Research Article
Enhancing Accuracy in a Touch Operation Biometric System: A Case on the Android Pattern Lock Scheme
Table 8
Attacking user 1 with user 2.
| Attack 1 with 2 | 1 | 2 | 3 | 4 | 5 | 6 | ā | 401 | 472 | 457 | 512 | 468 | 674 |
| 1 | 1141 | 0.5476 | 0.4476 | 0.4679 | 0.3956 | 0.4529 | 0.2181 | 2 | 1143 | 0.5506 | 0.4502 | 0.4706 | 0.3982 | 0.4556 | 0.22 | 3 | 923 | 0.2725 | 0.2034 | 0.2172 | 0.1689 | 0.207 | 0.062 | 4 | 876 | 0.2256 | 0.1632 | 0.1756 | 0.1325 | 0.1665 | 0.0408 | 5 | 849 | 0.2007 | 0.1421 | 0.1537 | 0.1136 | 0.1452 | 0.0306 | 6 | 1380 | 0.9584 | 0.8245 | 0.8519 | 0.7534 | 0.8317 | 0.4984 |
|
|