Fig. 6From: On the methodology of fingerprint template protection schemes conception : meditations on the reliabilityThe ROC curve under stolen-token scenario for FVC 2002 DB1 and DB2Back to article page