Research Article

Trace Attack against Biometric Mobile Applications

Figure 2

Difference between sensor attacks and the proposed attack in a biometric authentication system.