A method of personal authentication by shape recognition of the lips and front teeth

Masanori Nakakuni, Hiroshi Dozono, Eisuke Ito, Yoshiaki Kasahara, Hideaki Nakakuni

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper we propose a method for carrying out personal authentication by recording a photo of a computer user's face, recognizing the shape of their lips and front teeth, and performing image matching. Using this method, personal authentication is carried out by comparing the previous and current shape of a user's lips and front teeth when they log on to a computer. This method has a number of merits. As teeth are normally hidden behind the user's lips, user authentication is not carried out automatically as is the case with facial recognition. This means that it is possible for the user to decide for themselves whether or not to carry out user authentication. As it is not possible for a user to be recognized simply by their face being recorded on camera, their privacy is protected. Additionally, as the shape of lips and front teeth vary between individuals, there is a high probability that a user can be correctly identified. Furthermore, there is a low probability of significant changes to the shape of adult teeth over a period of months or years unless major dental work is carried out, so this method is potentially suited to personal authentication. Another merit of this method is the fact that it is possible to perform user authentication using an inexpensive webcam. In this paper, we will detail experiments using this method to perform personal authentication as well as the subsequent results.

Original languageEnglish
Title of host publicationProceedings of the 11th WSEAS International Conference on Mathematical and Computational Methods in Science and Engineering, MACMESE '09
Pages203-207
Number of pages5
Publication statusPublished - Dec 1 2009
Event11th WSEAS International Conference on Mathematical and Computational Methods in Science and Engineering, MACMESE '09 - Baltimore, MD, United States
Duration: Nov 7 2009Nov 9 2009

Publication series

NameProceedings of the 11th WSEAS International Conference on Mathematical and Computational Methods in Science and Engineering, MACMESE '09

Other

Other11th WSEAS International Conference on Mathematical and Computational Methods in Science and Engineering, MACMESE '09
CountryUnited States
CityBaltimore, MD
Period11/7/0911/9/09

Fingerprint

Shape Recognition
Authentication
User Authentication
Face
Image Matching
Image matching
Privacy
Camera
Vary
Cameras
Experiment

All Science Journal Classification (ASJC) codes

  • Computational Theory and Mathematics
  • Applied Mathematics
  • Computational Mathematics

Cite this

Nakakuni, M., Dozono, H., Ito, E., Kasahara, Y., & Nakakuni, H. (2009). A method of personal authentication by shape recognition of the lips and front teeth. In Proceedings of the 11th WSEAS International Conference on Mathematical and Computational Methods in Science and Engineering, MACMESE '09 (pp. 203-207). (Proceedings of the 11th WSEAS International Conference on Mathematical and Computational Methods in Science and Engineering, MACMESE '09).

A method of personal authentication by shape recognition of the lips and front teeth. / Nakakuni, Masanori; Dozono, Hiroshi; Ito, Eisuke; Kasahara, Yoshiaki; Nakakuni, Hideaki.

Proceedings of the 11th WSEAS International Conference on Mathematical and Computational Methods in Science and Engineering, MACMESE '09. 2009. p. 203-207 (Proceedings of the 11th WSEAS International Conference on Mathematical and Computational Methods in Science and Engineering, MACMESE '09).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Nakakuni, M, Dozono, H, Ito, E, Kasahara, Y & Nakakuni, H 2009, A method of personal authentication by shape recognition of the lips and front teeth. in Proceedings of the 11th WSEAS International Conference on Mathematical and Computational Methods in Science and Engineering, MACMESE '09. Proceedings of the 11th WSEAS International Conference on Mathematical and Computational Methods in Science and Engineering, MACMESE '09, pp. 203-207, 11th WSEAS International Conference on Mathematical and Computational Methods in Science and Engineering, MACMESE '09, Baltimore, MD, United States, 11/7/09.
Nakakuni M, Dozono H, Ito E, Kasahara Y, Nakakuni H. A method of personal authentication by shape recognition of the lips and front teeth. In Proceedings of the 11th WSEAS International Conference on Mathematical and Computational Methods in Science and Engineering, MACMESE '09. 2009. p. 203-207. (Proceedings of the 11th WSEAS International Conference on Mathematical and Computational Methods in Science and Engineering, MACMESE '09).
Nakakuni, Masanori ; Dozono, Hiroshi ; Ito, Eisuke ; Kasahara, Yoshiaki ; Nakakuni, Hideaki. / A method of personal authentication by shape recognition of the lips and front teeth. Proceedings of the 11th WSEAS International Conference on Mathematical and Computational Methods in Science and Engineering, MACMESE '09. 2009. pp. 203-207 (Proceedings of the 11th WSEAS International Conference on Mathematical and Computational Methods in Science and Engineering, MACMESE '09).
@inproceedings{093f38d3a9b8452da9c6ffc896e438f9,
title = "A method of personal authentication by shape recognition of the lips and front teeth",
abstract = "In this paper we propose a method for carrying out personal authentication by recording a photo of a computer user's face, recognizing the shape of their lips and front teeth, and performing image matching. Using this method, personal authentication is carried out by comparing the previous and current shape of a user's lips and front teeth when they log on to a computer. This method has a number of merits. As teeth are normally hidden behind the user's lips, user authentication is not carried out automatically as is the case with facial recognition. This means that it is possible for the user to decide for themselves whether or not to carry out user authentication. As it is not possible for a user to be recognized simply by their face being recorded on camera, their privacy is protected. Additionally, as the shape of lips and front teeth vary between individuals, there is a high probability that a user can be correctly identified. Furthermore, there is a low probability of significant changes to the shape of adult teeth over a period of months or years unless major dental work is carried out, so this method is potentially suited to personal authentication. Another merit of this method is the fact that it is possible to perform user authentication using an inexpensive webcam. In this paper, we will detail experiments using this method to perform personal authentication as well as the subsequent results.",
author = "Masanori Nakakuni and Hiroshi Dozono and Eisuke Ito and Yoshiaki Kasahara and Hideaki Nakakuni",
year = "2009",
month = "12",
day = "1",
language = "English",
isbn = "9789604741335",
series = "Proceedings of the 11th WSEAS International Conference on Mathematical and Computational Methods in Science and Engineering, MACMESE '09",
pages = "203--207",
booktitle = "Proceedings of the 11th WSEAS International Conference on Mathematical and Computational Methods in Science and Engineering, MACMESE '09",

}

TY - GEN

T1 - A method of personal authentication by shape recognition of the lips and front teeth

AU - Nakakuni, Masanori

AU - Dozono, Hiroshi

AU - Ito, Eisuke

AU - Kasahara, Yoshiaki

AU - Nakakuni, Hideaki

PY - 2009/12/1

Y1 - 2009/12/1

N2 - In this paper we propose a method for carrying out personal authentication by recording a photo of a computer user's face, recognizing the shape of their lips and front teeth, and performing image matching. Using this method, personal authentication is carried out by comparing the previous and current shape of a user's lips and front teeth when they log on to a computer. This method has a number of merits. As teeth are normally hidden behind the user's lips, user authentication is not carried out automatically as is the case with facial recognition. This means that it is possible for the user to decide for themselves whether or not to carry out user authentication. As it is not possible for a user to be recognized simply by their face being recorded on camera, their privacy is protected. Additionally, as the shape of lips and front teeth vary between individuals, there is a high probability that a user can be correctly identified. Furthermore, there is a low probability of significant changes to the shape of adult teeth over a period of months or years unless major dental work is carried out, so this method is potentially suited to personal authentication. Another merit of this method is the fact that it is possible to perform user authentication using an inexpensive webcam. In this paper, we will detail experiments using this method to perform personal authentication as well as the subsequent results.

AB - In this paper we propose a method for carrying out personal authentication by recording a photo of a computer user's face, recognizing the shape of their lips and front teeth, and performing image matching. Using this method, personal authentication is carried out by comparing the previous and current shape of a user's lips and front teeth when they log on to a computer. This method has a number of merits. As teeth are normally hidden behind the user's lips, user authentication is not carried out automatically as is the case with facial recognition. This means that it is possible for the user to decide for themselves whether or not to carry out user authentication. As it is not possible for a user to be recognized simply by their face being recorded on camera, their privacy is protected. Additionally, as the shape of lips and front teeth vary between individuals, there is a high probability that a user can be correctly identified. Furthermore, there is a low probability of significant changes to the shape of adult teeth over a period of months or years unless major dental work is carried out, so this method is potentially suited to personal authentication. Another merit of this method is the fact that it is possible to perform user authentication using an inexpensive webcam. In this paper, we will detail experiments using this method to perform personal authentication as well as the subsequent results.

UR - http://www.scopus.com/inward/record.url?scp=78149332435&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=78149332435&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:78149332435

SN - 9789604741335

T3 - Proceedings of the 11th WSEAS International Conference on Mathematical and Computational Methods in Science and Engineering, MACMESE '09

SP - 203

EP - 207

BT - Proceedings of the 11th WSEAS International Conference on Mathematical and Computational Methods in Science and Engineering, MACMESE '09

ER -