“…However, despite the many advantages, iris biometric systems are highly susceptible to presentation attacks, usually referred to as spoofing techniques, that attempt to conceal or impersonate other identities [Kohli et al, 2016, Toosi et al, 2017, Pala and Bhanu, 2017, Czajka and Bowyer, 2018,Sajjad et al, 2019,Tolosana et al, 2020. Examples of typical iris spoofing attacks include printed iris images, video playbacks, artificial eyes, and textured contact lenses.…”