Skip to main content

Possibilities of Applying the Triangulation Method in the Biometric Identification Process

  • Chapter
  • First Online:
Biometric Identification Technologies Based on Modern Data Mining Methods

Abstract

This chapter presents the possibilities of applying the triangulation method in the biometric identification process. The chapter includes a method in field of computational geometry (specifically polygon triangulation) in combination with face recognition techniques. The chapter describes some authentication techniques with an emphasis on face recognition technologies and polygon triangulation as a fundamental algorithm in computational geometry and graphics. The proposed method is based on generating one’s own key (faceprint), where everyone has a potential key in a 3D view of their characteristic facial lines; therefore, everybody is the carrier of his/her own unique key that is generated from a triangulation of the scanned polygon. The proposed method could find application exactly in biometric authentication. This is a pretty interesting possibility of authenticating users because there is no possibility of stealing the key (as is the case with the approaches: “something you know” and “something you have”). By introducing this procedure of determining the authentication of users, unauthorized access to computers, mobile devices, physical locations, networks, or databases is made difficult. In experimental research, the authors present concrete possibilities of applying the polygon triangulation in the biometric identification process. The authors tested a proposed solution using the appropriate two sets of data. The results show that using the triangulation method in combination with the face recognition technique, the success rate of authentication is achieved equally well as recognition with the application of some other methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Saracevic, M., Selimi, A., & Selimovic, F. (2018). Generation of cryptographic keys with algorithm of polygon triangulation and Catalan numbers. Computer Science, 19(3), 243–256.

    Article  Google Scholar 

  2. Loncarevic, Z., Saracevic, M., & Hadzic, M. (2018). Analysis of some techniques of biometric authentication systems with emphasis on 2D and 3D face recognition technology. Economic Challenges: Ekonomski izazovi, 7(13), 119–139.

    Google Scholar 

  3. Saracevic, M., Masovic, S., & Milosevic, D. (2013). Java implementation for triangulation of convex polygon based on Lukasiewicz’s algorithm and binary trees. Southeast European Journal of Soft Computing, 2(2), 40–45.

    Google Scholar 

  4. Gavrilova, M. (2007). Computational geometry and image processing in biometrics: On the path to convergence. In Image pattern recognition: Synthesis and analysis in biometrics (pp. 103–133). Singapore: Word Scientific.

    Chapter  Google Scholar 

  5. Vibert, B., Le Bars, J. M., Charrier, C., & Rosenberger, C. (2017). Fingerprint class recognition for securing EMV transaction. In International conference on information systems security and privacy.

    Google Scholar 

  6. Parziale, G., & Niel, A. (2004). A fingerprint matching using minutiae triangulation. In Biometric authentication - lecture notes in computer science (Vol. 3072). Berlin: Springer.

    Google Scholar 

  7. Bebis, G., Deaconu, T., & Georgiopoulos, M. (1999). Fingerprint identification using delaunay triangulation. In Proceedings on international conference on information intelligence and systems.

    Google Scholar 

  8. Delac, K., Grgic, M., & Stewart, B. M. (2008). Recent advances in face recognition. Croatia: In-Tech.

    Book  Google Scholar 

  9. Sirovich, L., & Meytlis, M. (2009). Symmetry, probability and recognition in face space. Proceedings of the National Academy of Sciences, 106(17), 6895–6899.

    Article  Google Scholar 

  10. Kim, D., & Sung, J. (2009). Automated face analysis: Emerging technologies and research. New York: Digital Media Research Lab, LG Electronics.

    Book  Google Scholar 

  11. Ding, L., & Martinez, A. M. (2010). Features versus context: An approach for precise and detailed detection and delineation of faces and facial features. Columbus, OH: Ohio State University.

    Google Scholar 

  12. Böhm, G., Galuppo, P., & Vesnaver, A. (2000). 3D adaptive tomography using Delaunay triangles and Voronoi polygons. Geophysical Prospecting, 48, 723–744.

    Article  Google Scholar 

  13. Chiang, J. Y., Wang, R. C., & Chang, J. L. (1997). The application of delaunay triangulation to face recognition. In Proc. national computer symp, TaiChuang, Taiwan (Vol. 1, pp. 27–32).

    Google Scholar 

  14. Zhang, G., & Wang, Y. (2009). Faceprint: Fusion of local features for 3D face recognition. In Advances in biometrics - Lecture notes in computer science (Vol. 5558). New York: Springer.

    Google Scholar 

  15. Koshy, T. (2009). Catalan numbers with applications. New York: Oxford University Press.

    MATH  Google Scholar 

  16. Saracevic, M., & Selimi, A. (2019). Convex polygon triangulation based on ballot problem and planted trivalent binary tree. Turkish Journal of Electrical Engineering and Computer Sciences, 27, 346–361.

    Article  Google Scholar 

  17. Stanimirović, P., Krtolica, P., Saracevic, M., & Masovic, S. (2014). Decomposition of catalan numbers and convex polygon triangulations. International Journal of Computer Mathematics, 91(6), 1315–1328.

    Article  MathSciNet  Google Scholar 

  18. Selimi, A., & Saracevic, M. (2018). Computational geometry applications. Southeast European Journal of Soft Computing, 7(2), 8–15.

    Google Scholar 

  19. Zhang, Y., & Zhou, Z. H. (2010). Cost-sensitive face recognition. Nanjing, China: Nat. Key Lab. for Novel Software Technol. Nanjing Univ..

    Google Scholar 

  20. Kumar, R., Barmpoutis, A., Banerjee, A., & Vemuri, B. C. (2011). Non-Lambertian reflectance modeling and shape recovery for faces using tensor splines. Gainesville, USA: Dept. of Comput. & Inf. Sci. & Eng., Univ. of Florida.

    Book  Google Scholar 

  21. Suo, I., Zhu, S. C., Shan, S., & Chen, X. (2010). A compositional and dynamic model for face aging. Beijing, China: Grad. Univ. of Chinese Acad. of Sci..

    Google Scholar 

  22. Xue, Z., Ming, D., Song, W., Wan, B., & Jin, S. (2010). Infrared gait recognition based on wavelet transform and support vector machine. Tianjin, China: College of Precision Instruments and Optoelectronics Engineering, Tianjin University.

    Book  Google Scholar 

  23. Phillips, P. J., Scruggs, W.T., O’Toole, A. J., Flynn, P. J. (2007). FRVT 2006 and ICE 2006 large-scale results. NISTIR 7408 - National Institute of Standards and Technology, USA.

    Google Scholar 

  24. Lončarević, Z. (2011). Authentication techniques based on face recognition. In Master thesis: Faculty of Organizational Sciences. Belgrade, Serbia: University of Belgrade.

    Google Scholar 

  25. Hassanpour, R., Atalay, V. (2004). Delaunay triangulation based 3D human face modeling from uncalibrated images. In Conference on computer vision and pattern recognition workshop, Washington, USA (p. 75).

    Google Scholar 

  26. Queirolo, C. C., Silva, L., Bellon, O. R. P., & Segundo, M. P. (2010). 3D face recognition using simulated annealing and the surface interpenetration measure. Curitiba, Brazil: Univ. Fed. do Parana.

    Book  Google Scholar 

  27. Park, U., Tong, Y., & Jain, A. K. (2010). Age-invariant face recognition. East Lansing, MI: Dept. of Comput. Sci. & Eng., Michigan State Univ..

    Google Scholar 

  28. Berretti, S., Del Bimbo, A., & Pala, P. (2010). 3D face recognition using iso-geodesic stripes. Firenze, Italy: Dipt. di Sist. e Inf. Universitd degli Studi di Firenze.

    Google Scholar 

  29. Wang, Y., Liu, J., & Tang, X. (2010). Robust 3D face recognition by local shape difference boosting. Hong Kong, China: Dept. of Inf. Eng. Chinese Univ. of Hong Kong.

    Google Scholar 

  30. Kemelmacher-Shlizerman, I., & Basri, R. (2011). 3D face reconstruction from a single image using a single reference face shape. Seattle, USA: Dept. of Comput. Sci. & Eng., Univ. of Washington.

    Book  Google Scholar 

  31. Liu, I., Chen, Y., & Tang, X. (2011). Decomposition of complex line drawings with hidden lines for 3D planar-faced manifold object reconstruction. Hong Kong, China: Dept. of Inf. Eng. Chinese Univ. of Hong Kong.

    Google Scholar 

  32. Keil, J. M., & Gutwin, C. A. (1989). The Delaunay triangulation closely approximates the complete Euclidean graph. In Algorithms and data structures - Lecture notes in computer science (Vol. 382). New York: Springer.

    Google Scholar 

  33. Sanguthevar, R. (2005). On the Euclidean minimum spanning tree problem. Computing Letters, 1(1), 11–14.

    Article  Google Scholar 

  34. Evgeny, Y., Eckart, S., Ulrich, S., & Kurt, T. (2005). An O(n log n) Heuristic for the Euclidean traveling salesman problem. Research Report Series on University of Würzburg. Institute of Computer Science, Germany.

    Google Scholar 

  35. Letchford, A. N., & Pearson, N. A. (2008). Good triangulations yield good tours. Computers & Operations Research, 35(2), 638–647.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Muzafer Saračevič .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Saračevič, M., Elhoseny, M., Selimi, A., Lončeravič, Z. (2021). Possibilities of Applying the Triangulation Method in the Biometric Identification Process. In: Bilan, S., Elhoseny, M., Hemanth, D.J. (eds) Biometric Identification Technologies Based on Modern Data Mining Methods. Springer, Cham. https://doi.org/10.1007/978-3-030-48378-4_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-48378-4_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-48377-7

  • Online ISBN: 978-3-030-48378-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics