2019 IEEE 5th International Conference on Identity, Security, and Behavior Analysis (ISBA) 2019
DOI: 10.1109/isba.2019.8778483
|View full text |Cite
|
Sign up to set email alerts
|

Spoofing PRNU Patterns of Iris Sensors while Preserving Iris Recognition

Abstract: The principle of Photo Response Non-Uniformity (PRNU) is used to link an image with its source, i.e., the sensor that produced it. In this work, we investigate if it is possible to modify an iris image acquired using one sensor in order to spoof the PRNU noise pattern of a different sensor. In this regard, we develop an image perturbation routine that iteratively modifies blocks of pixels in the original iris image such that its PRNU pattern approaches that of a target sensor. Experiments indicate the efficacy… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 36 publications
0
7
0
Order By: Relevance
“…To address this, our clustering scheme is designed to be agnostic to the GAN(s) used, and is able to extract available fingerprints, even from multiple models. 4 ○ Method should work for images with any type of high-level content (images of faces, animals, objects, etc.) To address this challenge, we use residual image extraction schemes that can effectively suppress high-level content.…”
Section: Methods Basicsmentioning
confidence: 99%
See 3 more Smart Citations
“…To address this, our clustering scheme is designed to be agnostic to the GAN(s) used, and is able to extract available fingerprints, even from multiple models. 4 ○ Method should work for images with any type of high-level content (images of faces, animals, objects, etc.) To address this challenge, we use residual image extraction schemes that can effectively suppress high-level content.…”
Section: Methods Basicsmentioning
confidence: 99%
“…Each time a cluster is updated, we compute a fingerprint (using cluster members), and two clusters are merged if the PCE correlation between their fingerprints is greater than T mer дe . 4 This is done iteratively at each step to grow clusters. By computing correlations using fingerprints, we reduce the risk of random noise impacting our correlation estimates.…”
Section: Detection Pipelinementioning
confidence: 99%
See 2 more Smart Citations
“…Different approaches are proposed in literature to detect such intentional counter forensic attacks, e.g., the "Triangle Test" [92] and more recently Sameer et al [93] proposed a deep learning based CNN model for the detection of counter forensic images. In biometrics, forging of the image identity has only been investigated for iris sensor data by Banerjee et al, [94] and Uhl and Höller [95], where the detection of such attacks is furthermore evaluated in the latter.…”
Section: B Potential Attacks and Prnu Robustnessmentioning
confidence: 99%