Abstract
Iris recognition is used in various applications to identify a person. However, presentation attacks are making such systems vulnerable. Intruders can impersonate an individual to get entry into a system. In this paper, we have focused on print attacks, in which an intruder can use various techniques like printing of iris photographs to present to the sensor. Experiments conducted on the IIIT-WVU iris dataset show that print attack images of live iris images, use of contact lenses and conjunction of both can play a significant role in deceiving the iris recognition systems. The paper makes use of deep Convolutional Neural Networks to detect such spoofing techniques with superior results as compared to the existing state-of-the-art techniques.
Similar content being viewed by others
References
Alzubi JA (2015a) Diversity based improved bagging algorithm. In: Proceedings of the international conference on engineering & MIS 2015 (ICEMIS’15). Istanbul, Turkey. ACM, New York, NY, USA, pp 1–5
Alzubi JA (2015b) Optimal classifier ensemble design based on cooperative game theory. Res J Appl Sci Eng Technol 11(12):1336–1343
Alzubi OA, Alzubi JA, Tedmori S, Rashaideh H, Almomani O (2018) Consensus-based combining method for classifier ensembles. Int Arab J Inf Technol 15(1):76–86
Bowyer KW, Doyle JS (2014) Cosmetic contact lenses and iris recognition spoofing. Computer 47(5):96–98
Chen T, Blasco J, Alzubi J, Alzubi O (2014) Intrusion detection. Eng Technol Ref 1(1):1–9
Czajka A, Bowyer K (2018) Presentation attack detection for iris recognition. ACM Comput Surv 51:1–35
Czajka A, Bowyer K, Krumdick M, VidalMata R (2017) Recognition of image-orientation-based iris spoofing. IEEE Transactions Inf Forensics Secur 12:2184–2196
Doyle JS, Flynn PJ, Bowyer KW (2013) Automated classification of contact lens type in iris images. In: International conference on biometrics (ICB). IEEE, Madrid, Spain, pp 1–6. https://doi.org/10.1109/icb.2013.6612954
Gupta R, Sehgal P (2016) A survey of attacks on iris biometric systems. Int J Biom 8:145
Gupta P, Behera S, Vatsa M, Singh R et al (2014) On iris spoofing using print attack. In: IEEE international conference on pattern recognition, pp 1681–1686
Hsieh S, Li Y, Wang W, Tien C (2018) A novel anti-spoofing solution for iris recognition toward cosmetic contact lens attack using spectral ICA analysis. Sensors 18:795
Hu Y, Sirlantzis K, Howells G (2016) Iris liveness detection using regional features. Pattern Recognit Lett 82:242–250
Illingworth J, Kittler J (1988) A survey of the Hough transform. Comput Vis Graph Image Process 44:87–116
Kimme C, Ballard DH, Sklansky J (1975) Finding circles by an array of accumulators. CACM 18:120–122
Kuehlkamp A, Pinto A, Richa A, Bowyer KW, Czajka A (2019) Ensemble of multi-view learning classifiers for cross-domain iris presentation attack detection. IEEE Trans Inf Forensics Secur 14(6):1419–1431
Lee MB, Kim YH, Park KR (2019) Conditional generative adversarial network: based data augmentation for enhancement of iris recognition accuracy. IEEE Access 7:122134–122152
Lefohn A, Budge B, Shirley P, Caruso R, Reinhard E (2003) An ocularist’s approach to human iris synthesis. IEEE Comput Graph Appl 23:70–75
Merlin PM, Farber DJ (1975) A parallel mechanism for detecting curves in pictures. IEEE Trans Comput 24:96–98
Morales A, Fierrez J, Galbally J, Gomez-Barrero M (2019) Introduction to iris presentation attack detection. Handbook of biometric anti-spoofing. Springer, Berlin, pp 1–18
Mukhopadhyay P, Chaudhuri BB (2015) A survey of Hough transform. Pattern Recognit 48(3):993–1010
Nguyen D, Baek N, Pham T, Park K (2018) Presentation attack detection for iris recognition system using NIR camera sensor. Sensors 18:1315
Raghavendra R, Busch C (2015) Robust scheme for iris presentation attack detection using multiscale binarized statistical image features. IEEE Trans Inf Forensics Secur 10:703–715
Raja K, Raghavendra R, Braun J, Busch C (2016) Presentation attack detection using a generalizable statistical approach for periocular and iris systems. In: International conference of the biometrics special interest group (BIOSIG), pp 111–122
Rathgeb C, Busch C (2017) On the feasibility of creating morphed iris-codes. In: IEEE international joint conference on biometrics
Rathgeb C, Uhl A (2010) An efficient hill-climbing technique. In: International conference on pattern recognition. IEEE, Turkey, pp 1217–1220
Rattani A, Scheirer W, Ross A (2015) Open set fingerprint spoof detection across novel fabrication materials. IEEE Trans Inf Forensics Secur 10:2447–2460
Sequeira A, Cardoso J (2015) Fingerprint liveness detection in the presence of capable intruders. Sensors 15:14615–14638
Shejin T, Sao AK (2012) Significance of dictionary for sparse coding based face recognition. In: Proceedings of the international conference of the biometrics special interest group (BIOSIG), pp 1–6
Stockman GC, Agrawala AK (1977) Equivalence of Hough curve detection to template matching. CACM 20:820–822
Thalheim L, Krissler J, MichaelZiegler P(2002) Body check biometric access protection devices and their programs put to the test. In: C't (in German), vol 11. Heise, Hannover, p114
Thavalengal S, Vranceanu R, Condorovici R, Corcoran P (2014) Iris pattern obfuscation in digital images. In; IEEE international joint conference on biometrics (IJCB). IEEE
Yadav D, Kohli N, Doyle J, Singh R, Vatsa M, Bowyer K (2014) Unraveling the effect of textured contact lenses on iris recognition. IEEE Trans Inf Forensics Secur 9:851–862
Yadav D, Kohli N, Doyle J, Singh R, Vatsa M, Bowyer K (2017) Unconstrained visible spectrum iris with textured contact lens variations: database and benchmarking. In: IEEE international joint conference on biometrics, CO, USA, pp 1–6
Yadav D, Kohli N, Vatsa M, Singh R, Noore A (2019) Detecting textured contact lens in uncontrolled environment using DensePAD. In: The IEEE conference on computer vision and pattern recognition (CVPR) workshops, pp 1–9
Yambay D, Becker B, Kohli N, Yadav D, Czajka A, Bowyer KW, Schuckers S, Singh R, Vatsa M, Noore A, Gragnaniello D, Sansone C, He VL, Ru Y, Li H, Liu N, Sun Z, Tan T (2017) LivDet iris 2017—iris liveness detection competition 2017. In: IEEE international joint conference on biometrics, pp 733–741
Yambay D, Czajka A, Bowyer K, Vatsa M, Singh R, Noore A, Kohli N, Yadav D, Schuckes S (2019) Review of iris presentation attack detection competitions. Handbook of biometric anti-spoofing. Springer, Cham, pp 169–183
Zhang H, Sun Z, Tan T (2010) Contact lens detection based on weighted LBP. In: 20th international conference on pattern recognition (ICPR), pp 4279–4282
Zheng BR, Ji DY, Li YH (2014) Heterogeneous iris recognition using heterogeneous Eigen iris and sparse representation. In: 2014 IEEE international conference on acoustics, speech and signal processing (ICASSP), pp 3764–3768
Acknowledgements
We thank IIIT Delhi for providing us with the IIITD-WVU Mobile Iris Spoofing Dataset for the application of our approach.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Arora, S., Bhatia, M.P.S. Presentation attack detection for iris recognition using deep learning. Int J Syst Assur Eng Manag 11 (Suppl 2), 232–238 (2020). https://doi.org/10.1007/s13198-020-00948-1
Received:
Revised:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13198-020-00948-1