Dual Spectral Attention Model for Iris Presentation Attack Detection

被引:0
作者
Al-Rajeh N.S. [1 ]
Al-Shargabi A.A. [1 ]
机构
[1] Department of Information Technology, College of Computer, Qassim University, Buraydah
来源
International Journal of Interactive Mobile Technologies | 2024年 / 18卷 / 10期
关键词
anomaly detection (AD); attack detection; biometric; iris presentation attack detection (PAD); one-class classification; presentation attacks; spoofing;
D O I
10.3991/ijim.v18i10.46981
中图分类号
学科分类号
摘要
The widespread use of iris recognition systems has led to a growing demand for enhanced security measures to counter potential iris presentation attacks, also known as anti-spoofing. To enhance the security and reliability of iris recognition systems, researchers have developed numerous methods for detecting presentation attacks. Most of these methods lack precision in detecting unknown attacks compared to known attacks. In addition, most literature on iris presentation attack detection (PAD) systems utilizes near-infrared (NIR) samples as inputs. These samples produce superior-quality and robust images with less reflection in the cornea of the eye. Despite this, due to the widespread use of smartphones and the necessity for unsupervised identity verification, visible-light samples play a crucial role in detecting presentation attacks. These samples can be easily captured using smartphone cameras. In this paper, a dual-spectral attention model has been developed to train a unified model for multiple real-world attack scenarios. Two different scenarios were tested. In the first scenario, the model was trained as a one-class anomaly detection (AD) approach, while in the second scenario, it was trained as a normal two-class detection approach. This model achieved the best result for the attack presentation classification error rate (APCER) of 4.87% in a one-class AD scenario when tested on the attack dataset, outperforming most studies on the same test dataset. These experimental results suggest that future research opportunities in areas such as working with visible light images, using an AD approach, and focusing on uncontrolled environment samples and synthetic iris images may improve iris detection accuracy. © 2024 by the authors of this article.
引用
收藏
页码:71 / 89
页数:18
相关论文
共 50 条
[41]   Attack detection model for BCoT based on contrastive variational autoencoder and metric learning [J].
Wu, Chunwang ;
Liu, Xiaolei ;
Ding, Kangyi ;
Xin, Bangzhou ;
Lu, Jiazhong ;
Liu, Jiayong ;
Huang, Cheng .
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2024, 13 (01)
[42]   DDoS attack detection and defense based on hybrid deep learning model in SDN [J].
Li C. ;
Wu Y. ;
Qian Z. ;
Sun Z. ;
Wang W. .
2018, Editorial Board of Journal on Communications (39) :176-187
[43]   Covert Attack Detection for LFC Systems of Electric Vehicles: A Dual Time-Varying Coding Method [J].
Wu, Zhihua ;
Tian, Engang ;
Chen, Hongtian .
IEEE-ASME TRANSACTIONS ON MECHATRONICS, 2023, 28 (02) :681-691
[44]   Wormhole attack detection and mitigation model for Internet of Things and WSN using machine learning [J].
Alshehri, Asma Hassan .
PEERJ COMPUTER SCIENCE, 2024, 10
[45]   Wormhole attack detection and mitigation model for Internet of Things and WSN using machine learning [J].
Alshehri, Asma Hassan .
PeerJ Computer Science, 2024, 10 :1-22
[46]   Event-triggered attack detection and state estimation based on Gaussian mixture model [J].
Jiang, Lu ;
Jia, Di ;
Xu, Jiping ;
Zhu, Cui ;
Liu, Kun ;
Xia, Yuanqing .
IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS, 2024, 9 (04) :366-374
[47]   Industrial Control System Attack Detection Model Based on Bayesian Network and Timed Automata [J].
Sun, Ye ;
Wang, Gang ;
Yan, Pei-zhi ;
Zhang, Li-fang ;
Yao, Xu .
BIG DATA, BIGDATA 2021, 2022, 12988 :77-90
[48]   RP-NBSR: A Novel Network Attack Detection Model Based on Machine Learning [J].
Shen, Zihao ;
Wang, Hui ;
Liu, Kun ;
Liu, Peiqian ;
Ba, Menglong ;
Zhao, MengYao .
COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2021, 37 (01) :121-133
[49]   Artificial intelligence enabled Luong Attention and Hosmer Lemeshow Regression Window-based attack detection in 6G [J].
Bhuvaneshwari, B. ;
Balusamy, Balamurugan ;
Dhanaraj, Rajesh Kumar ;
Ravi, Vinayakumar .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2023, 36 (15)
[50]   Attack Detection on Internet of Things via Deep Ensemble Classifier Model with Proposed Feature Set [J].
Rekha, H. ;
Siddappa, M. .
AD HOC & SENSOR WIRELESS NETWORKS, 2025, 60 (1-2) :19-55