Model Of Recognition Face Spoofing
| dc.contributor.author | Khan Suliman. | |
| dc.date.accessioned | 2026-01-01T12:11:37Z | |
| dc.date.issued | 2023-11-11 | |
| dc.description.abstract | This article argues model of recognition face spoofing by methods of stream demonstration and Haar cascades. These methods created with comfort and rapidity, can be functional to any face spoofing on program Python, which we use with OpenCV to stream “Motion JPEG” through standard output. | |
| dc.format | application/pdf | |
| dc.identifier.uri | https://zienjournals.com/index.php/tjm/article/view/4701 | |
| dc.identifier.uri | https://asianeducationindex.com/handle/123456789/63442 | |
| dc.language.iso | eng | |
| dc.publisher | Zien Journals | |
| dc.relation | https://zienjournals.com/index.php/tjm/article/view/4701/3874 | |
| dc.rights | https://creativecommons.org/licenses/by-nc/4.0 | |
| dc.source | Texas Journal of Multidisciplinary Studies; Vol. 26 (2023): TJM; 54-56 | |
| dc.source | 2770-0003 | |
| dc.subject | face spoofing | |
| dc.subject | recognition | |
| dc.subject | application | |
| dc.title | Model Of Recognition Face Spoofing | |
| dc.type | info:eu-repo/semantics/article | |
| dc.type | info:eu-repo/semantics/publishedVersion | |
| dc.type | Peer-reviewed Article |
item.page.files
item.page.filesection.original.bundle
pagination.showing.detail
loading.default
- item.page.filesection.name
- suliman_2023_model_of_recognition_face_spoofing.pdf
- item.page.filesection.size
- 211.45 KB
- item.page.filesection.format
- Adobe Portable Document Format