From: On the methodology of fingerprint template protection schemes conception : meditations on the reliability
FVC 2002 DB1
FVC 2002 DB2
Unprotected system
1.02%
0.13%
Different-key scenario
0%
Stolen-key scenario
3.09%
1.83%