Research Article
[Retracted] Cloud Data Access Prevention Method in Face Recognition Technology Based on Computer Vision
Figure 8
Face detection performance analysis of Replay Attack library. (a) Deep fool method. (b) Methods based on minimum perturbation dimension.
(a) |
(b) |