no code implementations • 15 Dec 2022 • J. Galbally, J. Fierrez, F. Alonso-Fernandez, M. Martinez-Diaz
The vulnerabilities of fingerprint-based recognition systems to direct attacks with and without the cooperation of the user are studied.