1 Introduction Biometric authentication methods have become widespread on mobile devices.However,the two widely deployed schemes,i.e.,face and fingerprint authentication,rely on users'sensitive physiological trait...1 Introduction Biometric authentication methods have become widespread on mobile devices.However,the two widely deployed schemes,i.e.,face and fingerprint authentication,rely on users'sensitive physiological traits,raising serious privacy concerns[1].展开更多
基金supported in part by the National Key R&D Program of China(No.2021YFB2700200)the National Natural Science Foundation of China(Grant No.62172303)+1 种基金the Key R&D Program of Hubei Province(No.2024BAB018)the Key R&D Program of Shandong Province(No.2022CXPT055).
文摘1 Introduction Biometric authentication methods have become widespread on mobile devices.However,the two widely deployed schemes,i.e.,face and fingerprint authentication,rely on users'sensitive physiological traits,raising serious privacy concerns[1].