2010 20th International Conference on Pattern Recognition 2010
DOI: 10.1109/icpr.2010.303
|View full text |Cite
|
Sign up to set email alerts
|

Attacking Iris Recognition: An Efficient Hill-Climbing Technique

Abstract: In this paper we propose a modified hill-climbing attack to iris biometric systems. Applying our technique we are able to effectively gain access to iris biometric systems at very low effort. Furthermore, we demonstrate that reconstructing approximations of original iris images is highly non-trivial.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
1

Year Published

2012
2012
2021
2021

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(12 citation statements)
references
References 5 publications
0
11
1
Order By: Relevance
“…Consequently, the efficiency of classical stochastic gradient descent methods would be at least unclear. Although previous work in [45] partially supports the assumption of smoothness/continuity, this could not be easily substantiated in our case. Therefore, by simultaneously searching for multiple solutions in the solution space, genetic algorithms are more likely to avoid potential minima or even plateaus in the search space (much like simulated annealing schemes).…”
Section: Is a Multiple Of R And W Is A Multiple Of C)contrasting
confidence: 92%
“…Consequently, the efficiency of classical stochastic gradient descent methods would be at least unclear. Although previous work in [45] partially supports the assumption of smoothness/continuity, this could not be easily substantiated in our case. Therefore, by simultaneously searching for multiple solutions in the solution space, genetic algorithms are more likely to avoid potential minima or even plateaus in the search space (much like simulated annealing schemes).…”
Section: Is a Multiple Of R And W Is A Multiple Of C)contrasting
confidence: 92%
“…There are several ways to spoof a biometric system [2], [3]. Indeed, previous studies show at least eight different points of attack [4], [5] that can be divided into two main groups: direct and indirect attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Anti-spoofing systems thus are required in order to reject the spoofing attacks [2]. Biometric systems without an anti-spoofing system pose a greater threat to the security of users' data [3,4]. In previous studies, eight different points have been highlighted regarding spoofing attacks [5,6], and they are categorized into two major groups such as direct attacks and indirect attacks.…”
Section: Introductionmentioning
confidence: 99%