With the existing anonymous authentication schemes based on biometrics,the user and the server can create the same session key after mutual authentication.If th
To address the problem that traditional keypoint detection methods are susceptible to complex backgrounds and local similarity of images resulting in inaccurate descriptor matching and bias in visual