Analysis of the attack potential in low cost spoofing of fingerprints | Publicación