Deep Face Spoofing via Local Binary Based Convolutional Neural Network
碩士 === 元智大學 === 電機工程學系 === 106 === There are many ways to do authentication, but most of the systems verification are still based on passwords. Passwords are very valuable to hackers, and there is endless news that involving hackers stealing passwords and obtaining user information for illegal purpo...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2018
|
Online Access: | http://ndltd.ncl.edu.tw/handle/hdr585 |