Palmprint Feature Representation Based On Using Fractal Characteristics.

Journal of Theoretical and Applied Information Technology
20th July 2013. Vol. 53 No.2
© 2005 - 2012 JATIT & LLS. All rights reserved.

ISSN: 1992-8645

www.jatit.org

E-ISSN: 1817-3195

Table of Contents

1.

Design, Analysis, and Optimalization of a Microtip Patch Antenna at Frequency 3.55 GHz
for WIMAX Appliaction
Ali El-Alami, Saad Dosse Bennani, Moulhime EL Bekkali, Ali Benbassou ……………….157-162

2. Smart Transisition Power Routing Based on Connectivity and Coverage
in Mobile Adhoc Networks
Bharathiraja.R, S.Karthik, V.P. Arunachalam ….……………………...…………………163-170


3. Design of a Adaptive Distance Learning Hypermedia Based on Learner
Modelling : Application for a Course in Electrical Engineering
Aziz derouich, Karim Mohammed, Driss Marjane, Fayçal Messaoudi ……………..……...171-179

4. Design of Analog Voltage-Mode Multiplier for UHF RFID Passive in
0.18 UM CMOS Process
Smail hassouni, Hassan Qjidaa, Mohamed Latrach .………...……………………………180-195

5. Implementation of Stronger AES by Using Dynamic S-Box Dependent on
Master Key
Sliman Arrag, Abdellatif Hamdoun, Abderrahim Tragha, Salah Eddine Khamlich…………..196-204

6. Efficient High Performance Modified Straight Line Routing for Wireless Sensor
Networks
Dr.R.Kanthavel, R.Dhaya, S.Vimal ………………………...…………………….….205-209
7. Measuring Computer Security Awareness on Internet Banking and Shopping
for Internet Users
Fatimah Sidi, Marzanah A. Jabar, Aida Mustapha, Nor Fazlida Sani, Iskandar Ishak, Siti Rozana
Supian ……………………………………….………………………………….……..210-216


8. Software of Production Scheduling Planning in Manufacture Companies Using Method of
Make to Order
Wiranto Herry Utomo, Aji Lesmana, Hendro Tampake ……………………...…….…....217-222

9. Index Based Steganography: A New Secure Approach for Image Steganography
Using Two Images
B.Persis Urbana Ivy, P.J.Kumar , S.Sureka, G.uma Maheswari ………………..……..….221-228

10. Adaptive Control Using Multiple Models Without Switching
Haisen Ke, Wenrui Li ………………….…………………………………………..….229-235

Journal of Theoretical and Applied Information Technology
20th July 2013. Vol. 53 No.2
© 2005 - 2012 JATIT & LLS. All rights reserved.

ISSN: 1992-8645

www.jatit.org


E-ISSN: 1817-3195

11. Neuro-Genetic Sensorless Sliding Mode Control of A Permanent Magnet
Synchronous Motor Using Leunberger Observer
H. Mahmoudi, A. Essalmi ……………………...…………………………………..….236-246

12. Performance Evaluation of Routing Protocols In Large-Scale Mobile
Ad Hoc Networks
Jamali Abdellah, Naja Najib, El Ouadghiri Driss, Benaini Redouane,
Zyane Abdellah ………………….………………………………………………..….247-254

13. Rule-Based Reasoning Algorithm for Intuitionistic Fuzzy Petri Nets
Arundhati Lenka, DR.Chakradhar Das …………………………………………..….…255-267

14. VM Consolidation Techniques in Cloud Datacenter
T.R.V.Anandharajan, Deepak Bhargavan, M.A. Bhagyaveni. …………...…………...….268-273

15. Palmprint Feature Representation Using Fractal Characteristics
Darma Putra …………...…………………………………………………….….….....274-282


16. Implementation of Virtualization in Data Centers to Increase
Proficiency and Performance
Mueen Uddin, Asadullah Shah, Raed Alsaqour ………………...…………….…....…....283-290

17. Energy-Aware Node Placement in Wireless Sensor Network Using ACO
Rabindra Ku Jena ………………………………………………………...…….......…291-297

18. The Missile Target Extraction in Ultraviolet Images with Noise and
Burst Interferences
Gao Qina, Zhu Yiing, Zou Ping ………………………….…...………………………..298-306

19. Automatic Selection of Filtering Devices in a Distributed Intrusion Prevension
System
Elmehdi Bendriss, Boubker Regragui …………..……………………………………....307-311

20. Efficient Technique for The Classification of Satellite Images Using Fuzzy
Rule Classifier
S.Prabhu,Dr.D.Tensing

…………....……………………………………………..312-323


Journal of Theoretical and Applied Information Technology
20th July 2013. Vol. 53 No.2
© 2005 - 2012 JATIT & LLS. All rights reserved.

ISSN: 1992-8645

www.jatit.org

Indexing and Abstracting Information

Thomson Science Citation Index Expanded (Being Monitored)
Thomson Journal Citation Reports/Science Edition (Being Monitored)
Ulrich's Periodicals Directory
DataBase systems and Logic Programming (DBLP)
EBSCO Publishing USA
Directory of Open Access Journals (DOAJ)
Google & Google Scholar Journals
The Index of Information Systems Journals
Information Technology Resources Collection

ZDNet Australia
NLM Catalog (Medi-Informaitcs)
Computing Research and Education Association of Australasia
CiteSeerx
Elsevier SCOPUS
TOC PremierTM
Computer Science Journals
Computers and Applied Sciences Complete
N|W Switzerland
Microsoft Academic Search
SciVerse Hub
J-Gate
INSPEC (The IET)

E-ISSN: 1817-3195

Journal of Theoretical and Applied Information Technology
20th July 2013. Vol. 53 No.2
© 2005 - 2012 JATIT & LLS. All rights reserved.


ISSN: 1992-8645

www.jatit.org

E-ISSN: 1817-3195

Editorial Board

EDITOR IN CHIEF
Prof. NIAZ AHMAD
FCE, MOE, Islamabad, PAKISTAN

EDITORIAL BOARD
Dr. CHRISTEL BAIER

University of Malaysia (UKM) 43600 UKM

Faculty of Computer Science, Institute for

BANGI, MALAYSIA.


Theoretical Computer Science, Technical
University Dresden, GERMANY

Dr. KHAIRUDDIN BIN OMAR
Faculty of Information Science and

Dr. YUSUF PISAN

Technology, Universiti Kebangsaan

Department of Software Engineering, Faculty of

Malaysia, 43600 Bangi Selangor Darul-Ehsan,

Information Technology, University of

MALYSIA.

Technology, Sydney, AUSTRALIA

.

Dr. TENGKU MOHD. BIN TENGKU

Dr. YUXIN MAO

SEMBOK

School Of Computer & Information Engineering

Faculty of Information Science and Technology

Zhejiang Gongshang University, CHINA

Universiti Kebangsaan, Malaysia, 43600 Bangi
Selangor Darul-Ehsan, MALYSIA.

Dr. MUHAMMAD SHER
Faculty of Basic and Applied Sciences,


Dr PRABHAT K. MAHANTI

Department of Computer Science, International

Department of Computer Science and Applied

Islamic University, Islamabad. PAKISTAN.

Statistics (CSAS), Hazen Hall Room 311,
University of New Brunswick, Saint John, New

Dr. ZARINA SHUKUR

Brunswick, CANADA.

Computer Science Dept., Fakulti Teknologi dan
Sains Maklumat, University Kebangsaan

Dr. R. PONALAGUSAMY


Malaysia, 43600 Bangi, MALAYSIA.

Department of Mathematics, National Institute of
Technology, Tiruchirappalli, Tamil Nadu,

Dr. NOR AZAN MAT ZIN

INDIA.

Department of Information Science, Faculty of
Information Science & Technology, National

Dr. NITIN UPADHYAY
Computer Science & Information Systems

Journal of Theoretical and Applied Information Technology
20th July 2013. Vol. 53 No.2
© 2005 - 2012 JATIT & LLS. All rights reserved.

ISSN: 1992-8645

www.jatit.org

Group, Birla Institute of Technology and Science

E-ISSN: 1817-3195

Electronics, Bani Walid. LIBYA

(BITS), Pilani-Goa Campus, NH-17B Bypass
Road, ZuariNagar, Goa, INDIA.

Dr. A. SERMET ANAGN

Dr. MAUMITA BHATTACHARYA

Eskisehir Osmangazi University, Industrial

SOBIT, Charles Sturt University, Albury - 2640,

Engineering Department, Bademlik Campus,

NSW, AUSTRALIA

26030 Eskisehir, TURKEY.
Dr. SEIFEDINE KADRY
Dr. YACINE LAFIFI

Lebanese International University, LEBONON

Department of Computer Science, University of
Guelma, BP 401, Guelma 24000, ALGERIA.

Dr. AIJUAN DONG
Department of Computer Science, Hood College

Dr. CHRISTOS GRECOS

Frederick, MD 21701. USA

School of Computing, Engineering and Physical
Sciences, University of Central Lancashire,

Dr. S.S.RIAZ AHAMED

Preston PR1 2E, UNITED KINGDOM.

Mohamed Sathak Engineering College,
Kilakarai, & Sathak Institute of Technology,

Dr. JAYANTHI RANJAN

Ramanathapuram , Tamilnadu, INDIA

Institute of Management Technology, Raj Nagar,
Ghaziabad, Uttar Pradesh, INDIA

Dr. ZURIATI AHMAD ZUKARNAIN
University Putra Malaysia, MALAYSIA

Dr. ADEL M. ALIMI
National Engineering School of Sfax (ENIS),

Dr. CHELLALI BENACHAIBA

University of SFAX, TUNISIA

University of Bechar, ALGERIA

Dr. SIKANDAR HAYAT KHIYAL

Dr. MOHD NAZRI ISMAIL

Department of Computer Science, Fatima Jinnah

University of Kuala Lumpur (UniKL)

Women University, Rawalpindi, PAKISTAN

MALYSIA

Dr. ADEL MERABET

Dr. VITUS SAI WA LAM

Department of Electrical & Computer

The University of Hong Kong, CHINA

Engineering, Dalhousie University, Halifax,
CANADA

Dr. WITCHA CHIMPHLEE
Suan Dusit Rajabhat University, Bangkok,
THAILAND

DR. HEMRAJ SAINI
CE&IT Department, Higher Institute of

Journal of Theoretical and Applied Information Technology
20th July 2013. Vol. 53 No.2
© 2005 - 2012 JATIT & LLS. All rights reserved.

ISSN: 1992-8645

www.jatit.org

E-ISSN: 1817-3195

Dr. SIDDHIVINAYAK KULKARNI

SHAHBAZ GHAYYUR

University of Ballarat, Ballarat, AUSTRALIA

Faculty of Basic and Applied Sciences,
Department of Computer Science and Software

Dr. S. KARTHIKEYAN

Engineering, International Islamic University,

Caledonian College of Engineering,

Islamabad. PAKISTAN.

OMAN
Dr. T.C.MANJUNATH,
Dr. DRAGAN R. MILIVOJEVIĆ

Professor & Head of the Dept.,Electronicis &

Mining and Metallurgy Institute Bor Zeleni

Communication Engg. Dept,

bulevar 35, 19210 Bor, SERBIA

New Horizon College of Engg.,Bangalore560087, Karnataka, INDIA.

Dr. ABDUL AZIZ
Professor of Computer Science, University of

Dr. Nacer eddine ZAROUR

Central Punjab, PAKISTAN

LIRE Laboratory, Computer Science
Departement, University Mentouri of

Dr.P.DANANJAYAN

Constantine (UMC)

Professor, Department of ECE, PEC, Puducherry,
INDIA.

Dr. RIKTESH SRIVASTAVA
Assistant Professor, Information Systems,

Dr. E. SREENIVASA REDDY
Principal - Vasireddy Venkatadri Institute of

Skyline University College
P O Box 1797, Sharjah, UAE

Technology, Guntur, A.P., INDIA
Dr. Mohd ZAINAL ABIDIN AB
Dr. SANTOSH DHONDOPANT
KHAMITKAR
Ramanand Teerth Marathwada University,
Nanded. Maharashtra 431605, INDIA
Dr. M. IQBAL SARIPAN
(MIEEE, MInstP, Member IAENG, GradBEM)
Dept. of Computer and Communication Systems
Engineering, Faculty of Engineering, Universiti
Putra MALAYSIA
Dr. E. SREENIVASA REDDY
Principal - Vasireddy Venkatadri Institute of
Technology, Guntur, A.P., INDIA

KADIR, PhD, MIEEE
Centre of Excellence on Lightning Protection
(CELP)
Dept. of Electrical and Electronics Engineering,
Faculty of Engineering, UPM,
Selangor,MALAYSIA
Dr. OUSMANE THIARE
Gaston Berger University, Department of
Computer Science, UFR S.A.T
BP 234 Saint-Louis, SENEGAL
Dr. SIDDHIVINAYAK KULKARNI
Graduate School of Information Technology and
Mathematics University of BallartAUSTRALIA

Journal of Theoretical and Applied Information Technology
20th July 2013. Vol. 53 No.2
© 2005 - 2012 JATIT & LLS. All rights reserved.

ISSN: 1992-8645

www.jatit.org

E-ISSN: 1817-3195

Dr. BONNY BANERJEE

Dept. of Computer Science & Engineering, Sri

Senior Scientist Audigence, FL, USA, The Ohio

Sai Madhavi Institute of Science & Technology,

State University, Columbus, OH, USA

Mallampudi,
Rajahmundry, A.P, INDIA

Dr. NICKOLAS S. SAPIDIS
Department of Mechanical Engineering,

Dr. KHALID USMANI

University of Western Macedonia

Department of Computer Science, Arid

Kozani GR-50100, GREECE.

Agriculture University, Rawalpindi, PAKISTAN.

Dr. NAZRI BIN MOHD NAWI

Dr. GUFRAN AHAMD ANSARI

Software Engineering Department, Faculty of

Qassim University, College of Computer

Science Computer Information Technology,

Science, Ministry of Higher Education, Qassim

Universiti Tun Hussein Onn

University, KINGDOM OF SAUDI ARABIA

MALAYSIA
Dr. Defa Hu
Dr. JOHN BABALOLA OLADOSU

School of Information, Hunan University of

Ladoke Akintola University of Technology,

Commerce, Changsha 410205, Hunan, P. R. of

Ogbomoso, NIGERIA

CHINA

Dr. ABDELLAH IDRISSI
Department of Computer Science, Faculty of
Science, Mohammed V University - Agdal,
Rabat, MOROCCO

Dr. AMIT CHAUDHRY
University Institute of Engineering and
Technology, Panjab University, Sector-25,
Chandigarh, INDIA

Dr. ASHRAF IMAM
Aligarh Muslim University, Aligarh-INDIA
Dr. MUHAMMAD UMER KHAN
Department of Mechatronics, Faculty of
Engineering, Air University, Islamabad.
PAKISTAN

Dr. MOHAMMED ALI HUSSAIN

Journal Search

Home
Journal Rankings

Search query

Journal Search

in Journal Title
Exact phrase

Country Rankings
Country Search
Compare

Search

J ou r n a l of Th eor etica l a n d Applied In f or ma tion Tech n ology
Country: Pakistan

Map Generator
Help

Subject Area: Computer Science | Mathematics
Subject Category: Computer Science (miscellaneous)

About Us

, Theoretical Computer Science

Publisher: Asian Research Publishing Network (ARPN). Publication type: Journals. ISSN: 18173195, 19928645
Coverage: 2010-2013
H Index: 5
Charts
Indicators
SJR

Display journal title
Just copy the code below and
paste within your html page:

1999

2000

2001

2002

2003

2004

2005

2006

2007

2008

2009

2010

Data
2011

2012

0,000 0,000 0,000 0,000 0,000 0,000 0,000 0,000 0,000 0,000 0,000 0,000 0,137 0,167

Total Documents

0

0

0

0

0

0

0

0

0

0

0

222

229

622

Total Docs. (3years)

0

0

0

0

0

0

0

0

0

0

0

0

222

451

Total References

0

0

0

0

0

0

0

0

0

0

0

Total Cites (3years)

0

0

0

0

0

0

0

0

0

0

0

0

61

Self Cites (3years)

0

0

0

0

0

0

0

0

0

0

0

0

4

17

Citable Docs. (3years)

0

0

0

0

0

0

0

0

0

0

0

0

222

451

Cites / Doc. (4years)

0,00

0,00

0,00

0,00

0,00

0,00

0,00

0,00

0,00

0,00

0,00

0,00

0,27

0,39

Cites / Doc. (3years)

0,00

0,00

0,00

0,00

0,00

0,00

0,00

0,00

0,00

0,00

0,00

0,00

0,27

0,39

Cites / Doc. (2years)

0,00

0,00

0,00

0,00

0,00

0,00

0,00

0,00

0,00

0,00

0,00

0,00

0,27

0,39

3.880 4.120 9.475
178

References / Doc.
0,00 0,00 0,00 0,00 0,00 0,00
0,00 0,00
0,00
0,00
17,48 17,99
15,23src="http://ww
x D and y R ≥ y D
x R > x D and y R ≤ y D

x R < x D and y R ≤ y D
x R = x D and y R ≥ y D

x R = x D and y R ≤ y D

then α i = α i
then α i = 180 − α i
then α i = 180 + α i

then α i = 360 − α i
then α i = 90
then α i = 270

The rest of the steps of this method are
similar with the step (b) and (c) in DIFC method.
AIFC method is depend on the selection of
tolerance value (є), filter size (m and n), and M
parameters. The result of each step of FDIFC
method is shown in figure 5.

(a)

E-ISSN: 1817-3195

where size represent the size of range blocks (see
formula (8)), and L represent quadtree
decomposition level. The maximum value (K) of
the level L can be computed as follows.
2 K = min( M 1 , M 2 )

in this case K = 7 because M 1 = M 2 = 128.
Figure 2(b), 4(b), and 5(b) show the
palmprint image representation by using the
criterion with L = K and figure 3(b) is the image
without the criterion.
All methods have been explained above
depend on the selection of tolerance value (є).
Figure 6 show the impact of the tolerance value to
the fractal dimension image representation.
According to the figure, the smaller tolerance value
produced more detail information and the higher
tolerance produced less detail information.
The main advantage of our proposed
methods is the palmprint features can be obtained
directly from the fractal codes palmprint image. Its
mean we can form the palmprint feature directly
from the compressed palmprint image because the
compressed image is collection of fractal codes.

(b)
(a)

(c)
(d)
Figure 5: AIFC method. (a) original palmprint image, (b)
angle image, (c) filtered image, and (d) palmprint feature
representation

3.5 Criterion
The binary image, distance image, and
angle image representation are formed based on the
position of range block. The criterion bellow can be
used to filter the range blocks that will be used to
form those images.

sizei = L − 1

(20)

(19)

(b)

(d)
(e)
Figure 6: Fractal dimension image with various
tolerance є, (a),(b),(c), and (d), represent fractal
dimension image with tolerance 2,3,4, and 5,
respectively.

4.

PALMPRINT FEATURE MATCHING

The degree of similarity between two
palmprint features is computed as follows:

278

Journal of Theoretical and Applied Information Technology
th

20 July 2013. Vol. 53 No.2
© 2005 - 2013 JATIT & LLS. All rights reserved.

ISSN: 1992-8645

d rs

www.jatit.org

(xr − xr )(xs − xs )T
(21)
= 1−
[(xr − xr )(xr − xr )T ]12 [(xs − xs )(xs − xs )T ]12

5.

where x r , x s are the mean of palmprint feature x r
and x s respectively. The above equation computes
one minus normalized correlation between
palmprint feature vector x r and x s . The value of d rs
is between 0 – 2. The d rs will be closed to 0 if x r
and x s obtained from two image of the same
palmprint. Otherwise, the d rs will be far from 0.
Figure 7 shows three groups of palmprint
from the same palm and palms with
similar/different line structures and their averages
score are listed in Table 1. The matching score of
group A are close to 0, and the matching score of
group B and C are far from 0. It is easy to
distinguish group A from group B and C using
these scores.
Table 1:Matching Score of groups A, B, and C in figure 7

Metode
FDFC
FDIFC
DIFC
AIFC

Group A
0,1873
0,1093
0,1679
0,1762

Group B
0,6029
0,5462
0,6563
0,5057

Group C
0,7121
0,5763
0,8911
0,6425

(a1)
(a2)
(a3)
Group A: palms from the same person

(b1)
(b2)
(b3)
Group B: palms from different person with similar line
structure

E-ISSN: 1817-3195

EXPERIMENT RESULTS

Those methods have been applied for
palmprint verification system. Verification system
is tested using database of 1050 palmprint images,
are generated from 5 samples from each of the 210
persons randomly selected. The averages of the first
three images from each user were used for training
and the rest were used for testing.
The performance of verification system is obtained
by matching each of testing palmprint images with
all of the training palmprint images in the database.
A matching is noted as a correct matching if the
two palmprint images are from the same palm and
as incorrect if otherwise.
Figure 8 (a) show the probability
distributions of genuine and imposter parts of
FDFC method used tolerance = 3, and feature
vector length = 256 (16 x 16 blocks). The genuine
and imposter parts are estimated from correct and
incorrect matching scores, respectively. Figure 8(b)
show its curve characteristics. The FAR, FRR, and
EER of the system are 0.3226%, 2.0734%, and
1.4523% respectively. We also tested the FDFC
method with tolerance=2.5 and the result show the
FAR=0.2312% and FRR=1.4423%.
Figure 9 (a) show the probability
distributions of genuine and imposter parts of
FDIFC method used tolerance = 3, filter size 5 x 5,
and feature vector length = 256 (16 x 16 blocks).
Figure 9(b) show its curve characteristics. The
FAR, FRR, and EER of the system are 0.344%,
0.479%, and 0.4092% respectively.
FAR and FRR values of FDIFC method in
various filter size and feature vector length with
tolerance = 3 are shown in table 2.
Figure 10 (a) show the probability
distributions of genuine and imposter parts of DIFC
method used tolerance = 3, filter size 5 x 3, and
feature vector length = 256 (16 x 16 blocks). Figure
10(b) show its curve characteristics. The FAR,
FRR, and EER of the system are 0.8445%,
1,7544%, and 1.1164% respectively.
Figure 11 (a) show the probability
distributions of genuine and imposter parts of DIFC
method used tolerance = 3, filter size 5 x 3, and
feature vector length = 256 (16 x 16 blocks). Figure
11(b) show its curve characteristics. The FAR,
FRR, and EER of the system are 0,6743%,
1,7544%, and 1.2759% respectively.

(c1)
(c2)
(c3)
Group 3: palms from different person with different line
structure
Figure 7: Groups of palmprint based on typical of
principal lines

279

Journal of Theoretical and Applied Information Technology
th

20 July 2013. Vol. 53 No.2
© 2005 - 2013 JATIT & LLS. All rights reserved.

ISSN: 1992-8645

www.jatit.org

E-ISSN: 1817-3195

(a)
(b)
Figure 9: (a) Genuine and impostor distributions of
FDIFC (b) its curve characteristics

(b)
Figure 8: (a) Genuine and impostor distributions of
FDFC, (b) its curve characteristics
(a)

(a)
(b)
Figure 10: (a) Genuine and impostor distributions of
DIFC (b) its curve characteristics

280

Journal of Theoretical and Applied Information Technology
th

20 July 2013. Vol. 53 No.2
© 2005 - 2013 JATIT & LLS. All rights reserved.

ISSN: 1992-8645

www.jatit.org

E-ISSN: 1817-3195

Table 2: FAR and FRR of FDIFC method in various filter
size and feature vector length with tolerance = 3

6.

Feature
Vector
Length
(8 x 8)

FRR

FAR

FRR

FAR

FRR

FAR

0.638

0.609

0.479

0.563

0.479

0.463

(16 x 8)

0.638

0.399

0.479

0.574

0.479

0.489

(16 x 16)

0.638

0.529

0.479

0.504

0.479

0.344

(32 x 16)

0.479

0.675

0.479

0.451

0.479

0.304

(32 x 32)

0.638

0.674

0.479

0.675

0.479

0.344

In this paper, we offer new methods
(FDFC, FDIFC, DIFC and AIFC methods) based
on fractal characteristics to represent the palmprint
features. Those methods have been applied for
palmprint verification system. The experiment
results show that the proposed methods can achieve
an acceptable accuracy rate. The FDIFC method
shows the best performance than other proposed
methods.
The main advantage of using those
methods for feature extraction is the methods can
be formed directly by exploitation fractal codes.
Because of fractal is a great method for image
coding and decoding (image compression), so in
the future, we will applied those proposed methods
for palmprint recognition system from compressed
palmprint images.

Filter 3 x 3

Filter 5 x 3

Filter 5 x 5

CONCLUSIONS AND FUTURE WORK

ACKNOWLEDGEMENT
The authors would like to thank
Directorate General of Higher Education of
Indonesia and Udayana University for supporting
this research.

(a)

REFERENCES:

(b)
Figure 11: (a) Genuine and impostor distributions of
AIFC (b) its curve characteristics

FAR and FRR values of DIFC and AIFC
method in various filter size and feature vector
length with tolerance = 3 are shown in table 3.
Table 3: FAR and FRR of DIFC and AIFC method in
various filter size and feature vector length with
tolerance = 3
DIFC

AIFC

Filter Size/
Number of Blocks

FRR

FAR

FRR

FAR

3 x 3 (8 x 8 block)

2,8708

0,7382

2,5518

0,7877

5 x 3 (8 x 8 block)

2,7113

0,8189

2,8708

0,7683

5 x 5 (8 x 8 block)

2,7113

0,7576

2,8708

0,8199

3 x 3 (16x16 block)

1,7544

0,9222

1,7544

0,8925

5 x 3 (16x16 block)

1,7544

0,8445

1,7544

0,6743

5 x 5 (16x16 block)

1,7544

0,8619

1,7544

0,6998

[1] D. Zhang, W.K. Kong, J.You & M.Wong,
Online Palmprint Identification, IEEE
Transaction on Pattern Analysis and Machine
Intelligence, 25(9), 2003.
[2] Darma Putra, PIFS Code based for Biometric
Palmprint Verification, International Journal
of Computer Science and Information Security
(IJCSIS), Vol. 9, No. 2, 2011, p. 47-52.
[3] T. Yokoyama, K. Sugawara & T. Watanabe,
Similarity-based image retrieval system using
partitioned iterated function system codes, The
8th International Symposium on Artificial Life
and Robotics, Oita, Japan, 2006.
[4] Darma Putra, Erdiawan, High Performance
Palmprint Identification System Based On
Two Dimensional Gabor, Telkomnika UAD,
Vol. 8, No. 3, 2010, p. 195-326
[5] A.K. Jain, Ross A. & S. Pankanti, A Prototype
Hand Geometry-based Verification System,
IEEE Trans. On Circuits and System for Video
Technology, 4(1), 1999.
[6] Darma Putra, Wira Bhuana, Erdiawan,
Pembentukan Kode Telapak Tangan (Palm
Code) berbasis Metode Gabor 2D, Makara UI,
Vol. 15 No. 2, 2011, p. 161-167

281

Journal of Theoretical and Applied Information Technology
th

20 July 2013. Vol. 53 No.2
© 2005 - 2013 JATIT & LLS. All rights reserved.

ISSN: 1992-8645

www.jatit.org

[7] D. Zhang, W. Shu, Two novel characteristics
in palmprint verification: datum point
invariance and line feature matching, pattern
recognition, 32(1), 1999, 691-702.
[8] I Ketut Gede Darma Putra, Sistem Verifikasi
Biometrika Telapak Tangan dengan metode
dimensi fraktal dan lacunarity, Teknologi
Elektro UNUD, Vol. 8 No. 2, 2009, p. 1-6
[9] X.Q. WU, K.Q. Wang & D. Zhang, An
Approach to Line Feature Representation and
Matching for Palmprint Recognition, Journal
of Software, 15(6), 2004.
[10] N. Duta, A.K. Jain & K.V. Mardia, Matching
of Palmprints, Pattern Recognition Letters,
23(1), 2002, 477-485.
[11] Y. Pang, T.B.J. Andrew, N.C.L. David & H.F.
San, Palmprint Verification with Moments,
Journal of WSCG, 12(1-3), 2003.
[12] W. LI, D. Zhang & S. XU, Palmprint
Recognition Based on Fourier Transform,
Journal of Software, 13(5), 2002.
[13] W. Shu & D. Zhang, Automated personal
identification by palmprint, Opt. eng., 37(8),
1998, 2359-2363.
[14] A. Kumar, D.C.M.Wong, C.S. Helen, Anil K.
Jain, Personal Verification using Palmprint
and Hand Geometry Biometric, 2004,
http:/biometrics.cse.msu.
edu/Kumar_AVBPA2003.pdf
[16] T. Connie., A. Teoh, M. Goh & D. Ngo,
Palmprint Recognition with PCA and ICA,
2003,
sprg.massye.ac.nz/ivcnz/proccedings/ivcnz_41
.pdf.

282

E-ISSN: 1817-3195