Image-Level Iris Morph Attack

Renu Sharma, A. Ross
{"title":"Image-Level Iris Morph Attack","authors":"Renu Sharma, A. Ross","doi":"10.1109/ICIP42928.2021.9506802","DOIUrl":null,"url":null,"abstract":"We investigate the problem of morph attacks in the context of iris biometrics. A morph attack entails the generation of an image that embodies two different identities. This is accomplished by combining, i.e., morphing, two biometric samples pertaining to two different identities. While such an attack is being increasingly studied in the context of face recognition, it has not been widely analyzed in iris recognition. In this work, we perform iris morphing at the image-level and generate morphed iris images using two available datasets (IITD and WVU multi-modal). We demonstrate the vulnerability of three different iris recognition methods to morph attacks with a success rate of over 90% at a false match rate of 0.01%. We also analyze the textural similarity required between the component images to create a successful morphed image. Finally, we provide preliminary results on the detection of morphed iris images.","PeriodicalId":314429,"journal":{"name":"2021 IEEE International Conference on Image Processing (ICIP)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE International Conference on Image Processing (ICIP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIP42928.2021.9506802","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

We investigate the problem of morph attacks in the context of iris biometrics. A morph attack entails the generation of an image that embodies two different identities. This is accomplished by combining, i.e., morphing, two biometric samples pertaining to two different identities. While such an attack is being increasingly studied in the context of face recognition, it has not been widely analyzed in iris recognition. In this work, we perform iris morphing at the image-level and generate morphed iris images using two available datasets (IITD and WVU multi-modal). We demonstrate the vulnerability of three different iris recognition methods to morph attacks with a success rate of over 90% at a false match rate of 0.01%. We also analyze the textural similarity required between the component images to create a successful morphed image. Finally, we provide preliminary results on the detection of morphed iris images.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
图像级虹膜变形攻击
我们研究了虹膜生物识别背景下的变形攻击问题。变形攻击需要生成一个包含两个不同身份的图像。这是通过组合,即变形,属于两个不同身份的两个生物特征样本来完成的。尽管这种攻击在人脸识别领域的研究越来越多,但在虹膜识别领域的研究还不够广泛。在这项工作中,我们在图像级执行虹膜变形,并使用两个可用的数据集(IITD和WVU多模态)生成变形的虹膜图像。我们展示了三种不同的虹膜识别方法对变形攻击的脆弱性,在0.01%的假匹配率下成功率超过90%。我们还分析了组件图像之间的纹理相似性,以创建成功的变形图像。最后,我们提供了变形虹膜图像检测的初步结果。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Deep Color Mismatch Correction In Stereoscopic 3d Images Weakly-Supervised Multiple Object Tracking Via A Masked Center Point Warping Loss A Parameter Efficient Multi-Scale Capsule Network Few Shot Learning For Infra-Red Object Recognition Using Analytically Designed Low Level Filters For Data Representation An Enhanced Reference Structure For Reference Picture Resampling (RPR) In VVC
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1