IEEE International Joint Conference on Biometrics 2014
DOI: 10.1109/btas.2014.6996226
|View full text |Cite
|
Sign up to set email alerts
|

Presentation attack detection on visible spectrum iris recognition by exploring inherent characteristics of Light Field Camera

Abstract: Presentation (or spoof) attacks on biometric system is a growing concern that received substantial attention from both academics and industry. In this paper, we present a novel way of addressing a Presentation Attack Detection (PAD) (or spoof detection) by exploiting the inherent characteristics of the Light Field Camera (LFC) for visible spectrum iris biometric system. The proposed PAD algorithm will capture the variation in the depth (or focus) between multiple depth images rendered by the LFC that in turn c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 21 publications
(8 citation statements)
references
References 14 publications
0
8
0
Order By: Relevance
“…Photo attacks are probably the presentation attacks against IRS most studied in the literature [13,48,50,54,58,63]. They simply consist on presenting to the sensor an image of the attacked iris, either printed on a sheet of paper or displayed on a digital screen.…”
Section: Photo and Video Attacksmentioning
confidence: 99%
See 3 more Smart Citations
“…Photo attacks are probably the presentation attacks against IRS most studied in the literature [13,48,50,54,58,63]. They simply consist on presenting to the sensor an image of the attacked iris, either printed on a sheet of paper or displayed on a digital screen.…”
Section: Photo and Video Attacksmentioning
confidence: 99%
“…Nonetheless, it is relatively easy to capture a video in public spaces and the usage of long range sensors open allows video capturing at a distance with high resolution qualities. • Expected impact of the attack: The literature offers a large number of approaches with good detection rates of printed photo attacks [13,48,50,54,58,72]. However, most of these methods exploit the lack of realism/quality of printed images in comparison with bona fide samples.…”
Section: Photo and Video Attacksmentioning
confidence: 99%
See 2 more Smart Citations
“…With this backdrop, in our recent work [21] we presented a preliminary study on presentation attack detection on visible spectrum iris recognition. Our preliminary results carried out on adopting LFC for PAD on visible iris recognition motivated us to extend this work in many directions.…”
Section: Introductionmentioning
confidence: 96%