Fig. 3From: Adversarial attacks on fingerprint liveness detectionThe flow chart of Chugh’s methodBack to article page