Fig. 1From: Presentation attack detection and biometric recognition in a challenge-response formalismA selection of three applications that all share the same biometric source. Application 1 is lacking in security and leaking data to a malicious agent. This agent attempts to use said data on an application 2 without PAD and succeeds. It further attempts to use the data on an application 3 with PAD and failsBack to article page