Review Article

Privacy-Preserving Biometric Authentication: Challenges and Directions

Figure 3

Example of a recovery template attack for a BAS with biometric traits represented as vectors in and with threshold . The values are chosen ad hoc to be able to picture the example in an easy and intuitive way and do not reflect the parameters used in real applications (usually, is smaller than and is in the order of 2048).