Noisy data appears very naturally in applications where the authentication is based on physical identifiers, such as human ...