Figure 2From: A Simple Scheme for Constructing Fault-Tolerant Passwords from Biometric Data The structure of the verification scheme. Back to article page