Analysis of fuzzy encryption schemes for the protection of biometric data by