IEEE International Joint Conference on Biometrics 2014
DOI: 10.1109/btas.2014.6996283
|View full text |Cite
|
Sign up to set email alerts
|

LivDet-iris 2013 - Iris Liveness Detection Competition 2013

Abstract: The use of an artificial replica of a biometric characteristic in an attempt to circumvent a system is an example of a biometric presentation attack. Liveness detection is one of the proposed countermeasures, and has been widely implemented in fingerprint and iris recognition systems in recent years to reduce the consequences of spoof attacks. The goal for the Liveness Detection (LivDet) competitions is to compare software-based iris liveness detection methodologies using a standardized testing protocol and la… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
45
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 63 publications
(45 citation statements)
references
References 7 publications
0
45
0
Order By: Relevance
“…The classification output is considered for various frames and the final decision for the entire video is made using majority voting of classification scores obtained on individual frames. As the proposed algorithm is based on frequency localization using Laplacian Pyramids at different scales, we evaluate the robustness of the proposed algorithm to detect the presentation attack in NIR domain also by employing wellknown Warsaw iris dataset from LiveDet 2013 competition [24,3]. The proposed algorithm has indicated its agnostic nature that is independent of the visible spectrum and NIR domain.…”
Section: Introductionmentioning
confidence: 98%
See 1 more Smart Citation
“…The classification output is considered for various frames and the final decision for the entire video is made using majority voting of classification scores obtained on individual frames. As the proposed algorithm is based on frequency localization using Laplacian Pyramids at different scales, we evaluate the robustness of the proposed algorithm to detect the presentation attack in NIR domain also by employing wellknown Warsaw iris dataset from LiveDet 2013 competition [24,3]. The proposed algorithm has indicated its agnostic nature that is independent of the visible spectrum and NIR domain.…”
Section: Introductionmentioning
confidence: 98%
“…A presentation attacks, which is also widely called as spoof attack, is the process of attacking the biometric capture device by presenting the biometric artefacts to gain access in a secure authentication scenario. Many studies such as [5,9,7,16,10,24,3], have investigated presentation attacks on NIR based iris recognition systems specifically for printed artefact presentation at the sensor level.…”
Section: Introductionmentioning
confidence: 99%
“…For instance, the results of Iris Liveness Detection Competition 2013 (LivDet-Iris 2013) [57] demonstrate that cosmetic lenses are indeed much more difficult to detect compared to iris paper printouts. One reason for this is that the artefact is visible only within a very small part of the iris image, whereas usually the whole periocular region corresponds to the artefact in the case of a print attack.…”
Section: Textured Contact Lens Detectionmentioning
confidence: 99%
“…The benchmark datasets contain usually separate folds only for training and testing which may cause bias due to "data peeking". While independent (third-party) evaluations are impossible to arrange without collective evaluations, like LivDet-Iris 2013 [57], the use of pre-defined training, development and test sets would mitigate the effect of tuning the methods on the test data. Unambiguous evaluation protocols would also allow fairer and direct comparison between different studies.…”
Section: On the Evaluation Of Contact Lens Detection Algorithmsmentioning
confidence: 99%
See 1 more Smart Citation