Rath, S.Ramalingam, J.Seal, S.2026-02-032025IEEE Transactions on Information Forensics and Security, 2025, 20, , pp. 1765-176615566013https://doi.org/10.1109/TIFS.2025.3526057https://idr.nitk.ac.in/handle/123456789/20723Zhang et al. (2020) exhibit a fundamental mathematical flaw that renders their algorithm infeasible. Additionally, existing outsourcing protocols for PCA-based face recognition suffer from inadequate verification methods, undermining the reliability of these algorithms. © 2005-2012 IEEE.Consensus algorithmFace recognitionOutsourcingPrincipal-component analysisRobust verificationVerification methodPrincipal component analysisA Note on “Secure and Efficient Outsourcing of PCA-Based Face Recognition”