Reducing bias and inefficiency in the selection algorithm
Proceedings of the Second International Conference on Genetic Algorithms on Genetic algorithms and their application
Genetic Algorithms in Search, Optimization and Machine Learning
Genetic Algorithms in Search, Optimization and Machine Learning
The Design of Innovation: Lessons from and for Competent Genetic Algorithms
The Design of Innovation: Lessons from and for Competent Genetic Algorithms
Handbook of Fingerprint Recognition
Handbook of Fingerprint Recognition
Biometric Recognition: Security and Privacy Concerns
IEEE Security and Privacy
Personal Identification Based on Iris Texture Analysis
IEEE Transactions on Pattern Analysis and Machine Intelligence
An Iris Image Synthesis Method Based on PCA and Super-Resolution
ICPR '04 Proceedings of the Pattern Recognition, 17th International Conference on (ICPR'04) Volume 4 - Volume 04
Biometric Systems: Technology, Design and Performance Evaluation
Biometric Systems: Technology, Design and Performance Evaluation
Style-preserving English handwriting synthesis
Pattern Recognition
From Template to Image: Reconstructing Fingerprints from Minutiae Points
IEEE Transactions on Pattern Analysis and Machine Intelligence
From Scores to Face Templates: A Model-Based Approach
IEEE Transactions on Pattern Analysis and Machine Intelligence
Image understanding for iris biometrics: A survey
Computer Vision and Image Understanding
Direct Attacks Using Fake Images in Iris Verification
Biometrics and Identity Management
Guide to Biometric Reference Systems and Performance Evaluation
Guide to Biometric Reference Systems and Performance Evaluation
Robustness of multimodal biometric fusion methods against spoof attacks
Journal of Visual Languages and Computing
Iris quality assessment and bi-orthogonal wavelet based encoding for recognition
Pattern Recognition
On the vulnerability of face verification systems to hill-climbing attacks
Pattern Recognition
An evaluation of direct attacks using fake fingers generated from ISO templates
Pattern Recognition Letters
Encyclopedia of Biometrics
The Multiscenario Multienvironment BioSecure Multimodal Database (BMDB)
IEEE Transactions on Pattern Analysis and Machine Intelligence
Attacking Iris Recognition: An Efficient Hill-Climbing Technique
ICPR '10 Proceedings of the 2010 20th International Conference on Pattern Recognition
An evaluation of indirect attacks and countermeasures in fingerprint verification systems
Pattern Recognition Letters
Robust and fast assessment of iris image quality
ICB'06 Proceedings of the 2006 international conference on Advances in Biometrics
Synthetic on-line signature generation. Part I: Methodology and algorithms
Pattern Recognition
Synthetic on-line signature generation. Part II: Experimental validation
Pattern Recognition
Biometrics: a tool for information security
IEEE Transactions on Information Forensics and Security
On Generation and Analysis of Synthetic Iris Images
IEEE Transactions on Information Forensics and Security
Visual Cryptography for Biometric Privacy
IEEE Transactions on Information Forensics and Security
New Methods in Iris Recognition
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Fingerprint Image Reconstruction from Standard Templates
IEEE Transactions on Pattern Analysis and Machine Intelligence
A high performance fingerprint liveness detection method based on quality related features
Future Generation Computer Systems
IEEE Transactions on Circuits and Systems for Video Technology
How to Generate Spoofed Irises From an Iris Code Template
IEEE Transactions on Information Forensics and Security
Hi-index | 0.00 |
A binary iriscode is a very compact representation of an iris image. For a long time it was assumed that the iriscode did not contain enough information to allow for the reconstruction of the original iris. The present work proposes a novel probabilistic approach based on genetic algorithms to reconstruct iris images from binary templates and analyzes the similarity between the reconstructed synthetic iris image and the original one. The performance of the reconstruction technique is assessed by empirically estimating the probability of successfully matching the synthesized iris image against its true counterpart using a commercial matcher. The experimental results indicate that the reconstructed images look reasonably realistic. While a human expert may not be easily deceived by them, they can successfully deceive a commercial matcher. Furthermore, since the proposed methodology is able to synthesize multiple iris images from a single iriscode, it has other potential applications including privacy enhancement of iris-based systems.