Research Article
[Retracted] Cloud Data Access Prevention Method in Face Recognition Technology Based on Computer Vision
Table 5
Experimental results of the Replay Attack library.
| ā | CNN | Add occlusion trained CNN | MRCNN |
| Detection of traditional attack methods | HTER (%) | 8.75 | 11.9 | 6.4 |
| Attack difficulty of adversarial samples | The mean minimum perturbation magnitude of the DeepFool method | 0.075 | 0.15 | 0.14 | The mean minimum disturbance amplitude of the Ma method | 0.088 | 0.114 | 0.182 |
|
|