Skip to main content
. 2014 Aug 26;8:244. doi: 10.3389/fnins.2014.00244

Figure 5.

Figure 5

(A) Diagram of the proposed method in which a support vector machine (SVM) classifier is used. (B) Illustration of the face morphing software triggered by the classifier's result.

HHS Vulnerability Disclosure