Research Article

[Retracted] Cloud Data Access Prevention Method in Face Recognition Technology Based on Computer Vision

Table 5

Experimental results of the Replay Attack library.

ā€‰CNNAdd occlusion trained CNNMRCNN

Detection of traditional attack methodsHTER (%)8.7511.96.4

Attack difficulty of adversarial samplesThe mean minimum perturbation magnitude of the DeepFool method0.0750.150.14
The mean minimum disturbance amplitude of the Ma method0.0880.1140.182