Login / Signup
An analysis on attacker actions in fingerprint-copy attack in source camera identification.
Roberto Caldelli
Irene Amerini
Andrea Novi
Published in:
WIFS (2011)
Keyphrases
</>
data analysis
vision system
real time
feature extraction
image analysis
wireless sensor networks
biometric identification