Figure 8From: Facial Recognition in Uncontrolled Conditions for Information SecurityAn example of repeat subject. First sessionSecond sessionBack to article page