scholarly journals Deep Learning-Based Enhanced Presentation Attack Detection for Iris Recognition by Combining Features from Local and Global Regions Based on NIR Camera Sensor

Sensors ◽  
2018 ◽  
Vol 18 (8) ◽  
pp. 2601 ◽  
Author(s):  
Dat Nguyen ◽  
Tuyen Pham ◽  
Young Lee ◽  
Kang Park

Iris recognition systems have been used in high-security-level applications because of their high recognition rate and the distinctiveness of iris patterns. However, as reported by recent studies, an iris recognition system can be fooled by the use of artificial iris patterns and lead to a reduction in its security level. The accuracies of previous presentation attack detection research are limited because they used only features extracted from global iris region image. To overcome this problem, we propose a new presentation attack detection method for iris recognition by combining features extracted from both local and global iris regions, using convolutional neural networks and support vector machines based on a near-infrared (NIR) light camera sensor. The detection results using each kind of image features are fused, based on two fusion methods of feature level and score level to enhance the detection ability of each kind of image features. Through extensive experiments using two popular public datasets (LivDet-Iris-2017 Warsaw and Notre Dame Contact Lens Detection 2015) and their fusion, we validate the efficiency of our proposed method by providing smaller detection errors than those produced by previous studies.

Sensors ◽  
2019 ◽  
Vol 19 (2) ◽  
pp. 410 ◽  
Author(s):  
Dat Nguyen ◽  
Tuyen Pham ◽  
Min Lee ◽  
Kang Park

Face-based biometric recognition systems that can recognize human faces are widely employed in places such as airports, immigration offices, and companies, and applications such as mobile phones. However, the security of this recognition method can be compromised by attackers (unauthorized persons), who might bypass the recognition system using artificial facial images. In addition, most previous studies on face presentation attack detection have only utilized spatial information. To address this problem, we propose a visible-light camera sensor-based presentation attack detection that is based on both spatial and temporal information, using the deep features extracted by a stacked convolutional neural network (CNN)-recurrent neural network (RNN) along with handcrafted features. Through experiments using two public datasets, we demonstrate that the temporal information is sufficient for detecting attacks using face images. In addition, it is established that the handcrafted image features efficiently enhance the detection performance of deep features, and the proposed method outperforms previous methods.


Sensors ◽  
2018 ◽  
Vol 18 (5) ◽  
pp. 1315 ◽  
Author(s):  
Dat Nguyen ◽  
Na Baek ◽  
Tuyen Pham ◽  
Kang Park

2018 ◽  
Vol 51 (4) ◽  
pp. 1-35 ◽  
Author(s):  
Adam Czajka ◽  
Kevin W. Bowyer

2011 ◽  
Vol 186 ◽  
pp. 121-125 ◽  
Author(s):  
Long Xue ◽  
Jing Li ◽  
Mu Hua Liu ◽  
Xiao Wang ◽  
Chun Sheng Luo

Based on Support Vector Machine (SVM) and genetic algorithm (GA), this paper intends to search for the characteristic spectral ranges and wavelengths of near infrared spectroscopy of navel oranges contaminated by different pesticides, and set up recognition models. The pesticides in the experiment were Lannate®L insecticide, fenvalerate and omethoate, and three different concentrations were given to each pesticide. Preparing ten groups of navel oranges, each group was sprayed with a different pesticide and the 10th group without pesticide spraying was used for comparison. Searching the whole spectral range through GA, 5 best spectral ranges (165 wavelengths) were obtained and the recognition rate reached 98.86%. Then based on the chosen spectral ranges, 85 feature wavelengths were extracted with continual GA-SVM optimization, and the recognition rate was 99.14%. Experiment results showed that the application of SVM combining with GA can not only improve recognition accuracy, but also simplify the model effectively


Sign in / Sign up

Export Citation Format

Share Document