Fig. 4From: On the methodology of fingerprint template protection schemes conception : meditations on the reliabilityThe genuine-imposter scores distribution for the unprotected system on FVC 2002 DB1 (a) and DB2 (b), and for the proposed system under Different-key scenario on FVC 2002 DB1 (c) and DB2 (d)Back to article page