Face presentation attack detection (aka face anti-spoofing, face spoofing detection or face liveness detection) using guided scale texture
☆17Apr 5, 2021Updated 4 years ago
Alternatives and similar repositories for Guided-Scale-Texture-for-Face-Presentation-Attack-Detection
Users that are interested in Guided-Scale-Texture-for-Face-Presentation-Attack-Detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆23Jan 5, 2017Updated 9 years ago
- ☆95Feb 22, 2017Updated 9 years ago
- Codes for TIFS paper☆43Sep 7, 2016Updated 9 years ago
- Face Liveness Detection in C++ and MATLAB.☆57Nov 28, 2020Updated 5 years ago
- A Java implementation of local binary patterns to distinguish real faces from fake ones based on single images.☆21Feb 17, 2016Updated 10 years ago
- ☆12Oct 3, 2023Updated 2 years ago
- CNN archictecture for face anti-spoofing☆177Oct 18, 2017Updated 8 years ago
- python and Tensorflow implementation of a CNN for face anti-spoofing☆83Aug 26, 2020Updated 5 years ago
- Analysis pipeline for quick ML analyses.☆11Oct 4, 2018Updated 7 years ago
- MatLab project to discern between real faces and spoofing attempts using 3D printed masks☆16May 19, 2017Updated 8 years ago
- Common CNN models defined for PyTorch Lightning☆10Jul 28, 2022Updated 3 years ago
- Tampered image recognition based on convolution neural network.☆19Jun 6, 2015Updated 10 years ago
- An Face Anti-spoofing Method for Print and Video Attacks☆75Jun 9, 2020Updated 5 years ago
- ☆135May 21, 2016Updated 9 years ago
- ☆14Apr 15, 2018Updated 7 years ago
- ☆10Jun 10, 2020Updated 5 years ago
- Data centric pub/sub framework based on Ice☆13Oct 15, 2024Updated last year
- Tensorflow slim implementation of spoofnet presented in the paper: Deep Representations for Iris, Face, and Fingerprint Spoofing Detectio…☆26Oct 16, 2018Updated 7 years ago
- Multiobjective Optimization Training of PLDA for Speaker Verification☆10Jun 14, 2018Updated 7 years ago
- The project is to recognize spoofing attack of faces using a normal flat camera without any extra sensors (such as depth, IR).☆10Jul 25, 2022Updated 3 years ago
- octave multi-channel signal processing☆10May 11, 2014Updated 11 years ago
- My own comments and modifications to word2vec by Mikolov et al.☆16Jan 31, 2016Updated 10 years ago
- This is a project about detecting spoofing in images using CNN and SVM☆33Jul 19, 2018Updated 7 years ago
- ☆15Apr 1, 2020Updated 5 years ago
- Split Bregman spatiotemporal total variation for MRI☆13Sep 30, 2017Updated 8 years ago
- Satellite package for LBP based face anti-spoofing☆22Jul 13, 2012Updated 13 years ago
- Example codes appears in lectures☆22Jan 11, 2022Updated 4 years ago
- Cisco work on the Opus codec☆29Sep 5, 2014Updated 11 years ago
- Repository for paper "Robust lensless image reconstruction via PSF estimation"☆18Sep 28, 2022Updated 3 years ago
- FloydHub quick start project - train TensorFlow model with MNIST dataset☆25Nov 20, 2018Updated 7 years ago
- 完成基于 yolov3 与 TensorRT 的 快速目标检测与基于 sgm 与 cuda 的 双目立体重建,发送类别,概率,以及物体在相机坐标系下的xyz☆17Dec 25, 2020Updated 5 years ago
- Match schema attributes of relational databases by value similarity. As a study assignment, this isn't well documented, but you can conta…☆24Oct 18, 2019Updated 6 years ago
- ☆10Apr 2, 2013Updated 12 years ago
- Feasibility study of sidelobe reduction techniques for Synthetic Aperture Sequential Beamforming☆13May 11, 2014Updated 11 years ago
- ☆19Feb 22, 2024Updated 2 years ago
- Algorithms for "schema matching"☆26Jul 6, 2016Updated 9 years ago
- Distributed, Column-oriented storage, Realtime analysis, High performance Database☆20Oct 3, 2024Updated last year
- This file is an implementation of the algorithm proposed in paper 'Phase-Based Dual-Microphone Robust Speech Enhancement'.☆18Aug 22, 2018Updated 7 years ago
- NLP project, based on Bert/UNILM☆23Dec 29, 2019Updated 6 years ago