Login / Signup
Exploring presentation attack vulnerability and usability of face recognition systems.
Heinz Hofbauer
Luca Debiasi
Susanne Kränkl
Andreas Uhl
Published in:
IET Biom. (2021)
Keyphrases
</>
face recognition systems
face verification
face recognition
attack graphs
face images
face matching
attack graph
penetration testing
buffer overflow
face recognition algorithms
security vulnerabilities
face detection
illumination variations
security risks
facial expressions
decision trees
computer vision