Research Article

Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?

Figure 14

Examples of captured images of cooperative and noncooperative artefacts from the desktop sensors evaluation.
(a) Cooperative
(b) Noncooperative