##plugins.themes.academic_pro.article.main##
Abstract
This article argues model of recognition face spoofing by methods of stream demonstration and Haar cascades. These methods created with comfort and rapidity, can be functional to any face spoofing on program Python, which we use with OpenCV to stream “Motion JPEG” through standard output.
Keywords
face spoofing
recognition
application
##plugins.themes.academic_pro.article.details##
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
How to Cite
Khan Suliman. (2023). Model Of Recognition Face Spoofing . Texas Journal of Multidisciplinary Studies, 26, 54–56. Retrieved from https://zienjournals.com/index.php/tjm/article/view/4701
References
- http://mitc.uz/ru/pages/info_security
- Decree of the President of the Republic of Uzbekistan dated November 21, 2018 N PP-4024 "On measures to improve the control system for the implementation of information technologies and communications, the organization of their protection"
- Jasur Gayrat ugli Rashidov” Cryptography as protection web sites from cyber-attack”, Study manual. “Publishing house”. pp. 289,2017, Tashkent, Uzbekistan.