Research Article

[Retracted] Cloud Data Access Prevention Method in Face Recognition Technology Based on Computer Vision

Figure 15

Comparison of authentication accuracy.
(a)
(b)