Figure 2From: Fingerprint-based crypto-biometric system for network security(x,y) coordinate space is divided into cells, and the equivalent cell numbers are shown in right.Back to article page