Skip to main content

Table 3 The EER(%) comparison with some state-of-the-art methods under stolen-token scenario on FVC2002 DB1 and DB2

From: On the methodology of fingerprint template protection schemes conception : meditations on the reliability

Method/dataset FVC 2002 DB1 FVC 2002 DB2
Ahmad et al. [30] 9 6
Ali et al. [26] 2 1
Ali et al. [27] 1.63 1
Jin et al. [16] 5.19 5.65
Jin et al. [33] 4.36 1.77
Sandhya and Prasad [34] 4.71 3.44
Sandhya et al. [35] 3.96 2.98
Wang and Hu [36] 3.5 4
Wang and Hu [37] 3 2
Yang et al. [38] 5.93 4
Yang et al. [39] 3.38 0.59
Proposed scheme 3.09 1.83