEE, 1--8.Google ScholarGoogle ScholarCross RefCross Ref
  144. Inmaculada Tomeo-Reyes and Vinod Chandran. 2013. Iris based identity verification robust to sample presentation security attacks. Interntional Journal of Information Science and Intelligent System 2, 1 (June 2013), 27--41. https://eprints.qut.edu.au/60842/Google ScholarGoogle Scholar
  145. Anna Bori Toth and Javier Galbally. 2015. Anti-spoofing, iris. In Encyclopedia of Biometrics, Stan Z. Li and Anil Jain (Eds.). Springer US, New York, 87--97. http://www.springer.com/us/book/9781489974877.Google ScholarGoogle Scholar
  146. Bori Toth. 2009. Liveness detection: Iris. In Encyclopedia of Biometrics, Stan Z. Li and Anil Jain (Eds.). Springer US, Boston, MA, 931--938.Google ScholarGoogle Scholar
  147. Mateusz Trokielewicz and Ewelina Bartuzi. 2016. Cross-spectral iris recognition for mobile applications using high-quality color images. J. Telecommun. Inf. Technol. 3 (2016), 91--97.Google ScholarGoogle Scholar
  148. Mateusz Trokielewicz, Adam Czajka, and Piotr Maciejewicz. 2016. Human iris recognition in post-mortem subjects: Study and database. In IEEE International Conference on Biometrics: Theory Applications and Systems (BTAS’16). IEEE, 1--6.Google ScholarGoogle ScholarDigital LibraryDigital Library
  149. Mateusz Trokielewicz, Adam Czajka, and Piotr Maciejewicz. 2016. Post-mortem human iris recognition. In IEEE International Conference on Biometrics (ICB’16). IEEE, 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  150. Shreyas Venugopalan and Marios Savvides. 2011. How to generate spoofed irises from an iris code template. IEEE Trans. Inf. Forens. Security 6, 2 (June 2011), 385--395. Google ScholarGoogle ScholarDigital LibraryDigital Library
  151. Fabiola M. Villalbos-Castaldi and Ernesto Suaste-Gómez. 2014. In the use of the spontaneous pupillary oscillations as a new biometric trait. In International Workshop on Biometrics and Forensics. IEEE, 1--6.Google ScholarGoogle Scholar
  152. Warsaw University of Technology. 2013. Warsaw Datasets Webpage. Retrieved August 10, 2017 from http://zbum.ia.pw.edu.pl/EN/node/46.Google ScholarGoogle Scholar
  153. Hong Wei, Lulu Chen, and James Ferryman. 2013. Biometrics in ABC: Counter-spoofing research. In FRONTEX 2nd Global Conference on Future Developments of Automated Border Control. FRONTEX, 1--4.Google ScholarGoogle Scholar
  154. Zhuoshi Wei, Xianchao Qiu, Zhenan Sun, and Tieniu Tan. 2008. Counterfeit iris detection based on texture analysis. In International Conference on Pattern Recognition (ICPR’08). IEEE, 1--4.Google ScholarGoogle Scholar
  155. Zhuoshi Wei, Tieniu Tan, and Zhenan Sun. 2008. Synthesis of large realistic iris databases using patch-based sampling. In International Conference on Pattern Recognition (ICPR’08). IEEE, 1--4.Google ScholarGoogle Scholar
  156. Daksha Yadav, Naman Kohli, James S. Doyle, Richa Singh, Mayank Vatsa, and Kevin W. Bowyer. 2014. Unraveling the effect of textured contact lenses on iris recognition. IEEE Trans. Inf. Forens. Security 9, 5 (May 2014), 851--862. Google ScholarGoogle ScholarDigital LibraryDigital Library
  157. Daksha Yadav, Naman Kohli, Mayank Vatsa, Richa Singh, and Afzel Noore. 2017. Unconstrained visible spectrum iris with textured contact lens variations: Database and benchmarking. In IEEE International Joint Conference on Biometrics (IJCB’17). IEEE, 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  158. David Yambay, Benedict Becker, Naman Kohli, Daksha Yadav, Adam Czajka, Kevin W. Bowyer, Stephanie Schuckers, Richa Singh, Mayank Vatsa, Afzel Noore, Diego Gragnaniello, C. Sansone, L. Verdoliva, Lingxiao He, Yiwei Ru, Haiqing Li, Nianfeng Liu, Zhenan Sun, and Tieniu Tan. 2017. LivDet iris 2017 -- Iris liveness detection competition 2017. In IEEE International Joint Conference on Biometrics (IJCB’17). IEEE, 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  159. David Yambay, James S. Doyle, Kevin W. Bowyer, Adam Czajka, and Stephanie Schuckers. 2014. LivDet-iris 2013 - Iris liveness detection competition 2013. In IEEE International Joint Conference on Biometrics (IJCB’14). IEEE, 1--8.Google ScholarGoogle ScholarCross RefCross Ref
  160. David Yambay and Stephanie Schuckers. 2018. Review of iris presentation attack detection competitions. In Handbook of Biometric Anti-Spoofing (2nd ed., to appear), Sébastien Marcel, Mark Nixon, Julian Fierrez, and Nicholas Evans (Eds.). Springer International Publishing AG, 1--16.Google ScholarGoogle Scholar
  161. David Yambay, Brian Walczak, Stephanie Schuckers, and Adam Czajka. 2017. LivDet-iris 2015 - Iris liveness detection competition 2015. In IEEE International Conference on Identity, Security and Behavior Analysis (ISBA’17). IEEE, 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  162. Hui Zhang, Zhenan Sun, and Tieniu Tan. 2010. Contact lens detection based on weighted LBP. In International Conference on Pattern Recognition (ICPR’10). IEEE, 4279--4282. Google ScholarGoogle ScholarDigital LibraryDigital Library
  163. Jinyu Zuo, Natalia A. Schmid, and Xiaohan Chen. 2007. On generation and analysis of synthetic iris images. IEEE Trans. Inf. Forens. Security 2, 1 (March 2007), 77--90. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Presentation Attack Detection for Iris Recognition: An Assessment of the State-of-the-Art

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Computing Surveys
        ACM Computing Surveys  Volume 51, Issue 4
        July 2019
        765 pages
        ISSN:0360-0300
        EISSN:1557-7341
        DOI:10.1145/3236632
        • Editor:
        • Sartaj Sahni
        Issue’s Table of Contents

        Copyright © 2018 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 31 July 2018
        • Revised: 1 June 2018
        • Accepted: 1 June 2018
        • Received: 1 March 2018
        Published in csur Volume 51, Issue 4

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • survey
        • Research
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader