Login / Signup

An evaluation of direct attacks using fake fingers generated from ISO templates.

Javier GalballyRaffaele CappelliAlessandra LuminiGuillermo González de RiveraDavide MaltoniJulian FiérrezJavier Ortega-GarciaDario Maio
Published in: Pattern Recognit. Lett. (2010)
Keyphrases
  • countermeasures
  • data sets
  • evaluation method
  • evaluation process
  • generation process
  • information systems
  • multiresolution
  • information retrieval systems
  • computer security
  • traffic analysis