Skip to main content
Erschienen in:
Buchtitelbild

2021 | OriginalPaper | Buchkapitel

Possibilities of Applying the Triangulation Method in the Biometric Identification Process

verfasst von : Muzafer Saračevič, Mohamed Elhoseny, Aybeyan Selimi, Zoran Lončeravič

Erschienen in: Biometric Identification Technologies Based on Modern Data Mining Methods

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This chapter presents the possibilities of applying the triangulation method in the biometric identification process. The chapter includes a method in field of computational geometry (specifically polygon triangulation) in combination with face recognition techniques. The chapter describes some authentication techniques with an emphasis on face recognition technologies and polygon triangulation as a fundamental algorithm in computational geometry and graphics. The proposed method is based on generating one’s own key (faceprint), where everyone has a potential key in a 3D view of their characteristic facial lines; therefore, everybody is the carrier of his/her own unique key that is generated from a triangulation of the scanned polygon. The proposed method could find application exactly in biometric authentication. This is a pretty interesting possibility of authenticating users because there is no possibility of stealing the key (as is the case with the approaches: “something you know” and “something you have”). By introducing this procedure of determining the authentication of users, unauthorized access to computers, mobile devices, physical locations, networks, or databases is made difficult. In experimental research, the authors present concrete possibilities of applying the polygon triangulation in the biometric identification process. The authors tested a proposed solution using the appropriate two sets of data. The results show that using the triangulation method in combination with the face recognition technique, the success rate of authentication is achieved equally well as recognition with the application of some other methods.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Saracevic, M., Selimi, A., & Selimovic, F. (2018). Generation of cryptographic keys with algorithm of polygon triangulation and Catalan numbers. Computer Science, 19(3), 243–256.CrossRef Saracevic, M., Selimi, A., & Selimovic, F. (2018). Generation of cryptographic keys with algorithm of polygon triangulation and Catalan numbers. Computer Science, 19(3), 243–256.CrossRef
2.
Zurück zum Zitat Loncarevic, Z., Saracevic, M., & Hadzic, M. (2018). Analysis of some techniques of biometric authentication systems with emphasis on 2D and 3D face recognition technology. Economic Challenges: Ekonomski izazovi, 7(13), 119–139. Loncarevic, Z., Saracevic, M., & Hadzic, M. (2018). Analysis of some techniques of biometric authentication systems with emphasis on 2D and 3D face recognition technology. Economic Challenges: Ekonomski izazovi, 7(13), 119–139.
3.
Zurück zum Zitat Saracevic, M., Masovic, S., & Milosevic, D. (2013). Java implementation for triangulation of convex polygon based on Lukasiewicz’s algorithm and binary trees. Southeast European Journal of Soft Computing, 2(2), 40–45. Saracevic, M., Masovic, S., & Milosevic, D. (2013). Java implementation for triangulation of convex polygon based on Lukasiewicz’s algorithm and binary trees. Southeast European Journal of Soft Computing, 2(2), 40–45.
4.
Zurück zum Zitat Gavrilova, M. (2007). Computational geometry and image processing in biometrics: On the path to convergence. In Image pattern recognition: Synthesis and analysis in biometrics (pp. 103–133). Singapore: Word Scientific.CrossRef Gavrilova, M. (2007). Computational geometry and image processing in biometrics: On the path to convergence. In Image pattern recognition: Synthesis and analysis in biometrics (pp. 103–133). Singapore: Word Scientific.CrossRef
5.
Zurück zum Zitat Vibert, B., Le Bars, J. M., Charrier, C., & Rosenberger, C. (2017). Fingerprint class recognition for securing EMV transaction. In International conference on information systems security and privacy. Vibert, B., Le Bars, J. M., Charrier, C., & Rosenberger, C. (2017). Fingerprint class recognition for securing EMV transaction. In International conference on information systems security and privacy.
6.
Zurück zum Zitat Parziale, G., & Niel, A. (2004). A fingerprint matching using minutiae triangulation. In Biometric authentication - lecture notes in computer science (Vol. 3072). Berlin: Springer. Parziale, G., & Niel, A. (2004). A fingerprint matching using minutiae triangulation. In Biometric authentication - lecture notes in computer science (Vol. 3072). Berlin: Springer.
7.
Zurück zum Zitat Bebis, G., Deaconu, T., & Georgiopoulos, M. (1999). Fingerprint identification using delaunay triangulation. In Proceedings on international conference on information intelligence and systems. Bebis, G., Deaconu, T., & Georgiopoulos, M. (1999). Fingerprint identification using delaunay triangulation. In Proceedings on international conference on information intelligence and systems.
8.
Zurück zum Zitat Delac, K., Grgic, M., & Stewart, B. M. (2008). Recent advances in face recognition. Croatia: In-Tech.CrossRef Delac, K., Grgic, M., & Stewart, B. M. (2008). Recent advances in face recognition. Croatia: In-Tech.CrossRef
9.
Zurück zum Zitat Sirovich, L., & Meytlis, M. (2009). Symmetry, probability and recognition in face space. Proceedings of the National Academy of Sciences, 106(17), 6895–6899.CrossRef Sirovich, L., & Meytlis, M. (2009). Symmetry, probability and recognition in face space. Proceedings of the National Academy of Sciences, 106(17), 6895–6899.CrossRef
10.
Zurück zum Zitat Kim, D., & Sung, J. (2009). Automated face analysis: Emerging technologies and research. New York: Digital Media Research Lab, LG Electronics.CrossRef Kim, D., & Sung, J. (2009). Automated face analysis: Emerging technologies and research. New York: Digital Media Research Lab, LG Electronics.CrossRef
11.
Zurück zum Zitat Ding, L., & Martinez, A. M. (2010). Features versus context: An approach for precise and detailed detection and delineation of faces and facial features. Columbus, OH: Ohio State University. Ding, L., & Martinez, A. M. (2010). Features versus context: An approach for precise and detailed detection and delineation of faces and facial features. Columbus, OH: Ohio State University.
12.
Zurück zum Zitat Böhm, G., Galuppo, P., & Vesnaver, A. (2000). 3D adaptive tomography using Delaunay triangles and Voronoi polygons. Geophysical Prospecting, 48, 723–744.CrossRef Böhm, G., Galuppo, P., & Vesnaver, A. (2000). 3D adaptive tomography using Delaunay triangles and Voronoi polygons. Geophysical Prospecting, 48, 723–744.CrossRef
13.
Zurück zum Zitat Chiang, J. Y., Wang, R. C., & Chang, J. L. (1997). The application of delaunay triangulation to face recognition. In Proc. national computer symp, TaiChuang, Taiwan (Vol. 1, pp. 27–32). Chiang, J. Y., Wang, R. C., & Chang, J. L. (1997). The application of delaunay triangulation to face recognition. In Proc. national computer symp, TaiChuang, Taiwan (Vol. 1, pp. 27–32).
14.
Zurück zum Zitat Zhang, G., & Wang, Y. (2009). Faceprint: Fusion of local features for 3D face recognition. In Advances in biometrics - Lecture notes in computer science (Vol. 5558). New York: Springer. Zhang, G., & Wang, Y. (2009). Faceprint: Fusion of local features for 3D face recognition. In Advances in biometrics - Lecture notes in computer science (Vol. 5558). New York: Springer.
15.
Zurück zum Zitat Koshy, T. (2009). Catalan numbers with applications. New York: Oxford University Press.MATH Koshy, T. (2009). Catalan numbers with applications. New York: Oxford University Press.MATH
16.
Zurück zum Zitat Saracevic, M., & Selimi, A. (2019). Convex polygon triangulation based on ballot problem and planted trivalent binary tree. Turkish Journal of Electrical Engineering and Computer Sciences, 27, 346–361.CrossRef Saracevic, M., & Selimi, A. (2019). Convex polygon triangulation based on ballot problem and planted trivalent binary tree. Turkish Journal of Electrical Engineering and Computer Sciences, 27, 346–361.CrossRef
17.
Zurück zum Zitat Stanimirović, P., Krtolica, P., Saracevic, M., & Masovic, S. (2014). Decomposition of catalan numbers and convex polygon triangulations. International Journal of Computer Mathematics, 91(6), 1315–1328.MathSciNetCrossRef Stanimirović, P., Krtolica, P., Saracevic, M., & Masovic, S. (2014). Decomposition of catalan numbers and convex polygon triangulations. International Journal of Computer Mathematics, 91(6), 1315–1328.MathSciNetCrossRef
18.
Zurück zum Zitat Selimi, A., & Saracevic, M. (2018). Computational geometry applications. Southeast European Journal of Soft Computing, 7(2), 8–15. Selimi, A., & Saracevic, M. (2018). Computational geometry applications. Southeast European Journal of Soft Computing, 7(2), 8–15.
19.
Zurück zum Zitat Zhang, Y., & Zhou, Z. H. (2010). Cost-sensitive face recognition. Nanjing, China: Nat. Key Lab. for Novel Software Technol. Nanjing Univ.. Zhang, Y., & Zhou, Z. H. (2010). Cost-sensitive face recognition. Nanjing, China: Nat. Key Lab. for Novel Software Technol. Nanjing Univ..
20.
Zurück zum Zitat Kumar, R., Barmpoutis, A., Banerjee, A., & Vemuri, B. C. (2011). Non-Lambertian reflectance modeling and shape recovery for faces using tensor splines. Gainesville, USA: Dept. of Comput. & Inf. Sci. & Eng., Univ. of Florida.CrossRef Kumar, R., Barmpoutis, A., Banerjee, A., & Vemuri, B. C. (2011). Non-Lambertian reflectance modeling and shape recovery for faces using tensor splines. Gainesville, USA: Dept. of Comput. & Inf. Sci. & Eng., Univ. of Florida.CrossRef
21.
Zurück zum Zitat Suo, I., Zhu, S. C., Shan, S., & Chen, X. (2010). A compositional and dynamic model for face aging. Beijing, China: Grad. Univ. of Chinese Acad. of Sci.. Suo, I., Zhu, S. C., Shan, S., & Chen, X. (2010). A compositional and dynamic model for face aging. Beijing, China: Grad. Univ. of Chinese Acad. of Sci..
22.
Zurück zum Zitat Xue, Z., Ming, D., Song, W., Wan, B., & Jin, S. (2010). Infrared gait recognition based on wavelet transform and support vector machine. Tianjin, China: College of Precision Instruments and Optoelectronics Engineering, Tianjin University.CrossRef Xue, Z., Ming, D., Song, W., Wan, B., & Jin, S. (2010). Infrared gait recognition based on wavelet transform and support vector machine. Tianjin, China: College of Precision Instruments and Optoelectronics Engineering, Tianjin University.CrossRef
23.
Zurück zum Zitat Phillips, P. J., Scruggs, W.T., O’Toole, A. J., Flynn, P. J. (2007). FRVT 2006 and ICE 2006 large-scale results. NISTIR 7408 - National Institute of Standards and Technology, USA. Phillips, P. J., Scruggs, W.T., O’Toole, A. J., Flynn, P. J. (2007). FRVT 2006 and ICE 2006 large-scale results. NISTIR 7408 - National Institute of Standards and Technology, USA.
24.
Zurück zum Zitat Lončarević, Z. (2011). Authentication techniques based on face recognition. In Master thesis: Faculty of Organizational Sciences. Belgrade, Serbia: University of Belgrade. Lončarević, Z. (2011). Authentication techniques based on face recognition. In Master thesis: Faculty of Organizational Sciences. Belgrade, Serbia: University of Belgrade.
25.
Zurück zum Zitat Hassanpour, R., Atalay, V. (2004). Delaunay triangulation based 3D human face modeling from uncalibrated images. In Conference on computer vision and pattern recognition workshop, Washington, USA (p. 75). Hassanpour, R., Atalay, V. (2004). Delaunay triangulation based 3D human face modeling from uncalibrated images. In Conference on computer vision and pattern recognition workshop, Washington, USA (p. 75).
26.
Zurück zum Zitat Queirolo, C. C., Silva, L., Bellon, O. R. P., & Segundo, M. P. (2010). 3D face recognition using simulated annealing and the surface interpenetration measure. Curitiba, Brazil: Univ. Fed. do Parana.CrossRef Queirolo, C. C., Silva, L., Bellon, O. R. P., & Segundo, M. P. (2010). 3D face recognition using simulated annealing and the surface interpenetration measure. Curitiba, Brazil: Univ. Fed. do Parana.CrossRef
27.
Zurück zum Zitat Park, U., Tong, Y., & Jain, A. K. (2010). Age-invariant face recognition. East Lansing, MI: Dept. of Comput. Sci. & Eng., Michigan State Univ.. Park, U., Tong, Y., & Jain, A. K. (2010). Age-invariant face recognition. East Lansing, MI: Dept. of Comput. Sci. & Eng., Michigan State Univ..
28.
Zurück zum Zitat Berretti, S., Del Bimbo, A., & Pala, P. (2010). 3D face recognition using iso-geodesic stripes. Firenze, Italy: Dipt. di Sist. e Inf. Universitd degli Studi di Firenze. Berretti, S., Del Bimbo, A., & Pala, P. (2010). 3D face recognition using iso-geodesic stripes. Firenze, Italy: Dipt. di Sist. e Inf. Universitd degli Studi di Firenze.
29.
Zurück zum Zitat Wang, Y., Liu, J., & Tang, X. (2010). Robust 3D face recognition by local shape difference boosting. Hong Kong, China: Dept. of Inf. Eng. Chinese Univ. of Hong Kong. Wang, Y., Liu, J., & Tang, X. (2010). Robust 3D face recognition by local shape difference boosting. Hong Kong, China: Dept. of Inf. Eng. Chinese Univ. of Hong Kong.
30.
Zurück zum Zitat Kemelmacher-Shlizerman, I., & Basri, R. (2011). 3D face reconstruction from a single image using a single reference face shape. Seattle, USA: Dept. of Comput. Sci. & Eng., Univ. of Washington.CrossRef Kemelmacher-Shlizerman, I., & Basri, R. (2011). 3D face reconstruction from a single image using a single reference face shape. Seattle, USA: Dept. of Comput. Sci. & Eng., Univ. of Washington.CrossRef
31.
Zurück zum Zitat Liu, I., Chen, Y., & Tang, X. (2011). Decomposition of complex line drawings with hidden lines for 3D planar-faced manifold object reconstruction. Hong Kong, China: Dept. of Inf. Eng. Chinese Univ. of Hong Kong. Liu, I., Chen, Y., & Tang, X. (2011). Decomposition of complex line drawings with hidden lines for 3D planar-faced manifold object reconstruction. Hong Kong, China: Dept. of Inf. Eng. Chinese Univ. of Hong Kong.
32.
Zurück zum Zitat Keil, J. M., & Gutwin, C. A. (1989). The Delaunay triangulation closely approximates the complete Euclidean graph. In Algorithms and data structures - Lecture notes in computer science (Vol. 382). New York: Springer. Keil, J. M., & Gutwin, C. A. (1989). The Delaunay triangulation closely approximates the complete Euclidean graph. In Algorithms and data structures - Lecture notes in computer science (Vol. 382). New York: Springer.
33.
Zurück zum Zitat Sanguthevar, R. (2005). On the Euclidean minimum spanning tree problem. Computing Letters, 1(1), 11–14.CrossRef Sanguthevar, R. (2005). On the Euclidean minimum spanning tree problem. Computing Letters, 1(1), 11–14.CrossRef
34.
Zurück zum Zitat Evgeny, Y., Eckart, S., Ulrich, S., & Kurt, T. (2005). An O(n log n) Heuristic for the Euclidean traveling salesman problem. Research Report Series on University of Würzburg. Institute of Computer Science, Germany. Evgeny, Y., Eckart, S., Ulrich, S., & Kurt, T. (2005). An O(n log n) Heuristic for the Euclidean traveling salesman problem. Research Report Series on University of Würzburg. Institute of Computer Science, Germany.
35.
Zurück zum Zitat Letchford, A. N., & Pearson, N. A. (2008). Good triangulations yield good tours. Computers & Operations Research, 35(2), 638–647.CrossRef Letchford, A. N., & Pearson, N. A. (2008). Good triangulations yield good tours. Computers & Operations Research, 35(2), 638–647.CrossRef
Metadaten
Titel
Possibilities of Applying the Triangulation Method in the Biometric Identification Process
verfasst von
Muzafer Saračevič
Mohamed Elhoseny
Aybeyan Selimi
Zoran Lončeravič
Copyright-Jahr
2021
DOI
https://doi.org/10.1007/978-3-030-48378-4_1

Neuer Inhalt