Inside risks: the uses and abuses of biometrics
Communications of the ACM
Biometrics, Personal Identification in Networked Society: Personal Identification in Networked Society
Digital Image Processing
An Analysis of Minutiae Matching Strength
AVBPA '01 Proceedings of the Third International Conference on Audio- and Video-Based Biometric Person Authentication
IEEE Transactions on Pattern Analysis and Machine Intelligence
Biometrics: a tool for information security
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Circuits and Systems for Video Technology
A high performance fingerprint liveness detection method based on quality related features
Future Generation Computer Systems
Computer Vision and Image Understanding
Pattern Recognition Letters
Hi-index | 0.00 |
In this contribution, the vulnerabilities of iris-based recognition systems to direct attacks are studied. A database of fake iris images has been created from real iris of the BioSec baseline database. Iris images are printed using a commercial printer and then, presented at the iris sensor. We use for our experiments a publicly available iris recognition system, which some modifications to improve the iris segmentation step. Based on results achieved on different operational scenarios, we show that the system is vulnerable to direct attacks, pointing out the importance of having countermeasures against this type of fraudulent actions.