Direct attacks using fake images in iris verification

10/30/2021
by   Virginia Ruiz-Albacete, et al.
0

In this contribution, the vulnerabilities of iris-based recognition systems to direct attacks are studied. A database of fake iris images has been created from real iris of the BioSec baseline database. Iris images are printed using a commercial printer and then, presented at the iris sensor. We use for our experiments a publicly available iris recognition system, which some modifications to improve the iris segmentation step. Based on results achieved on different operational scenarios, we show that the system is vulnerable to direct attacks, pointing out the importance of having countermeasures against this type of fraudulent actions.

READ FULL TEXT

page 3

page 4

page 5

page 6

page 8

research
12/31/2019

Segmentation-Aware and Adaptive Iris Recognition

Iris recognition has emerged as one of the most accurate and convenient ...
research
02/03/2017

An Analysis of 1-to-First Matching in Iris Recognition

Iris recognition systems are a mature technology that is widely used thr...
research
10/24/2022

Towards an efficient Iris Recognition System on Embedded Devices

Iris Recognition (IR) is one of the market's most reliable and accurate ...
research
01/06/2013

Stratified SIFT Matching for Human Iris Recognition

This paper proposes an efficient three fold stratified SIFT matching for...
research
05/23/2019

Constrained Design of Deep Iris Networks

Despite the promise of recent deep neural networks in the iris recogniti...
research
03/22/2018

Found a good match: should I keep searching? - Accuracy and Performance in Iris Matching Using 1-to-First Search

Iris recognition is used in many applications around the world, with enr...
research
05/30/2021

Square Kilometre Array : Processing Voluminous MeerKAT Data on IRIS

Processing astronomical data often comes with huge challenges with regar...

Please sign up or login with your details

Forgot password? Click here to reset