Fig. 1From: Practical security and privacy attacks against biometric hashing using sparse recoveryVerification setup. Illustration of biometric hashing-based verificationBack to article page