Model Of Recognition Face Spoofing

dc.contributor.authorKhan Suliman.
dc.date.accessioned2026-01-01T12:11:37Z
dc.date.issued2023-11-11
dc.description.abstractThis article argues model of recognition face spoofing by methods of stream demonstration and Haar cascades. These methods created with comfort and rapidity, can be functional to any face spoofing on program Python, which we use with OpenCV to stream “Motion JPEG” through standard output.
dc.formatapplication/pdf
dc.identifier.urihttps://zienjournals.com/index.php/tjm/article/view/4701
dc.identifier.urihttps://asianeducationindex.com/handle/123456789/63442
dc.language.isoeng
dc.publisherZien Journals
dc.relationhttps://zienjournals.com/index.php/tjm/article/view/4701/3874
dc.rightshttps://creativecommons.org/licenses/by-nc/4.0
dc.sourceTexas Journal of Multidisciplinary Studies; Vol. 26 (2023): TJM; 54-56
dc.source2770-0003
dc.subjectface spoofing
dc.subjectrecognition
dc.subjectapplication
dc.titleModel Of Recognition Face Spoofing
dc.typeinfo:eu-repo/semantics/article
dc.typeinfo:eu-repo/semantics/publishedVersion
dc.typePeer-reviewed Article

item.page.files

item.page.filesection.original.bundle

pagination.showing.labelpagination.showing.detail
loading.default
thumbnail.default.alt
item.page.filesection.name
suliman_2023_model_of_recognition_face_spoofing.pdf
item.page.filesection.size
211.45 KB
item.page.filesection.format
Adobe Portable Document Format

item.page.collections