Research Article

Trace Attack against Biometric Mobile Applications

Figure 10

Alteration based on negative image for fingerprint authentication applications.