Research Article

Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?

Table 2

Characteristics of the mobile device sensors used for the evaluation, according to sensor type, shape, and location on the device.

Mobile device 
(MD)
Sensor typeSensor shapeSensor location

MD1SwipeRectangularFront
MD2TouchCircularFront
MD3TouchRectangularFront
MD4TouchRectangularSide
MD5TouchCircularBack