Deep Face Spoofing via Local Binary Based Convolutional Neural Network

碩士 === 元智大學 === 電機工程學系 === 106 === There are many ways to do authentication, but most of the systems verification are still based on passwords. Passwords are very valuable to hackers, and there is endless news that involving hackers stealing passwords and obtaining user information for illegal purpo...

Full description

Bibliographic Details
Main Authors: Wen-Yang Liao, 廖文揚
Other Authors: Duan-Yu Chen
Format: Others
Language:zh-TW
Published: 2018
Online Access:http://ndltd.ncl.edu.tw/handle/hdr585