“…To mitigate other attacks such as similarity-based, hill-climbing, preimage, correlation, crossmatch, masquerade, and substitution in fingerprint and face biometric features, Yang et al [100] and Agarwal and Bansal [79] are able to use a linear convolution and an alignment-free non-invertible transformation function, respectively, to mitigate cross-matching attacks. Similarity correlation, pre-image, dictionary, and masquerade attacks were also mitigated in the works of Abdullahi et al [82] and Sardar et al [85]. Apart from inversion and masquerade attacks, Bedari et al [77] also use the Dyno key model to overcome attacks related to revoked templates.…”