Research Article

Biometrics Based Privacy-Preserving Authentication and Mobile Template Protection

Figure 3

An example of (a) Voronoi diagram, (b) Delaunay triangulation (bold line).
(a)
(b)