Return to Article Details The vulnerability of biometric technologies in authentication Download Download PDF