Figure 4From: Fingerprint-based crypto-biometric system for network securityA pictorial representation of Cartesian transformation.(a) Original fingerprint image, (b) Cells, (c) Cells which replaces the original cells, (d) Original minutiae points, (e) Minutiae points in cancelable template.Back to article page