Skip to main content

Introduction to Iris Presentation Attack Detection

  • Chapter
  • First Online:
Handbook of Biometric Anti-Spoofing

Part of the book series: Advances in Computer Vision and Pattern Recognition ((ACVPR))

Abstract

Iris recognition technology has attracted an increasing interest since more than two decades in which we have witnessed a migration from laboratories to real-world applications. The deployment of this technology in real applications raises questions about the main vulnerabilities and security threats related to these systems. Presentation attacks can be defined as presentation of human characteristics or artifacts directly to the input of a biometric system trying to interfere with its normal operation. These attacks include the use of real irises as well as artifacts with different levels of sophistication. This chapter introduces iris presentation attack detection methods and its main challenges. First, we summarize the most popular types of attacks including the main challenges to address. Second, we present a taxonomy of presentation attack detection methods to serve as a brief introduction on this very active research area. Finally, we discuss the integration of these methods into iris recognition systems according to the most important scenarios of practical application.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Daugman J (1993) High confidence visual recognition of persons by a test of statistical independence. IEEE Trans Pattern Anal Mach Intell 15:1148–1161

    Article  Google Scholar 

  2. Burge MJ, Bowyer KW (eds) (2013) Handbook of iris recognition. Springer, Berlin

    Google Scholar 

  3. Fierrez J, Morales A, Vera-Rodriguez R, Camacho D (2018) Multiple classifiers in biometrics. part 1: fundamentals and review. Inf Fusion 44:57–64

    Article  Google Scholar 

  4. Galbally J, Gomez-Barrero M (2017) chapter. In: Rathgeb C, Busch C (eds) Iris and periocular biometric recognition. Presentation attack detection in iris recognition, IET Digital Library, pp 235–263

    Google Scholar 

  5. Flom L, Safir A (1987) Iris recognition system. US Patent US4641349 A

    Google Scholar 

  6. Abraham R, Bennett ES, Sen N, Shah NB (2017) State of aadhaar report 2016–17. Tech Rep, IDinsight

    Google Scholar 

  7. Nguyen K, Fookes C, Jillela R, Sridharan S, Ross A (2017) Long range iris recognition: a survey. Pattern Recognit 72:123–143

    Article  Google Scholar 

  8. Chaos Computer Club Berlin: chaos computer clubs breaks iris recognition system of the samsung galaxy s8 (2017). https://www.ccc.de/en/updates/2017/iriden

  9. ISO/IEC CD 30107-1. Information technology - biometrics - presentation attack detection - Part 1: framework (2016)

    Google Scholar 

  10. Daugman J (1999) Biometrics. Personal identification in a networked society. In: Chapter, Recognizing persons by their iris patterns. Kluwer Academic Publishers, Dordrecht, pp 103–121

    Google Scholar 

  11. Galbally J, Marcel S, Fierrez J (2014) Image quality assessment for fake biometric detection: application to iris, fingerprint and face recognition. IEEE Trans Image Process 23:710–724

    Article  MathSciNet  Google Scholar 

  12. Menotti D, Chiachia G, Pinto A, Schwartz WR, Pedrini H, Falcao AX, Rocha A (2015) Deep representations for iris, face, and fingerprint spoofing detection. IEEE Trans Inf Forensics Secur 10:864–878

    Article  Google Scholar 

  13. Raghavendra R, Busch C (2014) Presentation attack detection algorithm for face and iris biometrics. In: Proceedings of the IEEE European signal processing conference (EUSIPCO), pp 1387–1391

    Google Scholar 

  14. Ratha NK, Connell JH, Bolle RM (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J 40(3):614–634

    Article  Google Scholar 

  15. Gomez-Barrero M, Maiorana E, Galbally J, Campisi P, Fierrez J (2017) Multi-biometric template protection based on homomorphic encryption. Pattern Recogn 67:149–163

    Article  Google Scholar 

  16. Hadid A, Evans N, Marcel S, Fierrez J (2015) Biometrics systems under spoofing attack. IEEE Signal Process Mag 32:20–30

    Article  Google Scholar 

  17. Johnson P, Lazarick R, Marasco E, Newton E, Ross A, Schuckers S (2012) Biometric liveness detection: framework and metrics. In: Proceedings of the NIST international biometric performance conference (IBPC)

    Google Scholar 

  18. Czajka A (2013) Database of iris printouts and its application: development of liveness detection method for iris recognition. In: Proceedings of the international conference on methods and models in automation and robotics (MMAR), pp 28–33

    Google Scholar 

  19. Pacut A, Czajka A (2006) Aliveness detection for iris biometrics. In: Proceedings of the IEEE international Carnahan conference on security technology (ICCST), pp 122–129

    Google Scholar 

  20. Ruiz-Albacete V, Tome-Gonzalez P, Alonso-Fernandez F, Galbally J, Fierrez J, Ortega-Garcia J (2008) Direct attacks using fake images in iris verification. In: Proceedings of the COST 2101 workshop on biometrics and identity management (BioID). LNCS, vol 5372. Springer, Berlin, pp 181–190

    Google Scholar 

  21. Raghavendra R, Busch C (2014) Presentation attack detection on visible spectrum iris recognition by exploring inherent characteristics of light field camera. In: Proceedings of the IEEE international joint conference on biometrics (IJCB) (2014)

    Google Scholar 

  22. Thalheim L, Krissler J (2002) Body check: biometric access protection devices and their programs put to the test. ct magazine, pp 114–121

    Google Scholar 

  23. He X, Lu Y, Shi P (2009) A new fake iris detection method. In: Proceedings of the IAPR/IEEE international conference on biometrics (ICB). LNCS, vol 5558. Springer, Berlin, pp 1132–1139

    Chapter  Google Scholar 

  24. Raja KB, Raghavendra R, Busch C (2015) Presentation attack detection using laplacian decomposed frequency response for visible spectrum and near-infra-red iris systems. In: Proceedings of the of IEEE international conference on biometrics: theory and applications (BTAS)

    Google Scholar 

  25. Raja KB, Raghavendra R, Busch C (2015) Video presentation attack detection in visible spectrum iris recognition using magnified phase information. IEEE Trans Inf Forensics Secur 10:2048–2056

    Article  Google Scholar 

  26. Zhang H, Sun Z, Tan T, Wang J (2011) Learning hierarchical visual codebook for iris liveness detection. In: Proceedings of the IEEE international joint conference on biometrics (IJCB)

    Google Scholar 

  27. Yambay D, Doyle JS, Boyer KW, Czajka A, Schuckers S (2014) Livdet-iris 2013 - iris liveness detection competition 2013. In: Proceedings of the IEEE international joint conference on biometrics (IJCB)

    Google Scholar 

  28. Daugman J (2004) Iris recognition and anti-spoofing countermeasures. In: Proceedings of the international biometrics conference (IBC)

    Google Scholar 

  29. von Seelen UC (2005) Countermeasures against iris spoofing with contact lenses. In: Proceedings of the biometrics consortium conference (BCC)

    Google Scholar 

  30. Wei Z, Qiu X, Sun Z, Tan T (2008) Counterfeit iris detection based on texture analysis. In: Proceedings of the IAPR international conference on pattern recognition (ICPR)

    Google Scholar 

  31. Zhang H, Sun Z, Tan T (2010) Contact lense detection based on weighted LBP. In: Proceedings of the IEEE international conference on pattern recognition (ICPR), pp 4279–4282

    Google Scholar 

  32. Lefohn A, Budge B, Shirley P, Caruso R, Reinhard E (2003) An ocularist’s approach to human iris synthesis. IEEE Trans Comput Graph Appl 23:70–75

    Article  Google Scholar 

  33. Chen R, Lin X, Ding T (2012) Liveness detection for iris recognition using multispectral images. Pattern Recogn Lett 33:1513–1519

    Article  Google Scholar 

  34. Czajka A (2015) Pupil dynamics for iris liveness detection. IEEE Trans Inf Forensics Secur 10:726–735

    Article  Google Scholar 

  35. Gupta P, Behera S, Singh MVV (2014) On iris spoofing using print attack. In: IEEE international conference on pattern recognition (ICPR)

    Google Scholar 

  36. He X, Lu Y, Shi P (2008) A fake iris detection method based on FFT and quality assessment. In: Proceedings of the IEEE Chinese conference on pattern recognition (CCPR)

    Google Scholar 

  37. Huang X, Ti C, zhen Hou Q, Tokuta A, Yang R (2013) An experimental study of pupil constriction for liveness detection. In: Proceedings of the IEEE workshop on applications of computer vision (WACV), pp 252–258

    Google Scholar 

  38. Kanematsu M, Takano H, Nakamura K (2007) Highly reliable liveness detection method for iris recognition. In: Proceedings of the SICE annual conference, international conference on instrumentation, control and information technology (ICICIT), pp 361–364

    Google Scholar 

  39. Lee EC, Yo YJ, Park KR (2008) Fake iris detection method using Purkinje images based on gaze position. Opt Eng 47(067):204

    Google Scholar 

  40. Yambay D, Becker B, Kohli N, Yadav, D, Czajka, A, Bowyer KW, Schuckers S, Singh R, Vatsa M, Noore A, Gragnaniello D, Sansone C, Verdoliva L, He L, Ru Y, Li H, Liu N, Sun Z, Tan T (2017) Livdet iris 2017, iris liveness detection competition 2017. In: Proceedings of the IEEE international joint conference on biometrics (IJCB), pp 1–6

    Google Scholar 

  41. Raghavendra R, Busch C (2015) Robust scheme for iris presentation attack detection using multiscale binarized statistical image features. IEEE Trans Inf Forensics Secur 10:703–715

    Article  Google Scholar 

  42. Sequeira AF, Oliveira HP, Monteiro JC, Monteiro JP, Cardoso JS (2014) MobILive 2014 - mobile iris liveness detection competition. In: Proceedings of the IEEE international joint conference on biometrics (IJCB)

    Google Scholar 

  43. Yadav D, Kohli N, Doyle JS, Singh R, Vatsa M, Bowyer KW (2014) Unraveling the effect of textured contact lenses on iris recognition. IEEE Trans Inf Forensics Secur 9:851–862

    Article  Google Scholar 

  44. He Y, Hou Y, Li Y, Wang Y (2010) Liveness iris detection method based on the eye’s optical features. In: Proceedings of the SPIE optics and photonics for counterterrorism and crime fighting VI, p 78380R

    Google Scholar 

  45. Lee EC, Park KR, Kim J (2006) Fake iris detection by using Purkinje image. In: Proceedings of the IAPR international conference on biometrics (ICB), pp 397–403

    Chapter  Google Scholar 

  46. Lee SJ, Park KR, Lee YJ, Bae K, Kim J (2007) Multifeature-based fake iris detection method. Opt Eng 46(127):204

    Google Scholar 

  47. Park JH, Kang MG (2005) Iris recognition against counterfeit attack using gradient based fusion of multi-spectral images. In: Proceedings of the of international workshop on biometric recognition systems (IWBRS). LNCS, vol 3781. Springer, Berlin, pp 150–156

    Chapter  Google Scholar 

  48. Lee EC, Park KR (2010) Fake iris detection based on 3D structure of the iris pattern. Int J Imaging Syst Technol 20:162–166

    Article  Google Scholar 

  49. Krupiski R, Mazurek P (2012) Estimation of electrooculography and blinking signals based on filter banks. In: Proceedings of the of the 2012 international conference on computer vision and graphics, pp 156–163

    Google Scholar 

  50. Galbally J, Ortiz-Lopez J, Fierrez J, Ortega-Garcia J (2012) Iris liveness detection based on quality related features. In: Proceedings of the IAPR international conference on biometrics (ICB), pp 271–276

    Google Scholar 

  51. He X, An S, Shi P (2007) Statistical texture analysis-based approach for fake iris detection using support vector machines. In: Proceedings of the IAPR international conference on biometrics (ICB), LNCS, vol 4642. Springer, Berlin, pp 540–546

    Google Scholar 

  52. Alonso-Fernandez F, Bigun J (2014) Fake iris detection: a comparison between near-infrared and visible images. In: Proceedings of the IEEE international conference on signal-image technology and internet-based systems (SITIS), pp 546–553

    Google Scholar 

  53. Gragnaniello D, Poggi G, Sansone C, Verdoliva L (2015) An investigation of local descriptors for biometric spoofing detection. IEEE Trans Inf Forensics Secur 10:849–863

    Article  Google Scholar 

  54. He Z, Sun Z, Tan T, Wei Z (2009) Efficient iris spoof detection via boosted local binary patterns. In: Proceedings of the IEEE international conference on biometrics (ICB)

    Google Scholar 

  55. Sun Z, Zhang H, Tan T, Wang J (2014) Iris image classification based on hierarchical visual codebook. IEEE Trans Pattern Anal Mach Intell 36:1120–1133

    Article  Google Scholar 

  56. Park KR (2006) Robust fake iris detection. In: Proceedings of the of articulated motion and deformable objects (AMDO). LNCS, vol 4069. Springer, Berlin, pp 10–18

    Chapter  Google Scholar 

  57. Komogortsev O, Karpov A (2013) Liveness detection via oculomotor plant characteristics: attack of mechanical replicas. In: Proceedings of the international conference of biometrics (ICB) (2013)

    Google Scholar 

  58. Bowyer KW, Doyle JS (2014) Cosmetic contact lenses and iris recognition spoofing. IEEE Comput 47:96–98

    Google Scholar 

  59. Biggio B, Fumera G, Marcialis G, Roli F (2017) Statistical meta-analysis of presentation attacks for secure multibiometric systems. IEEE Trans Pattern Anal Mach Intell 39(3):561–575

    Article  Google Scholar 

Download references

Acknowledgements

This work was done in the context of the TABULA RASA and BEAT projects funded under the 7th Framework Programme of EU. This work was supported in part by the CogniMetrics Project under Grant TEC2015-70627-R from MINECO/FEDER.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aythami Morales .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Morales, A., Fierrez, J., Galbally, J., Gomez-Barrero, M. (2019). Introduction to Iris Presentation Attack Detection. In: Marcel, S., Nixon, M., Fierrez, J., Evans, N. (eds) Handbook of Biometric Anti-Spoofing. Advances in Computer Vision and Pattern Recognition. Springer, Cham. https://doi.org/10.1007/978-3-319-92627-8_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-92627-8_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-92626-1

  • Online ISBN: 978-3-319-92627-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics