Fig. 3From: Presentation attack detection and biometric recognition in a challenge-response formalismA model biometric system with challenge response as it might be embedded in an existing biometric system. It includes a challenge generator (top-left), a biometric source (top-right), a sensor (bottom-right) and a response verifier (bottom-left)Back to article page