Figure 13From: A survey on biometric cryptosystems and cancelable biometricsThe stolen-token scenario for cancelable biometrics.Back to article page