Data Privacy

Facial Recognition: Types of Attacks and Anti-Spoofing Techniques

Dissolving the myth of easy-to-fake face recognition

Anh T. Dang
Towards Data Science
5 min readOct 10, 2020

--

Image by Author

Thanks to the quick advance in technology, especially in computer science and electronics. Nowadays, facial recognition is becoming the second most largely deployed biometric authentication method at the world level in…

--

--

I write about things that I like and things that I don’t, mainly in the business, art and tech sphere. Sign up for my newsletter http://junryo.xyz