April 2, 2007 14:42 World Scientific Review Volume - 9in x 6in Main˙WorldSc˙IPR˙SAB
Computational Geometry and Image Processing in Biometrics 105
of biometrics is shifting from the physical security, where the access
to the specific locations is usually monitored using standard security
identification mechanisms such as signature, access cards, passwords,
fingerprint scanning, palm prints and others, to remote security.By
this we mean the advanced methods of crowd monitoring at banks, car
registries or in the mall using video cameras, infrared and ultrared scanners,
temperature measuring devices, gait and behavioural pattern recording
made at the distance from the studied subject. The popularity of such
approaches has increased dramatically as the new technological devices are
coming on the market every week, capability to process massive amount of
data is doubling every few month, and the algorithm development by the
leading IT companies and the University research centers is tripled in the
last year.
Biometric modeling or synthesis of the biometrics is the new area of
the research at the frontier of biometric science. It is driven by two
major stimulating factors: the need to verify the effectiveness and
correctness of the newly developed methodologies on the extensive
biometric data sets and the desire to study dynamically evolving
situations from the different perspectives.
In order to satisfy the first demand, the data sets containing fingerprint,
facial and other biometric data are generated using specifically developed
methods. For the second need, dynamical modeling of processes, situations,
and subject behavior is utilized. Such computations are usually complex
and require either distributed environment, parallel algorithms or complex
3D visualization system.
Finally, as the demand for fast remote access and distributed processing
of biometric data had been increasingly growing, and the need to develop
more precise and reliable ways of person identification is ever pressing, the
combination of biometrics and data processing methods are gaining high
popularity as it undoubtedly increases the quality of the results and the
level of security protection.
Driven by the above motivations, the rest of this Chapter is devoted to
displaying the variety of computational geometry techniques in biometric
synthesis and identification, as well as the use of multiple algorithms to
enhance the solution to a specific problem. Our goal is not to provide
a comprehensive analysis of all the methods used in modern biometrics
(even this book with all its chapters would not be enough for this purpose),
but rather to concentrate on unique aspects of geometric computing and
exploring the topological relationship among objects in the biometric
world with the purpose of showcasing the strength and robustness of