Face recognition (8) | ![]() |
Image analysis (3) | ![]() |
Image processing (8) | ![]() |
Machine vision (9) | ![]() |
G#2v 6949 Face recognition 0#3#face recognition Face recognition 0#3#facial recognition Face recognition G#2v 6950 Image analysis
0#3#image analysis Image analysis G#2v 6951 Image processing 0#3#image processing Image processing G#2v 6952 Machine vision
0#3#machine vision Machine vision G#1v 7848 Informatics 0#2#informatics Informatics G#1v 6953 Information theory
Keeping fingerprint and facial recognition systems safe from fakes Finger print, voice and facial recognition identification have
moved from sci-fi fantasy and are now in many real life affordable devices, such as smartphones and tablets.
conventional biometric techniques, such as fingerprints and facial recognition, are rather vulnerable to direct attacks Attacks are performed by falsifying the biometric
< Back - Next >
Overtext Web Module V3.0 Alpha
Copyright Semantic-Knowledge, 1994-2011