Abstract. A face morphing attack image can be verified to multiple identities, making this attack a major vulnerability to processes based ...
確定! 回上一頁