This preview shows page 1. Sign up to view the full content.
Unformatted text preview: •This is the secret datathat attacker wants to mimic •Synthetic minutiae setsinput to the matcher •Attacker tries to generate a minutia set that results in a high matching score using the scores returned by the matcher....
View Full Document
This document was uploaded on 11/03/2011 for the course BIOLOGY BSC1105 at Broward College.
- Fall '10