Presentation attack detection for iris recognition using deep learning

  • Shefali AroraEmail author
  • M. P. S. Bhatia
Original Article


Iris recognition is used in various applications to identify a person. However, presentation attacks are making such systems vulnerable. Intruders can impersonate an individual to get entry into a system. In this paper, we have focused on print attacks, in which an intruder can use various techniques like printing of iris photographs to present to the sensor. Experiments conducted on the IIIT-WVU iris dataset show that print attack images of live iris images, use of contact lenses and conjunction of both can play a significant role in deceiving the iris recognition systems. The paper makes use of deep Convolutional Neural Networks to detect such spoofing techniques with superior results as compared to the existing state-of-the-art techniques.


Iris recognition Biometrics Deep learning Presentation attack Security Convolutional Neural Networks 



We thank IIIT Delhi for providing us with the IIITD-WVU Mobile Iris Spoofing Dataset for the application of our approach.


  1. Alzubi JA (2015a) Diversity based improved bagging algorithm. In: Proceedings of the international conference on engineering & MIS 2015 (ICEMIS’15). Istanbul, Turkey. ACM, New York, NY, USA, pp 1–5Google Scholar
  2. Alzubi JA (2015b) Optimal classifier ensemble design based on cooperative game theory. Res J Appl Sci Eng Technol 11(12):1336–1343CrossRefGoogle Scholar
  3. Alzubi OA, Alzubi JA, Tedmori S, Rashaideh H, Almomani O (2018) Consensus-based combining method for classifier ensembles. Int Arab J Inf Technol 15(1):76–86Google Scholar
  4. Bowyer KW, Doyle JS (2014) Cosmetic contact lenses and iris recognition spoofing. Computer 47(5):96–98CrossRefGoogle Scholar
  5. Chen T, Blasco J, Alzubi J, Alzubi O (2014) Intrusion detection. Eng Technol Ref 1(1):1–9Google Scholar
  6. Czajka A, Bowyer K (2018) Presentation attack detection for iris recognition. ACM Comput Surv 51:1–35CrossRefGoogle Scholar
  7. Czajka A, Bowyer K, Krumdick M, VidalMata R (2017) Recognition of image-orientation-based iris spoofing. IEEE Transactions Inf Forensics Secur 12:2184–2196CrossRefGoogle Scholar
  8. Doyle JS, Flynn PJ, Bowyer KW (2013) Automated classification of contact lens type in iris images. In: International conference on biometrics (ICB). IEEE, Madrid, Spain, pp 1–6.
  9. Gupta R, Sehgal P (2016) A survey of attacks on iris biometric systems. Int J Biom 8:145Google Scholar
  10. Gupta P, Behera S, Vatsa M, Singh R et al (2014) On iris spoofing using print attack. In: IEEE international conference on pattern recognition, pp 1681–1686Google Scholar
  11. Hsieh S, Li Y, Wang W, Tien C (2018) A novel anti-spoofing solution for iris recognition toward cosmetic contact lens attack using spectral ICA analysis. Sensors 18:795CrossRefGoogle Scholar
  12. Hu Y, Sirlantzis K, Howells G (2016) Iris liveness detection using regional features. Pattern Recognit Lett 82:242–250CrossRefGoogle Scholar
  13. Illingworth J, Kittler J (1988) A survey of the Hough transform. Comput Vis Graph Image Process 44:87–116CrossRefGoogle Scholar
  14. Kimme C, Ballard DH, Sklansky J (1975) Finding circles by an array of accumulators. CACM 18:120–122CrossRefGoogle Scholar
  15. Kuehlkamp A, Pinto A, Richa A, Bowyer KW, Czajka A (2019) Ensemble of multi-view learning classifiers for cross-domain iris presentation attack detection. IEEE Trans Inf Forensics Secur 14(6):1419–1431CrossRefGoogle Scholar
  16. Lee MB, Kim YH, Park KR (2019) Conditional generative adversarial network: based data augmentation for enhancement of iris recognition accuracy. IEEE Access 7:122134–122152CrossRefGoogle Scholar
  17. Lefohn A, Budge B, Shirley P, Caruso R, Reinhard E (2003) An ocularist’s approach to human iris synthesis. IEEE Comput Graph Appl 23:70–75CrossRefGoogle Scholar
  18. Merlin PM, Farber DJ (1975) A parallel mechanism for detecting curves in pictures. IEEE Trans Comput 24:96–98CrossRefGoogle Scholar
  19. Morales A, Fierrez J, Galbally J, Gomez-Barrero M (2019) Introduction to iris presentation attack detection. Handbook of biometric anti-spoofing. Springer, Berlin, pp 1–18Google Scholar
  20. Mukhopadhyay P, Chaudhuri BB (2015) A survey of Hough transform. Pattern Recognit 48(3):993–1010CrossRefGoogle Scholar
  21. Nguyen D, Baek N, Pham T, Park K (2018) Presentation attack detection for iris recognition system using NIR camera sensor. Sensors 18:1315CrossRefGoogle Scholar
  22. Raghavendra R, Busch C (2015) Robust scheme for iris presentation attack detection using multiscale binarized statistical image features. IEEE Trans Inf Forensics Secur 10:703–715CrossRefGoogle Scholar
  23. Raja K, Raghavendra R, Braun J, Busch C (2016) Presentation attack detection using a generalizable statistical approach for periocular and iris systems. In: International conference of the biometrics special interest group (BIOSIG), pp 111–122Google Scholar
  24. Rathgeb C, Busch C (2017) On the feasibility of creating morphed iris-codes. In: IEEE international joint conference on biometricsGoogle Scholar
  25. Rathgeb C, Uhl A (2010) An efficient hill-climbing technique. In: International conference on pattern recognition. IEEE, Turkey, pp 1217–1220Google Scholar
  26. Rattani A, Scheirer W, Ross A (2015) Open set fingerprint spoof detection across novel fabrication materials. IEEE Trans Inf Forensics Secur 10:2447–2460CrossRefGoogle Scholar
  27. Sequeira A, Cardoso J (2015) Fingerprint liveness detection in the presence of capable intruders. Sensors 15:14615–14638CrossRefGoogle Scholar
  28. Shejin T, Sao AK (2012) Significance of dictionary for sparse coding based face recognition. In: Proceedings of the international conference of the biometrics special interest group (BIOSIG), pp 1–6Google Scholar
  29. Stockman GC, Agrawala AK (1977) Equivalence of Hough curve detection to template matching. CACM 20:820–822CrossRefGoogle Scholar
  30. Thalheim L, Krissler J, MichaelZiegler P(2002) Body check biometric access protection devices and their programs put to the test. In: C't (in German), vol 11. Heise, Hannover, p114Google Scholar
  31. Thavalengal S, Vranceanu R, Condorovici R, Corcoran P (2014) Iris pattern obfuscation in digital images. In; IEEE international joint conference on biometrics (IJCB). IEEEGoogle Scholar
  32. Yadav D, Kohli N, Doyle J, Singh R, Vatsa M, Bowyer K (2014) Unraveling the effect of textured contact lenses on iris recognition. IEEE Trans Inf Forensics Secur 9:851–862CrossRefGoogle Scholar
  33. Yadav D, Kohli N, Doyle J, Singh R, Vatsa M, Bowyer K (2017) Unconstrained visible spectrum iris with textured contact lens variations: database and benchmarking. In: IEEE international joint conference on biometrics, CO, USA, pp 1–6Google Scholar
  34. Yadav D, Kohli N, Vatsa M, Singh R, Noore A (2019) Detecting textured contact lens in uncontrolled environment using DensePAD. In: The IEEE conference on computer vision and pattern recognition (CVPR) workshops, pp 1–9Google Scholar
  35. Yambay D, Becker B, Kohli N, Yadav D, Czajka A, Bowyer KW, Schuckers S, Singh R, Vatsa M, Noore A, Gragnaniello D, Sansone C, He VL, Ru Y, Li H, Liu N, Sun Z, Tan T (2017) LivDet iris 2017—iris liveness detection competition 2017. In: IEEE international joint conference on biometrics, pp 733–741Google Scholar
  36. Yambay D, Czajka A, Bowyer K, Vatsa M, Singh R, Noore A, Kohli N, Yadav D, Schuckes S (2019) Review of iris presentation attack detection competitions. Handbook of biometric anti-spoofing. Springer, Cham, pp 169–183CrossRefGoogle Scholar
  37. Zhang H, Sun Z, Tan T (2010) Contact lens detection based on weighted LBP. In: 20th international conference on pattern recognition (ICPR), pp 4279–4282Google Scholar
  38. Zheng BR, Ji DY, Li YH (2014) Heterogeneous iris recognition using heterogeneous Eigen iris and sparse representation. In: 2014 IEEE international conference on acoustics, speech and signal processing (ICASSP), pp 3764–3768Google Scholar

Copyright information

© The Society for Reliability Engineering, Quality and Operations Management (SREQOM), India and The Division of Operation and Maintenance, Lulea University of Technology, Sweden 2020

Authors and Affiliations

  1. 1.Division of Computer EngineeringNetaji Subhas Institute of TechnologyDelhiIndia

Personalised recommendations