Figure 5From: Fingerprint-based crypto-biometric system for network securityA snapshot of fused features and shuffled features.(a) Modified minutiae points of sender. (b) Modified minutiae points of receiver. (c) Feature level fusion. (d) Shuffled minutiae points.Back to article page