{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T11:32:04Z","timestamp":1777462324167,"version":"3.51.4"},"reference-count":54,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2018,4,24]],"date-time":"2018-04-24T00:00:00Z","timestamp":1524528000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Among biometric recognition systems such as fingerprint, finger-vein, or face, the iris recognition system has proven to be effective for achieving a high recognition accuracy and security level. However, several recent studies have indicated that an iris recognition system can be fooled by using presentation attack images that are recaptured using high-quality printed images or by contact lenses with printed iris patterns. As a result, this potential threat can reduce the security level of an iris recognition system. In this study, we propose a new presentation attack detection (PAD) method for an iris recognition system (iPAD) using a near infrared light (NIR) camera image. To detect presentation attack images, we first localized the iris region of the input iris image using circular edge detection (CED). Based on the result of iris localization, we extracted the image features using deep learning-based and handcrafted-based methods. The input iris images were then classified into real and presentation attack categories using support vector machines (SVM). Through extensive experiments with two public datasets, we show that our proposed method effectively solves the iris recognition presentation attack detection problem and produces detection accuracy superior to previous studies.<\/jats:p>","DOI":"10.3390\/s18051315","type":"journal-article","created":{"date-parts":[[2018,4,25]],"date-time":"2018-04-25T03:22:45Z","timestamp":1524626565000},"page":"1315","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Presentation Attack Detection for Iris Recognition System Using NIR Camera Sensor"],"prefix":"10.3390","volume":"18","author":[{"given":"Dat Tien","family":"Nguyen","sequence":"first","affiliation":[{"name":"Division of Electronics and Electrical Engineering, Dongguk University, 30 Pildong-ro 1-gil, Jung-gu, Seoul 100-715, Korea"}]},{"given":"Na Rae","family":"Baek","sequence":"additional","affiliation":[{"name":"Division of Electronics and Electrical Engineering, Dongguk University, 30 Pildong-ro 1-gil, Jung-gu, Seoul 100-715, Korea"}]},{"given":"Tuyen Danh","family":"Pham","sequence":"additional","affiliation":[{"name":"Division of Electronics and Electrical Engineering, Dongguk University, 30 Pildong-ro 1-gil, Jung-gu, Seoul 100-715, Korea"}]},{"given":"Kang Ryoung","family":"Park","sequence":"additional","affiliation":[{"name":"Division of Electronics and Electrical Engineering, Dongguk University, 30 Pildong-ro 1-gil, Jung-gu, Seoul 100-715, Korea"}]}],"member":"1968","published-online":{"date-parts":[[2018,4,24]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/TCSVT.2003.818349","article-title":"An introduction to biometric recognition","volume":"14","author":"Jain","year":"2004","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Nguyen, D.T., Yoon, H.S., Pham, T.D., and Park, K.R. (2017). Spoof detection for finger-vein recognition system using NIR camera. Sensors, 17.","DOI":"10.3390\/s17102261"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/j.patcog.2017.05.021","article-title":"Long range iris recognition: A survey","volume":"72","author":"Nguyen","year":"2017","journal-title":"Pattern Recognit."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1016\/j.ins.2015.04.013","article-title":"A survey on fingerprint minutiae-based local matching for verification and identification: Taxonomy and experimental evaluation","volume":"315","author":"Peralta","year":"2015","journal-title":"Inf. Sci."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"16886","DOI":"10.3390\/s150716866","article-title":"Nonintrusive finger-vein recognition system using NIR images sensor and accuracy analyses according to various factors","volume":"15","author":"Pham","year":"2015","journal-title":"Sensors"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"31339","DOI":"10.3390\/s151229856","article-title":"Bimodal biometric verification using the fusion of palmprint and infrared palm-dorsum vein images","volume":"15","author":"Lin","year":"2015","journal-title":"Sensors"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1049\/iet-bmt.2013.0041","article-title":"Palm-vein recognition with local texture patterns","volume":"3","author":"Mirmohamadsadeghi","year":"2014","journal-title":"IET Biom."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"701","DOI":"10.1109\/THMS.2014.2340578","article-title":"Recent advances on single modal and multimodal face recognition: A survey","volume":"44","author":"Zhou","year":"2014","journal-title":"IEEE Trans. Hum. Mach. Syst."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1117\/1.OE.52.4.047201","article-title":"Enhanced iris recognition method based on multi-unit iris images","volume":"52","author":"Shin","year":"2013","journal-title":"Opt. Eng."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Nguyen, D.T., Pham, T.D., Baek, N.R., and Park, K.R. (2018). Combining deep and handcrafted image features for presentation attack detection in face recognition using visible light camera sensors. Sensors, 18.","DOI":"10.3390\/s18030699"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1049\/iet-bmt.2013.0020","article-title":"Presentation attack detection methods for fingerprint recognition system: A survey","volume":"3","author":"Sousedik","year":"2014","journal-title":"IET Biom."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1530","DOI":"10.1109\/ACCESS.2014.2381273","article-title":"Biometric antispoofing methods: A survey in face recognition","volume":"2","author":"Galbally","year":"2014","journal-title":"IEEE Access"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1401","DOI":"10.1016\/j.dsp.2013.04.001","article-title":"Fake finger-vein image detection based on Fourier and wavelet transforms","volume":"23","author":"Nguyen","year":"2013","journal-title":"Digit. Signal Process."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"710","DOI":"10.1109\/TIP.2013.2292332","article-title":"Image quality assessment for fake biometric detection: Application to iris, fingerprint and face recognition","volume":"23","author":"Galbally","year":"2014","journal-title":"IEEE Trans. Image Process."},{"key":"ref_15","first-page":"1397","article-title":"Deep texture features for robust face spoofing detection","volume":"64","author":"Pires","year":"2017","journal-title":"IEEE Trans. Circuits Syst. II Express Briefs"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1109\/MSP.2015.116","article-title":"Biometric liveness detection: Challenges and research opportunities","volume":"13","author":"Akhtar","year":"2015","journal-title":"IEEE Secur. Priv."},{"key":"ref_17","unstructured":"(2018, March 26). Dongguk Iris Spoof Detection CNN Model (DFSD-CNN) with Algorithm. Available online: http:\/\/dm.dgu.edu\/link.html."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"849","DOI":"10.1109\/TIFS.2015.2404294","article-title":"An investigation of local descriptors for biometric spoofing detection","volume":"10","author":"Gragnaniello","year":"2015","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"1672","DOI":"10.1109\/ACCESS.2015.2477470","article-title":"Robust detection of textured contact lens in iris recognition using BSIF","volume":"3","author":"Doyle","year":"2015","journal-title":"IEEE Access"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1016\/j.patrec.2015.10.010","article-title":"Iris liveness detection using regional features","volume":"82","author":"Hu","year":"2016","journal-title":"Pattern Recognit. Lett."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"716","DOI":"10.1109\/TIFS.2015.2405345","article-title":"Attack of mechanical replicas: Liveness detection with eye movement","volume":"10","author":"Komogortsev","year":"2015","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Raja, K.B., Raghavendra, R., and Busch, C. (2016, January 20\u201322). Color adaptive quantized pattern for presentation attack detection in ocular biometric systems. Proceedings of the ACM International Conference on Security of Information and Networks, Newark, NJ, USA.","DOI":"10.1145\/2947626.2951959"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Silva, P., Luz, E., Baeta, R., Pedrini, H., Falcal, A.X., and Menotti, D. (2015, January 26\u201329). An approach to iris contact lens detection based on deep image representation. Proceedings of the IEEE Conference on Graphics, Patterns and Images, Salvador, Brazil.","DOI":"10.1109\/SIBGRAPI.2015.16"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"864","DOI":"10.1109\/TIFS.2015.2398817","article-title":"Deep representation for iris, face and fingerprint spoofing detection","volume":"10","author":"Menotti","year":"2015","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/TCSVT.2003.818350","article-title":"How iris recognition works","volume":"14","author":"Daugman","year":"2004","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"11177","DOI":"10.1007\/s11042-015-3052-0","article-title":"Periocular-based biometrics robust to eye rotation based on polar coordinates","volume":"76","author":"Cho","year":"2017","journal-title":"Multimed. Tools Appl."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"103102-1","DOI":"10.1117\/1.OE.52.10.103102","article-title":"Improved iris localization by using wide and narrow field of view cameras for iris recognition","volume":"52","author":"Kim","year":"2013","journal-title":"Opt. Eng."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"1262","DOI":"10.1016\/j.patcog.2010.12.005","article-title":"Age estimation using a hierarchical classifier based on global and local facial features","volume":"44","author":"Choi","year":"2011","journal-title":"Pattern Recognit."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"971","DOI":"10.1109\/TPAMI.2002.1017623","article-title":"Multiresolution gray-scale and rotation invariant texture classification with local binary patterns","volume":"24","author":"Ojala","year":"2002","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"21898","DOI":"10.3390\/s150921898","article-title":"Human age estimation method robust to camera sensor and\/or face movement","volume":"15","author":"Nguyen","year":"2015","journal-title":"Sensors"},{"key":"ref_31","unstructured":"Krizhevsky, A., Sutskever, I., and Hinton, G.E. (2012, January 3\u20138). ImageNet classification with deep convolutional neural networks. Proceedings of the Advances in Neural Information Processing Systems, Lake Tahoe, NV, USA."},{"key":"ref_32","unstructured":"Simonyan, K., and Zisserman, A. (2013, January 25\u201327). Very deep convolutional neural networks for large-scale image recognition. Proceedings of the International Conference on Learning Representations, Kunming, China."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., and Sun, J. (2016, January 27\u201330). Deep residual learning for image recognition. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Las Vegas, NV, USA.","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Huang, G., Liu, Z., Weinberger, K.Q., and Van de Maaten, L. (2017, January 22\u201325). Densely connected convolutional networks. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Honolulu, HI, USA.","DOI":"10.1109\/CVPR.2017.243"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Ren, S., He, K., Girshick, R., and Sun, J. (ArXiv, 2016). Faster R-CNN: Towards real-time object detection with region proposal networks, ArXiv.","DOI":"10.1109\/TPAMI.2016.2577031"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Redmon, J., Divvala, S., Girshick, R., and Farhadi, A. (ArXiv, 2016). You only look one: Unified, real-time object detection, ArXiv.","DOI":"10.1109\/CVPR.2016.91"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Taigman, Y., Yang, M., Ranzato, M., and Wolf, L. (2014, January 23\u201328). Deepface: Closing the gap to human-level performance in face verification. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Columbus, OH, USA.","DOI":"10.1109\/CVPR.2014.220"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Levi, G., and Hassner, T. (2015, January 7\u201312). Age and gender classification using convolutional neural networks. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, Boston, MA, USA.","DOI":"10.1109\/CVPRW.2015.7301352"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Gangwar, A., and Joshi, A. (2016, January 25\u201328). DeepIrisNet: Deep iris representation with applications in iris recognition and cross-sensor iris recognition. Proceedings of the IEEE International Conference on Image Processing, Phoenix, AZ, USA.","DOI":"10.1109\/ICIP.2016.7532769"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"18848","DOI":"10.1109\/ACCESS.2017.2784352","article-title":"Iris recognition with off-the-shelf CNN features: A deep learning perspective","volume":"6","author":"Nguyen","year":"2018","journal-title":"IEEE Access"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"1345","DOI":"10.1109\/TKDE.2009.191","article-title":"A survey on transfer learning","volume":"22","author":"Pan","year":"2010","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1145\/1961189.1961199","article-title":"LIBSVM: A library for support vector machines","volume":"2","author":"Chang","year":"2011","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"ref_43","unstructured":"(2018, March 26). LIBSVM Tools for SVM Classification. Available online: https:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm\/."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Nguyen, D.T., Kim, K.W., Hong, H.G., Koo, J.H., Kim, M.C., and Park, K.R. (2017). Gender recognition from human-body images using visible-light and thermal camera videos based on a convolutional neural network for feature extraction. Sensors, 17.","DOI":"10.3390\/s17030637"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1016\/j.patcog.2017.05.025","article-title":"Handcrafted vs. non-handcrafted features for computer vision classification","volume":"71","author":"Nanni","year":"2017","journal-title":"Pattern Recognit."},{"key":"ref_46","unstructured":"ISO\/IEC JTC1 SC37 Biometrics (2014). ISO\/IEC WD 30107-3: 2014 Information Technology\u2014Presentation Attack Detection\u2014Part 3: Testing and Reporting and Classification of Attacks, International Organization for Standardization."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Raghavendra, R., and Busch, C. (2015, January 23\u201327). Presentation attack detection algorithms for finger vein biometrics: A comprehensive study. Proceedings of the 11th International Conference on Signal-Image Technology and Internet-Based Systems, Bangkok, Thailand.","DOI":"10.1109\/SITIS.2015.74"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Yambay, D., Becker, B., Kohli, N., Yadav, D., Czajka, A., Bowyer, K.W., Schuckers, S., Singh, R., Vatsa, M., and Noore, A. (2017, January 1\u20134). LivDet iris 2017\u2014Iris liveness detection competition 2017. Proceedings of the International Conference on Biometrics, Denver, CO, USA.","DOI":"10.1109\/BTAS.2017.8272763"},{"key":"ref_49","unstructured":"(2018, March 26). Deep Learning Matlab Toolbox. Available online: https:\/\/www.mathworks.com\/help\/nnet\/deep-learning-basics.html?s_tid=gn_loc_drop."},{"key":"ref_50","unstructured":"(2018, March 26). Principal Component Analysis Matlab Toolbox. Available online: https:\/\/www.mathworks.com\/help\/stats\/pca.html."},{"key":"ref_51","unstructured":"(2018, March 26). Support Vector Machines (SVM) for Classification. Available online: https:\/\/www.mathworks.com\/help\/stats\/support-vector-machine-classification.html."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Yambay, D., Walczak, B., Schuckers, S., and Czajka, A. (2017, January 22\u201324). LivDet-iris 2015\u2014Iris liveness detection. Proceedings of the IEEE International Conference on Identity, Security and Behavior Analysis, New Delhi, India.","DOI":"10.1109\/ISBA.2017.7947701"},{"key":"ref_53","unstructured":"(2018, March 26). Presentation Attack Video Iris Dataset (PAVID). Available online: http:\/\/nislab.no\/biometrics_lab\/pavid_db."},{"key":"ref_54","unstructured":"Yambay, D., Doyle, J.S., Bowyer, K.W., Czajka, A., and Schucker, S. (October, January 29). LivDet-iris 2013\u2014Iris liveness detection competition 2013. Proceedings of the IEEE International Joint Conference on Biometrics, Clearwater, FL, USA."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/5\/1315\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:01:58Z","timestamp":1760194918000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/5\/1315"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,24]]},"references-count":54,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2018,5]]}},"alternative-id":["s18051315"],"URL":"https:\/\/doi.org\/10.3390\/s18051315","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,4,24]]}}}