Figure 6From: Fingerprint-based crypto-biometric system for network securityShuffling method.Back to article page