Research Article
A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication
Figure 8
The comparison of four fingerprint templates in three different authentication experiments using different . (a) Three transformed templates with the same fingerprint when . (b) Three transformed templates with the same fingerprint when . (c) The distance between transformed and original templates. (d) The orientation difference between transformed and original templates.
(a) |
(b) |
(c) |
(d) |