DocumentCode
84835
Title
Video Presentation Attack Detection in Visible Spectrum Iris Recognition Using Magnified Phase Information
Author
Raja, K.B. ; Raghavendra, R. ; Busch, C.
Author_Institution
Norwegian Biometrics Lab., Gjovik Univ. Coll., Gjovik, Norway
Volume
10
Issue
10
fYear
2015
fDate
Oct. 2015
Firstpage
2048
Lastpage
2056
Abstract
The gaining popularity of the visible spectrum iris recognition has sparked the interest in adopting it for various access control applications. Along with the popularity of visible spectrum iris recognition comes the threat of identity spoofing, presentation, or direct attack. This paper presents a novel scheme for detecting video presentation attacks in visible spectrum iris recognition system by magnifying the phase information in the eye region of the subject. The proposed scheme employs modified Eulerian video magnification (EVM) to enhance the subtle phase information in eye region and novel decision module to classify it as artefact(spoof attack) or normal presentation. The proposed decision module is based on estimating the change of phase information obtained from EVM, specially tailored to detect presentation attacks on video-based iris recognition systems in visible spectrum. The proposed scheme is extensively evaluated on the newly constructed database consisting of 62 unique iris video acquired using two smartphones-iPhone 5S and Nokia Lumia 1020. We also construct the artefact database with 62 iris acquired by replaying normal presentation iris video on iPad with retina display. Extensive evaluation of proposed presentation attack detection (PAD) scheme on the newly constructed database has shown an outstanding performance of average classification error rate = 0% supporting the robustness of the proposed PAD scheme.
Keywords
authorisation; iris recognition; EVM; PAD scheme; access control; decision module; magnified phase information; modified Eulerian video magnification; presentation attack detection scheme; subtle phase information; video presentation attack detection; video-based iris recognition systems; visible spectrum iris recognition; Databases; Iris recognition; Protocols; Robustness; Smart phones; Testing; Biometrics; Iris recognition; Presentation attack detection; Replay attack; Spoof; Visible Iris; biometrics; iris recognition; presentation attack detection; spoof; visible iris;
fLanguage
English
Journal_Title
Information Forensics and Security, IEEE Transactions on
Publisher
ieee
ISSN
1556-6013
Type
jour
DOI
10.1109/TIFS.2015.2440188
Filename
7115951
Link To Document