Research Article

Trace Attack against Biometric Mobile Applications

Figure 5

Alteration based on luminosity for fingerprint authentication applications.