Fig. 5From: On the methodology of fingerprint template protection schemes conception : meditations on the reliabilityThe genuine-imposter scores distribution for the proposed system under stolen-key scenario on FVC 2002 DB1 (a) and DB2 (b)Back to article page