Fig. 7From: On the methodology of fingerprint template protection schemes conception : meditations on the reliabilityTransformation of an original fingerprint template using two different sets of user key parameters. a Original template, b transformed template using the first set, and c transformed template using the second setBack to article page