Skip to main content

Table 3 The EER(%) comparison with some state-of-the-art methods under stolen-token scenario on FVC2002 DB1 and DB2

From: On the methodology of fingerprint template protection schemes conception : meditations on the reliability

Method/dataset

FVC 2002 DB1

FVC 2002 DB2

Ahmad et al. [30]

9

6

Ali et al. [26]

2

1

Ali et al. [27]

1.63

1

Jin et al. [16]

5.19

5.65

Jin et al. [33]

4.36

1.77

Sandhya and Prasad [34]

4.71

3.44

Sandhya et al. [35]

3.96

2.98

Wang and Hu [36]

3.5

4

Wang and Hu [37]

3

2

Yang et al. [38]

5.93

4

Yang et al. [39]

3.38

0.59

Proposed scheme

3.09

1.83