镶嵌细工 发表于 2025-3-26 23:55:02

https://doi.org/10.1007/978-1-137-05617-7d protect the face spoofing system to a certain degree. In this paper, we propose an algorithm to detect the images recaptured from LCD screen. On the one hand, the quality of the recaptured images would be affect in general. The generalized Gaussian distribution (GGD) and zero mode asymmetric gener

Rodent 发表于 2025-3-27 02:16:36

http://reply.papertrans.cn/28/2794/279337/279337_32.png

radiograph 发表于 2025-3-27 05:17:05

http://reply.papertrans.cn/28/2794/279337/279337_33.png

irritation 发表于 2025-3-27 10:47:24

http://reply.papertrans.cn/28/2794/279337/279337_34.png

美丽的写 发表于 2025-3-27 13:36:31

http://reply.papertrans.cn/28/2794/279337/279337_35.png

Traumatic-Grief 发表于 2025-3-27 20:17:09

http://reply.papertrans.cn/28/2794/279337/279337_36.png

GEST 发表于 2025-3-28 00:48:32

http://reply.papertrans.cn/28/2794/279337/279337_37.png

aerial 发表于 2025-3-28 02:15:49

Contract-Based Time Assignment, systems remain susceptible to an ever evolving diversity of spoofing attacks. It has recently been shown that high-quality face morphing or splicing can be employed to deceive facial recognition systems in a border control scenario. Moreover, facial morphs can easily be produced by means of open so

压倒性胜利 发表于 2025-3-28 07:03:46

Chapter 6: Power Control Algorithmalysis (TDA) concept of persistent homological invariants associated with certain image features. Image features of interest are pixels that have a uniform Local Binary pattern (LBP) code representing texture feature descriptors. We construct the sequence of simplicial complexes for increasing seque

Gobble 发表于 2025-3-28 11:28:26

http://reply.papertrans.cn/28/2794/279337/279337_40.png
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Digital Forensics and Watermarking; 16th International W Christian Kraetzer,Yun-Qing Shi,Hyoung Joong Kim Conference proceedings 2017 Sprin