Iris Presentation Attack Detection: Where Are We Now?
- URL: http://arxiv.org/abs/2006.13252v2
- Date: Thu, 16 Jul 2020 19:49:43 GMT
- Title: Iris Presentation Attack Detection: Where Are We Now?
- Authors: Aidan Boyd, Zhaoyuan Fang, Adam Czajka, Kevin W. Bowyer
- Abstract summary: This work presents an overview of the most important advances in the area of iris presentation attack detection.
Recent literature can be broken into three categories: traditional "hand-crafted" feature extraction and classification, deep learning-based solutions, and hybrid approaches.
- Score: 14.671313104089906
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: As the popularity of iris recognition systems increases, the importance of
effective security measures against presentation attacks becomes paramount.
This work presents an overview of the most important advances in the area of
iris presentation attack detection published in recent two years.
Newly-released, publicly-available datasets for development and evaluation of
iris presentation attack detection are discussed. Recent literature can be seen
to be broken into three categories: traditional "hand-crafted" feature
extraction and classification, deep learning-based solutions, and hybrid
approaches fusing both methodologies. Conclusions of modern approaches
underscore the difficulty of this task. Finally, commentary on possible
directions for future research is provided.
Related papers
- SoK: Pitfalls in Evaluating Black-Box Attacks [12.152882005660055]
We propose a taxonomy over the threat space spanning the axes of feedback granularity, the access of interactive queries, and the quality and quantity of the auxiliary data available to the attacker.
Our new taxonomy provides three key insights.
arXiv Detail & Related papers (2023-10-26T16:23:40Z) - Robust Saliency-Aware Distillation for Few-shot Fine-grained Visual
Recognition [57.08108545219043]
Recognizing novel sub-categories with scarce samples is an essential and challenging research topic in computer vision.
Existing literature addresses this challenge by employing local-based representation approaches.
This article proposes a novel model, Robust Saliency-aware Distillation (RSaD), for few-shot fine-grained visual recognition.
arXiv Detail & Related papers (2023-05-12T00:13:17Z) - Adversarial Attacks and Defenses in Machine Learning-Powered Networks: A
Contemporary Survey [114.17568992164303]
Adrial attacks and defenses in machine learning and deep neural network have been gaining significant attention.
This survey provides a comprehensive overview of the recent advancements in the field of adversarial attack and defense techniques.
New avenues of attack are also explored, including search-based, decision-based, drop-based, and physical-world attacks.
arXiv Detail & Related papers (2023-03-11T04:19:31Z) - Deep Learning for Iris Recognition: A Survey [66.55441036931555]
We conduct a comprehensive analysis of deep learning techniques developed for two main sub-tasks in iris biometrics: segmentation and recognition.
Third, we delve deep into deep learning techniques for forensic application, especially in post-mortem iris recognition.
Fourth, we review open-source resources and tools in deep learning techniques for iris recognition.
arXiv Detail & Related papers (2022-10-12T01:58:09Z) - MEAD: A Multi-Armed Approach for Evaluation of Adversarial Examples
Detectors [24.296350262025552]
We propose a novel framework, called MEAD, for evaluating detectors based on several attack strategies.
Among them, we make use of three new objectives to generate attacks.
The proposed performance metric is based on the worst-case scenario.
arXiv Detail & Related papers (2022-06-30T17:05:45Z) - Deep Learning meets Liveness Detection: Recent Advancements and
Challenges [3.2011056280404637]
We present a comprehensive survey on the literature related to deep-feature-based FAS methods since 2017.
We cover predominant public datasets for FAS in chronological order, their evolutional progress, and the evaluation criteria.
arXiv Detail & Related papers (2021-12-29T19:24:58Z) - Introduction to Presentation Attack Detection in Iris Biometrics and
Recent Advances [13.393219486444604]
Presentation attacks stand out as some of the most relevant and studied.
In the case of the iris, these attacks include the use of real irises as well as artifacts with different level of sophistication such as photographs or videos.
This chapter introduces iris Presentation Attack Detection (PAD) methods that have been developed to reduce the risk posed by presentation attacks.
arXiv Detail & Related papers (2021-11-24T12:43:06Z) - Introduction to Presentation Attack Detection in Face Biometrics and
Recent Advances [21.674697346594158]
The next pages present the different presentation attacks that a face recognition system can confront.
We make an introduction of the current status of face recognition, its level of deployment, and its challenges.
We review different types of presentation attack methods, from simpler to more complex ones, and in which cases they could be effective.
arXiv Detail & Related papers (2021-11-23T11:19:22Z) - A Review of Adversarial Attack and Defense for Classification Methods [78.50824774203495]
This paper focuses on the generation and guarding of adversarial examples.
It is the hope of the authors that this paper will encourage more statisticians to work on this important and exciting field of generating and defending against adversarial examples.
arXiv Detail & Related papers (2021-11-18T22:13:43Z) - Weakly Supervised Object Localization and Detection: A Survey [145.5041117184952]
weakly supervised object localization and detection plays an important role for developing new generation computer vision systems.
We review (1) classic models, (2) approaches with feature representations from off-the-shelf deep networks, (3) approaches solely based on deep learning, and (4) publicly available datasets and standard evaluation metrics that are widely used in this field.
We discuss the key challenges in this field, development history of this field, advantages/disadvantages of the methods in each category, relationships between methods in different categories, applications of the weakly supervised object localization and detection methods, and potential future directions to further promote the development of this research field
arXiv Detail & Related papers (2021-04-16T06:44:50Z) - Deep Learning for Anomaly Detection: A Review [150.9270911031327]
This paper surveys the research of deep anomaly detection with a comprehensive taxonomy, covering advancements in three high-level categories and 11 fine-grained categories of the methods.
We review their key intuitions, objective functions, underlying assumptions, advantages and disadvantages, and discuss how they address the aforementioned challenges.
arXiv Detail & Related papers (2020-07-06T02:21:16Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.