no code implementations • 21 Dec 2022 • Harkeerat Kaur, Rishabh Shukla, Isao Echizen, Pritee Khanna
These proxy biometrics can be generated from original ones only with the help of a user-specific key.
Privacy Preserving