•  
  •  
 

Abstract

Establishment Code Hand Palm (Palm Code) 2D Gabor-Based Method. Palmprint is relatively new in physiological biometrics. Palmprint ROI segmentation and feature extraction are two important issues in palm print recognition. This paper introduces two steps in the center of mass moment method for ROI segmentation that will be applied in the Gabor 2D filter to obtain palm code as palmprint feature vector. Normalized Hamming distance was used to measure the similarity degrees of two feature vectors of palmprint. The system was tested using database 1000 palmprint images generated from 5 samples from each of the 200 persons randomly selected with ROI 64 x 64 and 128 x 128 pixel. Experiment results show that this system can achieve high performance with a success rate about 98.7% (FRR = 1.17%, FAR = 0.11%, T = 0.376) with ROI 64 x 64 pixel.

Bahasa Abstract

Telapak tangan adalah biometrika yang masih relatif baru. Segmentasi region of interest (ROI) dan ekstraksi fitur telapak tangan merupakan dua isu penting dalam sistem pengenalan telapak tangan. Penelitian ini memperkenalkan metode segmentasi ROI dengan titik pusat momen 2 tahap dan menerapkan metode Gabor 2D untuk menghasilkan kode telapak tangan (palm code) sebagai fitur telapak tangan. Untuk mengukur tingkat kemiripan dua kode telapak tangan maka digunakan metode jarak Hamming ternormalisasi. Pengujian sistem dilakukan dengan menggunakan 1000 sampel telapak tangan milik 200 orang berbeda dengan 3 sampel sebagai acuan dan 2 sampel sebagai uji. Pengujian juga dilakukan dengan 2 ukuran ROI, yaitu 64 x 64 dan 128 x 128 pixel. Hasil pengujian menunjukkan bahwa unjuk kerja terbaik diperoleh ROI 64 x 64 pixel mencapai 98,7% atau (FRR = 1,17%, FAR = 0,11%, T = 0,376).

References

  1. D. Zhang, W. Shu, Pattern Recognition 32/1 (1999) 691.
  2. I.K.G.D. Putra, Sistem Biometrika Teori dan Aplikasi, Andi Offset, Yogyakarta, 2009, p.121.
  3. L. Wen-xin, D. Zhang, X.U. Shuo-qun, J. Software 13/5 (2002) 879.
  4. D. Zhang, W.K. Kong, J. You, M. Wong, IEEE Transaction on Pattern Analysis and Machine Intelligence 25/9 (2003) 1.
  5. W.U. Xiang-Quan, W. Kuan-Quan, D. Zhang, J. Software 15/6 (2004) 869.
  6. E. Murat, V. Vasif, Nabiyev, Y. Ozturk, Proceedings of IJCI, 2003, p.1.
  7. A. Kumar, D.C.M. Wong, H.C. Shen, A.K. Jain, 4th International Conference on Audio-and Video Based Biometric Person Authentication, Guildform, UK, 2003, p.668.
  8. D. Putra, A. Susanto, A. Harjoko, T.S. Widodo, Seminar Teknologi Informasi, UTY, Jogjakarta, Indonesia, 2005, p.1.
  9. D. Putra, A. Susanto, A. Harjoko, T.S. Widodo, J. Pakar (J. Teknol. Informasi dan Bisnis) 5/3 (2004) 1.
  10. I.K.G.D. Putra, Teknologi Elektro UNUD. 5/1 (2009) 67.
  11. I.K.G.D. Putra, A. Susanto, A. Harjoko, T.S. Widodo, Eighth IASTED International Conference Signal and Image Processing, Honolulu, Hawai, 2006, p.323.
  12. I.K.G.D. Putra, A. Susanto, A. Harjoko, T.S. Widodo, RPCS International Conference, UTM,
  13. Malaysia, 2006, p.1.
  14. D. Zhang, W.K. Kong, J. You, M. Wong, IEEE Transaction on Pattern Analysis and Machine
  15. Intelligence 25/9 (2003) 1.
  16. N. Duta, A.K. Jain, K.V. Mardia, Pattern Recognition Letters 23/1 (2002) 477.
  17. X.Q. Wu, K.Q. Wang, D. Zhang, J. Software 15/6 (2004) 869.
  18. Y. Pang, T.B.J. Andrew, N.C.L. David, H.F. San, J. WSCG. 12 (2003) 1.
  19. W. Li, D. Zhang, S. Xu, J. Software 13/5 (2002) 879.
  20. I.K. Timotius, I. Setyawan, A.A. Febrianto, Makara Teknologi 15/1 (2011) 96.

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.