Research Article

Enhancing Accuracy in a Touch Operation Biometric System: A Case on the Android Pattern Lock Scheme

Table 8

Attacking user 1 with user 2.

Attack 1 with 2123456
ā€‰401472457512468674

111410.54760.44760.46790.39560.45290.2181
211430.55060.45020.47060.39820.45560.22
39230.27250.20340.21720.16890.2070.062
48760.22560.16320.17560.13250.16650.0408
58490.20070.14210.15370.11360.14520.0306
613800.95840.82450.85190.75340.83170.4984