Keyphrases
- countermeasures
- reconstructed image
- fingerprint images
- fingerprint recognition
- fingerprint identification
- neural network
- malicious attacks
- image processing
- key exchange protocol
- malicious users
- fingerprint matching
- cyber attacks
- feature extraction
- image reconstruction
- fingerprint verification
- edge detection
- multiscale
- attack detection
- fingerprint classification
- high quality
- data corruption
- defense mechanisms