m<strong>en</strong>or tiempo <strong>de</strong> cálculo (a m<strong>en</strong>or número <strong>de</strong> características, mas rápido será) y que t<strong>en</strong>gauna separación mayor <strong>en</strong>tre sus distribuciones.Debido a la limitación <strong>de</strong> la base <strong>de</strong> datos, no se ha podido comprobar el funcionami<strong>en</strong>to<strong>de</strong>l algoritmo con difer<strong>en</strong>tes tipos <strong>de</strong> falsificaciones <strong>de</strong> <strong>iris</strong> como son ví<strong>de</strong>os, l<strong>en</strong>tes <strong>de</strong>contacto, ojos sintéticos…(pres<strong>en</strong>tados <strong>en</strong> la sección 4.1). Sería muy interesante po<strong>de</strong>rcontrastar el algoritmo con otras bases <strong>de</strong> datos mayores y con mayor diversidad <strong>de</strong> tipos<strong>de</strong> ataques directos.62
REFERENCIAS[1]. Matsumoto, T., 2004. “Artificial <strong>iris</strong>es: importance of vulnerability analysis.” In:Proc. ABW.[2]. Zuo, J., Schmid, N. A., et al., 2007. “On g<strong>en</strong>eration and analysis of synthetic <strong>iris</strong>images”. IEEE Trans. IFS 2, 77-90.[3]. Pacut, A., Czajka, A., 2006. “Aliv<strong>en</strong>ess <strong>de</strong>tection for <strong>iris</strong> biometrics”. In: IEEEICCST. pp. 122-129.[4]. Seel<strong>en</strong>, U. C., 2005. “Countermeasures against <strong>iris</strong> spoofing with contact l<strong>en</strong>ses”.Pres<strong>en</strong>tation at BC Confer<strong>en</strong>ce.[5]. Wei, Z., Qiu, X., Sun, Z., Tan, T., 2008. “Counterfeit <strong>iris</strong> <strong>de</strong>tection based on textureanalysis.” In: Proc.ICPR.[6]. Z.Wei, T. Tan, et al. Robust and fast assessm<strong>en</strong>t of <strong>iris</strong> image quality. In Proc. IAPRICB, pages 464–471. Springer LNCS 3832, 2006. 3[7]. Kalka, N., Zuo, J., Schmid, N., and Cukic, B. 2002. “Image Quality Assessm<strong>en</strong>ts forIris Biometric.” In: Proc. Annual Meeting of the Gesellschafi flit Classification, pp. 445-452.[8]. Galbally, J. Nov, 2009. Tesis Doctoral “Vulnerabilities and attack protection insecurity system based on biometric recognition”[9]. L. Ma, T. Tan, et al. Personal i<strong>de</strong>ntification based on <strong>iris</strong> texture analysis. IEEETrans. On Pattern Analysis and Machine Intellig<strong>en</strong>ce, 25:1519–1533, 2003. 4[10]. Aditya Abhyankar, Stephanie Schuckers. 2009 “Iris quality assessm<strong>en</strong>t and biorthogonalwavelet based <strong>en</strong>coding for recognition”. In: Pattern Recognition[11]. Y. Ch<strong>en</strong>, S. C. Dass, and A. K. Jain. Localized <strong>iris</strong> image quality using 2d wavelets.In Proc. IAPR ICB, pages 373-381, 2006. 4[12]. V. Ruiz-Albacete, P. Tome-Gonzalez, et al. Direct attacks using fake images in <strong>iris</strong>verification. In Proc. BioID, pages 181–190. Springer LNCS-5372, 2008. 1, 2, 5[13] F. Alonso-Fernan<strong>de</strong>z, J. Fierrez, et al. A comparative study of fingerprint imagequality estimation methods. IEEE Trans. on Information For<strong>en</strong>sics and Security, 2(4):734–743, 2008. 1[14] K. Bowyer, K. Hollingsworth, and P. Flynn. Image un<strong>de</strong>rstanding for <strong>iris</strong> biometrics:A survey. Computer vision and Image Un<strong>de</strong>rstanding, 110:281–307, 2007. 363