{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T10:22:50Z","timestamp":1763202170991,"version":"build-2065373602"},"reference-count":59,"publisher":"MDPI AG","issue":"8","license":[{"start":{"date-parts":[[2018,8,8]],"date-time":"2018-08-08T00:00:00Z","timestamp":1533686400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["NRF-2017R1C1B5074062","NRF-2016M3A9E1915855","NRF-2018R1D1A1B07041921"],"award-info":[{"award-number":["NRF-2017R1C1B5074062","NRF-2016M3A9E1915855","NRF-2018R1D1A1B07041921"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Iris recognition systems have been used in high-security-level applications because of their high recognition rate and the distinctiveness of iris patterns. However, as reported by recent studies, an iris recognition system can be fooled by the use of artificial iris patterns and lead to a reduction in its security level. The accuracies of previous presentation attack detection research are limited because they used only features extracted from global iris region image. To overcome this problem, we propose a new presentation attack detection method for iris recognition by combining features extracted from both local and global iris regions, using convolutional neural networks and support vector machines based on a near-infrared (NIR) light camera sensor. The detection results using each kind of image features are fused, based on two fusion methods of feature level and score level to enhance the detection ability of each kind of image features. Through extensive experiments using two popular public datasets (LivDet-Iris-2017 Warsaw and Notre Dame Contact Lens Detection 2015) and their fusion, we validate the efficiency of our proposed method by providing smaller detection errors than those produced by previous studies.<\/jats:p>","DOI":"10.3390\/s18082601","type":"journal-article","created":{"date-parts":[[2018,8,9]],"date-time":"2018-08-09T03:33:48Z","timestamp":1533785628000},"page":"2601","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":33,"title":["Deep Learning-Based Enhanced Presentation Attack Detection for Iris Recognition by Combining Features from Local and Global Regions Based on NIR Camera Sensor"],"prefix":"10.3390","volume":"18","author":[{"given":"Dat Tien","family":"Nguyen","sequence":"first","affiliation":[{"name":"Division of Electronics and Electrical Engineering, Dongguk University, 30 Pildong-ro 1-gil, Jung-gu, Seoul 100-715, Korea"}]},{"given":"Tuyen Danh","family":"Pham","sequence":"additional","affiliation":[{"name":"Division of Electronics and Electrical Engineering, Dongguk University, 30 Pildong-ro 1-gil, Jung-gu, Seoul 100-715, Korea"}]},{"given":"Young Won","family":"Lee","sequence":"additional","affiliation":[{"name":"Division of Electronics and Electrical Engineering, Dongguk University, 30 Pildong-ro 1-gil, Jung-gu, Seoul 100-715, Korea"}]},{"given":"Kang Ryoung","family":"Park","sequence":"additional","affiliation":[{"name":"Division of Electronics and Electrical Engineering, Dongguk University, 30 Pildong-ro 1-gil, Jung-gu, Seoul 100-715, Korea"}]}],"member":"1968","published-online":{"date-parts":[[2018,8,8]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Nguyen, D.T., Yoon, H.S., Pham, D.T., and Park, K.R. (2017). Spoof detection for finger-vein recognition system using NIR camera. Sensors, 17.","DOI":"10.3390\/s17102261"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/TCSVT.2003.818349","article-title":"An introduction to biometric recognition","volume":"14","author":"Jain","year":"2004","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"3095","DOI":"10.3390\/s140203095","article-title":"Finger-vein image enhancement using a fuzzy-based fusion method with Gabor and Retinex filtering","volume":"14","author":"Shin","year":"2014","journal-title":"Sensors"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/TCSVT.2003.818350","article-title":"How iris recognition works","volume":"14","author":"Daugman","year":"2004","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1016\/j.csda.2013.05.025","article-title":"Introduction to face recognition and evaluation of algorithm performance","volume":"67","author":"Givens","year":"2013","journal-title":"Comput. Stat. Data. Anal."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"1952","DOI":"10.1109\/TIP.2006.873443","article-title":"Fingerprint recognition by combining global structure and local cues","volume":"15","author":"Gu","year":"2006","journal-title":"IEEE Trans. Image Process."},{"key":"ref_7","first-page":"1397","article-title":"Deep texture features for robust face spoofing detection","volume":"64","author":"Pires","year":"2017","journal-title":"IEEE Trans. Circuits Syst. II Express Briefs"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1537","DOI":"10.3390\/s150101537","article-title":"Face liveness detection using defocus","volume":"15","author":"Kim","year":"2015","journal-title":"Sensors"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"864","DOI":"10.1109\/TIFS.2015.2398817","article-title":"Deep representation for iris, face and fingerprint spoofing detection","volume":"10","author":"Menotti","year":"2015","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"710","DOI":"10.1109\/TIP.2013.2292332","article-title":"Image quality assessment for fake biometric detection: Application to iris, fingerprint and face recognition","volume":"23","author":"Galbally","year":"2014","journal-title":"IEEE Trans. Image Process."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.patrec.2014.09.006","article-title":"Smartphone based visible iris recognition using deep sparse filtering","volume":"57","author":"Raja","year":"2015","journal-title":"Pattern Recognit. Lett."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/j.patcog.2017.05.021","article-title":"Long range iris recognition: A survey","volume":"72","author":"Nguyen","year":"2017","journal-title":"Pattern Recognit."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1012","DOI":"10.1016\/j.patrec.2011.06.017","article-title":"Iris recognition in non-ideal imaging conditions","volume":"33","author":"Li","year":"2012","journal-title":"Pattern Recognit. Lett."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"991","DOI":"10.1016\/j.patrec.2011.08.016","article-title":"New iris recognition method for noisy iris images","volume":"33","author":"Shin","year":"2012","journal-title":"Pattern Recognit. Lett."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"18848","DOI":"10.1109\/ACCESS.2017.2784352","article-title":"Iris recognition with off-the-shelf CNN features: A deep learning perspective","volume":"6","author":"Nguyen","year":"2018","journal-title":"IEEE Access"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"2933","DOI":"10.3390\/s17122933","article-title":"Noisy ocular recognition based on three convolutional neural networks","volume":"17","author":"Lee","year":"2017","journal-title":"Sensors"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1016\/j.patrec.2015.09.016","article-title":"Deepiris: Learning pairwise filter bank for heterogeneous iris verification","volume":"82","author":"Liu","year":"2016","journal-title":"Pattern Recognit. Lett."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Gangwar, A., and Joshi, A. (2016, January 25\u201318). DeepIrisNet: Deep iris representation with application in iris recognition and cross-sensor iris recognition. Proceedings of the IEEE International Conference on Image Processing, Phoenix, AZ, USA.","DOI":"10.1109\/ICIP.2016.7532769"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"783","DOI":"10.1007\/s10044-017-0656-1","article-title":"A multi-biometric iris recognition system based on a deep learning approach","volume":"21","author":"Qahwaji","year":"2018","journal-title":"Pattern Anal. Appl."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Arsalan, M., Hong, H.G., Naqvi, R.A., Lee, M.B., Kim, M.C., Kim, D.S., Kim, C.S., and Park, K.R. (2017). Deep learning-based iris segmentation for iris recognition in visible light environment. Symmetry, 9.","DOI":"10.3390\/sym9110263"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Arsalan, M., Naqvi, R.A., Kim, D.S., Nguyen, P.H., Owais, M., and Park, K.R. (2018). IrisDenseNet: Robust iris segmentation using densely connected fully convolutional networks in the images by visible light and near-infrared light camera sensors. Sensors, 18.","DOI":"10.3390\/s18051501"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"1084","DOI":"10.1109\/TIFS.2014.2322255","article-title":"Spoofing face recognition with 3D masks","volume":"9","author":"Erdorgmus","year":"2014","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Nguyen, D.T., Pham, T.D., Baek, N.R., and Park, K.R. (2018). Combining deep and handcrafted image features for presentation attack detection in face recognition using visible-light camera sensors. Sensors, 18.","DOI":"10.3390\/s18030699"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1401","DOI":"10.1016\/j.dsp.2013.04.001","article-title":"Fake finger-vein image detection based on Fourier and wavelet transforms","volume":"23","author":"Nguyen","year":"2013","journal-title":"Digit. Signal Process."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Nguyen, D.T., Baek, N.R., Pham, D.T., and Park, K.R. (2018). Presentation attack detection for iris recognition system using NIR camera sensor. Sensors, 18.","DOI":"10.3390\/s18051315"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"849","DOI":"10.1109\/TIFS.2015.2404294","article-title":"An investigation of local descriptors for biometric spoofing detection","volume":"10","author":"Gragnaniello","year":"2015","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1672","DOI":"10.1109\/ACCESS.2015.2477470","article-title":"Robust detection of textured contact lens in iris recognition using BSIF","volume":"3","author":"Doyle","year":"2015","journal-title":"IEEE Access"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1016\/j.patrec.2015.10.010","article-title":"Iris liveness detection using regional features","volume":"82","author":"Hu","year":"2016","journal-title":"Pattern Recognit. Lett."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"716","DOI":"10.1109\/TIFS.2015.2405345","article-title":"Attack of mechanical replicas: Liveness detection with eye movement","volume":"10","author":"Komogortsev","year":"2015","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Raja, K.B., Raghavendra, R., and Busch, C. (2016, January 20\u201322). Color adaptive quantized pattern for presentation attack detection in ocular biometric systems. Proceedings of the ACM International Conference on Security of Information and Networks, Newark, NJ, USA.","DOI":"10.1145\/2947626.2951959"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Silva, P., Luz, E., Baeta, R., Pedrini, H., Falcao, A.X., and Menotti, D. (2015, January 26\u201329). An approach to iris contact lens detection based on deep image representation. Proceedings of the IEEE Conference on Graphics, Patterns and Images, Salvador, Brazil.","DOI":"10.1109\/SIBGRAPI.2015.16"},{"key":"ref_32","unstructured":"Yambay, D., Doyle, J.S., Bowyer, K.W., Czajka, A., and Schucker, S. (October, January 29). LivDet-iris 2013\u2014Iris liveness detection competition 2013. Proceedings of the IEEE International Joint Conference on Biometrics, Clearwater, FL, USA."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Yambay, D., Walczak, B., Schuckers, S., and Czajka, A. (2017, January 22\u201324). LivDet-iris 2015\u2014Iris liveness detection. Proceedings of the IEEE International Conference on Identity, Security and Behavior Analysis, New Delhi, India.","DOI":"10.1109\/ISBA.2017.7947701"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Yambay, D., Becker, B., Kohli, N., Yadav, D., Czajka, A., Bowyer, K.W., Schuckers, S., Singh, R., Vatsa, M., and Noore, A. (2017, January 1\u20134). LivDet iris 2017\u2014Iris liveness detection competition 2017. Proceedings of the International Conference on Biometrics, Denver, CO, USA.","DOI":"10.1109\/BTAS.2017.8272763"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"He, L., Li, H., Liu, F., Liu, N., Sun, Z., and He, Z. (2016, January 6\u20139). Multi-patch convolution neural network for iris liveness detection. Proceedings of the IEEE 8th International Conference on Biometrics Theory, Applications and Systems, Buffalo, NY, USA.","DOI":"10.1109\/BTAS.2016.7791186"},{"key":"ref_36","unstructured":"(2018, July 09). Dongguk Iris Spoof Detection CNN Model Version 2 (DFSD-CNN-2) with Algorithm. Available online: http:\/\/dm.dgu.edu\/link.html."},{"key":"ref_37","unstructured":"Krizhevsky, A., Sutskever, I., and Hinton, G.E. (2012, January 3\u20136). ImageNet classification with deep convolutional neural networks. Proceedings of the Advances in Neural Information Processing Systems, Lake Tahoe, NV, USA."},{"key":"ref_38","unstructured":"Simonyan, K., and Zisserman, A. (2015, January 7\u20139). Very deep convolutional neural networks for large-scale image recognition. Proceedings of the International Conference on Learning Representations, San Diego, CA, USA. Available online: https:\/\/arxiv.org\/abs\/1409.1556."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., and Sun, J. (2016, January 27\u201330). Deep residual learning for image recognition. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Las Vegas, NV, USA.","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Huang, G., Liu, Z., Van de Maaten, L., and Weinberger, K.Q. (2017, January 21\u201326). Densely connected convolutional networks. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Honolulu, HI, USA.","DOI":"10.1109\/CVPR.2017.243"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Pham, D.T., Nguyen, D.T., Kim, W., Park, S.H., and Park, K.R. (2018). Deep learning-based banknote fitness classification using the reflection images by a visible-light one-dimensional line image sensor. Sensors, 18.","DOI":"10.3390\/s18020472"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Ren, S., He, K., Girshick, R., and Sun, J. (2016). Faster R-CNN: Towards real-time object detection with region proposal networks. ArXiv.","DOI":"10.1109\/TPAMI.2016.2577031"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Redmon, J., Divvala, S., Girshick, R., and Farhadi, A. (2016). You only look one: Unified, real-time object detection. ArXiv.","DOI":"10.1109\/CVPR.2016.91"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Taigman, Y., Yang, M., Ranzato, M., and Wolf, L. (2014, January 23\u201328). Deepface: Closing the gap to human-level performance in face verification. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Columbus, OH, USA.","DOI":"10.1109\/CVPR.2014.220"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Levi, G., and Hassner, T. (2015, January 7\u201312). Age and gender classification using convolutional neural networks. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, Boston, MA, USA.","DOI":"10.1109\/CVPRW.2015.7301352"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Li, J., Qiu, T., Wen, C., Xie, K., and Wen, F.Q. (2018). Robust face recognition using the deep C2D-CNN model based on decision-level fusion. Sensors, 18.","DOI":"10.3390\/s18072080"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Cheng, C., and Ross, A. (2018, January 15). A multi-task convolutional neural network for joint iris detection and presentation attack detection. Proceedings of the IEEE Winter Applications of Computer Vision Workshops, Lake Tahoe, NV, USA.","DOI":"10.1109\/WACVW.2018.00011"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"2278","DOI":"10.1109\/5.726791","article-title":"Gradient-based learning applied to document recognition","volume":"86","author":"Lecun","year":"1998","journal-title":"Proc. IEEE"},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Nguyen, D.T., Kim, K.W., Hong, H.G., Koo, J.H., Kim, M.C., and Park, K.R. (2017). Gender recognition from human-body images using visible-light and thermal camera videos based on a convolutional neural network for image feature extraction. Sensors, 17.","DOI":"10.3390\/s17030637"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1145\/1961189.1961199","article-title":"LIBSVM: A library for support vector machines","volume":"2","author":"Chang","year":"2011","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"ref_51","unstructured":"(2018, July 10). LIBSVM Tools for SVM Classification. Available online: https:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm\/."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"14093","DOI":"10.3390\/s150614093","article-title":"A high performance banknote recognition system based on a one-dimensional visible light line sensor","volume":"15","author":"Park","year":"2015","journal-title":"Sensors"},{"key":"ref_53","unstructured":"(2018, July 10). Presentation Attack Video Iris Dataset (PAVID). Available online: http:\/\/nislab.no\/biometrics_lab\/pavid_db."},{"key":"ref_54","unstructured":"International Organization for Standardization (2014). ISO\/IEC JTC1 SC37 Biometrics. ISO\/IEC WD 30107\u20133: 2014 Information Technology\u2014Presentation Attack Detection-Part 3: Testing and Reporting and Classification of Attacks, International Organization for Standardization."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Raghavendra, R., and Busch, C. (2015, January 23\u201327). Presentation attack detection algorithms for finger vein biometrics: A comprehensive study. Proceedings of the 11th International Conference on Signal-Image Technology and Internet-based Systems, Bangkok, Thailand.","DOI":"10.1109\/SITIS.2015.74"},{"key":"ref_56","unstructured":"(2018, July 30). NVIDIA TitanX. Available online: https:\/\/www.nvidia.com\/en-us\/titan\/titan-xp\/."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"971","DOI":"10.1109\/TPAMI.2002.1017623","article-title":"Multiresolution gray-scale and rotation invariant texture classification with local binary patterns","volume":"24","author":"Ojala","year":"2002","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1016\/j.patcog.2017.05.025","article-title":"Handcrafted vs. non-hancrafted features for computer vision classification","volume":"71","author":"Nanni","year":"2017","journal-title":"Pattern Recognit."},{"key":"ref_59","unstructured":"Cho, D.H., Park, K.R., Rhee, D.W., Kim, Y., and Yang, J. (2006, January 19\u201320). Pupil and iris localization for iris recognition in mobile phones. Proceedings of the 7th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel\/Distributed Computing, Las Vegas, NV, USA."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/8\/2601\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:17:26Z","timestamp":1760195846000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/8\/2601"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,8]]},"references-count":59,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2018,8]]}},"alternative-id":["s18082601"],"URL":"https:\/\/doi.org\/10.3390\/s18082601","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2018,8,8]]}}}