1. [1] A. Adler, “Sample images can be independently restored from face recognition templates,” in
2. CCECE, 2003.
3. [2] J. Galbally, C. McCool, J. Fierrez, S. Marcel, and J. Ortega-Garcia, “On the vulnerability of
4. face verification systems to hill-climbing attacks,” Pattern Recognition, 2010.
5. [3] Y. C. Feng, M.-H. Lim, and P. C. Yuen, “Masquerade attack on transform-based binary-template