Skip to main content

Anti-spoofing, Iris

  • Reference work entry
  • First Online:
Encyclopedia of Biometrics

Synonyms

Liveness detection; Presentation attack detection; Spoofing countermeasures; Spoof detection; Spoof resistance; Vitality tests

Definition

Iris anti-spoofing techniques are designed to counteract physical spoofing attacks launched against iris recognition systems. Such attacks are directed at the sensor level and try to gain access to the system by presenting a physical artifact to the acquisition device. In the case of iris, such artifacts include the use of photographs, video recordings, printed contact lenses, artificial eyes, etc. Iris anti-spoofing mechanisms aim to ascertain that iris images were acquired from a live and authorized user present at the time of transaction.

Introduction

Iris recognition systems are among the most accurate biometric systems available. Additionally, the iris is an internal organ which makes it more robust to spoofing attacks when compared to some of the other biometric technologies, especially fingerprinting and face. This is mainly due to...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 899.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 549.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. R. Bodade, S. Talbar, Fake iris detection: a holistic approach. Int. J. Comput. Appl. 19(2), 1–7 (2011)

    Google Scholar 

  2. R. Chen, X. Lin, T. Ding, Liveness detection for iris recognition using multispectral images. Pattern Recognit. Lett. 33, 1513–1519 (2012)

    Google Scholar 

  3. J.G. Daugman, Recognizing persons by their iris patterns: countermeasures against subterfuge, in Biometrics: Personal Identification in a Networked Society, ed. by A.K. Jain et al. (Springer, New York, 1999)

    Google Scholar 

  4. J. Galbally, J. Ortiz-Lopez, J. Fierrez, J. Ortega-Garcia, Iris liveness detection based on quality related features, in Proceedings of the International Conference on Biometrics (ICB), New Delhi, 2012, pp. 271–276

    Google Scholar 

  5. X. He, S. An, P. Shi, Statistical texture analysis-based approach for fake iris detection using support vector machines, in Proceedings of the IAPR International Conference on Biometrics (ICB), Seoul. LNCS, vol. 4642 (Springer, 2007), pp. 540–546

    Google Scholar 

  6. X. He, Y. Lu, P. Shi, A new fake iris detection method, in Proceedings of the IAPR/IEEE International Conference on Biometrics (ICB), Alghero. LNCS, vol. 5558 (Springer, 2009), pp. 1132–1139

    Google Scholar 

  7. Z. He, Z. Sun, T. Tan, Z. Wei, Efficient iris spoof detection via boosted local binary patterns, in Proceedings of the International Conference on Biometrics (ICB), Alghero, 2009

    Google Scholar 

  8. E.C. Lee, K.R. Park, Fake iris detection based on 3D structure of iris pattern. Int. J. Imaging Syst. Technol. 20, 162–166 (2010)

    Google Scholar 

  9. E.C. Lee, K.R. Park, J. Kim, Fake iris detection by using purkinje image, in Proceedings of the IAPR International Conference on Biometrics (ICB), Hong Kong, 2006, pp. 397–403

    Google Scholar 

  10. E.C. Lee, Y.J. Yo, K.R. Park, Fake iris detection method using purkinje images based on gaze position. Opt. Eng. 47, 067204 (2008)

    Google Scholar 

  11. T. Matsumoto, Artificial fingers and irises: importance of vulnerability analysis, in Proceedings of the 7th International Biometrics Conference, London (Elsevier, 2004)

    Google Scholar 

  12. T. Matsumoto, Assessing the security of advanced biometric systems: finger, vein and iris, in Proceedings of the 10th International Biometrics Conference, London (Elsevier, 2007)

    Google Scholar 

  13. A. Pacut, A. Czajka, Aliveness detection for iris biometrics in Proceedings of the 40th IEEE International Carnahan Conference on Security Technology, Lexington, Kentucky (IEEE, 2006), pp. 122–129

    Google Scholar 

  14. V. Ruiz-Albacete, P. Tome-Gonzalez, F. Alonso-Fernandez, J. Galbally, J. Fierrez, J. Ortega-Garcia, Direct attacks using fake images in iris verification, in Proceedings of the COST 2101 Workshop on Biometrics and Identity Management (BioID), Roskilde. LNCS, vol. 5372 (Springer, 2008), pp. 181–190

    Google Scholar 

  15. L. Thalheim, J. Krissler, P-M. Ziegler, Körperkontrolle: Biometrische Zugangssicherungen auf die Probe gestellt (Body check. Biometric access protection devices and their programs put to the test.). (Heinz Heise Publishing, Hanover, 2002), pp. 114–123

    Google Scholar 

  16. B. Toth, Liveness detection for iris recognition, in Proceedings of the Biometrics and E-Authentication Over Open Networks, Gaithersburg (NIST, 2005)

    Google Scholar 

  17. B. Toth, Biometric liveness detection, in Information Security Bulletin, ISB1008 (CHI Publishing, 2005), pp. 291–297

    Google Scholar 

  18. Z. Wei, X. Qiu, Z. Sun, T. Tan, Counterfeit iris detection based on texture analysis, in Proceedings of the IEEE International Conference on Pattern Recognition (ICPR), Tampa, 2008

    Google Scholar 

  19. H. Zhang, Z. Sun, T. Tan, J. Wang, Learning hierarchical visual codebook for iris liveness detection, in International Joint Conference on Biometrics, Washington, DC, 2011

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer Science+Business Media New York

About this entry

Cite this entry

Toth, A.B., Galbally, J. (2015). Anti-spoofing, Iris. In: Li, S.Z., Jain, A.K. (eds) Encyclopedia of Biometrics. Springer, Boston, MA. https://doi.org/10.1007/978-1-4899-7488-4_179

Download citation

Publish with us

Policies and ethics