Attacks and Mitigation Techniques for Iris-based Authentication Systems

被引:1
|
作者
Etienne, Laeticia [1 ]
Shahriar, Hossain [1 ]
机构
[1] Kennesaw State Univ, Dept Informat Technol, Kennesaw, GA 30144 USA
关键词
Iris; Authentication system; Classification; LIVENESS DETECTION;
D O I
10.1109/COMPSAC48688.2020.0-120
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Authentication is a key step for accessing resources and services. Currently, there are several ways of performing authentication such as text-based passwords and graphical images. These methods can be circumvented to bypass authentication system. Biometric signatures have been gaining popularity for user authentication. In this paper, we examine various attacks on iris-based authentication system followed by some common examples of mitigation techniques.
引用
收藏
页码:1101 / 1102
页数:2
相关论文
共 50 条
  • [1] An Iris-Based Authentication Framework to Prevent Presentation Attacks
    Shahriar, Hossain
    Haddad, Hisham
    Islam, Mahbubul
    [J]. 2017 IEEE 41ST ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 2, 2017, : 504 - 509
  • [2] Adoption of Iris-Based Authentication
    Mohammadi, S.
    Kaldi, A.
    [J]. IEEM: 2008 INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS 1-3, 2008, : 1582 - 1586
  • [3] Accurate iris boundary detection in iris-based biometric authentication process
    Dey, Somnath
    Samanta, Debasis
    [J]. PATTERN RECOGNITION AND MACHINE INTELLIGENCE, PROCEEDINGS, 2007, 4815 : 600 - 607
  • [4] Fusion of biometric systems using Boolean combination: an application to iris-based authentication
    Granger, Eric
    Khreich, Wael
    Sabourin, Robert
    Gorodnichy, Dmitry O.
    [J]. INTERNATIONAL JOURNAL OF BIOMETRICS, 2012, 4 (03) : 291 - 315
  • [5] Iris-based authentication system with template protection and renewability
    Ercole, Chiara
    Campisi, Patrizio
    Neri, Alessandro
    [J]. OPTICS AND PHOTONICS FOR COUNTERTERRORISM AND CRIME FIGHTING III, 2007, 6741
  • [6] Iris-based continuous authentication in mobile ad hoc network
    Ramkumar, D.
    Annadurai, C.
    Nelson, I
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (08):
  • [7] The Acceptability of Iris-based Authentication for Public Domain: An Instrumental Design
    Jimoh, R. G.
    Shiratuddin, Norshuhada
    [J]. PROCEEDINGS OF KNOWLEDGE MANAGEMENT 5TH INTERNATIONAL CONFERENCE 2010, 2010, : 669 - 673
  • [8] Iris-based personal authentication using a normalized directional energy feature
    Park, CH
    Lee, JJ
    Smith, MJT
    Park, KH
    [J]. AUDIO-AND VIDEO-BASED BIOMETRIC PERSON AUTHENTICATION, PROCEEDINGS, 2003, 2688 : 224 - 232
  • [9] Iris-based remote user authentication scheme using smart cards
    Sun, Hong-Wei
    Lam, Kwok-Yan
    Gu, Ming
    Sun, Jia-Guang
    [J]. 2007 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEMS; VOL 2: SIGNAL PROCESSING, COMPUTATIONAL INTELLIGENCE, CIRCUITS AND SYSTEMS, 2007, : 476 - +
  • [10] EmIr-Auth: Eye Movement and Iris-Based Portable Remote Authentication for Smart Grid
    Ma, Zhuo
    Yang, Yilong
    Liu, Ximeng
    Liu, Yang
    Ma, Siqi
    Ren, Kui
    Yao, Chang
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (10) : 6597 - 6606