Skip to main content
Top
Published in: Pattern Recognition and Image Analysis 4/2020

01-10-2020 | APPLIED PROBLEMS

HsIrisNet: Histogram Based Iris Recognition to Allay Replay and Template Attack Using Deep Learning Perspective

Authors: Richa Gupta, Priti Sehgal

Published in: Pattern Recognition and Image Analysis | Issue 4/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Iris biometric is a widely deployed tool for biometric based user authentication. Its success has paved path for several security related attacks on this biometric. In this paper, we propose a deep learning perspective to solve two of these attacks—replay attack and database attack simultaneously. The proposed architecture HsIrisNet, a convolutional neural network (CNN), is trained and tested on two publicly available databases Casia-Iris-Interval v4 DB and IIT Delhi DB. The proposed approach HsIrisNet uses histograms of the selective robust regions followed by image upsampling to authenticate the user. These robust regions have been found to be sufficient enough to authenticate the user, enabling non-deterministic approach. The use of these selective regions for authentication enables the system to mitigate replay attack. While, the CNN model does not require saving any biometric data to the database, which mitigates database attack from the system. The comparison of proposed approach with existing state-of-art techniques show better performance of the proposed approach.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference R. Gupta and P. Sehgal, “A survey of attacks on iris biometric systems,” Int. J. Biom. 8, 145–178 (2016). R. Gupta and P. Sehgal, “A survey of attacks on iris biometric systems,” Int. J. Biom. 8, 145–178 (2016).
5.
8.
go back to reference C. Rathgeb and A. Uhl, “An iris-based interval-mapping scheme for biometric key generation,” in 2009 Proc. 6th Int. Symp. Image Signal Process. Anal. (2009), pp. 511–516. C. Rathgeb and A. Uhl, “An iris-based interval-mapping scheme for biometric key generation,” in 2009 Proc. 6th Int. Symp. Image Signal Process. Anal. (2009), pp. 511–516.
9.
go back to reference D. Menotti, G. Chiachia, A. Pinto, W. R. Schwartz, H. Pedrini, A. X. Falcao, and A. Rocha, “Deep representations for iris, face, and fingerprint spoofing detection,” IEEE Trans. Inf. Forensics Secur. 10, 864–879 (2015).CrossRef D. Menotti, G. Chiachia, A. Pinto, W. R. Schwartz, H. Pedrini, A. X. Falcao, and A. Rocha, “Deep representations for iris, face, and fingerprint spoofing detection,” IEEE Trans. Inf. Forensics Secur. 10, 864–879 (2015).CrossRef
10.
go back to reference S. Pedro, E. Luz, R. Baeta, H. Pedrini, A. X. Falcao, and D. Menotti, “An approach to iris contact lens detection based on deep image representations,” in 2015 28th SIBGRAPI Conf. Graph. Patterns Images (2015), pp. 157–164. S. Pedro, E. Luz, R. Baeta, H. Pedrini, A. X. Falcao, and D. Menotti, “An approach to iris contact lens detection based on deep image representations,” in 2015 28th SIBGRAPI Conf. Graph. Patterns Images (2015), pp. 157–164.
11.
go back to reference R. Ramachandra, K. B. Raja, and C. Busch, “ContlensNet: Robust iris contact lens detection using deep convolutional neural networks,” in 2017 IEEE Winter Conf. Appl. Comput. Vis. (2017), pp. 1160–1167. R. Ramachandra, K. B. Raja, and C. Busch, “ContlensNet: Robust iris contact lens detection using deep convolutional neural networks,” in 2017 IEEE Winter Conf. Appl. Comput. Vis. (2017), pp. 1160–1167.
12.
go back to reference T. T. Liu Nianfeng, Man Zhang, Haiqing Li, and Zhenan Sun, “DeepIris: Learning pairwise filter bank for heterogeneous iris verification,” Pattern Recognit. Lett. 82, 154–161 (2016).CrossRef T. T. Liu Nianfeng, Man Zhang, Haiqing Li, and Zhenan Sun, “DeepIris: Learning pairwise filter bank for heterogeneous iris verification,” Pattern Recognit. Lett. 82, 154–161 (2016).CrossRef
13.
go back to reference M. Shervin, A. Abdolrashidiy, and Y. Wang, “An experimental study of deep convolutional features for iris recognition,” in 2016 IEEE Signal Process. Med. Biol. Symp. (2016), p. 1. M. Shervin, A. Abdolrashidiy, and Y. Wang, “An experimental study of deep convolutional features for iris recognition,” in 2016 IEEE Signal Process. Med. Biol. Symp. (2016), p. 1.
14.
go back to reference S. S. Nguyen Kien, C. Fookes, and A. Ross, “Iris recognition with off-the-shelf CNN features: A deep learning perspective,” IEEE Access 6, 18848–18855 (2018).CrossRef S. S. Nguyen Kien, C. Fookes, and A. Ross, “Iris recognition with off-the-shelf CNN features: A deep learning perspective,” IEEE Access 6, 18848–18855 (2018).CrossRef
15.
go back to reference M. Francesco, G. Poggi, C. Sansone, and L. Verdoliva, “A deep learning approach for iris sensor model identification,” Pattern Recognit. Lett. 113, 46–53 (2018).CrossRef M. Francesco, G. Poggi, C. Sansone, and L. Verdoliva, “A deep learning approach for iris sensor model identification,” Pattern Recognit. Lett. 113, 46–53 (2018).CrossRef
16.
go back to reference A. S. Al-Waisy, R. Qahwaji, S. Ipson, S. Al-Fahdawi, and T. A. Nagem, “A multi-biometric iris recognition system based on a deep learning approach,” Pattern Anal. Appl. 21, 783–802 (2018).MathSciNetCrossRef A. S. Al-Waisy, R. Qahwaji, S. Ipson, S. Al-Fahdawi, and T. A. Nagem, “A multi-biometric iris recognition system based on a deep learning approach,” Pattern Anal. Appl. 21, 783–802 (2018).MathSciNetCrossRef
17.
go back to reference G. Sutra, B. Dorizzi, S. Garcia-Salicetti, and N. Othman, A Biometric Reference System for Iris, OSIRIS Version 4.1 (Telecom Sud Paris, Paris, 2012). G. Sutra, B. Dorizzi, S. Garcia-Salicetti, and N. Othman, A Biometric Reference System for Iris, OSIRIS Version 4.1 (Telecom Sud Paris, Paris, 2012).
18.
go back to reference R. Gupta and P. Sehgal, “Non-deterministic approach to allay replay attack on iris biometric,” Pattern Anal. Appl. 22, 717–729 (2019).MathSciNetCrossRef R. Gupta and P. Sehgal, “Non-deterministic approach to allay replay attack on iris biometric,” Pattern Anal. Appl. 22, 717–729 (2019).MathSciNetCrossRef
19.
go back to reference C. Li, W. Zhou, and S. Yuan, “Iris recognition based on a novel variation of local binary pattern,” Vis. Comput. 31, 1419–1429 (2015).CrossRef C. Li, W. Zhou, and S. Yuan, “Iris recognition based on a novel variation of local binary pattern,” Vis. Comput. 31, 1419–1429 (2015).CrossRef
20.
go back to reference PrintWiki. http://printwiki.org/Pixel_Replication. Accessed February 17, 2019. PrintWiki. http://​printwiki.​org/​Pixel_​Replication.​ Accessed February 17, 2019.
21.
go back to reference M. Omkar Parkhi, A. Vedaldi, and A. Zisserman, “Deep face recognition,” in BMVC 2015 (2015). M. Omkar Parkhi, A. Vedaldi, and A. Zisserman, “Deep face recognition,” in BMVC 2015 (2015).
22.
go back to reference Z. Hongshuai, Z. Qu, L. Yuan, and G. Li, “A face recognition method based on LBP feature for CNN,” in 2017 IEEE 2nd Adv. Inf. Technol. Electron. Autom. Control Conf. (2017), pp. 544–547. Z. Hongshuai, Z. Qu, L. Yuan, and G. Li, “A face recognition method based on LBP feature for CNN,” in 2017 IEEE 2nd Adv. Inf. Technol. Electron. Autom. Control Conf. (2017), pp. 544–547.
23.
go back to reference N. R. Frassetto, R. de A. Lotufo, and R. C. Machado, “Fingerprint liveness detection using convolutional neural networks,” IEEE Trans. Inf. Forensics Secur. 11, 1206–1213 (2016).CrossRef N. R. Frassetto, R. de A. Lotufo, and R. C. Machado, “Fingerprint liveness detection using convolutional neural networks,” IEEE Trans. Inf. Forensics Secur. 11, 1206–1213 (2016).CrossRef
24.
go back to reference XRDS. https://blog.xrds.acm.org/2016/06/convolutional-neural-networks-cnns-illustrated-explanation/. Accessed February 17, 2019. XRDS. https://​blog.​xrds.​acm.​org/​2016/​06/​convolutional-neural-networks-cnns-illustrated-explanation/​.​ Accessed February 17, 2019.
25.
go back to reference S. Hijazi, R. Kumar, C. C. Rowen, and IP Group, Using Convolutional Neural Networks for Image Recognition. https://ip.cadence.com/uploads/901/cnn_wp-pdf S. Hijazi, R. Kumar, C. C. Rowen, and IP Group, Using Convolutional Neural Networks for Image Recognition. https://​ip.​cadence.​com/​uploads/​901/​cnn_​wp-pdf
26.
go back to reference http://www.cbsr.ia.ac.cn/english/IrisDatabase. Accessed December 26, 2018. http://www.cbsr.ia.ac.cn/english/IrisDatabase. Accessed December 26, 2018.
27.
go back to reference K. Ajay and A. Passi, “Comparison and combination of iris matchers for reliable personal authentication,” Pattern Recognit. 43, 1016–1026 (2010).CrossRef K. Ajay and A. Passi, “Comparison and combination of iris matchers for reliable personal authentication,” Pattern Recognit. 43, 1016–1026 (2010).CrossRef
29.
go back to reference M. Jyoti, D. Girdhar, R. Dahiya, and G. Sainarayanan, “Reference threshold calculation for biometric authentication,” Int. J. Image Graph. Signal Process. 6 (2), 46–53 (2014). M. Jyoti, D. Girdhar, R. Dahiya, and G. Sainarayanan, “Reference threshold calculation for biometric authentication,” Int. J. Image Graph. Signal Process. 6 (2), 46–53 (2014).
30.
go back to reference H. Fei, Y. Han, H. Wang, J. Ji, Y. Liu, and Z. Ma, “Deep learning architecture for iris recognition based on optimal Gabor filters and deep belief network,” J. Electron. Imaging 26, 023005 (2017).CrossRef H. Fei, Y. Han, H. Wang, J. Ji, Y. Liu, and Z. Ma, “Deep learning architecture for iris recognition based on optimal Gabor filters and deep belief network,” J. Electron. Imaging 26, 023005 (2017).CrossRef
31.
go back to reference R. Gupta and P. Sehgal, “A non-deterministic approach to mitigate replay attack and database attack simultaneously on iris recognition system,” in Int. Conf. Intell. Hum. Comput. Interact. (Springer, Cham, 2018), pp. 239–250. R. Gupta and P. Sehgal, “A non-deterministic approach to mitigate replay attack and database attack simultaneously on iris recognition system,” in Int. Conf. Intell. Hum. Comput. Interact. (Springer, Cham, 2018), pp. 239–250.
32.
go back to reference http://theprofessionalspoint.blogspot.com/2019/06/ dying-relu-causes-and-solutions-leaky.html. Accessed June 1, 2020. http://theprofessionalspoint.blogspot.com/2019/06/ dying-relu-causes-and-solutions-leaky.html. Accessed June 1, 2020.
Metadata
Title
HsIrisNet: Histogram Based Iris Recognition to Allay Replay and Template Attack Using Deep Learning Perspective
Authors
Richa Gupta
Priti Sehgal
Publication date
01-10-2020
Publisher
Pleiades Publishing
Published in
Pattern Recognition and Image Analysis / Issue 4/2020
Print ISSN: 1054-6618
Electronic ISSN: 1555-6212
DOI
https://doi.org/10.1134/S105466182004015X

Other articles of this Issue 4/2020

Pattern Recognition and Image Analysis 4/2020 Go to the issue

MATHEMATICAL THEORY OF IMAGES AND SIGNALS REPRESENTING, PROCESSING, ANALYSIS, RECOGNITION, AND UNDERSTANDING

Local Tetra-Directional Pattern–A New Texture Descriptor for Content-Based Image Retrieval

MATHEMATICAL THEORY OF IMAGES AND SIGNALS REPRESENTING, PROCESSING, ANALYSIS, RECOGNITION, AND UNDERSTANDING

Descriptive Image Analysis: Part IV. Information Structure for Generating Descriptive Algorithmic Schemes for Image Recognition

PATTERN RECOGNITION AND IMAGE ANALYSIS AUTOMATED SYSTEMS, HARDWARE AND SOFTWARE

Deep Learning Based Approach of Emotion Detection and Grading System

MATHEMATICAL THEORY OF IMAGES AND SIGNALS REPRESENTING, PROCESSING, ANALYSIS, RECOGNITION, AND UNDERSTANDING

Image Captioning using Reinforcement Learning with BLUDEr Optimization

Premium Partner