Login / Signup

Analysis of the attack potential in low cost spoofing of fingerprints.

Ines Goicoechea-TelleriaJudith Liu-JimenezHelga C. Quiros-SandovalRaul Sánchez-Reillo
Published in: ICCST (2017)
Keyphrases
  • low cost
  • quantitative analysis
  • data sets
  • database
  • machine learning
  • information systems
  • case study
  • secret key