Possibilities of Applying the Triangulation Method in the Biometric Identification Process

2021 
This chapter presents the possibilities of applying the triangulation method in the biometric identification process. The chapter includes a method in field of computational geometry (specifically polygon triangulation) in combination with face recognition techniques. The chapter describes some authentication techniques with an emphasis on face recognition technologies and polygon triangulation as a fundamental algorithm in computational geometry and graphics. The proposed method is based on generating one’s own key (faceprint), where everyone has a potential key in a 3D view of their characteristic facial lines; therefore, everybody is the carrier of his/her own unique key that is generated from a triangulation of the scanned polygon. The proposed method could find application exactly in biometric authentication. This is a pretty interesting possibility of authenticating users because there is no possibility of stealing the key (as is the case with the approaches: “something you know” and “something you have”). By introducing this procedure of determining the authentication of users, unauthorized access to computers, mobile devices, physical locations, networks, or databases is made difficult. In experimental research, the authors present concrete possibilities of applying the polygon triangulation in the biometric identification process. The authors tested a proposed solution using the appropriate two sets of data. The results show that using the triangulation method in combination with the face recognition technique, the success rate of authentication is achieved equally well as recognition with the application of some other methods.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    26
    References
    1
    Citations
    NaN
    KQI
    []