Research Article

Trace Attack against Biometric Mobile Applications

Figure 8

Alteration based on noise for fingerprint authentication applications.