JOURNAL ARTICLE

3T‐FASDM: Linear discriminant analysis‐based three‐tier face anti‐spoofing detection model using support vector machine

Aditya BakshiSunanda GuptaAkhil GuptaSudeep TanwarKuei‐Fang Hsiao

Year: 2020 Journal:   International Journal of Communication Systems Vol: 33 (12)   Publisher: Wiley

Abstract

Summary In recent years, to solve the problem of face spoofing, momentous work has been done in this field, but still, there is a need for establishing counter measures to the biometric spoofing attacks. Although trained and evaluated on different databases, impressive results have been achieved in existing face anti‐spoofing techniques, but biometric authentication is a very significant problem as imposters are using lots of reconstructed samples or fake synthetic material or structure that can be used for various attack purposes. For the first time, to the best of our knowledge, this paper explains the security for face anti‐spoofing detection using linear discriminant analysis and validates the results by calculating HTER and accuracy on different databases (i.e., REPLAY ATTACK and CASIA). The proposed model, that is, three‐tier face anti‐spoofing detection model (3T‐FASDM), is used for the detection of the fake biometric user and works well for real‐time applications. The proposed methods tested on a set of state‐of‐the‐art anti‐spoofing features for the face mode gives a very low degree of complexity as 26 general image quality measures are applied to differentiate among legitimate and imposter samples. The outcomes obtained from publically available data show that this technique has improved performance and accuracy by analyzing the HTER and machine learning classifiers that are helpful to differentiate among real and fake traits.

Keywords:
Spoofing attack Computer science Biometrics Artificial intelligence Face (sociological concept) Linear discriminant analysis Facial recognition system Field (mathematics) Pattern recognition (psychology) Authentication (law) Discriminant Machine learning Data mining Computer security Mathematics

Metrics

6
Cited By
0.74
FWCI (Field Weighted Citation Impact)
86
Refs
0.70
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Biometric Identification and Security
Physical Sciences →  Computer Science →  Signal Processing
Digital Media Forensic Detection
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition
Face recognition and analysis
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition
© 2026 ScienceGate Book Chapters — All rights reserved.