Research Article
Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?
Figure 14
Examples of captured images of cooperative and noncooperative artefacts from the desktop sensors evaluation.
(a) Cooperative |
(b) Noncooperative |