no code implementations • 26 Oct 2017 • Luiz Souza, Mauricio Pamplona, Luciano Oliveira, João Papa
The growing use of control access systems based on face recognition shed light over the need for even more accurate systems to detect face spoofing attacks.