商业上 发表于 2025-4-1 05:18:16
https://doi.org/10.1007/978-3-531-93353-5e client side, the SHA-256 hash of the original fingerprint image and sensitive personal information are encrypted and embedded into the fingerprint image using an advanced lossless data hiding scheme. At the service provider side, after the hidden data are extracted out, the fingerprint image can bforebear 发表于 2025-4-1 07:36:23
http://reply.papertrans.cn/28/2799/279891/279891_62.png