fig2
![A comprehensive survey of fingerprint presentation attack detection](https://image.oaes.cc/01ac7a20-a26a-4014-80e9-1c8b69caece1/4368.fig.2.jpg)
Figure 2. Types of security attacks on a fingerprint authentication system[4].
Figure 2. Types of security attacks on a fingerprint authentication system[4].
All published articles are preserved here permanently:
https://www.portico.org/publishers/oae/