Research Article
Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?
Table 2
Characteristics of the mobile device sensors used for the evaluation, according to sensor type, shape, and location on the device.
|