Login / Signup
Active Attack that Exploits Biometric Similarity Difference and Basic Countermeasures.
Pin Lyu
Wandong Cai
Yao Wang
Published in:
ADHOCNETS/TRIDENTCOM (2021)
Keyphrases
</>
countermeasures
information security
power analysis
similarity measure
rural areas
java card
security measures
cyber attacks
traffic accidents
match scores
computer security
biometric authentication
biometric systems
feature extraction
case study
user authentication
security issues
face recognition