Research Article

Trace Attack against Biometric Mobile Applications

Figure 1

Attack types and levels in a biometric authentication system.