(1) Denial of service attack, making the fingerprint collector not working and unable to input fingerprints. (2) Forgery fingerprint attack, use artificial fake fingerprint Song instead of human...
The fingerprint features commonly used by fingerprint attendance access control machines in fingerprint identification are nodes, singular points and lines, etc. The nodes mainly include endpoints...