Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
110 tokens/sec
GPT-4o
56 tokens/sec
Gemini 2.5 Pro Pro
44 tokens/sec
o3 Pro
6 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Swap It Like Its Hot: Segmentation-based spoof attacks on eye-tracking images (2404.13827v1)

Published 22 Apr 2024 in cs.CV

Abstract: Video-based eye trackers capture the iris biometric and enable authentication to secure user identity. However, biometric authentication is susceptible to spoofing another user's identity through physical or digital manipulation. The current standard to identify physical spoofing attacks on eye-tracking sensors uses liveness detection. Liveness detection classifies gaze data as real or fake, which is sufficient to detect physical presentation attacks. However, such defenses cannot detect a spoofing attack when real eye image inputs are digitally manipulated to swap the iris pattern of another person. We propose IrisSwap as a novel attack on gaze-based liveness detection. IrisSwap allows attackers to segment and digitally swap in a victim's iris pattern to fool iris authentication. Both offline and online attacks produce gaze data that deceives the current state-of-the-art defense models at rates up to 58% and motivates the need to develop more advanced authentication methods for eye trackers.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (32)
  1. Fernando Alonso-Fernandez. 2015. Near-infrared and visible-light periocular recognition with Gabor features using frequency-adaptive automatic eye detection. IET Biometrics 4 (June 2015), 74–89(15). Issue 2. https://digital-library.theiet.org/content/journals/10.1049/iet-bmt.2014.0038
  2. Apple. 2023. Apple Vision Pro: Privacy and Security. https://www.apple.com/apple-vision-pro/
  3. Evaluating White Matter Lesion Segmentations with Refined Sørensen-Dice Analysis. Scientific Reports 10, 1 (May 2020). https://doi.org/10.1038/s41598-020-64803-w
  4. The spyware used in intimate partner violence. In 2018 IEEE Symposium on Security and Privacy (SP). IEEE, 441–458.
  5. Aayush Kumar Chaudhary and Jeff B Pelz. 2020. Privacy-Preserving Eye Videos Using Rubber Sheet Model. In ACM Symposium on Eye Tracking Research and Applications (Stuttgart, Germany) (ETRA ’20 Short Papers). Association for Computing Machinery, New York, NY, USA, Article 22, 5 pages. https://doi.org/10.1145/3379156.3391375
  6. Adam Czajka and Kevin W Bowyer. 2018. Presentation attack detection for iris recognition: An assessment of the state-of-the-art. ACM Computing Surveys (CSUR) 51, 4 (2018), 1–35.
  7. J. Daugman. 2004. How iris recognition works. IEEE Transactions on Circuits and Systems for Video Technology 14, 1 (2004), 21–30. https://doi.org/10.1109/TCSVT.2003.818350
  8. Effects of aging on eye movements in the real world. Frontiers in human neuroscience 9 (2015), 46.
  9. James S Doyle and Kevin W Bowyer. 2015. Robust detection of textured contact lenses in iris recognition using BSIF. IEEE Access 3 (2015), 1672–1683.
  10. Biometric Data Interchange Formats-Part. 2005. 6: Iris image data. ISO/IEC (2005), 19794–6.
  11. “A Stalker’s Paradise” How Intimate Partner Abusers Exploit Technology. In Proceedings of the 2018 CHI conference on human factors in computing systems. 1–13.
  12. Dhananjay Garud and S.S. Agrwal. 2016. Face liveness detection. In 2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT). 789–792. https://doi.org/10.1109/ICACDOT.2016.7877695
  13. An introduction to biometric recognition. IEEE Transactions on circuits and systems for video technology 14, 1 (2004), 4–20.
  14. Javad Jarrahi. 2021. IProov face biometrics deployed in OCBC atms in Singapore Pilot: Biometric update. https://www.biometricupdate.com/202103/iproov-face-biometrics-deployed-in-ocbc-atms-in-singapore-pilot
  15. DoubleU-Net: A Deep Convolutional Neural Network for Medical Image Segmentation. https://doi.org/10.48550/ARXIV.2006.04868
  16. The security-utility trade-off for iris authentication and eye animation for social virtual avatars. IEEE transactions on visualization and computer graphics 26, 5 (2020), 1880–1890.
  17. EyeVEIL: Degrading Iris Authentication in Eye Tracking Headsets. In Proceedings of the 11th ACM Symposium on Eye Tracking Research &; Applications (Denver, Colorado) (ETRA ’19). Association for Computing Machinery, New York, NY, USA, Article 37, 5 pages. https://doi.org/10.1145/3314111.3319816
  18. Pupil: an open source platform for pervasive eye tracking and mobile gaze-based interaction. In Proceedings of the 2014 ACM international joint conference on pervasive and ubiquitous computing: Adjunct publication. 1151–1160.
  19. Biometric Identification via an Oculomotor Plant Mathematical Model. In Proceedings of the 2010 Symposium on Eye-Tracking Research amp; Applications (Austin, Texas) (ETRA ’10). Association for Computing Machinery, New York, NY, USA, 57–60. https://doi.org/10.1145/1743666.1743679
  20. Attack of Mechanical Replicas: Liveness Detection With Eye Movements. IEEE Transactions on Information Forensics and Security 10, 4 (2015), 716–725. https://doi.org/10.1109/TIFS.2015.2405345
  21. Magic Leap. 2023. Magic Leap 2: Iris ID (Beta). https://resources.magicleap.com/en-us/privacy/iris-unlock-id?locale=en-US
  22. Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, 2673–2690. https://www.usenix.org/conference/usenixsecurity22/presentation/li-changjiang
  23. Clark Phillips and Oleg V Komogortsev. 2011. Impact of resolution and blur on iris identification. Technical Report. Technical Report.
  24. Marcin Plata and Piotr Syga. 2020. Robust spatial-spread deep neural image watermarking. In 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 62–70.
  25. Video Presentation Attack Detection in Visible Spectrum Iris Recognition Using Magnified Phase Information. IEEE Transactions on Information Forensics and Security 10, 10 (2015), 2048–2056. https://doi.org/10.1109/TIFS.2015.2440188
  26. Iris Print Attack Detection using Eye Movement Signals. ETRA (2022), 70:1–70:6. https://doi.org/10.1145/3517031.3532521
  27. Ioannis Rigas and Oleg V. Komogortsev. 2014. Gaze estimation as a framework for iris liveness detection. In IEEE International Joint Conference on Biometrics. 1–8. https://doi.org/10.1109/BTAS.2014.6996282
  28. MobILive 2014 - Mobile Iris Liveness Detection Competition. In IEEE International Joint Conference on Biometrics. 1–6. https://doi.org/10.1109/BTAS.2014.6996290
  29. A realistic evaluation of iris presentation attack detection. In 2016 39th International Conference on Telecommunications and Signal Processing (TSP). 660–664. https://doi.org/10.1109/TSP.2016.7760965
  30. Ars Staff. 2019. Microsoft unveils Hololens 2: Twice the field of view, Eye Tracking. https://arstechnica.com/gadgets/2019/02/microsoft-unveils-hololens-2-twice-the-field-of-view-eye-tracking/
  31. A New Multi-spectral Iris Acquisition Sensor for Biometric Verification and Presentation Attack Detection. 2019 IEEE Winter Applications of Computer Vision Workshops (WACVW) (2019), 47–54.
  32. On the fusion of periocular and iris biometrics in non-ideal imagery. In 2010 20th International Conference on Pattern Recognition. IEEE, 201–204.
User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (2)
  1. Anish S. Narkar (2 papers)
  2. Brendan David-John (6 papers)

Summary

We haven't generated a summary for this paper yet.

X Twitter Logo Streamline Icon: https://streamlinehq.com
Youtube Logo Streamline Icon: https://streamlinehq.com