Skip to main content

2019 | OriginalPaper | Buchkapitel

6. Introduction to Iris Presentation Attack Detection

verfasst von : Aythami Morales, Julian Fierrez, Javier Galbally, Marta Gomez-Barrero

Erschienen in: Handbook of Biometric Anti-Spoofing

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Iris recognition technology has attracted an increasing interest since more than two decades in which we have witnessed a migration from laboratories to real-world applications. The deployment of this technology in real applications raises questions about the main vulnerabilities and security threats related to these systems. Presentation attacks can be defined as presentation of human characteristics or artifacts directly to the input of a biometric system trying to interfere with its normal operation. These attacks include the use of real irises as well as artifacts with different levels of sophistication. This chapter introduces iris presentation attack detection methods and its main challenges. First, we summarize the most popular types of attacks including the main challenges to address. Second, we present a taxonomy of presentation attack detection methods to serve as a brief introduction on this very active research area. Finally, we discuss the integration of these methods into iris recognition systems according to the most important scenarios of practical application.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Daugman J (1993) High confidence visual recognition of persons by a test of statistical independence. IEEE Trans Pattern Anal Mach Intell 15:1148–1161CrossRef Daugman J (1993) High confidence visual recognition of persons by a test of statistical independence. IEEE Trans Pattern Anal Mach Intell 15:1148–1161CrossRef
2.
Zurück zum Zitat Burge MJ, Bowyer KW (eds) (2013) Handbook of iris recognition. Springer, Berlin Burge MJ, Bowyer KW (eds) (2013) Handbook of iris recognition. Springer, Berlin
3.
Zurück zum Zitat Fierrez J, Morales A, Vera-Rodriguez R, Camacho D (2018) Multiple classifiers in biometrics. part 1: fundamentals and review. Inf Fusion 44:57–64CrossRef Fierrez J, Morales A, Vera-Rodriguez R, Camacho D (2018) Multiple classifiers in biometrics. part 1: fundamentals and review. Inf Fusion 44:57–64CrossRef
4.
Zurück zum Zitat Galbally J, Gomez-Barrero M (2017) chapter. In: Rathgeb C, Busch C (eds) Iris and periocular biometric recognition. Presentation attack detection in iris recognition, IET Digital Library, pp 235–263 Galbally J, Gomez-Barrero M (2017) chapter. In: Rathgeb C, Busch C (eds) Iris and periocular biometric recognition. Presentation attack detection in iris recognition, IET Digital Library, pp 235–263
5.
Zurück zum Zitat Flom L, Safir A (1987) Iris recognition system. US Patent US4641349 A Flom L, Safir A (1987) Iris recognition system. US Patent US4641349 A
6.
Zurück zum Zitat Abraham R, Bennett ES, Sen N, Shah NB (2017) State of aadhaar report 2016–17. Tech Rep, IDinsight Abraham R, Bennett ES, Sen N, Shah NB (2017) State of aadhaar report 2016–17. Tech Rep, IDinsight
7.
Zurück zum Zitat Nguyen K, Fookes C, Jillela R, Sridharan S, Ross A (2017) Long range iris recognition: a survey. Pattern Recognit 72:123–143CrossRef Nguyen K, Fookes C, Jillela R, Sridharan S, Ross A (2017) Long range iris recognition: a survey. Pattern Recognit 72:123–143CrossRef
9.
Zurück zum Zitat ISO/IEC CD 30107-1. Information technology - biometrics - presentation attack detection - Part 1: framework (2016) ISO/IEC CD 30107-1. Information technology - biometrics - presentation attack detection - Part 1: framework (2016)
10.
Zurück zum Zitat Daugman J (1999) Biometrics. Personal identification in a networked society. In: Chapter, Recognizing persons by their iris patterns. Kluwer Academic Publishers, Dordrecht, pp 103–121 Daugman J (1999) Biometrics. Personal identification in a networked society. In: Chapter, Recognizing persons by their iris patterns. Kluwer Academic Publishers, Dordrecht, pp 103–121
11.
Zurück zum Zitat Galbally J, Marcel S, Fierrez J (2014) Image quality assessment for fake biometric detection: application to iris, fingerprint and face recognition. IEEE Trans Image Process 23:710–724MathSciNetCrossRef Galbally J, Marcel S, Fierrez J (2014) Image quality assessment for fake biometric detection: application to iris, fingerprint and face recognition. IEEE Trans Image Process 23:710–724MathSciNetCrossRef
12.
Zurück zum Zitat Menotti D, Chiachia G, Pinto A, Schwartz WR, Pedrini H, Falcao AX, Rocha A (2015) Deep representations for iris, face, and fingerprint spoofing detection. IEEE Trans Inf Forensics Secur 10:864–878CrossRef Menotti D, Chiachia G, Pinto A, Schwartz WR, Pedrini H, Falcao AX, Rocha A (2015) Deep representations for iris, face, and fingerprint spoofing detection. IEEE Trans Inf Forensics Secur 10:864–878CrossRef
13.
Zurück zum Zitat Raghavendra R, Busch C (2014) Presentation attack detection algorithm for face and iris biometrics. In: Proceedings of the IEEE European signal processing conference (EUSIPCO), pp 1387–1391 Raghavendra R, Busch C (2014) Presentation attack detection algorithm for face and iris biometrics. In: Proceedings of the IEEE European signal processing conference (EUSIPCO), pp 1387–1391
14.
Zurück zum Zitat Ratha NK, Connell JH, Bolle RM (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J 40(3):614–634CrossRef Ratha NK, Connell JH, Bolle RM (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J 40(3):614–634CrossRef
15.
Zurück zum Zitat Gomez-Barrero M, Maiorana E, Galbally J, Campisi P, Fierrez J (2017) Multi-biometric template protection based on homomorphic encryption. Pattern Recogn 67:149–163CrossRef Gomez-Barrero M, Maiorana E, Galbally J, Campisi P, Fierrez J (2017) Multi-biometric template protection based on homomorphic encryption. Pattern Recogn 67:149–163CrossRef
16.
Zurück zum Zitat Hadid A, Evans N, Marcel S, Fierrez J (2015) Biometrics systems under spoofing attack. IEEE Signal Process Mag 32:20–30CrossRef Hadid A, Evans N, Marcel S, Fierrez J (2015) Biometrics systems under spoofing attack. IEEE Signal Process Mag 32:20–30CrossRef
17.
Zurück zum Zitat Johnson P, Lazarick R, Marasco E, Newton E, Ross A, Schuckers S (2012) Biometric liveness detection: framework and metrics. In: Proceedings of the NIST international biometric performance conference (IBPC) Johnson P, Lazarick R, Marasco E, Newton E, Ross A, Schuckers S (2012) Biometric liveness detection: framework and metrics. In: Proceedings of the NIST international biometric performance conference (IBPC)
18.
Zurück zum Zitat Czajka A (2013) Database of iris printouts and its application: development of liveness detection method for iris recognition. In: Proceedings of the international conference on methods and models in automation and robotics (MMAR), pp 28–33 Czajka A (2013) Database of iris printouts and its application: development of liveness detection method for iris recognition. In: Proceedings of the international conference on methods and models in automation and robotics (MMAR), pp 28–33
19.
Zurück zum Zitat Pacut A, Czajka A (2006) Aliveness detection for iris biometrics. In: Proceedings of the IEEE international Carnahan conference on security technology (ICCST), pp 122–129 Pacut A, Czajka A (2006) Aliveness detection for iris biometrics. In: Proceedings of the IEEE international Carnahan conference on security technology (ICCST), pp 122–129
20.
Zurück zum Zitat Ruiz-Albacete V, Tome-Gonzalez P, Alonso-Fernandez F, Galbally J, Fierrez J, Ortega-Garcia J (2008) Direct attacks using fake images in iris verification. In: Proceedings of the COST 2101 workshop on biometrics and identity management (BioID). LNCS, vol 5372. Springer, Berlin, pp 181–190 Ruiz-Albacete V, Tome-Gonzalez P, Alonso-Fernandez F, Galbally J, Fierrez J, Ortega-Garcia J (2008) Direct attacks using fake images in iris verification. In: Proceedings of the COST 2101 workshop on biometrics and identity management (BioID). LNCS, vol 5372. Springer, Berlin, pp 181–190
21.
Zurück zum Zitat Raghavendra R, Busch C (2014) Presentation attack detection on visible spectrum iris recognition by exploring inherent characteristics of light field camera. In: Proceedings of the IEEE international joint conference on biometrics (IJCB) (2014) Raghavendra R, Busch C (2014) Presentation attack detection on visible spectrum iris recognition by exploring inherent characteristics of light field camera. In: Proceedings of the IEEE international joint conference on biometrics (IJCB) (2014)
22.
Zurück zum Zitat Thalheim L, Krissler J (2002) Body check: biometric access protection devices and their programs put to the test. ct magazine, pp 114–121 Thalheim L, Krissler J (2002) Body check: biometric access protection devices and their programs put to the test. ct magazine, pp 114–121
23.
Zurück zum Zitat He X, Lu Y, Shi P (2009) A new fake iris detection method. In: Proceedings of the IAPR/IEEE international conference on biometrics (ICB). LNCS, vol 5558. Springer, Berlin, pp 1132–1139CrossRef He X, Lu Y, Shi P (2009) A new fake iris detection method. In: Proceedings of the IAPR/IEEE international conference on biometrics (ICB). LNCS, vol 5558. Springer, Berlin, pp 1132–1139CrossRef
24.
Zurück zum Zitat Raja KB, Raghavendra R, Busch C (2015) Presentation attack detection using laplacian decomposed frequency response for visible spectrum and near-infra-red iris systems. In: Proceedings of the of IEEE international conference on biometrics: theory and applications (BTAS) Raja KB, Raghavendra R, Busch C (2015) Presentation attack detection using laplacian decomposed frequency response for visible spectrum and near-infra-red iris systems. In: Proceedings of the of IEEE international conference on biometrics: theory and applications (BTAS)
25.
Zurück zum Zitat Raja KB, Raghavendra R, Busch C (2015) Video presentation attack detection in visible spectrum iris recognition using magnified phase information. IEEE Trans Inf Forensics Secur 10:2048–2056CrossRef Raja KB, Raghavendra R, Busch C (2015) Video presentation attack detection in visible spectrum iris recognition using magnified phase information. IEEE Trans Inf Forensics Secur 10:2048–2056CrossRef
26.
Zurück zum Zitat Zhang H, Sun Z, Tan T, Wang J (2011) Learning hierarchical visual codebook for iris liveness detection. In: Proceedings of the IEEE international joint conference on biometrics (IJCB) Zhang H, Sun Z, Tan T, Wang J (2011) Learning hierarchical visual codebook for iris liveness detection. In: Proceedings of the IEEE international joint conference on biometrics (IJCB)
27.
Zurück zum Zitat Yambay D, Doyle JS, Boyer KW, Czajka A, Schuckers S (2014) Livdet-iris 2013 - iris liveness detection competition 2013. In: Proceedings of the IEEE international joint conference on biometrics (IJCB) Yambay D, Doyle JS, Boyer KW, Czajka A, Schuckers S (2014) Livdet-iris 2013 - iris liveness detection competition 2013. In: Proceedings of the IEEE international joint conference on biometrics (IJCB)
28.
Zurück zum Zitat Daugman J (2004) Iris recognition and anti-spoofing countermeasures. In: Proceedings of the international biometrics conference (IBC) Daugman J (2004) Iris recognition and anti-spoofing countermeasures. In: Proceedings of the international biometrics conference (IBC)
29.
Zurück zum Zitat von Seelen UC (2005) Countermeasures against iris spoofing with contact lenses. In: Proceedings of the biometrics consortium conference (BCC) von Seelen UC (2005) Countermeasures against iris spoofing with contact lenses. In: Proceedings of the biometrics consortium conference (BCC)
30.
Zurück zum Zitat Wei Z, Qiu X, Sun Z, Tan T (2008) Counterfeit iris detection based on texture analysis. In: Proceedings of the IAPR international conference on pattern recognition (ICPR) Wei Z, Qiu X, Sun Z, Tan T (2008) Counterfeit iris detection based on texture analysis. In: Proceedings of the IAPR international conference on pattern recognition (ICPR)
31.
Zurück zum Zitat Zhang H, Sun Z, Tan T (2010) Contact lense detection based on weighted LBP. In: Proceedings of the IEEE international conference on pattern recognition (ICPR), pp 4279–4282 Zhang H, Sun Z, Tan T (2010) Contact lense detection based on weighted LBP. In: Proceedings of the IEEE international conference on pattern recognition (ICPR), pp 4279–4282
32.
Zurück zum Zitat Lefohn A, Budge B, Shirley P, Caruso R, Reinhard E (2003) An ocularist’s approach to human iris synthesis. IEEE Trans Comput Graph Appl 23:70–75CrossRef Lefohn A, Budge B, Shirley P, Caruso R, Reinhard E (2003) An ocularist’s approach to human iris synthesis. IEEE Trans Comput Graph Appl 23:70–75CrossRef
33.
Zurück zum Zitat Chen R, Lin X, Ding T (2012) Liveness detection for iris recognition using multispectral images. Pattern Recogn Lett 33:1513–1519CrossRef Chen R, Lin X, Ding T (2012) Liveness detection for iris recognition using multispectral images. Pattern Recogn Lett 33:1513–1519CrossRef
34.
Zurück zum Zitat Czajka A (2015) Pupil dynamics for iris liveness detection. IEEE Trans Inf Forensics Secur 10:726–735CrossRef Czajka A (2015) Pupil dynamics for iris liveness detection. IEEE Trans Inf Forensics Secur 10:726–735CrossRef
35.
Zurück zum Zitat Gupta P, Behera S, Singh MVV (2014) On iris spoofing using print attack. In: IEEE international conference on pattern recognition (ICPR) Gupta P, Behera S, Singh MVV (2014) On iris spoofing using print attack. In: IEEE international conference on pattern recognition (ICPR)
36.
Zurück zum Zitat He X, Lu Y, Shi P (2008) A fake iris detection method based on FFT and quality assessment. In: Proceedings of the IEEE Chinese conference on pattern recognition (CCPR) He X, Lu Y, Shi P (2008) A fake iris detection method based on FFT and quality assessment. In: Proceedings of the IEEE Chinese conference on pattern recognition (CCPR)
37.
Zurück zum Zitat Huang X, Ti C, zhen Hou Q, Tokuta A, Yang R (2013) An experimental study of pupil constriction for liveness detection. In: Proceedings of the IEEE workshop on applications of computer vision (WACV), pp 252–258 Huang X, Ti C, zhen Hou Q, Tokuta A, Yang R (2013) An experimental study of pupil constriction for liveness detection. In: Proceedings of the IEEE workshop on applications of computer vision (WACV), pp 252–258
38.
Zurück zum Zitat Kanematsu M, Takano H, Nakamura K (2007) Highly reliable liveness detection method for iris recognition. In: Proceedings of the SICE annual conference, international conference on instrumentation, control and information technology (ICICIT), pp 361–364 Kanematsu M, Takano H, Nakamura K (2007) Highly reliable liveness detection method for iris recognition. In: Proceedings of the SICE annual conference, international conference on instrumentation, control and information technology (ICICIT), pp 361–364
39.
Zurück zum Zitat Lee EC, Yo YJ, Park KR (2008) Fake iris detection method using Purkinje images based on gaze position. Opt Eng 47(067):204 Lee EC, Yo YJ, Park KR (2008) Fake iris detection method using Purkinje images based on gaze position. Opt Eng 47(067):204
40.
Zurück zum Zitat Yambay D, Becker B, Kohli N, Yadav, D, Czajka, A, Bowyer KW, Schuckers S, Singh R, Vatsa M, Noore A, Gragnaniello D, Sansone C, Verdoliva L, He L, Ru Y, Li H, Liu N, Sun Z, Tan T (2017) Livdet iris 2017, iris liveness detection competition 2017. In: Proceedings of the IEEE international joint conference on biometrics (IJCB), pp 1–6 Yambay D, Becker B, Kohli N, Yadav, D, Czajka, A, Bowyer KW, Schuckers S, Singh R, Vatsa M, Noore A, Gragnaniello D, Sansone C, Verdoliva L, He L, Ru Y, Li H, Liu N, Sun Z, Tan T (2017) Livdet iris 2017, iris liveness detection competition 2017. In: Proceedings of the IEEE international joint conference on biometrics (IJCB), pp 1–6
41.
Zurück zum Zitat Raghavendra R, Busch C (2015) Robust scheme for iris presentation attack detection using multiscale binarized statistical image features. IEEE Trans Inf Forensics Secur 10:703–715CrossRef Raghavendra R, Busch C (2015) Robust scheme for iris presentation attack detection using multiscale binarized statistical image features. IEEE Trans Inf Forensics Secur 10:703–715CrossRef
42.
Zurück zum Zitat Sequeira AF, Oliveira HP, Monteiro JC, Monteiro JP, Cardoso JS (2014) MobILive 2014 - mobile iris liveness detection competition. In: Proceedings of the IEEE international joint conference on biometrics (IJCB) Sequeira AF, Oliveira HP, Monteiro JC, Monteiro JP, Cardoso JS (2014) MobILive 2014 - mobile iris liveness detection competition. In: Proceedings of the IEEE international joint conference on biometrics (IJCB)
43.
Zurück zum Zitat Yadav D, Kohli N, Doyle JS, Singh R, Vatsa M, Bowyer KW (2014) Unraveling the effect of textured contact lenses on iris recognition. IEEE Trans Inf Forensics Secur 9:851–862CrossRef Yadav D, Kohli N, Doyle JS, Singh R, Vatsa M, Bowyer KW (2014) Unraveling the effect of textured contact lenses on iris recognition. IEEE Trans Inf Forensics Secur 9:851–862CrossRef
44.
Zurück zum Zitat He Y, Hou Y, Li Y, Wang Y (2010) Liveness iris detection method based on the eye’s optical features. In: Proceedings of the SPIE optics and photonics for counterterrorism and crime fighting VI, p 78380R He Y, Hou Y, Li Y, Wang Y (2010) Liveness iris detection method based on the eye’s optical features. In: Proceedings of the SPIE optics and photonics for counterterrorism and crime fighting VI, p 78380R
45.
Zurück zum Zitat Lee EC, Park KR, Kim J (2006) Fake iris detection by using Purkinje image. In: Proceedings of the IAPR international conference on biometrics (ICB), pp 397–403CrossRef Lee EC, Park KR, Kim J (2006) Fake iris detection by using Purkinje image. In: Proceedings of the IAPR international conference on biometrics (ICB), pp 397–403CrossRef
46.
Zurück zum Zitat Lee SJ, Park KR, Lee YJ, Bae K, Kim J (2007) Multifeature-based fake iris detection method. Opt Eng 46(127):204 Lee SJ, Park KR, Lee YJ, Bae K, Kim J (2007) Multifeature-based fake iris detection method. Opt Eng 46(127):204
47.
Zurück zum Zitat Park JH, Kang MG (2005) Iris recognition against counterfeit attack using gradient based fusion of multi-spectral images. In: Proceedings of the of international workshop on biometric recognition systems (IWBRS). LNCS, vol 3781. Springer, Berlin, pp 150–156CrossRef Park JH, Kang MG (2005) Iris recognition against counterfeit attack using gradient based fusion of multi-spectral images. In: Proceedings of the of international workshop on biometric recognition systems (IWBRS). LNCS, vol 3781. Springer, Berlin, pp 150–156CrossRef
48.
Zurück zum Zitat Lee EC, Park KR (2010) Fake iris detection based on 3D structure of the iris pattern. Int J Imaging Syst Technol 20:162–166CrossRef Lee EC, Park KR (2010) Fake iris detection based on 3D structure of the iris pattern. Int J Imaging Syst Technol 20:162–166CrossRef
49.
Zurück zum Zitat Krupiski R, Mazurek P (2012) Estimation of electrooculography and blinking signals based on filter banks. In: Proceedings of the of the 2012 international conference on computer vision and graphics, pp 156–163 Krupiski R, Mazurek P (2012) Estimation of electrooculography and blinking signals based on filter banks. In: Proceedings of the of the 2012 international conference on computer vision and graphics, pp 156–163
50.
Zurück zum Zitat Galbally J, Ortiz-Lopez J, Fierrez J, Ortega-Garcia J (2012) Iris liveness detection based on quality related features. In: Proceedings of the IAPR international conference on biometrics (ICB), pp 271–276 Galbally J, Ortiz-Lopez J, Fierrez J, Ortega-Garcia J (2012) Iris liveness detection based on quality related features. In: Proceedings of the IAPR international conference on biometrics (ICB), pp 271–276
51.
Zurück zum Zitat He X, An S, Shi P (2007) Statistical texture analysis-based approach for fake iris detection using support vector machines. In: Proceedings of the IAPR international conference on biometrics (ICB), LNCS, vol 4642. Springer, Berlin, pp 540–546 He X, An S, Shi P (2007) Statistical texture analysis-based approach for fake iris detection using support vector machines. In: Proceedings of the IAPR international conference on biometrics (ICB), LNCS, vol 4642. Springer, Berlin, pp 540–546
52.
Zurück zum Zitat Alonso-Fernandez F, Bigun J (2014) Fake iris detection: a comparison between near-infrared and visible images. In: Proceedings of the IEEE international conference on signal-image technology and internet-based systems (SITIS), pp 546–553 Alonso-Fernandez F, Bigun J (2014) Fake iris detection: a comparison between near-infrared and visible images. In: Proceedings of the IEEE international conference on signal-image technology and internet-based systems (SITIS), pp 546–553
53.
Zurück zum Zitat Gragnaniello D, Poggi G, Sansone C, Verdoliva L (2015) An investigation of local descriptors for biometric spoofing detection. IEEE Trans Inf Forensics Secur 10:849–863CrossRef Gragnaniello D, Poggi G, Sansone C, Verdoliva L (2015) An investigation of local descriptors for biometric spoofing detection. IEEE Trans Inf Forensics Secur 10:849–863CrossRef
54.
Zurück zum Zitat He Z, Sun Z, Tan T, Wei Z (2009) Efficient iris spoof detection via boosted local binary patterns. In: Proceedings of the IEEE international conference on biometrics (ICB) He Z, Sun Z, Tan T, Wei Z (2009) Efficient iris spoof detection via boosted local binary patterns. In: Proceedings of the IEEE international conference on biometrics (ICB)
55.
Zurück zum Zitat Sun Z, Zhang H, Tan T, Wang J (2014) Iris image classification based on hierarchical visual codebook. IEEE Trans Pattern Anal Mach Intell 36:1120–1133CrossRef Sun Z, Zhang H, Tan T, Wang J (2014) Iris image classification based on hierarchical visual codebook. IEEE Trans Pattern Anal Mach Intell 36:1120–1133CrossRef
56.
Zurück zum Zitat Park KR (2006) Robust fake iris detection. In: Proceedings of the of articulated motion and deformable objects (AMDO). LNCS, vol 4069. Springer, Berlin, pp 10–18CrossRef Park KR (2006) Robust fake iris detection. In: Proceedings of the of articulated motion and deformable objects (AMDO). LNCS, vol 4069. Springer, Berlin, pp 10–18CrossRef
57.
Zurück zum Zitat Komogortsev O, Karpov A (2013) Liveness detection via oculomotor plant characteristics: attack of mechanical replicas. In: Proceedings of the international conference of biometrics (ICB) (2013) Komogortsev O, Karpov A (2013) Liveness detection via oculomotor plant characteristics: attack of mechanical replicas. In: Proceedings of the international conference of biometrics (ICB) (2013)
58.
Zurück zum Zitat Bowyer KW, Doyle JS (2014) Cosmetic contact lenses and iris recognition spoofing. IEEE Comput 47:96–98 Bowyer KW, Doyle JS (2014) Cosmetic contact lenses and iris recognition spoofing. IEEE Comput 47:96–98
59.
Zurück zum Zitat Biggio B, Fumera G, Marcialis G, Roli F (2017) Statistical meta-analysis of presentation attacks for secure multibiometric systems. IEEE Trans Pattern Anal Mach Intell 39(3):561–575CrossRef Biggio B, Fumera G, Marcialis G, Roli F (2017) Statistical meta-analysis of presentation attacks for secure multibiometric systems. IEEE Trans Pattern Anal Mach Intell 39(3):561–575CrossRef
Metadaten
Titel
Introduction to Iris Presentation Attack Detection
verfasst von
Aythami Morales
Julian Fierrez
Javier Galbally
Marta Gomez-Barrero
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-319-92627-8_6

Neuer Inhalt