2019
DOI: 10.1007/978-3-319-92627-8_6
|View full text |Cite
|
Sign up to set email alerts
|

Introduction to Iris Presentation Attack Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 15 publications
(5 citation statements)
references
References 41 publications
0
5
0
Order By: Relevance
“…Biometry can similarly be attacked by replaying recorded or artificially generated data during enrollment. For instance, wearing cosmetic contact lenses during enrollment with an iris scanner can cause the scanner to accept other individuals who wear the same contact lens as false positives [37].…”
Section: Discussionmentioning
confidence: 99%
“…Biometry can similarly be attacked by replaying recorded or artificially generated data during enrollment. For instance, wearing cosmetic contact lenses during enrollment with an iris scanner can cause the scanner to accept other individuals who wear the same contact lens as false positives [37].…”
Section: Discussionmentioning
confidence: 99%
“…Subsequently, this acquired data is utilized to generate a replica image, either in two-dimensional or three-dimensional form. Such a replica can then be transformed into a mask or overlay, enabling an imposter to assume the identity of the victim [9]…”
Section: Different Types Of Attacks In Fvrsmentioning
confidence: 99%
“…Fingerprint designs are exclusive to everyone, and the likelihood that two individuals will have identical ngerprints is an exceptional case of approximately one in sixty-four thousand million from birth to death [16]. One of the most often used biometric recognition methods in biometric technology is the iris [17]. Since the earliest Dougman publication proposed the iris as a biological feature [18].…”
Section: Biometrics Informationmentioning
confidence: 99%