Return to Article Details Complex for studying the principles of fingerprint authentication in information security systems Download Download PDF