Fig. 1From: Quantization in zero leakage helper data schemesCommon steps in a privacy-preserving biometric verification schemeBack to article page