Return to Article Details
Analysis of Some Methods for Determining a Print Attack Into a Biometric Personal Identification System
Download
Download PDF