3T‐FASDM: Linear discriminant analysis‐based three‐tier face anti‐spoofing detection model using support vector machine
暂无分享,去创建一个
Kuei-Fang Hsiao | Sudeep Tanwar | Akhil Gupta | Sunanda Gupta | Aditya Bakshi | Sunanda Gupta | S. Tanwar | A. Bakshi | Akhil Gupta | Kuei-Fang Hsiao
[1] Rohit M. Thanki,et al. Sparse Watermarking Technique for Improving Security of Biometric System , 2015 .
[2] Pierre Gançarski,et al. Collaborative clustering: Why, when, what and how , 2018, Inf. Fusion.
[3] Mahmoud Al-Ayyoub,et al. On the road to the Internet of Biometric Things: A survey of fingerprint acquisition technologies and fingerprint databases , 2016, 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA).
[4] K Mohan,et al. A combined HOG-LPQ with Fuz-SVM classifier for Object face Liveness Detection , 2017, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC).
[5] Jieping Ye,et al. Generalized Linear Discriminant Analysis: A Unified Framework and Efficient Model Selection , 2008, IEEE Transactions on Neural Networks.
[6] Anil K. Jain,et al. Attacks on biometric systems: a case study in fingerprints , 2004, IS&T/SPIE Electronic Imaging.
[7] Muhammad Awais,et al. Spoofing Attack Detection by Anomaly Detection , 2019, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[8] Neeraj Kumar,et al. Securing electronics healthcare records in Healthcare 4.0 : A biometric-based approach , 2019, Comput. Electr. Eng..
[9] Albert Y. Zomaya,et al. A Hybrid Deep Learning-Based Model for Anomaly Detection in Cloud Datacenter Networks , 2019, IEEE Transactions on Network and Service Management.
[10] Ryan Ercel O. Paderes. A Comparative Review of Biometric Security Systems , 2015, 2015 8th International Conference on Bio-Science and Bio-Technology (BSBT).
[11] Sotiris B. Kotsiantis,et al. Supervised Machine Learning: A Review of Classification Techniques , 2007, Informatica.
[12] Neeraj Kumar,et al. Machine Learning Models for Secure Data Analytics: A taxonomy and threat model , 2020, Comput. Commun..
[13] João Paulo Papa,et al. How far did we get in face spoofing detection? , 2018, Eng. Appl. Artif. Intell..
[14] Jyh-Shing Roger Jang,et al. ANFIS: adaptive-network-based fuzzy inference system , 1993, IEEE Trans. Syst. Man Cybern..
[15] Ali Dehghantanha,et al. A Review of Vulnerabilities in Identity Management Using Biometrics , 2010, 2010 Second International Conference on Future Networks.
[16] Domingo Mery,et al. Face Recognition with Local Binary Patterns, Spatial Pyramid Histograms and Naive Bayes Nearest Neighbor Classification , 2009, 2009 International Conference of the Chilean Computer Science Society.
[17] Dipti D. Patil,et al. Evaluation of Decision Tree Pruning Algorithms for Complexity and Classification Accuracy , 2010 .
[18] Jay F. Nunamaker,et al. Powering E-Learning In the New Millennium: An Overview of E-Learning and Enabling Technology , 2003, Inf. Syst. Frontiers.
[19] Ling Shao,et al. Unconstrained Face Recognition Using a Set-to-Set Distance Measure on Deep Learned Features , 2018, IEEE Transactions on Circuits and Systems for Video Technology.
[20] Sébastien Marcel,et al. On the effectiveness of local binary patterns in face anti-spoofing , 2012, 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG).
[21] M. I. N. P. Munasinghe,et al. Facial Expression Recognition Using Facial Landmarks and Random Forest Classifier , 2018, 2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS).
[22] Marius Iulian Mihailescu,et al. New Enrollment Scheme for Biometric Template Using Hash Chaos-based Cryptography , 2014 .
[23] Abdullah Sharaf Alghamdi,et al. Towards the Designing of a Robust Intrusion Detection System through an Optimized Advancement of Neural Networks , 2010, AST/UCMA/ISA/ACN.
[24] P Poongodi,et al. A Study on Biometric Template Protection Techniques , 2014 .
[25] Fei Peng,et al. Face spoofing detection based on color texture Markov feature and support vector machine recursive feature elimination , 2018, J. Vis. Commun. Image Represent..
[26] Mohammad S. Obaidat,et al. HyClass: Hybrid Classification Model for Anomaly Detection in Cloud Environment , 2018, 2018 IEEE International Conference on Communications (ICC).
[27] Richa Singh,et al. Face recognition CAPTCHA , 2012, 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[28] Piotr Duda,et al. Decision Trees for Mining Data Streams Based on the McDiarmid's Bound , 2013, IEEE Transactions on Knowledge and Data Engineering.
[29] Sébastien Marcel,et al. Spoofing Face Recognition With 3D Masks , 2014, IEEE Transactions on Information Forensics and Security.
[30] Ivana Chingovska,et al. On the Use of Client Identity Information for Face Antispoofing , 2015, IEEE Transactions on Information Forensics and Security.
[31] Jieping Ye,et al. Characterization of a Family of Algorithms for Generalized Discriminant Analysis on Undersampled Problems , 2005, J. Mach. Learn. Res..
[32] K JainAnil,et al. 50 years of biometric research , 2016 .
[33] Khudoykulov Zarif Turakulovich,et al. Biometric cryptosystems: Open issues and challenges , 2016, 2016 International Conference on Information Science and Communications Technologies (ICISCT).
[34] Lin Sun,et al. Eyeblink-based Anti-Spoofing in Face Recognition from a Generic Webcamera , 2007, 2007 IEEE 11th International Conference on Computer Vision.
[35] Rohit M. Thanki,et al. Biometric Watermarking Technique Based on CS Theory and Fast Discrete Curvelet Transform for Face and Fingerprint Protection , 2015, SIRS.
[36] Sébastien Marcel,et al. Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition , 2014, IEEE Transactions on Image Processing.
[37] Ahmad A. Hassan,et al. Applying a new functional model to improve the security of biometrie systems , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.
[38] Seref Sagiroglu,et al. Security Perspective of Biometric Recognition and Machine Learning Techniques , 2016, 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA).
[39] Loris Nanni,et al. Overview of the combination of biometric matchers , 2017, Inf. Fusion.
[40] Ausif Mahmood,et al. Enhanced Human Face Recognition Using LBPH Descriptor, Multi-KNN, and Back-Propagation Neural Network , 2018, IEEE Access.
[41] Li Hongwei,et al. Ad hoc-based feature selection and support vector machine classifier for intrusion detection , 2007, 2007 IEEE International Conference on Grey Systems and Intelligent Services.
[42] Ravi Subban,et al. Fingerprint template protection techniques — A survey and analysis , 2014 .
[43] Marina L. Gavrilova,et al. Novel multimodal template generation algorithm , 2013, 2013 IEEE 12th International Conference on Cognitive Informatics and Cognitive Computing.
[44] Pong C. Yuen,et al. Masquerade attack on transform-based binary-template protection based on perceptron learning , 2014, Pattern Recognit..
[45] Yunde Jia,et al. Anisotropic Diffusion-based Kernel Matrix Model for Face Liveness Detection , 2019, Image Vis. Comput..
[46] Jean-Luc Dugelay,et al. Mask spoofing in face recognition and countermeasures , 2014, Image Vis. Comput..
[47] Ahmed M. Elgammal,et al. Learning to identify facial expression during detection using Markov decision process , 2006, 7th International Conference on Automatic Face and Gesture Recognition (FGR06).
[48] Shaogang Gong,et al. Support vector machine based multi-view face detection and recognition , 2004, Image Vis. Comput..
[49] Shanmukhappa A. Angadi,et al. Multi-directional local gradient descriptor: A new feature descriptor for face recognition , 2019, Image Vis. Comput..
[50] Jieping Ye,et al. An optimization criterion for generalized discriminant analysis on undersampled problems , 2004, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[51] Samy Bengio,et al. Measuring the performance of face localization systems , 2006, Image Vis. Comput..
[52] S. Parthasarathy,et al. Automated Decision Tree Classification of Corneal Shape , 2005, Optometry and Vision Science.
[53] Yi-Hung Liu,et al. Face Recognition Using Total Margin-Based Adaptive Fuzzy Support Vector Machines , 2007, IEEE Transactions on Neural Networks.
[54] Ali Nauman,et al. Smart Contract Privacy Protection Using AI in Cyber-Physical Systems: Tools, Techniques and Challenges , 2020, IEEE Access.
[55] Pritee Khanna,et al. Gaussian Random Projection Based Non-invertible Cancelable Biometric Templates , 2015 .
[56] Azzedine Boukerche,et al. A multi-stage anomaly detection scheme for augmenting the security in IoT-enabled applications , 2020, Future Gener. Comput. Syst..
[57] Aleix M. Martínez,et al. Where are linear feature extraction methods applicable? , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[58] Diego Vergara,et al. Multinomial Naive Bayes for real-time gender recognition , 2016, 2016 XXI Symposium on Signal Processing, Images and Artificial Vision (STSIVA).
[59] Albert Y. Zomaya,et al. En-ABC: An ensemble artificial bee colony based anomaly detection scheme for cloud environment , 2020, J. Parallel Distributed Comput..
[60] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[61] Jukka Komulainen,et al. On the generalization of color texture-based face anti-spoofing , 2018, Image Vis. Comput..
[62] Andy Adler,et al. Biometric System Security , 2008 .
[63] Nadia Nedjah,et al. Efficient yet robust biometric iris matching on smart cards for data high security and privacy , 2017, Future Gener. Comput. Syst..
[64] Ying Zhang,et al. Face Spoofing Video Detection Using Spatio-Temporal Statistical Binary Pattern , 2018, TENCON 2018 - 2018 IEEE Region 10 Conference.
[65] A.H. Nizar,et al. Power Utility Nontechnical Loss Analysis With Extreme Learning Machine Method , 2008, IEEE Transactions on Power Systems.
[66] Sudeep Sarkar,et al. A Non-Iterative Approach to Reconstruct Face Templates from Match Scores , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[67] Ashok Kumar,et al. A Study of Iris Template Protection Techniques for a Secure Iris Recognition System , 2015 .
[68] Rajesh Gupta,et al. Blockchain envisioned UAV networks: Challenges, solutions, and comparisons , 2020, Comput. Commun..
[69] Phalguni Gupta,et al. Face Classification Using Gabor Wavelets and Random Forest , 2009, 2009 Canadian Conference on Computer and Robot Vision.
[70] Arun Ross,et al. 50 years of biometric research: Accomplishments, challenges, and opportunities , 2016, Pattern Recognit. Lett..
[71] Anthony Watson,et al. Naive Bayes face-nonface classifier: a study of preprocessing and feature extraction techniques , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[72] Rama Chellappa,et al. Facial attributes for active authentication on mobile devices , 2017, Image Vis. Comput..
[73] Harry Wechsler,et al. Open set face recognition using transduction , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[74] Anil K. Jain,et al. Biometric Template Protection: Bridging the performance gap between theory and practice , 2015, IEEE Signal Processing Magazine.