Fig. 5From: Presentation attack detection and biometric recognition in a challenge-response formalismSpread of papers across the different categories.Back to article page