Current face biometric systems are vulnerable to spoofing attacks. A spoofing attack occurs when a person tries to masquerade as someone else by falsifying data and thereby gaining illegitimate access. Inspired by image quality assessment, characterization of printing artefacts, and differences in light reflection, we propose to approach the prob...

We have more than 145000 Documents , PPT and Research Papers

Have a question ?

Chat on WhatsApp