Currently, spoofing attacks using imitations of legitimate user fingerprints compromise biometric systems. Five representative spoofing materials…
Systems for detecting face presentation attacks are facing great challenges since new 3D facial masks are…