[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content
Log in

Presentation attack detection for iris recognition using deep learning

  • Original Article
  • Published:
International Journal of System Assurance Engineering and Management Aims and scope Submit manuscript

Abstract

Iris recognition is used in various applications to identify a person. However, presentation attacks are making such systems vulnerable. Intruders can impersonate an individual to get entry into a system. In this paper, we have focused on print attacks, in which an intruder can use various techniques like printing of iris photographs to present to the sensor. Experiments conducted on the IIIT-WVU iris dataset show that print attack images of live iris images, use of contact lenses and conjunction of both can play a significant role in deceiving the iris recognition systems. The paper makes use of deep Convolutional Neural Networks to detect such spoofing techniques with superior results as compared to the existing state-of-the-art techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  • Alzubi JA (2015a) Diversity based improved bagging algorithm. In: Proceedings of the international conference on engineering & MIS 2015 (ICEMIS’15). Istanbul, Turkey. ACM, New York, NY, USA, pp 1–5

  • Alzubi JA (2015b) Optimal classifier ensemble design based on cooperative game theory. Res J Appl Sci Eng Technol 11(12):1336–1343

    Article  Google Scholar 

  • Alzubi OA, Alzubi JA, Tedmori S, Rashaideh H, Almomani O (2018) Consensus-based combining method for classifier ensembles. Int Arab J Inf Technol 15(1):76–86

    Google Scholar 

  • Bowyer KW, Doyle JS (2014) Cosmetic contact lenses and iris recognition spoofing. Computer 47(5):96–98

    Article  Google Scholar 

  • Chen T, Blasco J, Alzubi J, Alzubi O (2014) Intrusion detection. Eng Technol Ref 1(1):1–9

    Google Scholar 

  • Czajka A, Bowyer K (2018) Presentation attack detection for iris recognition. ACM Comput Surv 51:1–35

    Article  Google Scholar 

  • Czajka A, Bowyer K, Krumdick M, VidalMata R (2017) Recognition of image-orientation-based iris spoofing. IEEE Transactions Inf Forensics Secur 12:2184–2196

    Article  Google Scholar 

  • Doyle JS, Flynn PJ, Bowyer KW (2013) Automated classification of contact lens type in iris images. In: International conference on biometrics (ICB). IEEE, Madrid, Spain, pp 1–6. https://doi.org/10.1109/icb.2013.6612954

  • Gupta R, Sehgal P (2016) A survey of attacks on iris biometric systems. Int J Biom 8:145

    Google Scholar 

  • Gupta P, Behera S, Vatsa M, Singh R et al (2014) On iris spoofing using print attack. In: IEEE international conference on pattern recognition, pp 1681–1686

  • Hsieh S, Li Y, Wang W, Tien C (2018) A novel anti-spoofing solution for iris recognition toward cosmetic contact lens attack using spectral ICA analysis. Sensors 18:795

    Article  Google Scholar 

  • Hu Y, Sirlantzis K, Howells G (2016) Iris liveness detection using regional features. Pattern Recognit Lett 82:242–250

    Article  Google Scholar 

  • Illingworth J, Kittler J (1988) A survey of the Hough transform. Comput Vis Graph Image Process 44:87–116

    Article  Google Scholar 

  • Kimme C, Ballard DH, Sklansky J (1975) Finding circles by an array of accumulators. CACM 18:120–122

    Article  MATH  Google Scholar 

  • Kuehlkamp A, Pinto A, Richa A, Bowyer KW, Czajka A (2019) Ensemble of multi-view learning classifiers for cross-domain iris presentation attack detection. IEEE Trans Inf Forensics Secur 14(6):1419–1431

    Article  Google Scholar 

  • Lee MB, Kim YH, Park KR (2019) Conditional generative adversarial network: based data augmentation for enhancement of iris recognition accuracy. IEEE Access 7:122134–122152

    Article  Google Scholar 

  • Lefohn A, Budge B, Shirley P, Caruso R, Reinhard E (2003) An ocularist’s approach to human iris synthesis. IEEE Comput Graph Appl 23:70–75

    Article  Google Scholar 

  • Merlin PM, Farber DJ (1975) A parallel mechanism for detecting curves in pictures. IEEE Trans Comput 24:96–98

    Article  MATH  Google Scholar 

  • Morales A, Fierrez J, Galbally J, Gomez-Barrero M (2019) Introduction to iris presentation attack detection. Handbook of biometric anti-spoofing. Springer, Berlin, pp 1–18

    Google Scholar 

  • Mukhopadhyay P, Chaudhuri BB (2015) A survey of Hough transform. Pattern Recognit 48(3):993–1010

    Article  Google Scholar 

  • Nguyen D, Baek N, Pham T, Park K (2018) Presentation attack detection for iris recognition system using NIR camera sensor. Sensors 18:1315

    Article  Google Scholar 

  • Raghavendra R, Busch C (2015) Robust scheme for iris presentation attack detection using multiscale binarized statistical image features. IEEE Trans Inf Forensics Secur 10:703–715

    Article  Google Scholar 

  • Raja K, Raghavendra R, Braun J, Busch C (2016) Presentation attack detection using a generalizable statistical approach for periocular and iris systems. In: International conference of the biometrics special interest group (BIOSIG), pp 111–122

  • Rathgeb C, Busch C (2017) On the feasibility of creating morphed iris-codes. In: IEEE international joint conference on biometrics

  • Rathgeb C, Uhl A (2010) An efficient hill-climbing technique. In: International conference on pattern recognition. IEEE, Turkey, pp 1217–1220

  • Rattani A, Scheirer W, Ross A (2015) Open set fingerprint spoof detection across novel fabrication materials. IEEE Trans Inf Forensics Secur 10:2447–2460

    Article  Google Scholar 

  • Sequeira A, Cardoso J (2015) Fingerprint liveness detection in the presence of capable intruders. Sensors 15:14615–14638

    Article  Google Scholar 

  • Shejin T, Sao AK (2012) Significance of dictionary for sparse coding based face recognition. In: Proceedings of the international conference of the biometrics special interest group (BIOSIG), pp 1–6

  • Stockman GC, Agrawala AK (1977) Equivalence of Hough curve detection to template matching. CACM 20:820–822

    Article  MATH  Google Scholar 

  • Thalheim L, Krissler J, MichaelZiegler P(2002) Body check biometric access protection devices and their programs put to the test. In: C't (in German), vol 11. Heise, Hannover, p114

  • Thavalengal S, Vranceanu R, Condorovici R, Corcoran P (2014) Iris pattern obfuscation in digital images. In; IEEE international joint conference on biometrics (IJCB). IEEE

  • Yadav D, Kohli N, Doyle J, Singh R, Vatsa M, Bowyer K (2014) Unraveling the effect of textured contact lenses on iris recognition. IEEE Trans Inf Forensics Secur 9:851–862

    Article  Google Scholar 

  • Yadav D, Kohli N, Doyle J, Singh R, Vatsa M, Bowyer K (2017) Unconstrained visible spectrum iris with textured contact lens variations: database and benchmarking. In: IEEE international joint conference on biometrics, CO, USA, pp 1–6

  • Yadav D, Kohli N, Vatsa M, Singh R, Noore A (2019) Detecting textured contact lens in uncontrolled environment using DensePAD. In: The IEEE conference on computer vision and pattern recognition (CVPR) workshops, pp 1–9

  • Yambay D, Becker B, Kohli N, Yadav D, Czajka A, Bowyer KW, Schuckers S, Singh R, Vatsa M, Noore A, Gragnaniello D, Sansone C, He VL, Ru Y, Li H, Liu N, Sun Z, Tan T (2017) LivDet iris 2017—iris liveness detection competition 2017. In: IEEE international joint conference on biometrics, pp 733–741

  • Yambay D, Czajka A, Bowyer K, Vatsa M, Singh R, Noore A, Kohli N, Yadav D, Schuckes S (2019) Review of iris presentation attack detection competitions. Handbook of biometric anti-spoofing. Springer, Cham, pp 169–183

    Book  Google Scholar 

  • Zhang H, Sun Z, Tan T (2010) Contact lens detection based on weighted LBP. In: 20th international conference on pattern recognition (ICPR), pp 4279–4282

  • Zheng BR, Ji DY, Li YH (2014) Heterogeneous iris recognition using heterogeneous Eigen iris and sparse representation. In: 2014 IEEE international conference on acoustics, speech and signal processing (ICASSP), pp 3764–3768

Download references

Acknowledgements

We thank IIIT Delhi for providing us with the IIITD-WVU Mobile Iris Spoofing Dataset for the application of our approach.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shefali Arora.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Arora, S., Bhatia, M.P.S. Presentation attack detection for iris recognition using deep learning. Int J Syst Assur Eng Manag 11 (Suppl 2), 232–238 (2020). https://doi.org/10.1007/s13198-020-00948-1

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13198-020-00948-1

Keywords

Navigation