Figure 18From: A survey on biometric cryptosystems and cancelable biometricsPotential points of attack in generic biometric systems.Back to article page