Figure 3. Presentation attack detection methods, inspired by[8,9].
All published articles are preserved here permanently: