The question above has multiple choices;
a) Hamming distance
b) Match percentage
c) Legacy amount 100.
d) PDA reading
The answer is a) Hamming distance
Biometric authentications like other technologies are vulnerable to attacks such as spoofing and transmission. Binary template representations in recent research provide significant improvements in efficiency without compromising data accuracy for biometric modalities like iris, fingerprints, and palm prints.
Any binary biometric representation that uses hamming distance and converts it into a privacy preserving secure protocol comparison provides template protection.