Research Article
Biometrics Based Privacy-Preserving Authentication and Mobile Template Protection
Table 4
EER (%) comparison between the proposed system and similar systems under the lost-key scenario.
| Methods | 2002 DB1 | 2002 DB2 | 2002 DB3 | 2004 DB2 | 1VS1 | FVC | 1VS1 | FVC | 1VS1 | FVC | 1VS1 | FVC |
| Yang et al. [5] | 5.93 | - | 4 | - | - | - | - | - | Ahn et al. [6] | - | 7.18 | - | 3.61 | - | 11.80 | - | - | Yang and Busch [7] | - | - | 13 | - | - | - | - | - | Yang et al. [8] | - | - | 0.85 | - | - | - | - | - | Ahmad et al.[9] | 9 | - | 6 | - | 27 | - | - | - | Wang and Hu [10] | 3.50 | - | 4 | 5 | 7.5 | - | - | - | Wang and Hu [11] | 2 | - | 2.30 | 3 | 6.12 | - | - | - | Wang and Hu [12] | 1 | - | 2 | - | 5.20 | - | 13.30 | - | Jin et al. [13] | 3.07 | - | 1.02 | - | - | - | - | - | Jin et al.[14] | 4.36 | - | 1.77 | - | - | - | 21.82 | - | Ferrara et al. [15] 2P-MCC64,64 | - | 3.30 | - | 1.80 | - | 7.80 | - | - | Instance 3 (proposed system) | 0.32 | 5.75 | 0.64 | 4.71 | 4.57 | 10.22 | 9.90 | 12.00 |
|
|