fig2
Figure 2. Types of security attacks on a fingerprint authentication system[4].
Figure 2. Types of security attacks on a fingerprint authentication system[4].
All published articles are preserved here permanently:
https://www.portico.org/publishers/oae/