A realistic evaluation of iris presentation attack detection

Iris liveness detection methods have been developed to overcome the vulnerability of iris biometric systems to spoofing attacks. In the literature, it is typically assumed that a known attack modality will be perpetrated. Then liveness models are designed using labelled samples from both real/live and fake/spoof distributions, the latter derived from the assumed attack modality. In this work it is argued that a comprehensive modelling of the spoof samples is not possible in a real-world scenario where the attack modality cannot be known with a high degree of certainty. In fact making this assumption will render the liveness detection system more vulnerable to attacks that were not included in the original training. To provide a more realistic evaluation, this work proposes: a) testing the binary models with unknown spoof samples that were not present in the training step; b) the use of a single-class classification designing the classifier by modelling only the distribution of live samples. The results obtained support the assertion that many evaluation methods from the literature are misleading and may lead to optimistic estimates of the robustness of liveness detection in practical use cases.

[1]  Robert P. W. Duin,et al.  Support vector domain description , 1999, Pattern Recognit. Lett..

[2]  Richa Singh,et al.  On Iris Spoofing Using Print Attack , 2014, 2014 22nd International Conference on Pattern Recognition.

[3]  Bori Toth Liveness Detection: Iris , 2009, Encyclopedia of Biometrics.

[4]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[5]  Yang Hu,et al.  Iris liveness detection using regional features , 2016, Pattern Recognit. Lett..

[6]  Christoph Busch,et al.  Presentation attack detection methods for fingerprint recognition systems: a survey , 2014, IET Biom..

[7]  Ramachandra Raghavendra,et al.  Robust Scheme for Iris Presentation Attack Detection Using Multiscale Binarized Statistical Image Features , 2015, IEEE Transactions on Information Forensics and Security.

[8]  Tieniu Tan,et al.  Contact Lens Detection Based on Weighted LBP , 2010, 2010 20th International Conference on Pattern Recognition.

[9]  James R. Matey,et al.  Iris on the Move: Acquisition of Images for Iris Recognition in Less Constrained Environments , 2006, Proceedings of the IEEE.

[10]  Carlo Sansone,et al.  On the Robustness of Fingerprint Liveness Detection Algorithms against New Materials used for Spoofing , 2017, BIOSIGNALS.

[11]  Anil Kumar Sao,et al.  Significance of dictionary for sparse coding based face recognition , 2012, 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG).

[12]  Ville Ojansivu,et al.  Blur Insensitive Texture Classification Using Local Phase Quantization , 2008, ICISP.

[13]  Jaime S. Cardoso,et al.  MobILive 2014 - Mobile Iris Liveness Detection Competition , 2014, IEEE International Joint Conference on Biometrics.

[14]  Hugo Proença,et al.  Guest editorial introduction to the special executable issue on "Mobile Iris CHallenge Evaluation part I (MICHE I)" , 2015, Pattern Recognit. Lett..

[15]  Matti Pietikäinen,et al.  Texture Classification using a Linear Configuration Model based Descriptor , 2011, BMVC.

[16]  Jaime S. Cardoso,et al.  Fingerprint Liveness Detection in the Presence of Capable Intruders , 2015, Sensors.

[17]  Kevin W. Bowyer,et al.  Cosmetic Contact Lenses and Iris Recognition Spoofing , 2014, Computer.

[18]  Jaime S. Cardoso,et al.  Iris liveness detection methods in mobile applications , 2014, 2014 International Conference on Computer Vision Theory and Applications (VISAPP).

[19]  Shejin Thavalengal,et al.  Evaluation of combined visible/NIR camera for iris authentication on smartphones , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[20]  Arun Ross,et al.  Open Set Fingerprint Spoof Detection Across Novel Fabrication Materials , 2015, IEEE Transactions on Information Forensics and Security.

[21]  Arun Ross,et al.  Automatic adaptation of fingerprint liveness detector to new spoof materials , 2014, IEEE International Joint Conference on Biometrics.

[22]  Yung-Hui Li,et al.  Heterogeneous IRIS recognition using heterogeneous eigeniris and sparse representation , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).