Tagged: Computer Science projects
INTRODUCTION Nowadays, it is known that most of the existing face recognition systems are vulnerableto spoofing attacks. A spoofing attack occurs when someone tries to bypass a facebiometric system by presenting a fake face...