A realistic evaluation of iris presentation attack detectionSequeira, A. F., Thavalengal, S., Ferryman, J., Corcoran, P. and Jaime, C. S. (2016) A realistic evaluation of iris presentation attack detection. In: 39th International Conference on Telecommunications and Signal Processing (TSP), 27-29 June 2016, Vienna, Austria, pp. 660-664. Full text not archived in this repository. It is advisable to refer to the publisher's version if you intend to cite from this work. See Guidance on citing. Official URL: https://doi.org/10.1109/TSP.2016.7760965 Abstract/SummaryIris liveness detection methods have been developed to overcome the vulnerability of iris biometric systems to spoofing attacks. In the literature, it is typically assumed that a known attack modality will be perpetrated. Then liveness models are designed using labelled samples from both real/live and fake/spoof distributions, the latter derived from the assumed attack modality. In this work it is argued that a comprehensive modelling of the spoof samples is not possible in a real-world scenario where the attack modality cannot be known with a high degree of certainty. In fact making this assumption will render the liveness detection system more vulnerable to attacks that were not included in the original training. To provide a more realistic evaluation, this work proposes: a) testing the binary models with unknown spoof samples that were not present in the training step; b) the use of a single-class classification designing the classifier by modelling only the distribution of live samples. The results obtained support the assertion that many evaluation methods from the literature are misleading and may lead to optimistic estimates of the robustness of liveness detection in practical use cases.
Funded Project Deposit Details University Staff: Request a correction | Centaur Editors: Update this record |