Journals
Publish with us
Publishing partnerships
About us
Blog
Mobile Information Systems
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Mobile Information Systems
/
2016
/
Article
/
Fig 4
/
Research Article
Trace Attack against Biometric Mobile Applications
Figure 4
Different steps of minutia point extraction.
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)
(j)
(k)