Research Article
A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication
Table 6
The comparison between [
6] and this paper.
| |
Time of verification |
The security hypothesis | | | | GAR | FAR | GAR | FAR | GAR | FAR |
| [6] | 42 ms | SHA256 | 96.50 | 0.30 | 93.57 | 0.10 | 90.05 | 0 | This paper | 20 ms | | 95.88 | 0.14 | 93.35 | 0.02 | 89.61 | 0 |
|
|