Addressing the presentation attacks using periocular region for smartphone biometrics

Addressing the presentation attacks using periocular region for smartphone biometrics

For access to this article, please select a purchase option:

Buy chapter PDF
(plus tax if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
Mobile Biometrics — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

In this chapter, we have explored presentation attacks in ocular biometric system on smartphones in the visible spectrum. We have discussed both kind of attacks - print attacks and electronic screen attacks. We have employed two publicly available databases that correspond to large-scale image-based artefact, MobiLive 2014 dataset, and for video-based artefacts, PAVID dataset.

Chapter Contents:

  • 13.1 Introduction
  • 13.2 Database
  • 13.2.1 MobILive 2014 Database
  • 13.2.2 PAVID Database
  • PAVID - Bona Fide iris video database
  • PAVID - attack iris video database
  • 13.3 Vulnerabilities towards presentation attacks
  • 13.3.1 Vulnerability analysis using the PAVID
  • 13.4 PAD techniques
  • 13.4.1 Metrics for PAD algorithms
  • 13.4.2 Texture features for PAD
  • Image quality features
  • Texture features from LBP
  • Texture features from binarized statistical image features
  • Laplacian pyramid frequency response features
  • 13.5 Experiments and results
  • 13.5.1 Results on MobiLive 2014 database
  • 13.5.2 Results on the PAVID database
  • 13.6 Discussions and conclusion
  • Acknowledgments
  • References

Inspec keywords: iris recognition; video signal processing; smart phones

Other keywords: electronic screen attacks; presentation attacks; image-based artefact; smartphones; print attacks; MobiLive 2014 dataset; PAVID dataset; video-based artefacts; periocular region

Subjects: Ubiquitous and pervasive computing; Image recognition; Video signal processing; Computer vision and image processing techniques

Preview this chapter:
Zoom in

Addressing the presentation attacks using periocular region for smartphone biometrics, Page 1 of 2

| /docserver/preview/fulltext/books/sc/pbse003e/PBSE003E_ch13-1.gif /docserver/preview/fulltext/books/sc/pbse003e/PBSE003E_ch13-2.gif

Related content

This is a required field
Please enter a valid email address