Research Article

[Retracted] Cloud Data Access Prevention Method in Face Recognition Technology Based on Computer Vision

Figure 7

Face detection performance analysis of Print Attack library. (a) DeepFool method. (b) Methods Based on Minimum Perturbation Dimension.
(a)
(b)