Figure 1: Vulnerabilities in a biometric system (adapted from [9]).