Research Article
Trace Attack against Biometric Mobile Applications
Table 2
Results of face authentication application.
| Face authentication application | | Alteration | Levels | Number of associations | Number of associations in | Reference image | Altered image |
| Yale database | Blur | 1 | 103 | 163 | 134 | 2 | 65 | 106 | 6 | 12 | 43 | Noise | 1.45 | 65 | 79 | 169 | 49.9 | 75 | 170 | 90.36 | 119 | 123 | Luminosity | −44.61 | 86 | 79 | 118 | −15.64 | 114 | 126 | 31 | 104 | 118 | Part of user image | 48 | 68 | 79 | 118 | 96 | 61 | 99 | 240 | 36 | 60 | Mosaic | — | 65 | 98 | 110 | — | 35 | 79 | 113 | — | 8 | 141 | 150 |
| AR database | Blur | 1 | 158 | 195 | 169 | 3 | 133 | 152 | 6 | 81 | 121 | Noise | 1.4 | 137 | 195 | 314 | 49.62 | 189 | 248 | 90.36 | 140 | 198 | Luminosity | −44.61 | 181 | 195 | 194 | −15.64 | 190 | 195 | 31 | 151 | 192 | Part of user image | 48 | 147 | 195 | 204 | 144 | 130 | 179 | 240 | 105 | 164 | Mosaic | — | 151 | 264 | 305 | — | 146 | 251 | 451 | — | 131 | 195 | 245 |
|
|