PresentIDco / Face-SimilarityLinks
Face Similarity PresentID Face Similarity can detect face in your image. High-precision detection of size; pitch, roll, yaw, and 14-point key landmarks. Low resource and impressive high performance. Robust detection of faces with rotation, glasses, etc. shows the image that is most similar.
☆5Updated 4 years ago
Alternatives and similar repositories for Face-Similarity
Users that are interested in Face-Similarity are comparing it to the libraries listed below
Sorting:
- PresentID QR-Code & Barcode scanner API can scan both QR code and barcode.☆1Updated 3 years ago
- PresentID Optical character recognition API can extract data from all types of cards including driver's license, National ID card, Certif…☆1Updated 3 years ago
- PresentID Document Detection can detect edges of document and get back the isolated document.☆1Updated 3 years ago
- PresentID face mask detection API can detect that the person wear a mask or not. It is necessary for many places specially in the meantim…☆1Updated 4 years ago
- Face Detection API☆9Updated 3 years ago
- Speaker Verification API☆4Updated 3 years ago
- PresentID Voice Gender Recognition API☆4Updated 3 years ago
- PresentID Face Enroll API allows you to register your users for future authentication. This API stores two image files along with the use…☆2Updated 3 years ago
- PresentID Face Liveness Detection API☆7Updated 3 years ago
- Simple Paint program which allows the user to draw using a leap motion and a myo armband☆4Updated 9 years ago
- Simple Paint Program with the theme of breaking bad.☆4Updated 9 years ago
- A simple program that allows the user to jot quick notes and save them anywhere on their computer☆9Updated 8 years ago
- Basic Chess game with the theme of Yosemite☆1Updated 8 years ago
- ☆4Updated 8 months ago
- A YouTube-Alternative for Rocket Beans TV.☆7Updated 8 years ago
- ☆12Updated last year
- PAAS-TA-PORTAL-COMMON-API☆17Updated 2 years ago
- ☆17Updated 2 years ago
- ☆17Updated 7 years ago
- Password Exploiter that runs a brute force dictionary attack from scratch.☆15Updated last year
- ☆16Updated 5 months ago
- CaaS service broker for PaaS-TA☆17Updated 3 years ago
- how to build your own isolated malware analysis lab using virtualbox . Create a virtual network, disable Windows Defender, and set up Rem…☆17Updated last year
- A security technology used to monitor and detect changes in files that may indicate a security breach or malicious activity.☆16Updated last month
- Welcome to the Prank Malware Generator! This repository hosts a simple batch script designed to create a fun and harmless prank malware. …☆16Updated last year
- SPRING-CLOUD-SAMPLE☆15Updated 7 years ago
- IaaS (only Openstack) monitoring☆17Updated 4 years ago
- PAAS-TA-PORTAL-API☆17Updated 2 years ago
- DELIVERY-PIPELINE-BINARY-STORAGE-API☆18Updated 3 years ago
- ☆15Updated 8 years ago