Fig. 16From: Fingerprint restoration using cubic Bezier curveCMC curves with and without proposed method in type-I attackBack to article page