Figure 2From: Facial Recognition in Uncontrolled Conditions for Information Security Overall system architecture. Back to article page