Login / Signup
DeepMasterPrint: Generating Fingerprints for Presentation Attacks.
Philip Bontrager
Julian Togelius
Nasir D. Memon
Published in:
CoRR (2017)
Keyphrases
</>
countermeasures
multimedia
malicious attacks
biometric template
neural network
watermarking scheme
generation process
computer security
database
web services
cooperative
security mechanisms
personal identification
image watermarking
detecting malicious