Research Article

Trace Attack against Biometric Mobile Applications

Figure 3

Samples of altered images from the FVC2002 and Yale database.