Abstract
Biometric security has found many applications in Internet of Things (IoT) security. Many mobile devices including smart phones have supplied fingerprint authentication function. However, the authentication performance in such restricted environment has been downgraded significantly. A number of methods based on Delaunay triangulation have been proposed for minutiae-based fingerprint matching, due to some favorable properties of the Delaunay triangulation under image distortion. However, all existing methods are based on 2D pattern, of which each unit, a Delaunay triangle, can only provide limited discrimination ability and could cause low matching performance. In this paper, we propose a 3D Delaunay triangulation based fingerprint authentication system as an improvement to improve the authentication performance without adding extra sensor data. Each unit in a 3D Delaunay triangulation is a Delaunay tetrahedron, which can provide higher discrimination than a Delaunay triangle. From the experimental results it is observed that the 3D Delaunay triangulation based fingerprint authentication system outperforms the 2D based system in terms of matching performance by using same feature representation, e.g., edge. Furthermore, some issues in applying 3D Delaunay triangulation in fingerprint authentication, have been discussed and solved. To the best of our knowledge, this is the first work in literature that deploys 3D Delaunay triangulation in fingerprint authentication research.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Zheng, G., Fang, G., Shankaran, R., Orgun, M.A.: Encryption for implantable medical devices using modified one-time pads. IEEE Access 3, 825–836 (2015)
Fang, G., Orgun, M.A., Shankaran, R., Dutkiewicz, E., Zheng, G.: Truthful channel sharing for self coexistence of overlapping medical body area networks. PLoS ONE 11, e0148376 (2016)
Zheng, G., Shankaran, R., Orgun, M.A., Qiao, L., Saleem, K.: Ideas and challenges for securing wireless implantable medical devices: a review. IEEE Sens. J. 17, 562–576 (2016)
Zheng, G., Fang, G., Shankaran, R., Orgun, M.A., Zhou, J., Qiao, L., Saleem, K.: Multiple ECG fiducial points-based random binary sequence generation for securing wireless body area networks. IEEE J. Biomed. Health Inform. 21, 655–663 (2017)
Bebis, G., Deaconu, T., Georgiopoulos, M.: Fingerprint identification using Delaunay triangulation. In: International Conference on Information Intelligence and Systems, pp. 452–459 (1999)
Liu, N., Yin, Y., Zhang, H.: A fingerprint matching algorithm based on Delaunay triangulation net. In: The 5th International Conference on Computer and Information Technology, pp. 591–595. IEEE (2005)
Wang, C., Gavrilova, M.L.: Delaunay triangulation algorithm for fingerprint matching. In: 3rd International Symposium on Voronoi Diagrams in Science and Engineering, pp. 208–216 (2006)
Yang, W., Hu, J., Wang, S., Stojmenovic, M.: An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures. Pattern Recogn. 47, 1309–1320 (2014)
Junior, P., de Nazare-Junior, A., Menotti, D.: A complete system for fingerprint authentication using Delaunay triangulation. Re-conhecimento de Padroes, DECOM UFOP, pp. 1–7 (2010)
Yang, W., Hu, J., Stojmenovic, M.: NDTC: a novel topology-based fingerprint matching algorithm using N-layer Delaunay triangulation net check. In: 2012 7th IEEE Conference on Industrial Electronics and Applications (ICIEA), pp. 866–870. IEEE (2012)
Yang, W., Hu, J., Wang, S.: A Delaunay triangle-based fuzzy extractor for fingerprint authentication. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 66–70. IEEE (2012)
Yang, W., Hu, J., Wang, S.: A Delaunay triangle group based fuzzy vault with cancellability. In: 2013 6th International Congress on Image and Signal Processing (CISP), pp. 1676–1681 (2013)
Yang, W., Hu, J., Wang, S., Yang, J.: Cancelable fingerprint templates with Delaunay triangle-based local structures. In: Wang, G., Ray, I., Feng, D., Rajarajan, M. (eds.) CSS 2013. LNCS, vol. 8300, pp. 81–91. Springer, Cham (2013). https://doi.org/10.1007/978-3-319-03584-0_7
Yang, W., Hu, J., Wang, S., Chen, C.: Mutual dependency of features in multimodal biometric systems. Electron. Lett. 51, 234–235 (2015)
Lee, D.-T., Schachter, B.J.: Two algorithms for constructing a Delaunay triangulation. Int. J. Comput. Inf. Sci. 9, 219–242 (1980)
VeriFinger SDK: Neuro Technology. <http://www.neurotechnology.com/verifinger.html>
Wang, S., Hu, J.: A blind system identification approach to cancelable fingerprint templates. Pattern Recogn. 54, 14–22 (2016)
Wang, S., Hu, J.: Design of alignment-free cancelable fingerprint templates via curtailed circular convolution. Pattern Recogn. 47, 1321–1329 (2014)
Wang, S., Hu, J.: Blind channel estimation for single-input multiple-output OFDM systems: zero padding based or cyclic prefix based? Wirel. Commun. Mob. Comput. 13, 204–210 (2013)
Wang, S., Hu, J.: Alignment-free cancellable fingerprint template design: a densely infinite-to-one mapping (DITOM) approach. Pattern Recogn. 45, 4129–4137 (2012)
Wang, S., Deng, G., Hu, J.: A partial Hadamard transform approach to the design of cancelable fingerprint templates containing binary biometric representations. Pattern Recogn. 61, 447–458 (2017)
Wang, S., Yang, W., Hu, J.: Design of alignment-free cancelable fingerprint templates with Zoned Minutia Pairs. Pattern Recogn. 66, 295–301 (2017)
Acknowledgments
This paper is supported by Defence Science and Technology Group (DST) of Australia through project CERA 221.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Yang, W. et al. (2018). Application of 3D Delaunay Triangulation in Fingerprint Authentication System. In: Hu, J., Khalil, I., Tari, Z., Wen, S. (eds) Mobile Networks and Management. MONAMI 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 235. Springer, Cham. https://doi.org/10.1007/978-3-319-90775-8_23
Download citation
DOI: https://doi.org/10.1007/978-3-319-90775-8_23
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-90774-1
Online ISBN: 978-3-319-90775-8
eBook Packages: Computer ScienceComputer Science (R0)