Direct Attacks Using Fake Images in Iris Verification
In this contribution, the vulnerabilities of iris-based recognition systems to direct attacks are studied. A database of fake iris images has been created from real iris of the BioSec baseline database. Iris images are printed using a commercial printer and then, presented at the iris sensor. We use for our experiments a publicly available iris recognition system, which some modifications to improve the iris segmentation step. Based on results achieved on different operational scenarios, we show that the system is vulnerable to direct attacks, pointing out the importance of having countermeasures against this type of fraudulent actions.
KeywordsBiometrics iris recognition direct attacks fake iris
Unable to display preview. Download preview PDF.
- 2.Jain, A., Bolle, R., Pankanti, S. (eds.): Biometrics - Personal Identification in Networked Society. Kluwer Academic Publishers, Dordrecht (1999)Google Scholar
- 6.Soutar, C., Gilroy, R., Stoianov, A.: Biometric system performance and security. In: Proc. IEEE Workshop on Automatic Identification Advanced Technologies, AIAT (1999)Google Scholar
- 8.Gonzalez, R., Woods, R.: Digital Image Processing. Addison-Wesley, Reading (2002)Google Scholar
- 9.Masek, L., Kovesi, P.: Matlab source code for a biometric identification system based on iris patterns. The School of Computer Science and Software Engineering, The University of Western Australia (2003)Google Scholar
- 11.Daugman, J.: Anti spoofing liveness detection, http://www.cl.cam.ac.uk/users/jgd1000/countermeasures.pdf
- 12.Pacut, A., Czajka, A.: Aliveness detection for iris biometrics. In: Proc. IEEE Intl. Carnahan Conf. on Security Technology, ICCST, pp. 122–129 (2006)Google Scholar