Research Article

Trace Attack against Biometric Mobile Applications

Figure 4

Different steps of minutia point extraction.
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)
(j)
(k)