Research Article

A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication

Figure 7

(a) The comparison between improved SHA1 and original SHA1. (b) The efficiency of improved SHA1 and original SHA1.
(a)
(b)