Fig. 2From: Practical security and privacy attacks against biometric hashing using sparse recoveryBiohash inversion attacks. Illustration of the inversion attacks against biometric hashingBack to article page