Obviously Awesome

Facial Recognition: Types of Attacks & Anti-Spoofing Techniques

Presentation attacks - where the sensor is the input vector.

Indirect attacks - when the attacker has access to system internals. These are closely related to typical cybersecurity measures.

Original (Trung Anh Dang, Towards Data Science)