Computational and Mathematical Methods in Medicine / 2015 / Article / Fig 8

Research Article

A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication

Figure 8

The comparison of four fingerprint templates in three different authentication experiments using different . (a) Three transformed templates with the same fingerprint when . (b) Three transformed templates with the same fingerprint when . (c) The distance between transformed and original templates. (d) The orientation difference between transformed and original templates.
(a)
(b)
(c)
(d)

We are committed to sharing findings related to COVID-19 as quickly as possible. We will be providing unlimited waivers of publication charges for accepted research articles as well as case reports and case series related to COVID-19. Review articles are excluded from this waiver policy. Sign up here as a reviewer to help fast-track new submissions.