“…In the verification phase, the key can be released by combining the protected template with a newly captured probe biometric sample. Examples of known key binding and release implementations are the Code-Offset Construction [40,64,65], Fuzzy Commitment Scheme (FCS) [36,[66][67][68][69][70][71], the Helper Data System (HDS) [33][34][35]72,73], Quantization Index Modulation (QIM) [48,74,75], and the Fuzzy Vault [46,[76][77][78][79][80][81][82][83][84][85][86]. The first three schemes are related to each other as portrayed in Figure 2.6.…”