Model Of Recognition Face Spoofing

Authors

  • Khan Suliman. Computer science and English as the foreign language Teacher at Hajiabad Public School. Timergara, Lower Dir. KPK. Pakistan. Master Degree Graduator from Jiangsu University of Science and Technology. Zhenjiang. Jiangsu. China

Keywords:

face spoofing, recognition, application

Abstract

This article argues model of recognition face spoofing by methods of stream demonstration and Haar cascades. These methods created with comfort and rapidity, can be functional to any face spoofing on program Python, which we use with OpenCV to stream “Motion JPEG” through standard output.

References

http://mitc.uz/ru/pages/info_security

Decree of the President of the Republic of Uzbekistan dated November 21, 2018 N PP-4024 "On measures to improve the control system for the implementation of information technologies and communications, the organization of their protection"

Jasur Gayrat ugli Rashidov” Cryptography as protection web sites from cyber-attack”, Study manual. “Publishing house”. pp. 289,2017, Tashkent, Uzbekistan.

Downloads

Published

2023-11-11

Issue

Section

Articles

How to Cite

Model Of Recognition Face Spoofing . (2023). Texas Journal of Multidisciplinary Studies, 26, 54-56. https://zienjournals.com/index.php/tjm/article/view/4701