Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology 2006
DOI: 10.1109/ccst.2006.313440
|View full text |Cite
|
Sign up to set email alerts
|

Aliveness Detection for IRIS Biometrics

Abstract: Various experiments show an alarming lack of anti-spoofing mechanisms in devices already protecting many sensitive areas all over the world, proving that aliveness detection methods must be quickly included in commercial equipment. To introduce and systemize the topic, the paper begins with a survey of possible types of eye forgery, together with possible countermeasures. The authors introduce three solutions of eye aliveness detection, based on analyses of image frequency spectrum, controlled light reflection… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

1
42
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 74 publications
(43 citation statements)
references
References 6 publications
1
42
0
Order By: Relevance
“…Several works have already studied the robustness of biometric systems against direct attacks, specially fingerprint-and iris-based, including [2,3,6]. In the case of indirect attacks, most of the studies use some kind of variant of the hillclimbing algorithm [4].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Several works have already studied the robustness of biometric systems against direct attacks, specially fingerprint-and iris-based, including [2,3,6]. In the case of indirect attacks, most of the studies use some kind of variant of the hillclimbing algorithm [4].…”
Section: Introductionmentioning
confidence: 99%
“…There are two main types of attacks that may put at risk the security offered by a biometric system: (i) direct attacks, carried out against the sensor using synthetic traits, such as printed iris images or gummy fingers [2]; and (ii) indirect attacks, carried out against some of the inner modules of the system [3,4], and thus requiring for the attacker to have some knowledge about the system (e.g., storage format or matcher used). A more detailed analysis of the vulnerable points of biometric systems is made by Ratha et al in [5].…”
Section: Introductionmentioning
confidence: 99%
“…Different liveness detection algorithms have been proposed for traits such as fingerprint [20][21][22], face [23][24][25], or iris [26][27][28]. These algorithms can broadly be divided into:…”
Section: Related Workmentioning
confidence: 99%
“…In this case some specific device is added to the sensor in order to detect particular properties of a living trait such as the blood pressure [29], the odor [30], or the pupil hippus [27].…”
Section: Related Workmentioning
confidence: 99%
“…[23], [14] and [18] indicate that fingerprint authentication systems suffer from similar weakness. [11], [12] and [19] diagnose the same shortcoming on iris recognition systems. Finally, [5] and [7] address spoofing attacks to speaker biometrics.…”
Section: Introductionmentioning
confidence: 99%