Direct attacks using fake images in iris verification
2008 (English)In: Biometrics and Identity Management / [ed] Ben Schouten, Berlin: Springer Berlin/Heidelberg, 2008, Vol. Springer LNCS-5372, 181-190 p.Conference paper (Refereed)
In this contribution, the vulnerabilities of iris-based recognition systems to direct attacks are studied. A database of fake iris images has been created from real iris of the BioSec baseline database. Iris images are printed using a commercial printer and then, presented at the iris sensor. We use for our experiments a publicly available iris recognition system, which some modifications to improve the iris segmentation step. Based on results achieved on different operational scenarios, we show that the system is vulnerable to direct attacks, pointing out the importance of having countermeasures against this type of fraudulent actions. © 2008 Springer Berlin Heidelberg.
Place, publisher, year, edition, pages
Berlin: Springer Berlin/Heidelberg, 2008. Vol. Springer LNCS-5372, 181-190 p.
, Lecture Notes in Computer Science, ISSN 0302-9743 ; 5372
Biometrics, Direct attacks, Fake iris, Iris recognition
IdentifiersURN: urn:nbn:se:hh:diva-21247DOI: 10.1007/978-3-540-89991-4_19ISI: 000264154300019ScopusID: 2-s2.0-59149087002ISBN: 978-354089990-7OAI: oai:DiVA.org:hh-21247DiVA: diva2:589368
1st European Workshop on Biometrics and Identity Management, BIOID 2008, BIOID, Roskilde University, Denmark, 7-9 May 2008