1. D. V. Pakulich and S. A. Alyamkin, ‘‘Application of convolutional neural networks for face anstispoofing,’’ Optoelectron., Instrum. Data Process. 57, 412–418 (2021).
https://doi.org/10.3103/S8756699021040099
2. A. S. Ismagilova and N. D. Lushnikov, ‘‘Multifunctional software for protecting user accounts using biometric technologies,’’ Zashch. Inf. Insaid, No. 2, 28–31 (2021).
3. K. S. Gurtova, ‘‘Method for information protection of digital documents using invisible digital watermarks and its implementation,’’ Sovrem. Inf. Tekhnol. IT-Obraz. 18 (1), 152–166 (2022). https://doi.org/10.25559/SITITO.18.202201.152-166
4. G. A. Akilin and E. V. Gritskevich, ‘‘Features of simulation modeling of information systems using biometric identification by face,’’ Interexpo GEO-Siberia 6 (2), 61–65 (2019). https://doi.org/10.33764/2618-981x-2019-6-2-61-65
5. S. Haykin, Neural Networks: A Comprehensive Foundation (Macmillan, 1994).