2 research outputs found

    Detection of Iris Presentation Attacks Using Feature Fusion of Thepade's Sorted Block Truncation Coding with Gray-Level Co-Occurrence Matrix Features.

    Full text link
    Iris biometric detection provides contactless authentication, preventing the spread of COVID-19-like contagious diseases. However, these systems are prone to spoofing attacks attempted with the help of contact lenses, replayed video, and print attacks, making them vulnerable and unsafe. This paper proposes the iris liveness detection (ILD) method to mitigate spoofing attacks, taking global-level features of Thepade's sorted block truncation coding (TSBTC) and local-level features of the gray-level co-occurrence matrix (GLCM) of the iris image. Thepade's SBTC extracts global color texture content as features, and GLCM extracts local fine-texture details. The fusion of global and local content presentation may help distinguish between live and non-live iris samples. The fusion of Thepade's SBTC with GLCM features is considered in experimental validations of the proposed method. The features are used to train nine assorted machine learning classifiers, including naïve Bayes (NB), decision tree (J48), support vector machine (SVM), random forest (RF), multilayer perceptron (MLP), and ensembles (SVM + RF + NB, SVM + RF + RT, RF + SVM + MLP, J48 + RF + MLP) for ILD. Accuracy, precision, recall, and F-measure are used to evaluate the performance of the projected ILD variants. The experimentation was carried out on four standard benchmark datasets, and our proposed model showed improved results with the feature fusion approach. The proposed fusion approach gave 99.68% accuracy using the RF + J48 + MLP ensemble of classifiers, immediately followed by the RF algorithm, which gave 95.57%. The better capability of iris liveness detection will improve human-computer interaction and security in the cyber-physical space by improving person validation

    Detection of Iris Presentation Attacks Using Hybridization of Discrete Cosine Transform and Haar Transform with Machine Learning Classifiers and Ensembles

    Full text link
    Iris biometric identification allows for contactless authentication, which helps to avoid the transmission of diseases like COVID-19. Biometric systems become unstable and hazardous due to spoofing attacks involving contact lenses, replayed video, cadaver iris, synthetic Iris, and printed iris. This work demonstrates the iris presentation attacks detection (Iris-PAD) approach that uses fragmental coefficients of transform iris images as features obtained using Discrete Cosine Transform (DCT), Haar Transform, and hybrid Transform. In experimental validations of the proposed method, three main types of feature creation are investigated. The extracted features are utilized for training seven different machine learning classifiers alias Support Vector Machine (SVM), Naive Bayes (NB), Random Forest (RF), and decision tree(J48) with ensembles of SVM+RF+NB, SVM+RF+RT, and RF+SVM+MLP (multi-layer perceptron) for proposed iris liveness detection. The proposed iris liveness detection variants are evaluated using various statistical measures: accuracy, Attack Presentation Classification Error Rate (APCER), Normal Presentation Classification Error Rate (NPCER), Average Classification Error Rate (ACER). Six standard datasets are used in the investigations. Total nine iris spoofing attacks are getting identified in the proposed method. Among all investigated variations of proposed iris-PAD methods, the 4 ×4 of fragmental coefficients of a Hybrid transformed iris image with RF algorithm have shown superior iris liveness detection with 99.95% accuracy. The proposed hybridization of transform for features extraction has demonstrated the ability to identify all nine types of iris spoofing attacks and proved it robust. The proposed method offers exceptional performances against the Synthetic iris spoofing images by using a random forest classifier. Machine learning has massive potential in a similar domain and could be explored further based on the research requirements
    corecore