Adversarial Examples to Fool Iris Recognition Systems

  title={Adversarial Examples to Fool Iris Recognition Systems},
  author={Sobhan Soleymani and Ali Dabouei and J. Dawson and N. Nasrabadi},
  journal={2019 International Conference on Biometrics (ICB)},
Adversarial examples have recently proven to be able to fool deep learning methods by adding carefully crafted small perturbation to the input space image. In this paper, we study the possibility of generating adversarial examples for code-based iris recognition systems. Since generating adversarial examples requires back-propagation of the adversarial loss, conventional filter bank-based iris-code generation frameworks cannot be employed in such a setup. Therefore, to compensate for this… Expand
Defending Against Adversarial Iris Examples UsingWavelet Decomposition
Zero-Shot Deep Hashing and Neural Network Based Error Correction for Face Template Protection
Adversarial Learning in the Cyber Security Domain
Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain
Attribute-Guided Coupled GAN for Cross-Resolution Face Recognition
Biometrics: Trust, but Verify
Resist: Reconstruction of irises from templates


Adversarial Diversity and Hard Positive Generation
Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks
Fast Geometrically-Perturbed Adversarial Faces
The Limitations of Deep Learning in Adversarial Settings
Adversarial examples in the physical world
Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods
Robust Scheme for Iris Presentation Attack Detection Using Multiscale Binarized Statistical Image Features
On the feasibility of creating morphed iris-codes
  • C. Rathgeb, C. Busch
  • Computer Science
  • 2017 IEEE International Joint Conference on Biometrics (IJCB)
  • 2017
Multi-patch convolution neural network for iris liveness detection
How to Generate Spoofed Irises From an Iris Code Template