3T‐FASDM: Linear discriminant analysis‐based three‐tier face anti‐spoofing detection model using support vector machine

[1]  Rohit M. Thanki,et al.  Sparse Watermarking Technique for Improving Security of Biometric System , 2015 .

[2]  Pierre Gançarski,et al.  Collaborative clustering: Why, when, what and how , 2018, Inf. Fusion.

[3]  Mahmoud Al-Ayyoub,et al.  On the road to the Internet of Biometric Things: A survey of fingerprint acquisition technologies and fingerprint databases , 2016, 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA).

[4]  K Mohan,et al.  A combined HOG-LPQ with Fuz-SVM classifier for Object face Liveness Detection , 2017, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC).

[5]  Jieping Ye,et al.  Generalized Linear Discriminant Analysis: A Unified Framework and Efficient Model Selection , 2008, IEEE Transactions on Neural Networks.

[6]  Anil K. Jain,et al.  Attacks on biometric systems: a case study in fingerprints , 2004, IS&T/SPIE Electronic Imaging.

[7]  Muhammad Awais,et al.  Spoofing Attack Detection by Anomaly Detection , 2019, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[8]  Neeraj Kumar,et al.  Securing electronics healthcare records in Healthcare 4.0 : A biometric-based approach , 2019, Comput. Electr. Eng..

[9]  Albert Y. Zomaya,et al.  A Hybrid Deep Learning-Based Model for Anomaly Detection in Cloud Datacenter Networks , 2019, IEEE Transactions on Network and Service Management.

[10]  Ryan Ercel O. Paderes A Comparative Review of Biometric Security Systems , 2015, 2015 8th International Conference on Bio-Science and Bio-Technology (BSBT).

[11]  Sotiris B. Kotsiantis,et al.  Supervised Machine Learning: A Review of Classification Techniques , 2007, Informatica.

[12]  Neeraj Kumar,et al.  Machine Learning Models for Secure Data Analytics: A taxonomy and threat model , 2020, Comput. Commun..

[13]  João Paulo Papa,et al.  How far did we get in face spoofing detection? , 2018, Eng. Appl. Artif. Intell..

[14]  Jyh-Shing Roger Jang,et al.  ANFIS: adaptive-network-based fuzzy inference system , 1993, IEEE Trans. Syst. Man Cybern..

[15]  Ali Dehghantanha,et al.  A Review of Vulnerabilities in Identity Management Using Biometrics , 2010, 2010 Second International Conference on Future Networks.

[16]  Domingo Mery,et al.  Face Recognition with Local Binary Patterns, Spatial Pyramid Histograms and Naive Bayes Nearest Neighbor Classification , 2009, 2009 International Conference of the Chilean Computer Science Society.

[17]  Dipti D. Patil,et al.  Evaluation of Decision Tree Pruning Algorithms for Complexity and Classification Accuracy , 2010 .

[18]  Jay F. Nunamaker,et al.  Powering E-Learning In the New Millennium: An Overview of E-Learning and Enabling Technology , 2003, Inf. Syst. Frontiers.

[19]  Ling Shao,et al.  Unconstrained Face Recognition Using a Set-to-Set Distance Measure on Deep Learned Features , 2018, IEEE Transactions on Circuits and Systems for Video Technology.

[20]  Sébastien Marcel,et al.  On the effectiveness of local binary patterns in face anti-spoofing , 2012, 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG).

[21]  M. I. N. P. Munasinghe,et al.  Facial Expression Recognition Using Facial Landmarks and Random Forest Classifier , 2018, 2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS).

[22]  Marius Iulian Mihailescu,et al.  New Enrollment Scheme for Biometric Template Using Hash Chaos-based Cryptography , 2014 .

[23]  Abdullah Sharaf Alghamdi,et al.  Towards the Designing of a Robust Intrusion Detection System through an Optimized Advancement of Neural Networks , 2010, AST/UCMA/ISA/ACN.

[24]  P Poongodi,et al.  A Study on Biometric Template Protection Techniques , 2014 .

[25]  Fei Peng,et al.  Face spoofing detection based on color texture Markov feature and support vector machine recursive feature elimination , 2018, J. Vis. Commun. Image Represent..

[26]  Mohammad S. Obaidat,et al.  HyClass: Hybrid Classification Model for Anomaly Detection in Cloud Environment , 2018, 2018 IEEE International Conference on Communications (ICC).

[27]  Richa Singh,et al.  Face recognition CAPTCHA , 2012, 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[28]  Piotr Duda,et al.  Decision Trees for Mining Data Streams Based on the McDiarmid's Bound , 2013, IEEE Transactions on Knowledge and Data Engineering.

[29]  Sébastien Marcel,et al.  Spoofing Face Recognition With 3D Masks , 2014, IEEE Transactions on Information Forensics and Security.

[30]  Ivana Chingovska,et al.  On the Use of Client Identity Information for Face Antispoofing , 2015, IEEE Transactions on Information Forensics and Security.

[31]  Jieping Ye,et al.  Characterization of a Family of Algorithms for Generalized Discriminant Analysis on Undersampled Problems , 2005, J. Mach. Learn. Res..

[32]  K JainAnil,et al.  50 years of biometric research , 2016 .

[33]  Khudoykulov Zarif Turakulovich,et al.  Biometric cryptosystems: Open issues and challenges , 2016, 2016 International Conference on Information Science and Communications Technologies (ICISCT).

[34]  Lin Sun,et al.  Eyeblink-based Anti-Spoofing in Face Recognition from a Generic Webcamera , 2007, 2007 IEEE 11th International Conference on Computer Vision.

[35]  Rohit M. Thanki,et al.  Biometric Watermarking Technique Based on CS Theory and Fast Discrete Curvelet Transform for Face and Fingerprint Protection , 2015, SIRS.

[36]  Sébastien Marcel,et al.  Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition , 2014, IEEE Transactions on Image Processing.

[37]  Ahmad A. Hassan,et al.  Applying a new functional model to improve the security of biometrie systems , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[38]  Seref Sagiroglu,et al.  Security Perspective of Biometric Recognition and Machine Learning Techniques , 2016, 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA).

[39]  Loris Nanni,et al.  Overview of the combination of biometric matchers , 2017, Inf. Fusion.

[40]  Ausif Mahmood,et al.  Enhanced Human Face Recognition Using LBPH Descriptor, Multi-KNN, and Back-Propagation Neural Network , 2018, IEEE Access.

[41]  Li Hongwei,et al.  Ad hoc-based feature selection and support vector machine classifier for intrusion detection , 2007, 2007 IEEE International Conference on Grey Systems and Intelligent Services.

[42]  Ravi Subban,et al.  Fingerprint template protection techniques — A survey and analysis , 2014 .

[43]  Marina L. Gavrilova,et al.  Novel multimodal template generation algorithm , 2013, 2013 IEEE 12th International Conference on Cognitive Informatics and Cognitive Computing.

[44]  Pong C. Yuen,et al.  Masquerade attack on transform-based binary-template protection based on perceptron learning , 2014, Pattern Recognit..

[45]  Yunde Jia,et al.  Anisotropic Diffusion-based Kernel Matrix Model for Face Liveness Detection , 2019, Image Vis. Comput..

[46]  Jean-Luc Dugelay,et al.  Mask spoofing in face recognition and countermeasures , 2014, Image Vis. Comput..

[47]  Ahmed M. Elgammal,et al.  Learning to identify facial expression during detection using Markov decision process , 2006, 7th International Conference on Automatic Face and Gesture Recognition (FGR06).

[48]  Shaogang Gong,et al.  Support vector machine based multi-view face detection and recognition , 2004, Image Vis. Comput..

[49]  Shanmukhappa A. Angadi,et al.  Multi-directional local gradient descriptor: A new feature descriptor for face recognition , 2019, Image Vis. Comput..

[50]  Jieping Ye,et al.  An optimization criterion for generalized discriminant analysis on undersampled problems , 2004, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[51]  Samy Bengio,et al.  Measuring the performance of face localization systems , 2006, Image Vis. Comput..

[52]  S. Parthasarathy,et al.  Automated Decision Tree Classification of Corneal Shape , 2005, Optometry and Vision Science.

[53]  Yi-Hung Liu,et al.  Face Recognition Using Total Margin-Based Adaptive Fuzzy Support Vector Machines , 2007, IEEE Transactions on Neural Networks.

[54]  Ali Nauman,et al.  Smart Contract Privacy Protection Using AI in Cyber-Physical Systems: Tools, Techniques and Challenges , 2020, IEEE Access.

[55]  Pritee Khanna,et al.  Gaussian Random Projection Based Non-invertible Cancelable Biometric Templates , 2015 .

[56]  Azzedine Boukerche,et al.  A multi-stage anomaly detection scheme for augmenting the security in IoT-enabled applications , 2020, Future Gener. Comput. Syst..

[57]  Aleix M. Martínez,et al.  Where are linear feature extraction methods applicable? , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[58]  Diego Vergara,et al.  Multinomial Naive Bayes for real-time gender recognition , 2016, 2016 XXI Symposium on Signal Processing, Images and Artificial Vision (STSIVA).

[59]  Albert Y. Zomaya,et al.  En-ABC: An ensemble artificial bee colony based anomaly detection scheme for cloud environment , 2020, J. Parallel Distributed Comput..

[60]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[61]  Jukka Komulainen,et al.  On the generalization of color texture-based face anti-spoofing , 2018, Image Vis. Comput..

[62]  Andy Adler,et al.  Biometric System Security , 2008 .

[63]  Nadia Nedjah,et al.  Efficient yet robust biometric iris matching on smart cards for data high security and privacy , 2017, Future Gener. Comput. Syst..

[64]  Ying Zhang,et al.  Face Spoofing Video Detection Using Spatio-Temporal Statistical Binary Pattern , 2018, TENCON 2018 - 2018 IEEE Region 10 Conference.

[65]  A.H. Nizar,et al.  Power Utility Nontechnical Loss Analysis With Extreme Learning Machine Method , 2008, IEEE Transactions on Power Systems.

[66]  Sudeep Sarkar,et al.  A Non-Iterative Approach to Reconstruct Face Templates from Match Scores , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[67]  Ashok Kumar,et al.  A Study of Iris Template Protection Techniques for a Secure Iris Recognition System , 2015 .

[68]  Rajesh Gupta,et al.  Blockchain envisioned UAV networks: Challenges, solutions, and comparisons , 2020, Comput. Commun..

[69]  Phalguni Gupta,et al.  Face Classification Using Gabor Wavelets and Random Forest , 2009, 2009 Canadian Conference on Computer and Robot Vision.

[70]  Arun Ross,et al.  50 years of biometric research: Accomplishments, challenges, and opportunities , 2016, Pattern Recognit. Lett..

[71]  Anthony Watson,et al.  Naive Bayes face-nonface classifier: a study of preprocessing and feature extraction techniques , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[72]  Rama Chellappa,et al.  Facial attributes for active authentication on mobile devices , 2017, Image Vis. Comput..

[73]  Harry Wechsler,et al.  Open set face recognition using transduction , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[74]  Anil K. Jain,et al.  Biometric Template Protection: Bridging the performance gap between theory and practice , 2015, IEEE Signal Processing Magazine.