Video Presentation Attack Detection in Visible Spectrum Iris Recognition Using Magnified Phase Information

The gaining popularity of the visible spectrum iris recognition has sparked the interest in adopting it for various access control applications. Along with the popularity of visible spectrum iris recognition comes the threat of identity spoofing, presentation, or direct attack. This paper presents a...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on information forensics and security Vol. 10; no. 10; pp. 2048 - 2056
Main Authors Raja, K. B., Raghavendra, R., Busch, C.
Format Journal Article
LanguageEnglish
Published New York IEEE 01.10.2015
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text
ISSN1556-6013
1556-6021
DOI10.1109/TIFS.2015.2440188

Cover

Abstract The gaining popularity of the visible spectrum iris recognition has sparked the interest in adopting it for various access control applications. Along with the popularity of visible spectrum iris recognition comes the threat of identity spoofing, presentation, or direct attack. This paper presents a novel scheme for detecting video presentation attacks in visible spectrum iris recognition system by magnifying the phase information in the eye region of the subject. The proposed scheme employs modified Eulerian video magnification (EVM) to enhance the subtle phase information in eye region and novel decision module to classify it as artefact(spoof attack) or normal presentation. The proposed decision module is based on estimating the change of phase information obtained from EVM, specially tailored to detect presentation attacks on video-based iris recognition systems in visible spectrum. The proposed scheme is extensively evaluated on the newly constructed database consisting of 62 unique iris video acquired using two smartphones-iPhone 5S and Nokia Lumia 1020. We also construct the artefact database with 62 iris acquired by replaying normal presentation iris video on iPad with retina display. Extensive evaluation of proposed presentation attack detection (PAD) scheme on the newly constructed database has shown an outstanding performance of average classification error rate = 0% supporting the robustness of the proposed PAD scheme.
AbstractList The gaining popularity of the visible spectrum iris recognition has sparked the interest in adopting it for various access control applications. Along with the popularity of visible spectrum iris recognition comes the threat of identity spoofing, presentation, or direct attack. This paper presents a novel scheme for detecting video presentation attacks in visible spectrum iris recognition system by magnifying the phase information in the eye region of the subject. The proposed scheme employs modified Eulerian video magnification (EVM) to enhance the subtle phase information in eye region and novel decision module to classify it as artefact(spoof attack) or normal presentation. The proposed decision module is based on estimating the change of phase information obtained from EVM, specially tailored to detect presentation attacks on video-based iris recognition systems in visible spectrum. The proposed scheme is extensively evaluated on the newly constructed database consisting of 62 unique iris video acquired using two smartphones--iPhone 5S and Nokia Lumia 1020. We also construct the artefact database with 62 iris acquired by replaying normal presentation iris video on iPad with retina display. Extensive evaluation of proposed presentation attack detection (PAD) scheme on the newly constructed database has shown an outstanding performance of average classification error rate = 0% supporting the robustness of the proposed PAD scheme.
Author Busch, C.
Raja, K. B.
Raghavendra, R.
Author_xml – sequence: 1
  givenname: K. B.
  surname: Raja
  fullname: Raja, K. B.
  email: kiran.raja@hig.no
  organization: Norwegian Biometrics Lab., Gjovik Univ. Coll., Gjovik, Norway
– sequence: 2
  givenname: R.
  surname: Raghavendra
  fullname: Raghavendra, R.
  email: raghavendra.ramachandra@hig.no
  organization: Norwegian Biometrics Lab., Gjovik Univ. Coll., Gjovik, Norway
– sequence: 3
  givenname: C.
  surname: Busch
  fullname: Busch, C.
  email: christoph.busch@hig.no
  organization: Norwegian Biometrics Lab., Gjovik Univ. Coll., Gjovik, Norway
BookMark eNp9kEtPQyEQhYnRxOcPMG5I3Lhp5XGBy9L4bKLRqO32htKhUm-hwu3Cfy9tTRcuzCwYJt85MzmHaDfEAAidUtKnlOjL98HdW58RKvqsqgit6x10QIWQPUkY3d32lO-jw5xnhFQVlfUBmo38BCJ-SZAhdKbzMeCrrjP2E99AB3Y98AGPfPbjFvDboszSco4HyWf8CjZOg19Dw-zDFD-Z8nceJvjlw2TAg-Bimq99j9GeM22Gk9_3CA3vbt-vH3qPz_eD66vHnuVMdj2tGdNcKFITbZjlUC53jNGJY0ZyZw0DIpQBQZRW9ZhoBVJK52qtrVDVmB-hi43vIsWvJeSumftsoW1NgLjMDVWcFIdKVgU9_4PO4jKFcl2hCC-lRF0ouqFsijkncM0i-blJ3w0lzSr9ZpV-s0q_-U2_aNQfjfWbeLtkfPuv8myj9ACw3aQoFVpQ_gNf2pN3
CODEN ITIFA6
CitedBy_id crossref_primary_10_1109_MCE_2016_2522018
crossref_primary_10_1108_SR_08_2015_0136
crossref_primary_10_1109_TCE_2016_7514667
crossref_primary_10_1109_TIFS_2017_2756598
crossref_primary_10_1007_s11042_020_10378_7
crossref_primary_10_1109_TBIOM_2021_3116875
crossref_primary_10_1145_3232849
crossref_primary_10_1145_3355389
crossref_primary_10_1007_s11042_021_11578_5
crossref_primary_10_1109_TIFS_2018_2878542
crossref_primary_10_1016_j_image_2024_117203
Cites_doi 10.1007/s11265-008-0202-x
10.1016/j.imavis.2013.12.014
10.1145/2185520.2335416
10.1109/TIP.2015.2395951
10.1109/CVPR.2001.990517
10.1109/IWBF.2014.6914251
10.1145/2461912.2461966
10.1109/TCSVT.2003.818350
10.1109/CCST.2011.6095949
10.1109/ICB.2012.6199754
10.1016/j.patrec.2014.09.006
10.1109/BIOMS.2014.6951530
10.1109/TIFS.2015.2400393
10.1049/iet-bmt.2011.0009
10.1109/CVPRW.2013.23
10.1109/ICB.2012.6199819
10.1109/ACPR.2013.22
10.1109/BTAS.2013.6712736
10.1109/IJCB.2011.6117503
10.1109/PROC.1981.12022
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Oct 2015
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Oct 2015
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
7SP
7TB
8FD
FR3
JQ2
KR7
L7M
L~C
L~D
F28
DOI 10.1109/TIFS.2015.2440188
DatabaseName IEEE Xplore (IEEE)
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Mechanical & Transportation Engineering Abstracts
Technology Research Database
Engineering Research Database
ProQuest Computer Science Collection
Civil Engineering Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ANTE: Abstracts in New Technology & Engineering
DatabaseTitle CrossRef
Civil Engineering Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Mechanical & Transportation Engineering Abstracts
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Engineering Research Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
ANTE: Abstracts in New Technology & Engineering
DatabaseTitleList Civil Engineering Abstracts

Civil Engineering Abstracts
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1556-6021
EndPage 2056
ExternalDocumentID 3774266971
10_1109_TIFS_2015_2440188
7115951
Genre orig-research
GroupedDBID 0R~
29I
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFS
ACIWK
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
HZ~
IFIPE
IPLJI
JAVBF
LAI
M43
O9-
OCL
P2P
PQQKQ
RIA
RIE
RNS
AAYXX
CITATION
RIG
7SC
7SP
7TB
8FD
FR3
JQ2
KR7
L7M
L~C
L~D
F28
ID FETCH-LOGICAL-c326t-992293570809a2c3e556f221df2a63fca2e057ae507978b097e666ff899c574b3
IEDL.DBID RIE
ISSN 1556-6013
IngestDate Thu Sep 04 15:59:07 EDT 2025
Sat Aug 23 12:47:33 EDT 2025
Tue Jul 01 02:34:10 EDT 2025
Thu Apr 24 23:04:28 EDT 2025
Tue Aug 26 16:50:02 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 10
Keywords spoof
visible iris
biometrics
Replay attack
iris recognition
presentation attack detection
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c326t-992293570809a2c3e556f221df2a63fca2e057ae507978b097e666ff899c574b3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
PQID 1703030758
PQPubID 85506
PageCount 9
ParticipantIDs proquest_miscellaneous_1730057464
ieee_primary_7115951
crossref_primary_10_1109_TIFS_2015_2440188
crossref_citationtrail_10_1109_TIFS_2015_2440188
proquest_journals_1703030758
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2015-Oct.
2015-10-00
20151001
PublicationDateYYYYMMDD 2015-10-01
PublicationDate_xml – month: 10
  year: 2015
  text: 2015-Oct.
PublicationDecade 2010
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on information forensics and security
PublicationTitleAbbrev TIFS
PublicationYear 2015
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref12
(ref24) 2015
ref15
ref14
ref11
ref10
ref17
ref16
ref19
sutra (ref25) 2012
(ref18) 2015
raja (ref2) 2014
ref23
ref26
ref20
ref22
toth (ref6) 2005
ref21
anjos (ref9) 2013; 3
ref27
ref8
ref7
ref4
ref3
ref5
raja (ref1) 2015
References_xml – ident: ref20
  doi: 10.1007/s11265-008-0202-x
– ident: ref17
  doi: 10.1016/j.imavis.2013.12.014
– year: 2015
  ident: ref24
– start-page: 143
  year: 2015
  ident: ref1
  article-title: Multimodal authentication system for smartphones using face, iris and periocular
  publication-title: Proc IEEE Int Conf Biometrics
– ident: ref21
  doi: 10.1145/2185520.2335416
– volume: 3
  start-page: 147
  year: 2013
  ident: ref9
  article-title: Motion-based counter-measures to photo attacks in face recognition
  publication-title: Institute of Engineering and Technology(IET) Biometrics
– ident: ref7
  doi: 10.1109/TIP.2015.2395951
– ident: ref19
  doi: 10.1109/CVPR.2001.990517
– start-page: 970
  year: 2005
  ident: ref6
  publication-title: Anti-Spoofing Iris
– ident: ref16
  doi: 10.1109/IWBF.2014.6914251
– year: 2015
  ident: ref18
  publication-title: Mobile Iris Challenge Evaluation (MICHE I and II)
– ident: ref23
  doi: 10.1145/2461912.2461966
– year: 2012
  ident: ref25
  article-title: A biometric reference system for iris, OSIRIS version 4.1
– ident: ref26
  doi: 10.1109/TCSVT.2003.818350
– ident: ref14
  doi: 10.1109/CCST.2011.6095949
– ident: ref12
  doi: 10.1109/ICB.2012.6199754
– ident: ref4
  doi: 10.1016/j.patrec.2014.09.006
– start-page: 1
  year: 2014
  ident: ref2
  article-title: Smartphone authentication system using periocular biometrics
  publication-title: Proc 13th Int Conf Biometrics Special Interest Group (BIOSIG)
– ident: ref5
  doi: 10.1109/BIOMS.2014.6951530
– ident: ref8
  doi: 10.1109/TIFS.2015.2400393
– ident: ref11
  doi: 10.1049/iet-bmt.2011.0009
– ident: ref13
  doi: 10.1109/CVPRW.2013.23
– ident: ref15
  doi: 10.1109/ICB.2012.6199819
– ident: ref27
  doi: 10.1109/ACPR.2013.22
– ident: ref3
  doi: 10.1109/BTAS.2013.6712736
– ident: ref10
  doi: 10.1109/IJCB.2011.6117503
– ident: ref22
  doi: 10.1109/PROC.1981.12022
SSID ssj0044168
Score 2.316618
Snippet The gaining popularity of the visible spectrum iris recognition has sparked the interest in adopting it for various access control applications. Along with the...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 2048
SubjectTerms Access control
Biometric recognition systems
Biometrics
Classification
Computer information security
Construction
Iris recognition
Modules
Presentation attack detection
Protocols
Replay attack
Robustness
Smart phones
Spoof
Testing
Visible Iris
Visible spectrum
Title Video Presentation Attack Detection in Visible Spectrum Iris Recognition Using Magnified Phase Information
URI https://ieeexplore.ieee.org/document/7115951
https://www.proquest.com/docview/1703030758
https://www.proquest.com/docview/1730057464
Volume 10
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8QwEB7Ukx58i-uLCJ7Ern2lIUdRFxVWxBfeSptOcX10RbsXf70zabqKinhr6bQNnXcz8w3ATsyIx6EqvDwMjUcSkng6KtELshAZzUT7EXcj98-Tk5v47E7eTcDeuBcGEW3xGXb50O7lF0Mz4l9l-4rCF8390pMkZk2vVmt1yas3bW9SJh4lGZHbwQx8vX992rviIi7ZJV_mB3bIyqcPskNVflhi6156c9BvF9ZUlTx2R3XeNe_fMBv_u_J5mHVxpjhoBGMBJrBahLl2hoNwKr0IM18ACZfg4XZQ4FBcfPYkVeKgrjPzKI6wtlVblRhU4nZAmvSEgqfX16-jZ8GD6sVlW4xERLYUQfQzOi8pyhUX9-QuhWt-YopluOkdXx-eeG4ag2coxKs9BrDVkVQUYuosNBHSly7DMCjKMEui0hBzKfbLkAJMykxzXyuk1KgsKaEzUsV5tAJT1bDCVRC5zkjbNSqp8tgvfV0ECSPLSVRJHsiiA37Ln9Q4qHKemPGU2pTF1ymzNGWWpo6lHdgd3_LS4HT8RbzELBoTOu50YKMVgtRp8lsasEkkQyjpru3xZdJB3ljJKhyOmIZB_1WcxGu_P3kdpvn9TRHgBkwRZ3CTgpk637JS_AEy7u6n
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT9wwEB4hONAeeFfd8jJSTxVZ8nIsHxGwWh6LUFkQtyhxJuoCzVYle-HXM-M4CwKEuCXKOLIy73jmG4CfMSMeh6rw8jA0HklI4umoRC_IQmQ0E-1H3I08OE_6V_HJjbyZgd1pLwwi2uIz7PKlPcsvxmbCv8r2FIUvmvul58jvx7Lp1mrtLvn1pvFNysSjNCNyZ5iBr_eGx71LLuOSXfJmfmDHrDx7ITtW5Y0ttg6mtwiDdmtNXcldd1LnXfP4CrXxs3tfggUXaYr9RjSWYQarFVhspzgIp9Qr8PUFJOEq3F6PChyLi-eupErs13Vm7sQh1rZuqxKjSlyPSJfuUfD8-vr_5K_gUfXid1uORES2GEEMMrovKc4VF3_IYQrX_sQUa3DVOxoe9D03j8EzFOTVHkPY6kgqCjJ1FpoI6UuXYRgUZZglUWmIvRT9ZUghJuWmua8VUnJUlpTSGaniPPoGs9W4wu8gcp2RvmtUUuWxX_q6CBLGlpOokjyQRQf8lj-pcWDlPDPjPrVJi69TZmnKLE0dSzvwa7rkX4PU8RHxKrNoSui404GNVghSp8sPacBGkUyhpFU708ekhXy0klU4njANw_6rOIl_vP_mbZjvDwdn6dnx-ek6fOG9NCWBGzBLXMJNCm3qfMtK9BPWYfH0
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Video+Presentation+Attack+Detection+in+Visible+Spectrum+Iris+Recognition+Using+Magnified+Phase+Information&rft.jtitle=IEEE+transactions+on+information+forensics+and+security&rft.date=2015-10-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.issn=1556-6013&rft.eissn=1556-6021&rft.volume=10&rft.issue=10&rft.spage=2048&rft_id=info:doi/10.1109%2FTIFS.2015.2440188&rft.externalDBID=NO_FULL_TEXT&rft.externalDocID=3774266971
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1556-6013&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1556-6013&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1556-6013&client=summon