Advertisement

Pattern Recognition and Image Analysis

, Volume 28, Issue 4, pp 670–675 | Cite as

Iris Anti-Spoofing Solution for Mobile Biometric Applications

  • G. Odinokikh
  • Iu. Efimov
  • I. Solomatin
  • M. Korobkin
  • I. Matveev
Proceedings of the 6th International Workshop
  • 4 Downloads

Abstract

The ability to provide reliable protection against counterfeiting is one of the key requirements for a biometric security system. Iris recognition as the technology emerging on mobile market is assumed to handle various types of spoof attacks to prevent compromise of the user’s personal data. A method of iris anti-spoofing is proposed in this work. It is based on applying of convolutional neural network and capable to work in real-time on the mobile device with highly limited computational resources. Classification of iris sample for spoof and live is made by a single frame using a pair of images: eye region and normalized iris. The following types of iris spoof samples are considered in this particular work: printed on paper, printed on paper with imposition of a contact lens, printed on paper with application of transparent glue. Testing of the method is performed on the dataset manually collected and containing all the mentioned spoof sample types. The method revealed its high performance in both classification accuracy and processing speed as well as robustness under uncontrollably changing environmental conditions, which are specific and significant when interacting with the mobile device.

Keywords

mobile biometrics iris recognition anti-spoofing machine learning neural networks 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    J. Daugman, “How iris recognition works,” IEEE Trans. Circuits Syst. Video Technol. 14 (1), 21–30 (2004).CrossRefGoogle Scholar
  2. 2.
    S. Chowhan and G. Shinde, “Iris Biometrics Recognition Application in Security Management,” in Proc. 2008 Int. Congress on Image and Signal Processing (CISP 2008) (Sanya, China, 2008), Vol. 1, pp. 661–665.Google Scholar
  3. 3.
    K. Mali and V. Bhattacharya, “Comparative study of different biometric features,” Int. J. Adv. Res. Comput. Commun. Eng. 2 (7), 2776–2784 (2013).Google Scholar
  4. 4.
    J. Lee, “NTT DOCOMO, Fujitsu smartphone powered by delta ID iris recognition,” Biometric Update (June 1, 2015), URL: http://www.biometricupdate. com/201506/ntt–docomo–fujitsu–smartphonepowered–by–delta–id–iris–recognitionGoogle Scholar
  5. 5.
    Microsoft Corporation: Unlock your Lumia 950 or Lumia 950 XLwith a look (2017), URL: https://support. microsoft.com/en–us/instantanswers/4ea145a3–b98e–f8ed–a262–055ec78cdb80/unlock–your–lumia–950–or–lumia–950–xl–with–a–lookGoogle Scholar
  6. 6.
    Samsung Electronics, Inc.: Security (2017), URL: http://www.samsung.com/global/galaxy/galaxys8/security/.Google Scholar
  7. 7.
    Chaos Computer Club (CCC): Chaos Computer Club breaks iris recognition system of the Samsung Galaxy S8 (2017), URL: https://www.ccc.de/en/updates/2017/iridenGoogle Scholar
  8. 8.
    Bkav Corporation: Galaxy S8 iris scanner bypassed by glue (2017), URL: http://www.bkav.com/top–news/–/view_content/content/94273/galaxy–s8–iris–scannerbypassed–by–gl–1.Google Scholar
  9. 9.
    J. Daugman, “Iris recognition and anti–spoofing countermeasures,” in Proc. 7th Int. Biometric Conference (IBC 2004) (Cairns, Australia, July 2004) (London, 2004).Google Scholar
  10. 10.
    A. Czajka, “Database of iris printouts and its application: Development of liveness detection method for iris recognition,” in Proc. 18th Int. Conf. on Methods Models in Automation Robotics (MMAR 2013) (Międzyzdroje, Poland, Aug. 2013), pp. 28–33.Google Scholar
  11. 11.
    X. He, Y. Lu, and P. Shi, “A fake iris detection method based on FFT and quality assessment,” in Proc. 2008 Chinese Conference on Pattern Recognition (CCPR 2008) (Beijing, China, 2008), pp. 316–319.Google Scholar
  12. 12.
    K. B. Raja, R. Raghavendra, and C. Busch, “Presentation attack detection using Laplacian decomposed frequency response for visible spectrum and Near–Infra–Red iris systems,” in Proc. IEEE 7th Int. Conf. on Biometrics Theory, Applications and Systems (BTAS) (Arlington, VA, 2015), pp. 1–8.Google Scholar
  13. 13.
    Z. He, Z. Sun, T. Tan, and Z. Wei, “Efficient iris spoof detection via boosted local binary patterns,” in Advances in Biometrics: Proc. Third Int. Conf. ICB 2009, Ed. by M. Tistarelli and M. S. Nixon, Lecture Notes in Computer Science (Springer, Berlin. Heidelberg, 2009), Vol. 5558, pp. 1080–1090.Google Scholar
  14. 14.
    P. Gupta, S. Behera, M. Vatsa, and R. Singh, “On iris spoofing using print attack,” in Proc. 2014 22nd Int. Conf. on Pattern Recognition (ICPR’14) (Stockholm, Sweden, 2014), pp. 1681–1686.CrossRefGoogle Scholar
  15. 15.
    R. Raghavendra and C. Busch, “Robust scheme for iris presentation attack detection using multiscale binarized statistical image features,” IEEE Trans. Inf. For. Secur. 10 (4), 703–715 (2015).CrossRefGoogle Scholar
  16. 16.
    D. Gragnaniello, G. Poggi, C. Sansone, and L. Verdoliva, “An investigation of local descriptors for biometric spoofing detection,” IEEE Trans. Inf. For. Secur. 10 (4), 849–863 (2015).CrossRefGoogle Scholar
  17. 17.
    J. Galbally, J. Ortiz–Lopez, J. Fierrez, and J. Ortega–Garcia, “Iris liveness detection based on quality related features,” in Proc. 2012 5th IAPR Int. Conf. on Biometrics (ICB) (New Delhi, India, 2012), pp. 271–276.CrossRefGoogle Scholar
  18. 18.
    D. Menotti, G. Chiachia, A. Pinto, W. R. Schwartz, H. Pedrini, A. X. Falcao, and A. Rocha, “Deep representations for iris, face, and fingerprint spoofing detection,” IEEE Trans. Inf. For. Secur. 10 (4), 864–879 (2015).CrossRefGoogle Scholar
  19. 19.
    D. Yambay, J. S. Doyle, K. W. Bowyer, A. Czajka, and S. Schuckers, “LivDet–iris 2013 — Iris liveness detection competition 2013,” in Proc. IEEE Int. Joint Conf. on Biometrics (IJCB 2014) (Clearwater, FL, 2014), pp. 1–8.Google Scholar
  20. 20.
    D. Yambay, B. Walczak, and S. Schuckers, and A. Czajka, “LivDet–iris 2015 — Iris liveness detection competition 2015,” in Proc. 2017 IEEE Int. Conf. on Identity, Security and Behavior Analysis (ISBA) (New Delhi, India, 2017), pp. 1–6.Google Scholar
  21. 21.
    D. Yambay, B. Becker, N. Kohli, D. Yadav, A. Czajka, K. W. Bowyer, S. Schuckers, R. Singh, M. Vatsa, A. Noore, et al., “LivDet iris 2017 — Iris liveness detection competition 2017,” in Proc. IEEE Int. Joint Conf. on Biometrics (IJCB 2017) (Denver, CO, US2017), pp. 733–741.Google Scholar
  22. 22.
    A. Sequeira, H. Oliveira, J. C. Monteiro, J. P. Monteiro, and J. Cardoso, “MobILive 2014–Mobile iris liveness detection competition,” in Proc. IEEE Int. Joint Conf. on Biometrics (IJCB 2014) (Clearwater, FL, 2014), pp. 1–6.Google Scholar
  23. 23.
    A. Sequeira, J. Murari, and J. Cardoso, “Iris Liveness detection methods in mobile applications,” in Proc. 9th Int. Conf. on Computer Vision Theory and Applications (VISAPP 2014) (Lisbon, Portugal, 2014), Vol. 3, pp. 22–33.Google Scholar
  24. 24.
    A. G. Howard, M. Zhu, B. Chen, D. Kalenichenko, W. Wang, T. Weyand, M. Andreetto, and H. Adam, “MobileNets: Efficient convolutional neural networks for mobile vision applications,” CoRR abs/1704.04861, arXiv:1704.04861 (2017), URL: http://arxiv.org/abs/v1704.04861Google Scholar
  25. 25.
    J. Galbally and M. Gomez–Barrero, “A review of iris anti–spoofing,” in Proc. 2016 4th Int. Conf. on Biometrics and Forensics (IWBF) (Limassol, Cyprus, 2016), pp. 1–6.Google Scholar
  26. 26.
    H. Li, Z. Sun, M. Zhang, L. Wang, L. Xiao, and T. Tan, “A brief survey on recent progress in iris recognition,” in Biometric Recognition: Proc. 9th Chinese Conference, CCBR 2014, Shenyang, China, November 7–9, 2014, Ed. by Z. Sun, S. Shan, H. Sang, et al., Lecture Notes in Computer Science (Springer, Cham, 2014), Vol. 88.Google Scholar

Copyright information

© Pleiades Publishing, Ltd. 2018

Authors and Affiliations

  • G. Odinokikh
    • 1
  • Iu. Efimov
    • 2
  • I. Solomatin
    • 2
  • M. Korobkin
    • 3
  • I. Matveev
    • 1
  1. 1.Federal Research Center “Computer Science and Control” of Russian Academy of SciencesMoscowRussia
  2. 2.Moscow Institute of Physics and TechnologyDolgoprudnyRussia
  3. 3.National Research University of Electronic TechnologyZelenogradRussia

Personalised recommendations