Return to Article Details Methods of Protection Against Attacks on Biometric Authentication Systems Download Download PDF