An overview of face liveness detection
☆43Nov 7, 2021Updated 4 years ago
Alternatives and similar repositories for Liveness-Detection
Users that are interested in Liveness-Detection are comparing it to the libraries listed below
Sorting:
- Face Liveness Detection - A tool to prevent spoofing in face recognition systems.☆171Dec 15, 2022Updated 3 years ago
- ☆17Jun 12, 2020Updated 5 years ago
- Liveness detection experiments☆56Jul 18, 2020Updated 5 years ago
- Face Anti-Spoofing project. Lanit-Tercom summer school 2022☆77Sep 30, 2022Updated 3 years ago
- A Python anti-spoofing web app to distinguish real faces from fake ones based on live camera feed☆63Oct 14, 2022Updated 3 years ago
- Realtime Face Anti Spoofing with Face Detector based on Deep Learning using Tensorflow/Keras and OpenCV☆26Mar 7, 2022Updated 4 years ago
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated last month
- Open Authorization API (OAA) development libraries, connectors and resources.☆17Jan 9, 2025Updated last year
- YOLOv8 Segmentation Right in The Browser Using onnxruntime-web☆35Jun 1, 2023Updated 2 years ago
- face liveness detection activate, the script asks the person to generate an action, for example one of the actions they may ask you to do…☆306Mar 24, 2023Updated 2 years ago
- ns3sionna is a software module that brings realistic channel simulation using ray tracing from Sionna to the ns-3 network simulator☆23Dec 11, 2025Updated 2 months ago
- EOSIO-Taurus - The Most Powerful Infrastructure for Decentralized Applications☆13Mar 29, 2024Updated last year
- React (Polaris) + .NET 7 Template for Embedded Shopify App☆11Oct 26, 2023Updated 2 years ago
- GBM implementation on Legate☆14Jan 28, 2026Updated last month
- YOLO and TensorFlow.js to find and recognize objects in image, video, and webcam content.☆14Jan 25, 2026Updated last month
- Aware Driving (AD) is a mobile app that will assist you while you are driving.☆11Apr 6, 2025Updated 11 months ago
- The purpose this solution provides is automated notifications for how many passed, not passed, failed, and warning findings for each memb…☆10Dec 5, 2022Updated 3 years ago
- ☆16Updated this week
- [Push Mirror] A rewrite of cowsay in python☆14Sep 2, 2025Updated 6 months ago
- Minimum DevSecOps with Monitoring Options on Amazon EKS☆13Feb 25, 2026Updated last week
- An Face Anti-spoofing Method for Print and Video Attacks☆75Jun 9, 2020Updated 5 years ago
- Image Segmentation for Intensity Inhomogeneity in Presence of High Noise - deformable model☆11Apr 24, 2021Updated 4 years ago
- using Arduino Nano and containerized Laravel☆10Apr 8, 2024Updated last year
- Sudoku Puzzle Solver and Generator☆10Mar 6, 2020Updated 6 years ago
- Code and pre-trained models for detecting spoofing attacks from images.☆40Dec 2, 2020Updated 5 years ago
- Example implementation of the Identity Verification using Amazon Rekognition whitepaper.☆48Sep 21, 2023Updated 2 years ago
- ☆10Aug 17, 2021Updated 4 years ago
- Ream time Emotion Detection using DeepFace library written in python.☆12Dec 1, 2022Updated 3 years ago
- ☆11Aug 30, 2023Updated 2 years ago
- 🚀 A comprehensive project analyzing Big Tech stock prices using time series analysis, volatility modeling, and macroeconomic indicators.…☆11Jun 29, 2024Updated last year
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 11 months ago
- 💪 Working 8 hours a day in front of a computer exposes you to specific health challenges. This guide provides community tips on improvin…☆12Aug 23, 2023Updated 2 years ago
- A shopping website with PHP and Laravel☆13Dec 23, 2022Updated 3 years ago
- A wrapper to concatenate network conditions using tc-netem by means of a simple configuration file.☆13Jul 20, 2023Updated 2 years ago
- 🐍 Run Object Detection Inferences in Python☆12Feb 3, 2020Updated 6 years ago
- YOLOv5 Segmentation Right in The Browser Using onnxruntime-web☆12Feb 20, 2023Updated 3 years ago
- ☆15Feb 25, 2023Updated 3 years ago
- 🔐 Google Cloud Workload Identity Federation Examples and How-To☆12Nov 24, 2025Updated 3 months ago
- Detection of Denial of service attack like Blackhole and Greyhole attack in wireless mesh network.☆16Aug 10, 2017Updated 8 years ago