Sign in

Vulnerabilities of Unattended Face Verification Systems to Facial Components-based Presentation Attacks: An Empirical Study.

Le QinFei PengMin LongRaghavendra RamachandraChristoph Busch
Published in: ACM Trans. Priv. Secur. (2022)
Keyphrases
  • face verification
  • face detection
  • face identification
  • face recognition
  • countermeasures
  • security vulnerabilities
  • pairwise
  • face images
  • space time