Research Article

Trace Attack against Biometric Mobile Applications

Figure 9

Alteration based on part of user’s image for fingerprint authentication applications.