Securing iris recognition systems against masquerade attacks
Entity
UAM. Departamento de Tecnología Electrónica y de las ComunicacionesPublisher
Society of Photo-Optical Instrumentation EngineersDate
2013-06-04Citation
10.1117/12.2015690
Proc. SPIE 8712, Biometric and Surveillance Technology for Human and Activity Identification X. Ed. Ioannis Kakadiaris; Walter J. Scheirer; Laurence G. Hassebrook; Shishir Shah. 12 June 2013
ISSN
0277-786X (print); 1996-756X (online)ISBN
9780819495037DOI
10.1117/12.2015690Funded by
This work has been partially supported by projects Contexts (S2009/TIC-1485) from CAM, Bio-Challenge (TEC2009-11186) and Bio-Shield (TEC2012-34881) from Spanish MECD, TABULA RASA (FP7-ICT-257289) and BEAT (FP7-SEC-284989) from EU, and Cátedra UAM-Telefónica.Project
Comunidad de Madrid. S2009/TIC-1485/CONTEXTS; info:eu-repo/grantAgreement/EC/FP7/257289; info:eu-repo/grantAgreement/EC/FP7/284989Editor's Version
http://dx.doi.org/10.1117/12.2015690Subjects
Countermeasures; Inverse biometrics; Iris recognition; Security; Vulnerabilities; TelecomunicacionesNote
Javier Galbally ; Marta Gomez-Barrero ; Arun Ross ; Julian Fierrez ; Javier Ortega-Garcia; "Securing iris recognition systems against masquerade attacks", Biometric and Surveillance Technology for Human and Activity Identification X, Proc. SPIE 8712 (May 31, 2013); doi:10.1117/12.2015690. Copyright 2013 Society of Photo‑Optical Instrumentation Engineers. One print or electronic copy may be made for personal use only. Systematic reproduction and distribution, duplication of any material in this paper for a fee or for commercial purposes, or modification of the content of the paper are prohibited.Proceedings of the X Biometric and Surveillance Technology for Human and Activity Identification Conference (Baltimore, Maryland, USA)
Rights
Copyright 2013 Society of Photo-Optical Instrumentation EngineersAbstract
A novel two-stage protection scheme for automatic iris recognition systems against masquerade attacks carried out with synthetically reconstructed iris images is presented. The method uses different characteristics of real iris images to differentiate them from the synthetic ones, thereby addressing important security flaws detected in state-of-the-art commercial systems. Experiments are carried out on the publicly available Biosecure Database and demonstrate the efficacy of the proposed security enhancing approach.
Files in this item
Google Scholar:Galbally Herrero, Javier
-
Gómez-Barrero, Marta
-
Ross, Arun A.
-
Fiérrez Aguilar, Julián
-
Ortega García, Javier
This item appears in the following Collection(s)
Related items
Showing items related by title, author, creator and subject.