Figure 1:
Vulnerabilities in a biometric system (adapted from [9]).