Fig. 4From: Presentation attack detection and biometric recognition in a challenge-response formalismNumber of published biometric challenge-response protocol papers across the past 20 yearsBack to article page