Research Article

Privacy-Preserving Fingerprint Authentication Using D-H Key Exchange and Secret Sharing

Figure 1

System architecture.