fig2

Figure 2. Types of security attacks on a fingerprint authentication system[4].

Figure 2. Types of security attacks on a fingerprint authentication system[4].
All published articles are preserved here permanently:
https://www.portico.org/publishers/oae/