Enhancing Accuracy in a Touch Operation Biometric System: A Case on the Android Pattern Lock Scheme
Table 8
Attacking user 1 with user 2.
Attack 1 with 2
1
2
3
4
5
6
401
472
457
512
468
674
1
1141
0.5476
0.4476
0.4679
0.3956
0.4529
0.2181
2
1143
0.5506
0.4502
0.4706
0.3982
0.4556
0.22
3
923
0.2725
0.2034
0.2172
0.1689
0.207
0.062
4
876
0.2256
0.1632
0.1756
0.1325
0.1665
0.0408
5
849
0.2007
0.1421
0.1537
0.1136
0.1452
0.0306
6
1380
0.9584
0.8245
0.8519
0.7534
0.8317
0.4984
We are committed to sharing findings related to COVID-19 as quickly as possible. We will be providing unlimited waivers of publication charges for accepted research articles as well as case reports and case series related to COVID-19. Review articles are excluded from this waiver policy. Sign up here as a reviewer to help fast-track new submissions.