Skip to main content

Biometrics in an Adversarial Environment: Security and Privacy - Part 1 of 2