Skip to main content

Application of 3D Delaunay Triangulation in Fingerprint Authentication System

  • Conference paper
  • First Online:
Mobile Networks and Management (MONAMI 2017)

Abstract

Biometric security has found many applications in Internet of Things (IoT) security. Many mobile devices including smart phones have supplied fingerprint authentication function. However, the authentication performance in such restricted environment has been downgraded significantly. A number of methods based on Delaunay triangulation have been proposed for minutiae-based fingerprint matching, due to some favorable properties of the Delaunay triangulation under image distortion. However, all existing methods are based on 2D pattern, of which each unit, a Delaunay triangle, can only provide limited discrimination ability and could cause low matching performance. In this paper, we propose a 3D Delaunay triangulation based fingerprint authentication system as an improvement to improve the authentication performance without adding extra sensor data. Each unit in a 3D Delaunay triangulation is a Delaunay tetrahedron, which can provide higher discrimination than a Delaunay triangle. From the experimental results it is observed that the 3D Delaunay triangulation based fingerprint authentication system outperforms the 2D based system in terms of matching performance by using same feature representation, e.g., edge. Furthermore, some issues in applying 3D Delaunay triangulation in fingerprint authentication, have been discussed and solved. To the best of our knowledge, this is the first work in literature that deploys 3D Delaunay triangulation in fingerprint authentication research.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zheng, G., Fang, G., Shankaran, R., Orgun, M.A.: Encryption for implantable medical devices using modified one-time pads. IEEE Access 3, 825–836 (2015)

    Article  Google Scholar 

  2. Fang, G., Orgun, M.A., Shankaran, R., Dutkiewicz, E., Zheng, G.: Truthful channel sharing for self coexistence of overlapping medical body area networks. PLoS ONE 11, e0148376 (2016)

    Article  Google Scholar 

  3. Zheng, G., Shankaran, R., Orgun, M.A., Qiao, L., Saleem, K.: Ideas and challenges for securing wireless implantable medical devices: a review. IEEE Sens. J. 17, 562–576 (2016)

    Article  Google Scholar 

  4. Zheng, G., Fang, G., Shankaran, R., Orgun, M.A., Zhou, J., Qiao, L., Saleem, K.: Multiple ECG fiducial points-based random binary sequence generation for securing wireless body area networks. IEEE J. Biomed. Health Inform. 21, 655–663 (2017)

    Article  Google Scholar 

  5. Bebis, G., Deaconu, T., Georgiopoulos, M.: Fingerprint identification using Delaunay triangulation. In: International Conference on Information Intelligence and Systems, pp. 452–459 (1999)

    Google Scholar 

  6. Liu, N., Yin, Y., Zhang, H.: A fingerprint matching algorithm based on Delaunay triangulation net. In: The 5th International Conference on Computer and Information Technology, pp. 591–595. IEEE (2005)

    Google Scholar 

  7. Wang, C., Gavrilova, M.L.: Delaunay triangulation algorithm for fingerprint matching. In: 3rd International Symposium on Voronoi Diagrams in Science and Engineering, pp. 208–216 (2006)

    Google Scholar 

  8. Yang, W., Hu, J., Wang, S., Stojmenovic, M.: An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures. Pattern Recogn. 47, 1309–1320 (2014)

    Article  Google Scholar 

  9. Junior, P., de Nazare-Junior, A., Menotti, D.: A complete system for fingerprint authentication using Delaunay triangulation. Re-conhecimento de Padroes, DECOM UFOP, pp. 1–7 (2010)

    Google Scholar 

  10. Yang, W., Hu, J., Stojmenovic, M.: NDTC: a novel topology-based fingerprint matching algorithm using N-layer Delaunay triangulation net check. In: 2012 7th IEEE Conference on Industrial Electronics and Applications (ICIEA), pp. 866–870. IEEE (2012)

    Google Scholar 

  11. Yang, W., Hu, J., Wang, S.: A Delaunay triangle-based fuzzy extractor for fingerprint authentication. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 66–70. IEEE (2012)

    Google Scholar 

  12. Yang, W., Hu, J., Wang, S.: A Delaunay triangle group based fuzzy vault with cancellability. In: 2013 6th International Congress on Image and Signal Processing (CISP), pp. 1676–1681 (2013)

    Google Scholar 

  13. Yang, W., Hu, J., Wang, S., Yang, J.: Cancelable fingerprint templates with Delaunay triangle-based local structures. In: Wang, G., Ray, I., Feng, D., Rajarajan, M. (eds.) CSS 2013. LNCS, vol. 8300, pp. 81–91. Springer, Cham (2013). https://doi.org/10.1007/978-3-319-03584-0_7

    Chapter  Google Scholar 

  14. Yang, W., Hu, J., Wang, S., Chen, C.: Mutual dependency of features in multimodal biometric systems. Electron. Lett. 51, 234–235 (2015)

    Article  Google Scholar 

  15. Lee, D.-T., Schachter, B.J.: Two algorithms for constructing a Delaunay triangulation. Int. J. Comput. Inf. Sci. 9, 219–242 (1980)

    Article  MathSciNet  Google Scholar 

  16. VeriFinger SDK: Neuro Technology. <http://www.neurotechnology.com/verifinger.html>

  17. http://bias.csr.unibo.it/fvc2002

  18. Wang, S., Hu, J.: A blind system identification approach to cancelable fingerprint templates. Pattern Recogn. 54, 14–22 (2016)

    Article  MathSciNet  Google Scholar 

  19. Wang, S., Hu, J.: Design of alignment-free cancelable fingerprint templates via curtailed circular convolution. Pattern Recogn. 47, 1321–1329 (2014)

    Article  Google Scholar 

  20. Wang, S., Hu, J.: Blind channel estimation for single-input multiple-output OFDM systems: zero padding based or cyclic prefix based? Wirel. Commun. Mob. Comput. 13, 204–210 (2013)

    Article  Google Scholar 

  21. Wang, S., Hu, J.: Alignment-free cancellable fingerprint template design: a densely infinite-to-one mapping (DITOM) approach. Pattern Recogn. 45, 4129–4137 (2012)

    Article  MathSciNet  Google Scholar 

  22. Wang, S., Deng, G., Hu, J.: A partial Hadamard transform approach to the design of cancelable fingerprint templates containing binary biometric representations. Pattern Recogn. 61, 447–458 (2017)

    Article  Google Scholar 

  23. Wang, S., Yang, W., Hu, J.: Design of alignment-free cancelable fingerprint templates with Zoned Minutia Pairs. Pattern Recogn. 66, 295–301 (2017)

    Article  Google Scholar 

Download references

Acknowledgments

This paper is supported by Defence Science and Technology Group (DST) of Australia through project CERA 221.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wencheng Yang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yang, W. et al. (2018). Application of 3D Delaunay Triangulation in Fingerprint Authentication System. In: Hu, J., Khalil, I., Tari, Z., Wen, S. (eds) Mobile Networks and Management. MONAMI 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 235. Springer, Cham. https://doi.org/10.1007/978-3-319-90775-8_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-90775-8_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-90774-1

  • Online ISBN: 978-3-319-90775-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics