Research Article

A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication

Figure 8

The comparison of four fingerprint templates in three different authentication experiments using different . (a) Three transformed templates with the same fingerprint when . (b) Three transformed templates with the same fingerprint when . (c) The distance between transformed and original templates. (d) The orientation difference between transformed and original templates.
(a)
(b)
(c)
(d)