
Security News
MCP Community Begins Work on Official MCP Metaregistry
The MCP community is launching an official registry to standardize AI tool discovery and let agents dynamically find and install MCP servers.
this is an opensource wrapper library for the most common face detection models.
It also provides multiple face utilities such as face cropping.
more to be added in the next releases
OS X & Linux using PIP :
pip install face-utils
By creating an object of the face detection model you want you can use it to detect the faces in images.
I have also implemented outputs forms such as
1 : (x,y,w,h) and 2 : (top,right,bottom,left )
ability to crop the face from the image given the detector result
You can also zoom in and out from the face.
import cv2
from face_utils.detection import Detector
from face_utils.cropping import cropping
imgPath = "files/Obama.jpg"
img = cv2.imread(imgPath)
img= np.array(img)
model = Detector("hog")
bbox = model.detect(img,2) #using (x,y,w,h) return mode
face = cropping.crop(img,bbox,1,80,80)
input :
output :
MIT
© Digified 2021
FAQs
opensource wrapper library for face detection algorithms and other utilities
We found that face-utils demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
The MCP community is launching an official registry to standardize AI tool discovery and let agents dynamically find and install MCP servers.
Research
Security News
Socket uncovers an npm Trojan stealing crypto wallets and BullX credentials via obfuscated code and Telegram exfiltration.
Research
Security News
Malicious npm packages posing as developer tools target macOS Cursor IDE users, stealing credentials and modifying files to gain persistent backdoor access.