Abstract—Morphing attacks currently are a threat to face ... above techniques, most of which use OpenCV[17]. B. Morph detection.
確定! 回上一頁