Fig. 3From: Practical security and privacy attacks against biometric hashing using sparse recoveryAttacks. Illustration of the proposed attackBack to article page