fig3
Figure 3. Comparative analysis of authentication results using different algorithms. (A) Scores obtained from the different algorithms; (B) Authentication outcomes produced by different algorithms; (C) Intersection of authentication results derived from different scoring methods under the same criterion. ns indicates no significant difference.