Research Article

Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?

Figure 9

Break-down of IAPMR results by each of the 15 unexperienced attackers, separated by attacker and device.