Figure 8From: Fingerprint-based crypto-biometric system for network securityHamming distances between genuine and impostor’s keys.(a) K shuf and fingerprints are unknown. (b) Only K shuf is known. (c) One fingerprint is known but K shuf is unknown. (d) One fingerprint and K shuf are unknown. (e) Known fingerprints but unknown K shuf.Back to article page