Return to Article Details Analysis of Some Methods for Determining a Print Attack Into a Biometric Personal Identification System Download Download PDF