Abstract
This chapter presents the possibilities of applying the triangulation method in the biometric identification process. The chapter includes a method in field of computational geometry (specifically polygon triangulation) in combination with face recognition techniques. The chapter describes some authentication techniques with an emphasis on face recognition technologies and polygon triangulation as a fundamental algorithm in computational geometry and graphics. The proposed method is based on generating one’s own key (faceprint), where everyone has a potential key in a 3D view of their characteristic facial lines; therefore, everybody is the carrier of his/her own unique key that is generated from a triangulation of the scanned polygon. The proposed method could find application exactly in biometric authentication. This is a pretty interesting possibility of authenticating users because there is no possibility of stealing the key (as is the case with the approaches: “something you know” and “something you have”). By introducing this procedure of determining the authentication of users, unauthorized access to computers, mobile devices, physical locations, networks, or databases is made difficult. In experimental research, the authors present concrete possibilities of applying the polygon triangulation in the biometric identification process. The authors tested a proposed solution using the appropriate two sets of data. The results show that using the triangulation method in combination with the face recognition technique, the success rate of authentication is achieved equally well as recognition with the application of some other methods.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Saracevic, M., Selimi, A., & Selimovic, F. (2018). Generation of cryptographic keys with algorithm of polygon triangulation and Catalan numbers. Computer Science, 19(3), 243–256.
Loncarevic, Z., Saracevic, M., & Hadzic, M. (2018). Analysis of some techniques of biometric authentication systems with emphasis on 2D and 3D face recognition technology. Economic Challenges: Ekonomski izazovi, 7(13), 119–139.
Saracevic, M., Masovic, S., & Milosevic, D. (2013). Java implementation for triangulation of convex polygon based on Lukasiewicz’s algorithm and binary trees. Southeast European Journal of Soft Computing, 2(2), 40–45.
Gavrilova, M. (2007). Computational geometry and image processing in biometrics: On the path to convergence. In Image pattern recognition: Synthesis and analysis in biometrics (pp. 103–133). Singapore: Word Scientific.
Vibert, B., Le Bars, J. M., Charrier, C., & Rosenberger, C. (2017). Fingerprint class recognition for securing EMV transaction. In International conference on information systems security and privacy.
Parziale, G., & Niel, A. (2004). A fingerprint matching using minutiae triangulation. In Biometric authentication - lecture notes in computer science (Vol. 3072). Berlin: Springer.
Bebis, G., Deaconu, T., & Georgiopoulos, M. (1999). Fingerprint identification using delaunay triangulation. In Proceedings on international conference on information intelligence and systems.
Delac, K., Grgic, M., & Stewart, B. M. (2008). Recent advances in face recognition. Croatia: In-Tech.
Sirovich, L., & Meytlis, M. (2009). Symmetry, probability and recognition in face space. Proceedings of the National Academy of Sciences, 106(17), 6895–6899.
Kim, D., & Sung, J. (2009). Automated face analysis: Emerging technologies and research. New York: Digital Media Research Lab, LG Electronics.
Ding, L., & Martinez, A. M. (2010). Features versus context: An approach for precise and detailed detection and delineation of faces and facial features. Columbus, OH: Ohio State University.
Böhm, G., Galuppo, P., & Vesnaver, A. (2000). 3D adaptive tomography using Delaunay triangles and Voronoi polygons. Geophysical Prospecting, 48, 723–744.
Chiang, J. Y., Wang, R. C., & Chang, J. L. (1997). The application of delaunay triangulation to face recognition. In Proc. national computer symp, TaiChuang, Taiwan (Vol. 1, pp. 27–32).
Zhang, G., & Wang, Y. (2009). Faceprint: Fusion of local features for 3D face recognition. In Advances in biometrics - Lecture notes in computer science (Vol. 5558). New York: Springer.
Koshy, T. (2009). Catalan numbers with applications. New York: Oxford University Press.
Saracevic, M., & Selimi, A. (2019). Convex polygon triangulation based on ballot problem and planted trivalent binary tree. Turkish Journal of Electrical Engineering and Computer Sciences, 27, 346–361.
Stanimirović, P., Krtolica, P., Saracevic, M., & Masovic, S. (2014). Decomposition of catalan numbers and convex polygon triangulations. International Journal of Computer Mathematics, 91(6), 1315–1328.
Selimi, A., & Saracevic, M. (2018). Computational geometry applications. Southeast European Journal of Soft Computing, 7(2), 8–15.
Zhang, Y., & Zhou, Z. H. (2010). Cost-sensitive face recognition. Nanjing, China: Nat. Key Lab. for Novel Software Technol. Nanjing Univ..
Kumar, R., Barmpoutis, A., Banerjee, A., & Vemuri, B. C. (2011). Non-Lambertian reflectance modeling and shape recovery for faces using tensor splines. Gainesville, USA: Dept. of Comput. & Inf. Sci. & Eng., Univ. of Florida.
Suo, I., Zhu, S. C., Shan, S., & Chen, X. (2010). A compositional and dynamic model for face aging. Beijing, China: Grad. Univ. of Chinese Acad. of Sci..
Xue, Z., Ming, D., Song, W., Wan, B., & Jin, S. (2010). Infrared gait recognition based on wavelet transform and support vector machine. Tianjin, China: College of Precision Instruments and Optoelectronics Engineering, Tianjin University.
Phillips, P. J., Scruggs, W.T., O’Toole, A. J., Flynn, P. J. (2007). FRVT 2006 and ICE 2006 large-scale results. NISTIR 7408 - National Institute of Standards and Technology, USA.
Lončarević, Z. (2011). Authentication techniques based on face recognition. In Master thesis: Faculty of Organizational Sciences. Belgrade, Serbia: University of Belgrade.
Hassanpour, R., Atalay, V. (2004). Delaunay triangulation based 3D human face modeling from uncalibrated images. In Conference on computer vision and pattern recognition workshop, Washington, USA (p. 75).
Queirolo, C. C., Silva, L., Bellon, O. R. P., & Segundo, M. P. (2010). 3D face recognition using simulated annealing and the surface interpenetration measure. Curitiba, Brazil: Univ. Fed. do Parana.
Park, U., Tong, Y., & Jain, A. K. (2010). Age-invariant face recognition. East Lansing, MI: Dept. of Comput. Sci. & Eng., Michigan State Univ..
Berretti, S., Del Bimbo, A., & Pala, P. (2010). 3D face recognition using iso-geodesic stripes. Firenze, Italy: Dipt. di Sist. e Inf. Universitd degli Studi di Firenze.
Wang, Y., Liu, J., & Tang, X. (2010). Robust 3D face recognition by local shape difference boosting. Hong Kong, China: Dept. of Inf. Eng. Chinese Univ. of Hong Kong.
Kemelmacher-Shlizerman, I., & Basri, R. (2011). 3D face reconstruction from a single image using a single reference face shape. Seattle, USA: Dept. of Comput. Sci. & Eng., Univ. of Washington.
Liu, I., Chen, Y., & Tang, X. (2011). Decomposition of complex line drawings with hidden lines for 3D planar-faced manifold object reconstruction. Hong Kong, China: Dept. of Inf. Eng. Chinese Univ. of Hong Kong.
Keil, J. M., & Gutwin, C. A. (1989). The Delaunay triangulation closely approximates the complete Euclidean graph. In Algorithms and data structures - Lecture notes in computer science (Vol. 382). New York: Springer.
Sanguthevar, R. (2005). On the Euclidean minimum spanning tree problem. Computing Letters, 1(1), 11–14.
Evgeny, Y., Eckart, S., Ulrich, S., & Kurt, T. (2005). An O(n log n) Heuristic for the Euclidean traveling salesman problem. Research Report Series on University of Würzburg. Institute of Computer Science, Germany.
Letchford, A. N., & Pearson, N. A. (2008). Good triangulations yield good tours. Computers & Operations Research, 35(2), 638–647.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Saračevič, M., Elhoseny, M., Selimi, A., Lončeravič, Z. (2021). Possibilities of Applying the Triangulation Method in the Biometric Identification Process. In: Bilan, S., Elhoseny, M., Hemanth, D.J. (eds) Biometric Identification Technologies Based on Modern Data Mining Methods. Springer, Cham. https://doi.org/10.1007/978-3-030-48378-4_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-48378-4_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-48377-7
Online ISBN: 978-3-030-48378-4
eBook Packages: Computer ScienceComputer Science (R0)