Abstract
Presentation attacks such as using a contact lens with a printed pattern or printouts of an iris can be utilized to bypass a biometric security system......
小提示:本篇文献需要登录阅读全文,点击跳转登录