Model Of Recognition Face Spoofing
Keywords:
face spoofing, recognition, applicationAbstract
This article argues model of recognition face spoofing by methods of stream demonstration and Haar cascades. These methods created with comfort and rapidity, can be functional to any face spoofing on program Python, which we use with OpenCV to stream “Motion JPEG” through standard output.
References
http://mitc.uz/ru/pages/info_security
Decree of the President of the Republic of Uzbekistan dated November 21, 2018 N PP-4024 "On measures to improve the control system for the implementation of information technologies and communications, the organization of their protection"
Jasur Gayrat ugli Rashidov” Cryptography as protection web sites from cyber-attack”, Study manual. “Publishing house”. pp. 289,2017, Tashkent, Uzbekistan.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
User Rights
Under the Creative Commons Attribution-NonCommercial 4.0 International (CC-BY-NC), the author (s) and users are free to share (copy, distribute and transmit the contribution).
Rights of Authors
Authors retain the following rights:
1. Copyright and other proprietary rights relating to the article, such as patent rights,
2. the right to use the substance of the article in future works, including lectures and books,
3. the right to reproduce the article for own purposes, provided the copies are not offered for sale,
4. the right to self-archive the article.








