Video Presentation Attack Detection in Visible Spectrum Iris Recognition Using Magnified Phase Information
The gaining popularity of the visible spectrum iris recognition has sparked the interest in adopting it for various access control applications. Along with the popularity of visible spectrum iris recognition comes the threat of identity spoofing, presentation, or direct attack. This paper presents a...
Saved in:
Published in | IEEE transactions on information forensics and security Vol. 10; no. 10; pp. 2048 - 2056 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.10.2015
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
ISSN | 1556-6013 1556-6021 |
DOI | 10.1109/TIFS.2015.2440188 |
Cover
Abstract | The gaining popularity of the visible spectrum iris recognition has sparked the interest in adopting it for various access control applications. Along with the popularity of visible spectrum iris recognition comes the threat of identity spoofing, presentation, or direct attack. This paper presents a novel scheme for detecting video presentation attacks in visible spectrum iris recognition system by magnifying the phase information in the eye region of the subject. The proposed scheme employs modified Eulerian video magnification (EVM) to enhance the subtle phase information in eye region and novel decision module to classify it as artefact(spoof attack) or normal presentation. The proposed decision module is based on estimating the change of phase information obtained from EVM, specially tailored to detect presentation attacks on video-based iris recognition systems in visible spectrum. The proposed scheme is extensively evaluated on the newly constructed database consisting of 62 unique iris video acquired using two smartphones-iPhone 5S and Nokia Lumia 1020. We also construct the artefact database with 62 iris acquired by replaying normal presentation iris video on iPad with retina display. Extensive evaluation of proposed presentation attack detection (PAD) scheme on the newly constructed database has shown an outstanding performance of average classification error rate = 0% supporting the robustness of the proposed PAD scheme. |
---|---|
AbstractList | The gaining popularity of the visible spectrum iris recognition has sparked the interest in adopting it for various access control applications. Along with the popularity of visible spectrum iris recognition comes the threat of identity spoofing, presentation, or direct attack. This paper presents a novel scheme for detecting video presentation attacks in visible spectrum iris recognition system by magnifying the phase information in the eye region of the subject. The proposed scheme employs modified Eulerian video magnification (EVM) to enhance the subtle phase information in eye region and novel decision module to classify it as artefact(spoof attack) or normal presentation. The proposed decision module is based on estimating the change of phase information obtained from EVM, specially tailored to detect presentation attacks on video-based iris recognition systems in visible spectrum. The proposed scheme is extensively evaluated on the newly constructed database consisting of 62 unique iris video acquired using two smartphones--iPhone 5S and Nokia Lumia 1020. We also construct the artefact database with 62 iris acquired by replaying normal presentation iris video on iPad with retina display. Extensive evaluation of proposed presentation attack detection (PAD) scheme on the newly constructed database has shown an outstanding performance of average classification error rate = 0% supporting the robustness of the proposed PAD scheme. |
Author | Busch, C. Raja, K. B. Raghavendra, R. |
Author_xml | – sequence: 1 givenname: K. B. surname: Raja fullname: Raja, K. B. email: kiran.raja@hig.no organization: Norwegian Biometrics Lab., Gjovik Univ. Coll., Gjovik, Norway – sequence: 2 givenname: R. surname: Raghavendra fullname: Raghavendra, R. email: raghavendra.ramachandra@hig.no organization: Norwegian Biometrics Lab., Gjovik Univ. Coll., Gjovik, Norway – sequence: 3 givenname: C. surname: Busch fullname: Busch, C. email: christoph.busch@hig.no organization: Norwegian Biometrics Lab., Gjovik Univ. Coll., Gjovik, Norway |
BookMark | eNp9kEtPQyEQhYnRxOcPMG5I3Lhp5XGBy9L4bKLRqO32htKhUm-hwu3Cfy9tTRcuzCwYJt85MzmHaDfEAAidUtKnlOjL98HdW58RKvqsqgit6x10QIWQPUkY3d32lO-jw5xnhFQVlfUBmo38BCJ-SZAhdKbzMeCrrjP2E99AB3Y98AGPfPbjFvDboszSco4HyWf8CjZOg19Dw-zDFD-Z8nceJvjlw2TAg-Bimq99j9GeM22Gk9_3CA3vbt-vH3qPz_eD66vHnuVMdj2tGdNcKFITbZjlUC53jNGJY0ZyZw0DIpQBQZRW9ZhoBVJK52qtrVDVmB-hi43vIsWvJeSumftsoW1NgLjMDVWcFIdKVgU9_4PO4jKFcl2hCC-lRF0ouqFsijkncM0i-blJ3w0lzSr9ZpV-s0q_-U2_aNQfjfWbeLtkfPuv8myj9ACw3aQoFVpQ_gNf2pN3 |
CODEN | ITIFA6 |
CitedBy_id | crossref_primary_10_1109_MCE_2016_2522018 crossref_primary_10_1108_SR_08_2015_0136 crossref_primary_10_1109_TCE_2016_7514667 crossref_primary_10_1109_TIFS_2017_2756598 crossref_primary_10_1007_s11042_020_10378_7 crossref_primary_10_1109_TBIOM_2021_3116875 crossref_primary_10_1145_3232849 crossref_primary_10_1145_3355389 crossref_primary_10_1007_s11042_021_11578_5 crossref_primary_10_1109_TIFS_2018_2878542 crossref_primary_10_1016_j_image_2024_117203 |
Cites_doi | 10.1007/s11265-008-0202-x 10.1016/j.imavis.2013.12.014 10.1145/2185520.2335416 10.1109/TIP.2015.2395951 10.1109/CVPR.2001.990517 10.1109/IWBF.2014.6914251 10.1145/2461912.2461966 10.1109/TCSVT.2003.818350 10.1109/CCST.2011.6095949 10.1109/ICB.2012.6199754 10.1016/j.patrec.2014.09.006 10.1109/BIOMS.2014.6951530 10.1109/TIFS.2015.2400393 10.1049/iet-bmt.2011.0009 10.1109/CVPRW.2013.23 10.1109/ICB.2012.6199819 10.1109/ACPR.2013.22 10.1109/BTAS.2013.6712736 10.1109/IJCB.2011.6117503 10.1109/PROC.1981.12022 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Oct 2015 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Oct 2015 |
DBID | 97E RIA RIE AAYXX CITATION 7SC 7SP 7TB 8FD FR3 JQ2 KR7 L7M L~C L~D F28 |
DOI | 10.1109/TIFS.2015.2440188 |
DatabaseName | IEEE Xplore (IEEE) IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Mechanical & Transportation Engineering Abstracts Technology Research Database Engineering Research Database ProQuest Computer Science Collection Civil Engineering Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ANTE: Abstracts in New Technology & Engineering |
DatabaseTitle | CrossRef Civil Engineering Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Mechanical & Transportation Engineering Abstracts Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Engineering Research Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional ANTE: Abstracts in New Technology & Engineering |
DatabaseTitleList | Civil Engineering Abstracts Civil Engineering Abstracts |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science |
EISSN | 1556-6021 |
EndPage | 2056 |
ExternalDocumentID | 3774266971 10_1109_TIFS_2015_2440188 7115951 |
Genre | orig-research |
GroupedDBID | 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFS ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ IFIPE IPLJI JAVBF LAI M43 O9- OCL P2P PQQKQ RIA RIE RNS AAYXX CITATION RIG 7SC 7SP 7TB 8FD FR3 JQ2 KR7 L7M L~C L~D F28 |
ID | FETCH-LOGICAL-c326t-992293570809a2c3e556f221df2a63fca2e057ae507978b097e666ff899c574b3 |
IEDL.DBID | RIE |
ISSN | 1556-6013 |
IngestDate | Thu Sep 04 15:59:07 EDT 2025 Sat Aug 23 12:47:33 EDT 2025 Tue Jul 01 02:34:10 EDT 2025 Thu Apr 24 23:04:28 EDT 2025 Tue Aug 26 16:50:02 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 10 |
Keywords | spoof visible iris biometrics Replay attack iris recognition presentation attack detection |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c326t-992293570809a2c3e556f221df2a63fca2e057ae507978b097e666ff899c574b3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 |
PQID | 1703030758 |
PQPubID | 85506 |
PageCount | 9 |
ParticipantIDs | proquest_miscellaneous_1730057464 ieee_primary_7115951 crossref_primary_10_1109_TIFS_2015_2440188 crossref_citationtrail_10_1109_TIFS_2015_2440188 proquest_journals_1703030758 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2015-Oct. 2015-10-00 20151001 |
PublicationDateYYYYMMDD | 2015-10-01 |
PublicationDate_xml | – month: 10 year: 2015 text: 2015-Oct. |
PublicationDecade | 2010 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | IEEE transactions on information forensics and security |
PublicationTitleAbbrev | TIFS |
PublicationYear | 2015 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 ref12 (ref24) 2015 ref15 ref14 ref11 ref10 ref17 ref16 ref19 sutra (ref25) 2012 (ref18) 2015 raja (ref2) 2014 ref23 ref26 ref20 ref22 toth (ref6) 2005 ref21 anjos (ref9) 2013; 3 ref27 ref8 ref7 ref4 ref3 ref5 raja (ref1) 2015 |
References_xml | – ident: ref20 doi: 10.1007/s11265-008-0202-x – ident: ref17 doi: 10.1016/j.imavis.2013.12.014 – year: 2015 ident: ref24 – start-page: 143 year: 2015 ident: ref1 article-title: Multimodal authentication system for smartphones using face, iris and periocular publication-title: Proc IEEE Int Conf Biometrics – ident: ref21 doi: 10.1145/2185520.2335416 – volume: 3 start-page: 147 year: 2013 ident: ref9 article-title: Motion-based counter-measures to photo attacks in face recognition publication-title: Institute of Engineering and Technology(IET) Biometrics – ident: ref7 doi: 10.1109/TIP.2015.2395951 – ident: ref19 doi: 10.1109/CVPR.2001.990517 – start-page: 970 year: 2005 ident: ref6 publication-title: Anti-Spoofing Iris – ident: ref16 doi: 10.1109/IWBF.2014.6914251 – year: 2015 ident: ref18 publication-title: Mobile Iris Challenge Evaluation (MICHE I and II) – ident: ref23 doi: 10.1145/2461912.2461966 – year: 2012 ident: ref25 article-title: A biometric reference system for iris, OSIRIS version 4.1 – ident: ref26 doi: 10.1109/TCSVT.2003.818350 – ident: ref14 doi: 10.1109/CCST.2011.6095949 – ident: ref12 doi: 10.1109/ICB.2012.6199754 – ident: ref4 doi: 10.1016/j.patrec.2014.09.006 – start-page: 1 year: 2014 ident: ref2 article-title: Smartphone authentication system using periocular biometrics publication-title: Proc 13th Int Conf Biometrics Special Interest Group (BIOSIG) – ident: ref5 doi: 10.1109/BIOMS.2014.6951530 – ident: ref8 doi: 10.1109/TIFS.2015.2400393 – ident: ref11 doi: 10.1049/iet-bmt.2011.0009 – ident: ref13 doi: 10.1109/CVPRW.2013.23 – ident: ref15 doi: 10.1109/ICB.2012.6199819 – ident: ref27 doi: 10.1109/ACPR.2013.22 – ident: ref3 doi: 10.1109/BTAS.2013.6712736 – ident: ref10 doi: 10.1109/IJCB.2011.6117503 – ident: ref22 doi: 10.1109/PROC.1981.12022 |
SSID | ssj0044168 |
Score | 2.316618 |
Snippet | The gaining popularity of the visible spectrum iris recognition has sparked the interest in adopting it for various access control applications. Along with the... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 2048 |
SubjectTerms | Access control Biometric recognition systems Biometrics Classification Computer information security Construction Iris recognition Modules Presentation attack detection Protocols Replay attack Robustness Smart phones Spoof Testing Visible Iris Visible spectrum |
Title | Video Presentation Attack Detection in Visible Spectrum Iris Recognition Using Magnified Phase Information |
URI | https://ieeexplore.ieee.org/document/7115951 https://www.proquest.com/docview/1703030758 https://www.proquest.com/docview/1730057464 |
Volume | 10 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8QwEB7Ukx58i-uLCJ7Ern2lIUdRFxVWxBfeSptOcX10RbsXf70zabqKinhr6bQNnXcz8w3ATsyIx6EqvDwMjUcSkng6KtELshAZzUT7EXcj98-Tk5v47E7eTcDeuBcGEW3xGXb50O7lF0Mz4l9l-4rCF8390pMkZk2vVmt1yas3bW9SJh4lGZHbwQx8vX992rviIi7ZJV_mB3bIyqcPskNVflhi6156c9BvF9ZUlTx2R3XeNe_fMBv_u_J5mHVxpjhoBGMBJrBahLl2hoNwKr0IM18ACZfg4XZQ4FBcfPYkVeKgrjPzKI6wtlVblRhU4nZAmvSEgqfX16-jZ8GD6sVlW4xERLYUQfQzOi8pyhUX9-QuhWt-YopluOkdXx-eeG4ag2coxKs9BrDVkVQUYuosNBHSly7DMCjKMEui0hBzKfbLkAJMykxzXyuk1KgsKaEzUsV5tAJT1bDCVRC5zkjbNSqp8tgvfV0ECSPLSVRJHsiiA37Ln9Q4qHKemPGU2pTF1ymzNGWWpo6lHdgd3_LS4HT8RbzELBoTOu50YKMVgtRp8lsasEkkQyjpru3xZdJB3ljJKhyOmIZB_1WcxGu_P3kdpvn9TRHgBkwRZ3CTgpk637JS_AEy7u6n |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT9wwEB4hONAeeFfd8jJSTxVZ8nIsHxGwWh6LUFkQtyhxJuoCzVYle-HXM-M4CwKEuCXKOLIy73jmG4CfMSMeh6rw8jA0HklI4umoRC_IQmQ0E-1H3I08OE_6V_HJjbyZgd1pLwwi2uIz7PKlPcsvxmbCv8r2FIUvmvul58jvx7Lp1mrtLvn1pvFNysSjNCNyZ5iBr_eGx71LLuOSXfJmfmDHrDx7ITtW5Y0ttg6mtwiDdmtNXcldd1LnXfP4CrXxs3tfggUXaYr9RjSWYQarFVhspzgIp9Qr8PUFJOEq3F6PChyLi-eupErs13Vm7sQh1rZuqxKjSlyPSJfuUfD8-vr_5K_gUfXid1uORES2GEEMMrovKc4VF3_IYQrX_sQUa3DVOxoe9D03j8EzFOTVHkPY6kgqCjJ1FpoI6UuXYRgUZZglUWmIvRT9ZUghJuWmua8VUnJUlpTSGaniPPoGs9W4wu8gcp2RvmtUUuWxX_q6CBLGlpOokjyQRQf8lj-pcWDlPDPjPrVJi69TZmnKLE0dSzvwa7rkX4PU8RHxKrNoSui404GNVghSp8sPacBGkUyhpFU708ekhXy0klU4njANw_6rOIl_vP_mbZjvDwdn6dnx-ek6fOG9NCWBGzBLXMJNCm3qfMtK9BPWYfH0 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Video+Presentation+Attack+Detection+in+Visible+Spectrum+Iris+Recognition+Using+Magnified+Phase+Information&rft.jtitle=IEEE+transactions+on+information+forensics+and+security&rft.date=2015-10-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.issn=1556-6013&rft.eissn=1556-6021&rft.volume=10&rft.issue=10&rft.spage=2048&rft_id=info:doi/10.1109%2FTIFS.2015.2440188&rft.externalDBID=NO_FULL_TEXT&rft.externalDocID=3774266971 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1556-6013&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1556-6013&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1556-6013&client=summon |