Research Article

A Privacy-Preserving Biometric Recognition System with Visual Cryptography

Figure 2

The encryption time comparison between our and Lee’s [24] schemes.