Latest version: v1.1.0
The information on this page was curated by experts in our Cybersecurity Intelligence Team.
Fusion of spoofing counter measures for the REPLAY-ATTACK database (competition entry for 2nd competition on counter measures to 2D facial spoofing attacks, ICB 2013)
No known vulnerabilities found