IRIS Attack Detection Using Multiscale BSIF and Person Identification
1C.Sajula
Hiyamini
cshiyamini@gmail.com
1PG
Student, Department of Electronics and Communication Engineering, DMI College
of Engineering, Chennai
Abstract- Biometric systems have witnessed a large-scale deployment in a wide range
of security applications. Among the available biometric modalities, iris
recognition is one of the most promising and widely adopted modalities. But
this iris recognition system remains a challenge due to different presentation attacks
that fail to assure the reliability when adopting these systems in real-life. This paper, presented a deep analysis of
presentation attacks on iris recognition systems especially focusing on the
photo print attacks. Also, novel presentation attack detection (PAD) scheme
based on multiscale binarized statistical image features and linear support
vector machines. The input iris image is divided in to periocular and iris
region then convert in to different scales or resolutions then the features are
computed from the multiscale converted image then the Support vector machine
classifier gives the right result according to the input image. The performance
of the proposed PAD scheme is well suitable for real time scenario. Extensive
experiments are carried out on four different publicly available iris artefact
databases that have revealed the outstanding performance of the proposed PAD
scheme when benchmarked with various well-established state-of-the-art schemes.
Finally find the person who are in the database and also can find the specific
person.
Key words- Biometric,
Presentation attack, Binarized image
I.INTRODUCTION
In imaging science, image processing is processing of images using
mathematical operations by using any form of signal processing for which the
input is an image, such a photograph or video frame, the output of image
processing may be either an image or a set of characteristics or parameters
related to the image. Most image processing techniques involve testing the
image as two dimensional signals and applying standard signal processing
technique. Image processing usually refers to digital image processing but
optical and analog image processing is also possible. The acquisition of image
is referred to as imaging. Digital image processing is the use of computer
algorithms to perform image processing on digital images. As a subcategory or
field of digital signal processing, digital image processing has many
advantages over analog image processing. It allows a much wider range of
algorithms to be applied to the input data and can avoid problems such as the
build-up of noise and the signal distortion during processing. Iris recognition
is an automated method of biometric identification that uses mathematical
pattern-recognition techniques on video images of one or both of the irises of
an individual's eyes, whose complex random patterns are unique, stable, and can
be seen from some distance.
Retinal scanning is a different,
ocular-based biometric technology that uses the unique patterns on a person's
retina blood vessels and is often confused with iris recognition. Iris
recognition uses video camera technology with subtle near infrared illumination
to acquire images of the detail-rich, intricate structures of the iris which
are visible externally. Digital templates encoded from these patterns by
mathematical and statistical algorithms allow the identification of an
individual or someone pretending to be that individual. Databases of enrolled
templates are searched by matcher engines at speeds measured in the millions of
templates per second per (single-core) CPU, and with remarkably low false match
rates.
Several hundred millions of persons in
several countries around the world have been enrolled in iris recognition
systems for convenience purposes such as passport-free automated
border-crossings, and some national ID programs. A key advantage of iris
recognition, besides its speed of matching and its extreme resistance to false
matches is the stability of the iris as an internal and protected, yet
externally visible organ of the eye.
An iris-recognition algorithm can
identify up to 200 identification points including rings, furrows and freckles
within the iris. First the system has to localize the inner and outer
boundaries of the iris (pupil and limbus) in an image of an eye. Further
subroutines detect and exclude eyelids, eyelashes, and seculars reflections
that often occlude parts of the iris. The set of pixels containing only the
iris, normalized by a rubber-sheet model to compensate for pupil dilation or
constriction, is then analyzed to extract a bit pattern encoding the
information needed to compare two iris images.
The remainder of the paper is organized as follows. In section 2
the review of the related papers for the field of this work. Next in section 3,
the overview of PAD scheme. In section 4, the performance of detecting the
presentation attack will show in Mat lab. In section 5, the conclusion of this
paper is discussed.
II.RELATED WORKS
The fake detection method that can be
used in multiple biometric systems to detect different types of fraudulent
access attempts. So the new approach has been introduced for the biometric
system. The objective of the proposed system is to enhance the security of
biometric recognition frameworks, by adding liveness assessment in a fast,
user-friendly, and non-intrusive manner, through the use of image quality assessment.
It presents a very low degree of complexity, which makes it suitable for
real-time applications, using 25 general image quality features extracted from
one image (i.e., the same acquired for authentication purposes) to distinguish
between legitimate and impostor samples[5]. The results, obtained on publicly
available data sets of fingerprint, iris, and 2D face, show that the proposed
method is highly competitive compared with other state-of-the-art approaches
and that the analysis of the general image quality of real biometric samples
reveals highly valuable information that may be very efficiently used to
discriminate them from fake traits.
The new fake iris detection methods
based on wavelet packet transform. First, wavelet packet decomposition is used
to extract the feature values which provide unique information for
discriminating fake irises from real ones. Second, to enhance the detecting
accuracy of fake iris, Support vector machine (SVM) is used to characterize the
distribution boundary based on extracted wavelet packet features, for it has
good classification performance in high dimensional space and it is originally
developed for two-class problems. The results indicate the proposed method is
to be a very promising technique for making iris recognition systems more
robust against fake iris spoofing attempts [8].
Iris recognition as a reliable method
for personal identification has been well-studied with the objective to assign
the class label of each iris image to a unique subject[4]. In contrast, iris
image classification aims to classify an iris image to an application specific
category, e.g., iris livens detection (classification of genuine and fake iris
images), race classification (e.g., classification of iris images of Asian and
non-Asian subjects), coarse-to-fine iris identification (classification of all
iris images in the central database into multiple categories). This paper
proposes a general framework for iris image classification based on texture
analysis[6]. A novel texture pattern representation method called Hierarchical
Visual Codebook (HVC) is proposed to encode the texture primitives of iris
images. The proposed HVC method is an integration of two existing Bag-of-Words
models, namely Vocabulary Tree, and Locality-constrained Linear Coding. The HVC
adopts a coarse-to-fine visual coding strategy and takes advantages of both VT
and LLC for accurate and sparse representation of iris texture. The proposed
iris image classification method achieves state-of-the-art performance for iris
liveness detection, race classification, and coarse-to-fine iris
identification. A comprehensive fake iris image database simulating four types
of iris spoof attacks is developed as the benchmark for research of iris liveness
detection [13].
Liveness detection (often referred to
as presentation attack detection) is the ability to detect artificial objects
presented to a biometric device with an intention to subvert the recognition
system[14]. This paper presents the database of iris printout images with a
controlled quality, and its fundamental application, namely development of
liveness detection method for iris recognition. The database gathers images of
only those printouts that were accepted by an example commercial camera, i.e.
the iris template calculated for an artefact was matched to the corresponding
iris reference of the living eye. This means that the quality of the employed
imitations is not accidental and precisely controlled. The database consists of
729 printout images for 243 different eyes, and 1274 images of the authentic
eyes, corresponding to imitations. It may thus serve as a good benchmark for at
least two challenges: a) assessment of the liveness detection algorithms, and
b) assessment of the eagerness of matching real and fake samples by iris
recognition methods. To our best knowledge, the iris printout database of such
properties is the first worldwide published as of today [2].
In its second part, the paper presents an
example application of this database, i.e. the development of liveness
detection method based on iris image frequency analysis. We discuss how to
select frequency windows and regions of interest to make the method sensitive
to “alien frequencies” resulting from the printing process. The proposed method
shows very promising results; since it may be configured to achieve no false
alarms when the rate of accepting the iris printouts is approximately 5% (i.e.
95% of presentation attack trials are correctly identified). This favorable
compares to the results of commercial equipment used in the database
development, as this device accepted all the printouts used. The method employs
the same image as used in iris recognition process, hence no investments into-
the capture devices is required, and may be applied also to other carriers for
printed iris patterns, e.g. contact lens.
III.
OVERVIEW OF PROPOSED SCHEME
Overview of the proposed PAD algorithm
that explores both periocular (eye region) and iris region to accurately
identify the presentation attacks on the iris recognition system. The proposed
scheme can be structured in the following two important components namely:
1)
Multi-Scale Binarized Statistical Image Feature
Extraction
(M-BSIF)
Unsupervised filter learning is widely
used to learn a new filter by exploring the statistics from the natural images.
These methods have emerged as a feasible alternative to the manually design
filters, for instance like Local Binary Patterns (LBP). The most popular
techniques of the unsupervised learning includes: Restricted Boltzmann Machines
(RBMs) Auto-encoders sparse coding and Independent Component Analysis (ICA).
Among these schemes, these of ICA has proved to be a more appealing choice as
it overcomes the tuning of large sets of hyper-parameters and can also provide
a statistically independent basis that in turn can be utilized as the filter to
extract the features from the given image.
The objective of the BSIF is to learn
a set of filters from natural images using a ICA based unsupervised scheme.
These learned filters can be used to represent each pixel of the given image as
a binary string by simply computing its response to the learned filters. The
binary code corresponding to the pixel can be considered as a local descriptor
of the image intensity pattern in the neighborhood of pixel. Finally, the
histogram of the pixels code values allow one to characterize the texture
properties within the image sub-regions. Thus, the applicability of the BSIF
especially for the visible iris presentation attack detection appears to be an
elegant choice as it effectively captures the micro-texture information that
can be used to detect the artefact.
In this work, we have employed the
open-source filters that are trained using 50000 image patches randomly sampled
from 13 different natural scenic images.
The training process to construct BSIF
filters involves three main steps,
a) Mean
subtraction of each patch
b)
Dimensionality reduction using Principle
Component Analysis (PCA)
c)
Estimation of statistically independent
filters (or basis) using Independent Component Analysis (ICA).
2)
Decision Level Fusion
In this work employed 8independent
linear Support Vector Machine (SVM) classifiers corresponding to both iris and
periocular biometrics whose decisions are combined using weighted majority
voting. Out of 8 different linear SVM classifiers, the first four are applied
on periocular and the remaining four on the iris modality. Among four different
linear SVM classifiers that are used on the periocular modality are distributed
such that, one each is used on the three independent M-BSIF features and one on
the feature level fusion of these M-BSIF features..
Fig. 1. Overview of the Proposed PAD Algorithm
Similarly, out of four linear SVM
classifiers that were used on the iris modality, three classifiers are used on
three independent M-BSIF features and one on the feature level fusion of M-BSIF
features. Each of these linear SVM classifiers is first trained using a set of
positive (either with normal (or real) iris or periocular samples) and negative
(or artefact or spoof) samples according to the standard protocol described for
each of the database used in this work
In this work, weights for the
individual classifiers (or experts) are computed according to their performance
such that larger weights are assigned to the expert with high accuracy
advice-versa as mentioned in. The weight assignment scheme will consider the
individual performance of the expert and depending upon performance the method
will compute the weights such that wr= 1. These weights are assigned on the
development dataset from VSIA database and kept constant throughout experiments.
IV. SIMULATION AND RESULTS
Iris biometric systems are highly
vulnerable to presentation attacks that can be carried out using both a photo
print and electronic screen display. In this work, we explored the
vulnerability of iris recognition systems to various presentation attacks.
Further, we also proposed a novel algorithm to accurately detect and mitigate
the presentation attacks on the iris recognition system. To this extent, introduce a new relatively large scale visible
iris artefact database that comprised of 550 normal and 2750 iris artefact
samples. This is one of the important contributions of this work as the VSIA
database will be made available to the research community. We then proposed a
novel scheme based on M-BSIF and the linear SVM technique that emerged as the
best iris presentation attack detection algorithm on both visible and NIR iris
recognition system.
Fig.2.Periocular image
First of all the normal iris image is
taken as the input image. If the image is color means that are converted into
gray scale image. Here the hue and saturation value is eliminated. Then the
grayscale image is converted to binary image. Here the nonzero imaginary parts
are ignored. The high value is marked as 1(white) and the low value is marked
as 0(black). The iris region is presented in the periocular region. The
rectangular box is fixed at the iris region for crop the iris region. Then the
cropped image and the original image are multiplied then truncation and round
off is done. Then the size of the image is finding out and again crops the
image.
Fig.3.Normalization
Then the iris image is normalized by
the image registration technique. Linear and non-linear methods are used to
shape the image. Take the ratio of the inner and outer boundaries of the iris
region. Normalization changes the range of the pixel value. It is used to
improve the iris recognition. Image registration is the process of transforming
different set of data into one co-ordinate system for aligns the image.
Fig.4.Scaling image
The above figure is the scaling output
the different value of the iris image is obtained. Scaling is a linear
transformation that enlarge object by a scalar factor that is the same in all
direction. The result of uniform scaling is similar to the original. More
general is scaling with a separate scale factor for each axis direction. It
also includes the case in which one or more scale factors are equal to zero.
Then the feature selection and feature classification are done. By using the
SVM classifier it will detect the image is fake or not.
Fig.5.Normal output
This is the final output. If there is
any attack is not presented in the iris means it displayed as normal. The mean
value and the dimension values are summed and given the output.
Fig.6.Attack output
This is the attack output. There is
any attack is presented that is color, size, intensity means that will display
the output as the attack by using the principle component analysis. The
database images are already labeled with 1 or -1. The given image is compared
to the database. If the most value is indicated1 means it will display the
positive output otherwise the attack is presented in the iris region.
V.CONCLUSION
Iris biometric system is highly
vulnerable to presentation attacks that can be carried out using either a photo
print or electronic screen display. This work, explored the vulnerability of
iris recognition system to various presentation attacks. Further, we also
proposed a novel algorithm to accurately detect and mitigate the presentation
attacks on the iris recognition system. To this extent, introduce a new
relatively large-scale visible iris artefact database that comprised of 550
normal and 2750 iris artefact samples. This is one of the important
contributions of this work as the VSIA database will be made available to the
research community. The proposed a novel scheme based on M-BSIF and the linear
SVM technique that emerged as the best iris presentation attack detection
algorithm on both visible and NIR iris recognition system.
ACKNOWLEDGEMENT
This work
was carried out under the guidance and support of Mrs. Subah Martina. A, M.E.,
[Assistant professor / ECE], DMI college of Engineering.
REFERENCES
[1]
J Unique Identification Authority
of India. [Online]. Available: http://uidai.gov.in//, accessed Jun. 2014.
[2]
A. Czajka, “Database of iris
printouts and its application: Development of liveness detection method for
iris recognition,” in Proc. 18thInt. Conf. Methods Models Autom. Robot. (MMAR),
Aug. 2013, pp. 28–33.
[3]
J. Daugman, “Iris recognition and
anti-spoofing countermeasures,” in Proc. 7th Int. Biometrics Conf., 2004.
[4]
J. Galbally, S. Marcel, and J.
Fierrez, “Image quality assessment for fake biometric detection: Application to
iris, fingerprint, and face recognition,” IEEE Trans. Image Process., vol. 23,
no. 2, pp. 710–724, Feb. 2014.
[5]
J. Galbally, J. Ortiz-Lopez, J.
Fierrez, and J. Ortega-Garcia, “Iris liveness detection based on quality
related features,” in Proc. 5th IAPR Int. Conf.Biometrics (ICB), Mar./Apr.
2012, pp. 271–276.
[6]
X. He, S. An, and P. Shi, “Statistical texture
analysis-based approach for fake iris detection using support vector machines,”
in Advances in Biometrics (Lecture Notes in Computer Science), vol. 4642, S.-W.
Lee and S. Z. Li, Eds. Berlin, Germany: Springer-Verlag, 2007, pp. 540–546.
[7]
K. Hughes and K. W. Bowyer, “Detection of
contact-lens-based iris biometric spoofs using stereo imaging,” in Proc. 46th
Hawaii Int. Conf.Syst. Sci., Jan. 2013, pp. 1763–1772.
[8]
X. He, Y. Lu, and P. Shi, “A new
fake iris detection method,” in Advances in
Biometrics, vol. 5558, M. Tistarelli and M. S. Nixon, Eds. Berlin, Germany:
Springer-Verlag, 2009, pp. 1132–1139.
[9]
X. He, Y. Lu, and P. Shi, “A fake iris detection method based on
FFT and quality assessment,” in Proc. Chin. Conf. Pattern Recognition, Oct.
2008, pp. 1–4.
[10]
Z. He, Z. Sun, T. Tan, and Z. Wei, “Efficient iris spoof detection
via boosted local binary patterns,” in Advances in Biometrics. Berlin, Germany:
Springer-Verlag, 2009, pp. 1080–1090.
[11]
M. Kanematsu, H. Takano, and K. Nakamura, “Highly reliable
liveness detection method for iris recognition,” in Proc. Annu. Conf. SICE,
Sep. 2007, pp. 361–364.
[12]
E. Lee, K. Park, and J. Kim, “Fake iris detection by using
purkinje image,” in Advances in Biometrics (Lecture Notes in Computer Science),
vol. 3832, D. Zhang and A. K. Jain, Eds. Berlin, Germany: Springer-Verlag,
2005, pp. 397–403.
[13]
S. J. Lee, K. R. Park, and J. Kim, “Robust fake iris detection
based on variation of the reflectance ratio between the iris and the sclera,”
in Proc. Biometric Consortium Conf., Sep./Aug. 2006, pp. 1–6.
[14]
A. F. Sequeira, J. Murari, and J. S. Cardoso, “Iris liveness
detection methods in mobile applications,” in Proc. 9th Int. Conf. Computer.
Vis.Theory Appl., 2013, pp. 1–5.