Abstract
Presentation attacks such as printed iris images or patterned contact lenses can be used to circumvent an iris recognition system. Different solutions......
小提示:本篇文献需要登录阅读全文,点击跳转登录