Introduction to identity usurpation applied to biometric modalities | IEEE Conference Publication | IEEE Xplore