In this article, we will learn the pros and cons of using Face Recognition as an authentication method. We will also see how it can be spoofed and the methods that can be used to detect the spoofing ...
Latest From the Blog
May 24, 2022
14 Comments
DepthAI Pipeline Overview: Creating a Complex Pipeline
May 17, 2022
1 Comment
TensorFlow Lite Model Maker: Create Models for On-Device Machine Learning
May 10, 2022
3 Comments
TensorFlow Lite: TFLite Model Optimization for On-Device Machine Learning
May 3, 2022
4 Comments
Object Detection With Depth Measurement Using Pre-trained Models With OAK-D
April 26, 2022
5 Comments
YOLOv5: Expert Guide to Custom Object Detection Training
April 19, 2022
1 Comment
- « Go to Previous Page
- Page 1
- Interim pages omitted …
- Page 34
- Page 35
- Page 36
- Page 37
- Page 38
- Interim pages omitted …
- Page 80
- Go to Next Page »