Respuesta :

The question above has multiple choices;

a)      Hamming distance

b)      Match percentage

c)       Legacy amount 100.

d)      PDA reading

The answer is a) Hamming distance


Biometric authentications like other technologies are vulnerable to attacks such as spoofing and transmission. Binary template representations in recent research provide significant improvements in efficiency without compromising data accuracy for biometric modalities like iris, fingerprints, and palm prints.

Any binary biometric representation that uses hamming distance and converts it into a privacy preserving secure protocol comparison provides template protection.