Mitigating Iris-Based Replay Attacks

In this paper, we present an iris-based access control protocol that is resistant to iris-based replay attacks. This new style of biometric-based access control protocol is similar to the so called, 'one time password' approach used by some conventional username/password access protocols. Our results show that not only is this new type of iris-based access protocol effective, it can also distinguish between when a user attempting to gain access has supplied a poor sample of their iris and when the access control system is experiencing an iris-based replay attack.

[1]  Gerry V. Dozier,et al.  Permutation-based biometric authentication protocols for mitigating replay attacks , 2012, 2012 IEEE Congress on Evolutionary Computation.

[2]  Sakhawat Hossen,et al.  Compound Local Binary Pattern (CLBP) for Rotation Invariant Texture Classification , 2011 .

[3]  Nadia Nedjah,et al.  Evolutionary Computation: from Genetic Algorithms to Genetic Programming , 2006, Genetic Systems Programming.

[4]  Ching Y. Suen,et al.  Iris segmentation using variational level set method , 2011 .

[5]  Gary Marchionini,et al.  A study on video browsing strategies , 1997 .

[6]  Anil K. Jain,et al.  Biometrics of Next Generation: An Overview , 2010 .

[7]  Pedro Larrañaga,et al.  Estimation of Distribution Algorithms , 2002, Genetic Algorithms and Evolutionary Computation.

[8]  Damon L. Woodard,et al.  Comparison of Genetic-based Feature Extraction Methods for Facial Recognition , 2011, MAICS.

[9]  David B. Fogel,et al.  Evolutionary Computation: Towards a New Philosophy of Machine Intelligence , 1995 .

[10]  Karl Ricanek,et al.  Genetic & Evolutionary Biometric Security: Disposable Feature Extractors for Mitigating Biometric Replay Attacks , 2012, CSER.

[11]  Lawrence. Davis,et al.  Handbook Of Genetic Algorithms , 1990 .

[12]  J. A. Lozano,et al.  Estimation of Distribution Algorithms: A New Tool for Evolutionary Computation , 2001 .

[13]  Matti Pietikäinen,et al.  Face Description with Local Binary Patterns: Application to Face Recognition , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[14]  Matti Pietikäinen,et al.  Multiresolution Gray-Scale and Rotation Invariant Texture Classification with Local Binary Patterns , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[15]  Anil K. Jain,et al.  Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.

[16]  Gerry V. Dozier,et al.  Mitigating replay attacks using Darwinian-based Feature Extraction , 2012, 2012 IEEE Symposium on Computational Intelligence for Security and Defence Applications.

[17]  Chris Roberts,et al.  Biometric attack vectors and defences , 2007, Comput. Secur..