Fig. 5

The genuine-imposter scores distribution for the proposed system under stolen-key scenario on FVC 2002 DB1 (a) and DB2 (b)
The genuine-imposter scores distribution for the proposed system under stolen-key scenario on FVC 2002 DB1 (a) and DB2 (b)