Abstract: Face recognition systems use the templates (extracted from users’ face images) stored in the system’s database for recognition. In a template inversion attack, the adversary gains access to ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results