“…A comparative analysis against existing methods was performed to check the authenticity, accuracy, and originality of the presented biometric templates encryption technique for real-time applications. We have compared our presented technique with other existing techniques [8], [20], [27], [28], [34]. The type of data, applied process, transform domain, permutation and substitution methods, the number of keys, sensitivity to secret keys, keyspace, entropy, PSNR of the decrypted image, and attack analysis are among the parameters considered for comparison, as described in Table 12.…”