On the vulnerability of palm vein recognition to spoofing attacks | Publicación