Palmprint Feature Representation Based On Using Fractal Characteristics.
Journal of Theoretical and Applied Information Technology
20th July 2013. Vol. 53 No.2
© 2005 - 2012 JATIT & LLS. All rights reserved.
ISSN: 1992-8645
www.jatit.org
E-ISSN: 1817-3195
Table of Contents
1.
Design, Analysis, and Optimalization of a Microtip Patch Antenna at Frequency 3.55 GHz
for WIMAX Appliaction
Ali El-Alami, Saad Dosse Bennani, Moulhime EL Bekkali, Ali Benbassou ……………….157-162
2. Smart Transisition Power Routing Based on Connectivity and Coverage
in Mobile Adhoc Networks
Bharathiraja.R, S.Karthik, V.P. Arunachalam ….……………………...…………………163-170
3. Design of a Adaptive Distance Learning Hypermedia Based on Learner
Modelling : Application for a Course in Electrical Engineering
Aziz derouich, Karim Mohammed, Driss Marjane, Fayçal Messaoudi ……………..……...171-179
4. Design of Analog Voltage-Mode Multiplier for UHF RFID Passive in
0.18 UM CMOS Process
Smail hassouni, Hassan Qjidaa, Mohamed Latrach .………...……………………………180-195
5. Implementation of Stronger AES by Using Dynamic S-Box Dependent on
Master Key
Sliman Arrag, Abdellatif Hamdoun, Abderrahim Tragha, Salah Eddine Khamlich…………..196-204
6. Efficient High Performance Modified Straight Line Routing for Wireless Sensor
Networks
Dr.R.Kanthavel, R.Dhaya, S.Vimal ………………………...…………………….….205-209
7. Measuring Computer Security Awareness on Internet Banking and Shopping
for Internet Users
Fatimah Sidi, Marzanah A. Jabar, Aida Mustapha, Nor Fazlida Sani, Iskandar Ishak, Siti Rozana
Supian ……………………………………….………………………………….……..210-216
8. Software of Production Scheduling Planning in Manufacture Companies Using Method of
Make to Order
Wiranto Herry Utomo, Aji Lesmana, Hendro Tampake ……………………...…….…....217-222
9. Index Based Steganography: A New Secure Approach for Image Steganography
Using Two Images
B.Persis Urbana Ivy, P.J.Kumar , S.Sureka, G.uma Maheswari ………………..……..….221-228
10. Adaptive Control Using Multiple Models Without Switching
Haisen Ke, Wenrui Li ………………….…………………………………………..….229-235
Journal of Theoretical and Applied Information Technology
20th July 2013. Vol. 53 No.2
© 2005 - 2012 JATIT & LLS. All rights reserved.
ISSN: 1992-8645
www.jatit.org
E-ISSN: 1817-3195
11. Neuro-Genetic Sensorless Sliding Mode Control of A Permanent Magnet
Synchronous Motor Using Leunberger Observer
H. Mahmoudi, A. Essalmi ……………………...…………………………………..….236-246
12. Performance Evaluation of Routing Protocols In Large-Scale Mobile
Ad Hoc Networks
Jamali Abdellah, Naja Najib, El Ouadghiri Driss, Benaini Redouane,
Zyane Abdellah ………………….………………………………………………..….247-254
13. Rule-Based Reasoning Algorithm for Intuitionistic Fuzzy Petri Nets
Arundhati Lenka, DR.Chakradhar Das …………………………………………..….…255-267
14. VM Consolidation Techniques in Cloud Datacenter
T.R.V.Anandharajan, Deepak Bhargavan, M.A. Bhagyaveni. …………...…………...….268-273
15. Palmprint Feature Representation Using Fractal Characteristics
Darma Putra …………...…………………………………………………….….….....274-282
16. Implementation of Virtualization in Data Centers to Increase
Proficiency and Performance
Mueen Uddin, Asadullah Shah, Raed Alsaqour ………………...…………….…....…....283-290
17. Energy-Aware Node Placement in Wireless Sensor Network Using ACO
Rabindra Ku Jena ………………………………………………………...…….......…291-297
18. The Missile Target Extraction in Ultraviolet Images with Noise and
Burst Interferences
Gao Qina, Zhu Yiing, Zou Ping ………………………….…...………………………..298-306
19. Automatic Selection of Filtering Devices in a Distributed Intrusion Prevension
System
Elmehdi Bendriss, Boubker Regragui …………..……………………………………....307-311
20. Efficient Technique for The Classification of Satellite Images Using Fuzzy
Rule Classifier
S.Prabhu,Dr.D.Tensing
…………....……………………………………………..312-323
Journal of Theoretical and Applied Information Technology
20th July 2013. Vol. 53 No.2
© 2005 - 2012 JATIT & LLS. All rights reserved.
ISSN: 1992-8645
www.jatit.org
Indexing and Abstracting Information
Thomson Science Citation Index Expanded (Being Monitored)
Thomson Journal Citation Reports/Science Edition (Being Monitored)
Ulrich's Periodicals Directory
DataBase systems and Logic Programming (DBLP)
EBSCO Publishing USA
Directory of Open Access Journals (DOAJ)
Google & Google Scholar Journals
The Index of Information Systems Journals
Information Technology Resources Collection
ZDNet Australia
NLM Catalog (Medi-Informaitcs)
Computing Research and Education Association of Australasia
CiteSeerx
Elsevier SCOPUS
TOC PremierTM
Computer Science Journals
Computers and Applied Sciences Complete
N|W Switzerland
Microsoft Academic Search
SciVerse Hub
J-Gate
INSPEC (The IET)
E-ISSN: 1817-3195
Journal of Theoretical and Applied Information Technology
20th July 2013. Vol. 53 No.2
© 2005 - 2012 JATIT & LLS. All rights reserved.
ISSN: 1992-8645
www.jatit.org
E-ISSN: 1817-3195
Editorial Board
EDITOR IN CHIEF
Prof. NIAZ AHMAD
FCE, MOE, Islamabad, PAKISTAN
EDITORIAL BOARD
Dr. CHRISTEL BAIER
University of Malaysia (UKM) 43600 UKM
Faculty of Computer Science, Institute for
BANGI, MALAYSIA.
Theoretical Computer Science, Technical
University Dresden, GERMANY
Dr. KHAIRUDDIN BIN OMAR
Faculty of Information Science and
Dr. YUSUF PISAN
Technology, Universiti Kebangsaan
Department of Software Engineering, Faculty of
Malaysia, 43600 Bangi Selangor Darul-Ehsan,
Information Technology, University of
MALYSIA.
Technology, Sydney, AUSTRALIA
.
Dr. TENGKU MOHD. BIN TENGKU
Dr. YUXIN MAO
SEMBOK
School Of Computer & Information Engineering
Faculty of Information Science and Technology
Zhejiang Gongshang University, CHINA
Universiti Kebangsaan, Malaysia, 43600 Bangi
Selangor Darul-Ehsan, MALYSIA.
Dr. MUHAMMAD SHER
Faculty of Basic and Applied Sciences,
Dr PRABHAT K. MAHANTI
Department of Computer Science, International
Department of Computer Science and Applied
Islamic University, Islamabad. PAKISTAN.
Statistics (CSAS), Hazen Hall Room 311,
University of New Brunswick, Saint John, New
Dr. ZARINA SHUKUR
Brunswick, CANADA.
Computer Science Dept., Fakulti Teknologi dan
Sains Maklumat, University Kebangsaan
Dr. R. PONALAGUSAMY
Malaysia, 43600 Bangi, MALAYSIA.
Department of Mathematics, National Institute of
Technology, Tiruchirappalli, Tamil Nadu,
Dr. NOR AZAN MAT ZIN
INDIA.
Department of Information Science, Faculty of
Information Science & Technology, National
Dr. NITIN UPADHYAY
Computer Science & Information Systems
Journal of Theoretical and Applied Information Technology
20th July 2013. Vol. 53 No.2
© 2005 - 2012 JATIT & LLS. All rights reserved.
ISSN: 1992-8645
www.jatit.org
Group, Birla Institute of Technology and Science
E-ISSN: 1817-3195
Electronics, Bani Walid. LIBYA
(BITS), Pilani-Goa Campus, NH-17B Bypass
Road, ZuariNagar, Goa, INDIA.
Dr. A. SERMET ANAGN
Dr. MAUMITA BHATTACHARYA
Eskisehir Osmangazi University, Industrial
SOBIT, Charles Sturt University, Albury - 2640,
Engineering Department, Bademlik Campus,
NSW, AUSTRALIA
26030 Eskisehir, TURKEY.
Dr. SEIFEDINE KADRY
Dr. YACINE LAFIFI
Lebanese International University, LEBONON
Department of Computer Science, University of
Guelma, BP 401, Guelma 24000, ALGERIA.
Dr. AIJUAN DONG
Department of Computer Science, Hood College
Dr. CHRISTOS GRECOS
Frederick, MD 21701. USA
School of Computing, Engineering and Physical
Sciences, University of Central Lancashire,
Dr. S.S.RIAZ AHAMED
Preston PR1 2E, UNITED KINGDOM.
Mohamed Sathak Engineering College,
Kilakarai, & Sathak Institute of Technology,
Dr. JAYANTHI RANJAN
Ramanathapuram , Tamilnadu, INDIA
Institute of Management Technology, Raj Nagar,
Ghaziabad, Uttar Pradesh, INDIA
Dr. ZURIATI AHMAD ZUKARNAIN
University Putra Malaysia, MALAYSIA
Dr. ADEL M. ALIMI
National Engineering School of Sfax (ENIS),
Dr. CHELLALI BENACHAIBA
University of SFAX, TUNISIA
University of Bechar, ALGERIA
Dr. SIKANDAR HAYAT KHIYAL
Dr. MOHD NAZRI ISMAIL
Department of Computer Science, Fatima Jinnah
University of Kuala Lumpur (UniKL)
Women University, Rawalpindi, PAKISTAN
MALYSIA
Dr. ADEL MERABET
Dr. VITUS SAI WA LAM
Department of Electrical & Computer
The University of Hong Kong, CHINA
Engineering, Dalhousie University, Halifax,
CANADA
Dr. WITCHA CHIMPHLEE
Suan Dusit Rajabhat University, Bangkok,
THAILAND
DR. HEMRAJ SAINI
CE&IT Department, Higher Institute of
Journal of Theoretical and Applied Information Technology
20th July 2013. Vol. 53 No.2
© 2005 - 2012 JATIT & LLS. All rights reserved.
ISSN: 1992-8645
www.jatit.org
E-ISSN: 1817-3195
Dr. SIDDHIVINAYAK KULKARNI
SHAHBAZ GHAYYUR
University of Ballarat, Ballarat, AUSTRALIA
Faculty of Basic and Applied Sciences,
Department of Computer Science and Software
Dr. S. KARTHIKEYAN
Engineering, International Islamic University,
Caledonian College of Engineering,
Islamabad. PAKISTAN.
OMAN
Dr. T.C.MANJUNATH,
Dr. DRAGAN R. MILIVOJEVIĆ
Professor & Head of the Dept.,Electronicis &
Mining and Metallurgy Institute Bor Zeleni
Communication Engg. Dept,
bulevar 35, 19210 Bor, SERBIA
New Horizon College of Engg.,Bangalore560087, Karnataka, INDIA.
Dr. ABDUL AZIZ
Professor of Computer Science, University of
Dr. Nacer eddine ZAROUR
Central Punjab, PAKISTAN
LIRE Laboratory, Computer Science
Departement, University Mentouri of
Dr.P.DANANJAYAN
Constantine (UMC)
Professor, Department of ECE, PEC, Puducherry,
INDIA.
Dr. RIKTESH SRIVASTAVA
Assistant Professor, Information Systems,
Dr. E. SREENIVASA REDDY
Principal - Vasireddy Venkatadri Institute of
Skyline University College
P O Box 1797, Sharjah, UAE
Technology, Guntur, A.P., INDIA
Dr. Mohd ZAINAL ABIDIN AB
Dr. SANTOSH DHONDOPANT
KHAMITKAR
Ramanand Teerth Marathwada University,
Nanded. Maharashtra 431605, INDIA
Dr. M. IQBAL SARIPAN
(MIEEE, MInstP, Member IAENG, GradBEM)
Dept. of Computer and Communication Systems
Engineering, Faculty of Engineering, Universiti
Putra MALAYSIA
Dr. E. SREENIVASA REDDY
Principal - Vasireddy Venkatadri Institute of
Technology, Guntur, A.P., INDIA
KADIR, PhD, MIEEE
Centre of Excellence on Lightning Protection
(CELP)
Dept. of Electrical and Electronics Engineering,
Faculty of Engineering, UPM,
Selangor,MALAYSIA
Dr. OUSMANE THIARE
Gaston Berger University, Department of
Computer Science, UFR S.A.T
BP 234 Saint-Louis, SENEGAL
Dr. SIDDHIVINAYAK KULKARNI
Graduate School of Information Technology and
Mathematics University of BallartAUSTRALIA
Journal of Theoretical and Applied Information Technology
20th July 2013. Vol. 53 No.2
© 2005 - 2012 JATIT & LLS. All rights reserved.
ISSN: 1992-8645
www.jatit.org
E-ISSN: 1817-3195
Dr. BONNY BANERJEE
Dept. of Computer Science & Engineering, Sri
Senior Scientist Audigence, FL, USA, The Ohio
Sai Madhavi Institute of Science & Technology,
State University, Columbus, OH, USA
Mallampudi,
Rajahmundry, A.P, INDIA
Dr. NICKOLAS S. SAPIDIS
Department of Mechanical Engineering,
Dr. KHALID USMANI
University of Western Macedonia
Department of Computer Science, Arid
Kozani GR-50100, GREECE.
Agriculture University, Rawalpindi, PAKISTAN.
Dr. NAZRI BIN MOHD NAWI
Dr. GUFRAN AHAMD ANSARI
Software Engineering Department, Faculty of
Qassim University, College of Computer
Science Computer Information Technology,
Science, Ministry of Higher Education, Qassim
Universiti Tun Hussein Onn
University, KINGDOM OF SAUDI ARABIA
MALAYSIA
Dr. Defa Hu
Dr. JOHN BABALOLA OLADOSU
School of Information, Hunan University of
Ladoke Akintola University of Technology,
Commerce, Changsha 410205, Hunan, P. R. of
Ogbomoso, NIGERIA
CHINA
Dr. ABDELLAH IDRISSI
Department of Computer Science, Faculty of
Science, Mohammed V University - Agdal,
Rabat, MOROCCO
Dr. AMIT CHAUDHRY
University Institute of Engineering and
Technology, Panjab University, Sector-25,
Chandigarh, INDIA
Dr. ASHRAF IMAM
Aligarh Muslim University, Aligarh-INDIA
Dr. MUHAMMAD UMER KHAN
Department of Mechatronics, Faculty of
Engineering, Air University, Islamabad.
PAKISTAN
Dr. MOHAMMED ALI HUSSAIN
Journal Search
Home
Journal Rankings
Search query
Journal Search
in Journal Title
Exact phrase
Country Rankings
Country Search
Compare
Search
J ou r n a l of Th eor etica l a n d Applied In f or ma tion Tech n ology
Country: Pakistan
Map Generator
Help
Subject Area: Computer Science | Mathematics
Subject Category: Computer Science (miscellaneous)
About Us
, Theoretical Computer Science
Publisher: Asian Research Publishing Network (ARPN). Publication type: Journals. ISSN: 18173195, 19928645
Coverage: 2010-2013
H Index: 5
Charts
Indicators
SJR
Display journal title
Just copy the code below and
paste within your html page:
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
Data
2011
2012
0,000 0,000 0,000 0,000 0,000 0,000 0,000 0,000 0,000 0,000 0,000 0,000 0,137 0,167
Total Documents
0
0
0
0
0
0
0
0
0
0
0
222
229
622
Total Docs. (3years)
0
0
0
0
0
0
0
0
0
0
0
0
222
451
Total References
0
0
0
0
0
0
0
0
0
0
0
Total Cites (3years)
0
0
0
0
0
0
0
0
0
0
0
0
61
Self Cites (3years)
0
0
0
0
0
0
0
0
0
0
0
0
4
17
Citable Docs. (3years)
0
0
0
0
0
0
0
0
0
0
0
0
222
451
Cites / Doc. (4years)
0,00
0,00
0,00
0,00
0,00
0,00
0,00
0,00
0,00
0,00
0,00
0,00
0,27
0,39
Cites / Doc. (3years)
0,00
0,00
0,00
0,00
0,00
0,00
0,00
0,00
0,00
0,00
0,00
0,00
0,27
0,39
Cites / Doc. (2years)
0,00
0,00
0,00
0,00
0,00
0,00
0,00
0,00
0,00
0,00
0,00
0,00
0,27
0,39
3.880 4.120 9.475
178
References / Doc.
0,00 0,00 0,00 0,00 0,00 0,00
0,00 0,00
0,00
0,00
17,48 17,99
15,23src="http://ww
x D and y R ≥ y D
x R > x D and y R ≤ y D
x R < x D and y R ≤ y D
x R = x D and y R ≥ y D
x R = x D and y R ≤ y D
then α i = α i
then α i = 180 − α i
then α i = 180 + α i
then α i = 360 − α i
then α i = 90
then α i = 270
The rest of the steps of this method are
similar with the step (b) and (c) in DIFC method.
AIFC method is depend on the selection of
tolerance value (є), filter size (m and n), and M
parameters. The result of each step of FDIFC
method is shown in figure 5.
(a)
E-ISSN: 1817-3195
where size represent the size of range blocks (see
formula (8)), and L represent quadtree
decomposition level. The maximum value (K) of
the level L can be computed as follows.
2 K = min( M 1 , M 2 )
in this case K = 7 because M 1 = M 2 = 128.
Figure 2(b), 4(b), and 5(b) show the
palmprint image representation by using the
criterion with L = K and figure 3(b) is the image
without the criterion.
All methods have been explained above
depend on the selection of tolerance value (є).
Figure 6 show the impact of the tolerance value to
the fractal dimension image representation.
According to the figure, the smaller tolerance value
produced more detail information and the higher
tolerance produced less detail information.
The main advantage of our proposed
methods is the palmprint features can be obtained
directly from the fractal codes palmprint image. Its
mean we can form the palmprint feature directly
from the compressed palmprint image because the
compressed image is collection of fractal codes.
(b)
(a)
(c)
(d)
Figure 5: AIFC method. (a) original palmprint image, (b)
angle image, (c) filtered image, and (d) palmprint feature
representation
3.5 Criterion
The binary image, distance image, and
angle image representation are formed based on the
position of range block. The criterion bellow can be
used to filter the range blocks that will be used to
form those images.
sizei = L − 1
(20)
(19)
(b)
(d)
(e)
Figure 6: Fractal dimension image with various
tolerance є, (a),(b),(c), and (d), represent fractal
dimension image with tolerance 2,3,4, and 5,
respectively.
4.
PALMPRINT FEATURE MATCHING
The degree of similarity between two
palmprint features is computed as follows:
278
Journal of Theoretical and Applied Information Technology
th
20 July 2013. Vol. 53 No.2
© 2005 - 2013 JATIT & LLS. All rights reserved.
ISSN: 1992-8645
d rs
www.jatit.org
(xr − xr )(xs − xs )T
(21)
= 1−
[(xr − xr )(xr − xr )T ]12 [(xs − xs )(xs − xs )T ]12
5.
where x r , x s are the mean of palmprint feature x r
and x s respectively. The above equation computes
one minus normalized correlation between
palmprint feature vector x r and x s . The value of d rs
is between 0 – 2. The d rs will be closed to 0 if x r
and x s obtained from two image of the same
palmprint. Otherwise, the d rs will be far from 0.
Figure 7 shows three groups of palmprint
from the same palm and palms with
similar/different line structures and their averages
score are listed in Table 1. The matching score of
group A are close to 0, and the matching score of
group B and C are far from 0. It is easy to
distinguish group A from group B and C using
these scores.
Table 1:Matching Score of groups A, B, and C in figure 7
Metode
FDFC
FDIFC
DIFC
AIFC
Group A
0,1873
0,1093
0,1679
0,1762
Group B
0,6029
0,5462
0,6563
0,5057
Group C
0,7121
0,5763
0,8911
0,6425
(a1)
(a2)
(a3)
Group A: palms from the same person
(b1)
(b2)
(b3)
Group B: palms from different person with similar line
structure
E-ISSN: 1817-3195
EXPERIMENT RESULTS
Those methods have been applied for
palmprint verification system. Verification system
is tested using database of 1050 palmprint images,
are generated from 5 samples from each of the 210
persons randomly selected. The averages of the first
three images from each user were used for training
and the rest were used for testing.
The performance of verification system is obtained
by matching each of testing palmprint images with
all of the training palmprint images in the database.
A matching is noted as a correct matching if the
two palmprint images are from the same palm and
as incorrect if otherwise.
Figure 8 (a) show the probability
distributions of genuine and imposter parts of
FDFC method used tolerance = 3, and feature
vector length = 256 (16 x 16 blocks). The genuine
and imposter parts are estimated from correct and
incorrect matching scores, respectively. Figure 8(b)
show its curve characteristics. The FAR, FRR, and
EER of the system are 0.3226%, 2.0734%, and
1.4523% respectively. We also tested the FDFC
method with tolerance=2.5 and the result show the
FAR=0.2312% and FRR=1.4423%.
Figure 9 (a) show the probability
distributions of genuine and imposter parts of
FDIFC method used tolerance = 3, filter size 5 x 5,
and feature vector length = 256 (16 x 16 blocks).
Figure 9(b) show its curve characteristics. The
FAR, FRR, and EER of the system are 0.344%,
0.479%, and 0.4092% respectively.
FAR and FRR values of FDIFC method in
various filter size and feature vector length with
tolerance = 3 are shown in table 2.
Figure 10 (a) show the probability
distributions of genuine and imposter parts of DIFC
method used tolerance = 3, filter size 5 x 3, and
feature vector length = 256 (16 x 16 blocks). Figure
10(b) show its curve characteristics. The FAR,
FRR, and EER of the system are 0.8445%,
1,7544%, and 1.1164% respectively.
Figure 11 (a) show the probability
distributions of genuine and imposter parts of DIFC
method used tolerance = 3, filter size 5 x 3, and
feature vector length = 256 (16 x 16 blocks). Figure
11(b) show its curve characteristics. The FAR,
FRR, and EER of the system are 0,6743%,
1,7544%, and 1.2759% respectively.
(c1)
(c2)
(c3)
Group 3: palms from different person with different line
structure
Figure 7: Groups of palmprint based on typical of
principal lines
279
Journal of Theoretical and Applied Information Technology
th
20 July 2013. Vol. 53 No.2
© 2005 - 2013 JATIT & LLS. All rights reserved.
ISSN: 1992-8645
www.jatit.org
E-ISSN: 1817-3195
(a)
(b)
Figure 9: (a) Genuine and impostor distributions of
FDIFC (b) its curve characteristics
(b)
Figure 8: (a) Genuine and impostor distributions of
FDFC, (b) its curve characteristics
(a)
(a)
(b)
Figure 10: (a) Genuine and impostor distributions of
DIFC (b) its curve characteristics
280
Journal of Theoretical and Applied Information Technology
th
20 July 2013. Vol. 53 No.2
© 2005 - 2013 JATIT & LLS. All rights reserved.
ISSN: 1992-8645
www.jatit.org
E-ISSN: 1817-3195
Table 2: FAR and FRR of FDIFC method in various filter
size and feature vector length with tolerance = 3
6.
Feature
Vector
Length
(8 x 8)
FRR
FAR
FRR
FAR
FRR
FAR
0.638
0.609
0.479
0.563
0.479
0.463
(16 x 8)
0.638
0.399
0.479
0.574
0.479
0.489
(16 x 16)
0.638
0.529
0.479
0.504
0.479
0.344
(32 x 16)
0.479
0.675
0.479
0.451
0.479
0.304
(32 x 32)
0.638
0.674
0.479
0.675
0.479
0.344
In this paper, we offer new methods
(FDFC, FDIFC, DIFC and AIFC methods) based
on fractal characteristics to represent the palmprint
features. Those methods have been applied for
palmprint verification system. The experiment
results show that the proposed methods can achieve
an acceptable accuracy rate. The FDIFC method
shows the best performance than other proposed
methods.
The main advantage of using those
methods for feature extraction is the methods can
be formed directly by exploitation fractal codes.
Because of fractal is a great method for image
coding and decoding (image compression), so in
the future, we will applied those proposed methods
for palmprint recognition system from compressed
palmprint images.
Filter 3 x 3
Filter 5 x 3
Filter 5 x 5
CONCLUSIONS AND FUTURE WORK
ACKNOWLEDGEMENT
The authors would like to thank
Directorate General of Higher Education of
Indonesia and Udayana University for supporting
this research.
(a)
REFERENCES:
(b)
Figure 11: (a) Genuine and impostor distributions of
AIFC (b) its curve characteristics
FAR and FRR values of DIFC and AIFC
method in various filter size and feature vector
length with tolerance = 3 are shown in table 3.
Table 3: FAR and FRR of DIFC and AIFC method in
various filter size and feature vector length with
tolerance = 3
DIFC
AIFC
Filter Size/
Number of Blocks
FRR
FAR
FRR
FAR
3 x 3 (8 x 8 block)
2,8708
0,7382
2,5518
0,7877
5 x 3 (8 x 8 block)
2,7113
0,8189
2,8708
0,7683
5 x 5 (8 x 8 block)
2,7113
0,7576
2,8708
0,8199
3 x 3 (16x16 block)
1,7544
0,9222
1,7544
0,8925
5 x 3 (16x16 block)
1,7544
0,8445
1,7544
0,6743
5 x 5 (16x16 block)
1,7544
0,8619
1,7544
0,6998
[1] D. Zhang, W.K. Kong, J.You & M.Wong,
Online Palmprint Identification, IEEE
Transaction on Pattern Analysis and Machine
Intelligence, 25(9), 2003.
[2] Darma Putra, PIFS Code based for Biometric
Palmprint Verification, International Journal
of Computer Science and Information Security
(IJCSIS), Vol. 9, No. 2, 2011, p. 47-52.
[3] T. Yokoyama, K. Sugawara & T. Watanabe,
Similarity-based image retrieval system using
partitioned iterated function system codes, The
8th International Symposium on Artificial Life
and Robotics, Oita, Japan, 2006.
[4] Darma Putra, Erdiawan, High Performance
Palmprint Identification System Based On
Two Dimensional Gabor, Telkomnika UAD,
Vol. 8, No. 3, 2010, p. 195-326
[5] A.K. Jain, Ross A. & S. Pankanti, A Prototype
Hand Geometry-based Verification System,
IEEE Trans. On Circuits and System for Video
Technology, 4(1), 1999.
[6] Darma Putra, Wira Bhuana, Erdiawan,
Pembentukan Kode Telapak Tangan (Palm
Code) berbasis Metode Gabor 2D, Makara UI,
Vol. 15 No. 2, 2011, p. 161-167
281
Journal of Theoretical and Applied Information Technology
th
20 July 2013. Vol. 53 No.2
© 2005 - 2013 JATIT & LLS. All rights reserved.
ISSN: 1992-8645
www.jatit.org
[7] D. Zhang, W. Shu, Two novel characteristics
in palmprint verification: datum point
invariance and line feature matching, pattern
recognition, 32(1), 1999, 691-702.
[8] I Ketut Gede Darma Putra, Sistem Verifikasi
Biometrika Telapak Tangan dengan metode
dimensi fraktal dan lacunarity, Teknologi
Elektro UNUD, Vol. 8 No. 2, 2009, p. 1-6
[9] X.Q. WU, K.Q. Wang & D. Zhang, An
Approach to Line Feature Representation and
Matching for Palmprint Recognition, Journal
of Software, 15(6), 2004.
[10] N. Duta, A.K. Jain & K.V. Mardia, Matching
of Palmprints, Pattern Recognition Letters,
23(1), 2002, 477-485.
[11] Y. Pang, T.B.J. Andrew, N.C.L. David & H.F.
San, Palmprint Verification with Moments,
Journal of WSCG, 12(1-3), 2003.
[12] W. LI, D. Zhang & S. XU, Palmprint
Recognition Based on Fourier Transform,
Journal of Software, 13(5), 2002.
[13] W. Shu & D. Zhang, Automated personal
identification by palmprint, Opt. eng., 37(8),
1998, 2359-2363.
[14] A. Kumar, D.C.M.Wong, C.S. Helen, Anil K.
Jain, Personal Verification using Palmprint
and Hand Geometry Biometric, 2004,
http:/biometrics.cse.msu.
edu/Kumar_AVBPA2003.pdf
[16] T. Connie., A. Teoh, M. Goh & D. Ngo,
Palmprint Recognition with PCA and ICA,
2003,
sprg.massye.ac.nz/ivcnz/proccedings/ivcnz_41
.pdf.
282
E-ISSN: 1817-3195
20th July 2013. Vol. 53 No.2
© 2005 - 2012 JATIT & LLS. All rights reserved.
ISSN: 1992-8645
www.jatit.org
E-ISSN: 1817-3195
Table of Contents
1.
Design, Analysis, and Optimalization of a Microtip Patch Antenna at Frequency 3.55 GHz
for WIMAX Appliaction
Ali El-Alami, Saad Dosse Bennani, Moulhime EL Bekkali, Ali Benbassou ……………….157-162
2. Smart Transisition Power Routing Based on Connectivity and Coverage
in Mobile Adhoc Networks
Bharathiraja.R, S.Karthik, V.P. Arunachalam ….……………………...…………………163-170
3. Design of a Adaptive Distance Learning Hypermedia Based on Learner
Modelling : Application for a Course in Electrical Engineering
Aziz derouich, Karim Mohammed, Driss Marjane, Fayçal Messaoudi ……………..……...171-179
4. Design of Analog Voltage-Mode Multiplier for UHF RFID Passive in
0.18 UM CMOS Process
Smail hassouni, Hassan Qjidaa, Mohamed Latrach .………...……………………………180-195
5. Implementation of Stronger AES by Using Dynamic S-Box Dependent on
Master Key
Sliman Arrag, Abdellatif Hamdoun, Abderrahim Tragha, Salah Eddine Khamlich…………..196-204
6. Efficient High Performance Modified Straight Line Routing for Wireless Sensor
Networks
Dr.R.Kanthavel, R.Dhaya, S.Vimal ………………………...…………………….….205-209
7. Measuring Computer Security Awareness on Internet Banking and Shopping
for Internet Users
Fatimah Sidi, Marzanah A. Jabar, Aida Mustapha, Nor Fazlida Sani, Iskandar Ishak, Siti Rozana
Supian ……………………………………….………………………………….……..210-216
8. Software of Production Scheduling Planning in Manufacture Companies Using Method of
Make to Order
Wiranto Herry Utomo, Aji Lesmana, Hendro Tampake ……………………...…….…....217-222
9. Index Based Steganography: A New Secure Approach for Image Steganography
Using Two Images
B.Persis Urbana Ivy, P.J.Kumar , S.Sureka, G.uma Maheswari ………………..……..….221-228
10. Adaptive Control Using Multiple Models Without Switching
Haisen Ke, Wenrui Li ………………….…………………………………………..….229-235
Journal of Theoretical and Applied Information Technology
20th July 2013. Vol. 53 No.2
© 2005 - 2012 JATIT & LLS. All rights reserved.
ISSN: 1992-8645
www.jatit.org
E-ISSN: 1817-3195
11. Neuro-Genetic Sensorless Sliding Mode Control of A Permanent Magnet
Synchronous Motor Using Leunberger Observer
H. Mahmoudi, A. Essalmi ……………………...…………………………………..….236-246
12. Performance Evaluation of Routing Protocols In Large-Scale Mobile
Ad Hoc Networks
Jamali Abdellah, Naja Najib, El Ouadghiri Driss, Benaini Redouane,
Zyane Abdellah ………………….………………………………………………..….247-254
13. Rule-Based Reasoning Algorithm for Intuitionistic Fuzzy Petri Nets
Arundhati Lenka, DR.Chakradhar Das …………………………………………..….…255-267
14. VM Consolidation Techniques in Cloud Datacenter
T.R.V.Anandharajan, Deepak Bhargavan, M.A. Bhagyaveni. …………...…………...….268-273
15. Palmprint Feature Representation Using Fractal Characteristics
Darma Putra …………...…………………………………………………….….….....274-282
16. Implementation of Virtualization in Data Centers to Increase
Proficiency and Performance
Mueen Uddin, Asadullah Shah, Raed Alsaqour ………………...…………….…....…....283-290
17. Energy-Aware Node Placement in Wireless Sensor Network Using ACO
Rabindra Ku Jena ………………………………………………………...…….......…291-297
18. The Missile Target Extraction in Ultraviolet Images with Noise and
Burst Interferences
Gao Qina, Zhu Yiing, Zou Ping ………………………….…...………………………..298-306
19. Automatic Selection of Filtering Devices in a Distributed Intrusion Prevension
System
Elmehdi Bendriss, Boubker Regragui …………..……………………………………....307-311
20. Efficient Technique for The Classification of Satellite Images Using Fuzzy
Rule Classifier
S.Prabhu,Dr.D.Tensing
…………....……………………………………………..312-323
Journal of Theoretical and Applied Information Technology
20th July 2013. Vol. 53 No.2
© 2005 - 2012 JATIT & LLS. All rights reserved.
ISSN: 1992-8645
www.jatit.org
Indexing and Abstracting Information
Thomson Science Citation Index Expanded (Being Monitored)
Thomson Journal Citation Reports/Science Edition (Being Monitored)
Ulrich's Periodicals Directory
DataBase systems and Logic Programming (DBLP)
EBSCO Publishing USA
Directory of Open Access Journals (DOAJ)
Google & Google Scholar Journals
The Index of Information Systems Journals
Information Technology Resources Collection
ZDNet Australia
NLM Catalog (Medi-Informaitcs)
Computing Research and Education Association of Australasia
CiteSeerx
Elsevier SCOPUS
TOC PremierTM
Computer Science Journals
Computers and Applied Sciences Complete
N|W Switzerland
Microsoft Academic Search
SciVerse Hub
J-Gate
INSPEC (The IET)
E-ISSN: 1817-3195
Journal of Theoretical and Applied Information Technology
20th July 2013. Vol. 53 No.2
© 2005 - 2012 JATIT & LLS. All rights reserved.
ISSN: 1992-8645
www.jatit.org
E-ISSN: 1817-3195
Editorial Board
EDITOR IN CHIEF
Prof. NIAZ AHMAD
FCE, MOE, Islamabad, PAKISTAN
EDITORIAL BOARD
Dr. CHRISTEL BAIER
University of Malaysia (UKM) 43600 UKM
Faculty of Computer Science, Institute for
BANGI, MALAYSIA.
Theoretical Computer Science, Technical
University Dresden, GERMANY
Dr. KHAIRUDDIN BIN OMAR
Faculty of Information Science and
Dr. YUSUF PISAN
Technology, Universiti Kebangsaan
Department of Software Engineering, Faculty of
Malaysia, 43600 Bangi Selangor Darul-Ehsan,
Information Technology, University of
MALYSIA.
Technology, Sydney, AUSTRALIA
.
Dr. TENGKU MOHD. BIN TENGKU
Dr. YUXIN MAO
SEMBOK
School Of Computer & Information Engineering
Faculty of Information Science and Technology
Zhejiang Gongshang University, CHINA
Universiti Kebangsaan, Malaysia, 43600 Bangi
Selangor Darul-Ehsan, MALYSIA.
Dr. MUHAMMAD SHER
Faculty of Basic and Applied Sciences,
Dr PRABHAT K. MAHANTI
Department of Computer Science, International
Department of Computer Science and Applied
Islamic University, Islamabad. PAKISTAN.
Statistics (CSAS), Hazen Hall Room 311,
University of New Brunswick, Saint John, New
Dr. ZARINA SHUKUR
Brunswick, CANADA.
Computer Science Dept., Fakulti Teknologi dan
Sains Maklumat, University Kebangsaan
Dr. R. PONALAGUSAMY
Malaysia, 43600 Bangi, MALAYSIA.
Department of Mathematics, National Institute of
Technology, Tiruchirappalli, Tamil Nadu,
Dr. NOR AZAN MAT ZIN
INDIA.
Department of Information Science, Faculty of
Information Science & Technology, National
Dr. NITIN UPADHYAY
Computer Science & Information Systems
Journal of Theoretical and Applied Information Technology
20th July 2013. Vol. 53 No.2
© 2005 - 2012 JATIT & LLS. All rights reserved.
ISSN: 1992-8645
www.jatit.org
Group, Birla Institute of Technology and Science
E-ISSN: 1817-3195
Electronics, Bani Walid. LIBYA
(BITS), Pilani-Goa Campus, NH-17B Bypass
Road, ZuariNagar, Goa, INDIA.
Dr. A. SERMET ANAGN
Dr. MAUMITA BHATTACHARYA
Eskisehir Osmangazi University, Industrial
SOBIT, Charles Sturt University, Albury - 2640,
Engineering Department, Bademlik Campus,
NSW, AUSTRALIA
26030 Eskisehir, TURKEY.
Dr. SEIFEDINE KADRY
Dr. YACINE LAFIFI
Lebanese International University, LEBONON
Department of Computer Science, University of
Guelma, BP 401, Guelma 24000, ALGERIA.
Dr. AIJUAN DONG
Department of Computer Science, Hood College
Dr. CHRISTOS GRECOS
Frederick, MD 21701. USA
School of Computing, Engineering and Physical
Sciences, University of Central Lancashire,
Dr. S.S.RIAZ AHAMED
Preston PR1 2E, UNITED KINGDOM.
Mohamed Sathak Engineering College,
Kilakarai, & Sathak Institute of Technology,
Dr. JAYANTHI RANJAN
Ramanathapuram , Tamilnadu, INDIA
Institute of Management Technology, Raj Nagar,
Ghaziabad, Uttar Pradesh, INDIA
Dr. ZURIATI AHMAD ZUKARNAIN
University Putra Malaysia, MALAYSIA
Dr. ADEL M. ALIMI
National Engineering School of Sfax (ENIS),
Dr. CHELLALI BENACHAIBA
University of SFAX, TUNISIA
University of Bechar, ALGERIA
Dr. SIKANDAR HAYAT KHIYAL
Dr. MOHD NAZRI ISMAIL
Department of Computer Science, Fatima Jinnah
University of Kuala Lumpur (UniKL)
Women University, Rawalpindi, PAKISTAN
MALYSIA
Dr. ADEL MERABET
Dr. VITUS SAI WA LAM
Department of Electrical & Computer
The University of Hong Kong, CHINA
Engineering, Dalhousie University, Halifax,
CANADA
Dr. WITCHA CHIMPHLEE
Suan Dusit Rajabhat University, Bangkok,
THAILAND
DR. HEMRAJ SAINI
CE&IT Department, Higher Institute of
Journal of Theoretical and Applied Information Technology
20th July 2013. Vol. 53 No.2
© 2005 - 2012 JATIT & LLS. All rights reserved.
ISSN: 1992-8645
www.jatit.org
E-ISSN: 1817-3195
Dr. SIDDHIVINAYAK KULKARNI
SHAHBAZ GHAYYUR
University of Ballarat, Ballarat, AUSTRALIA
Faculty of Basic and Applied Sciences,
Department of Computer Science and Software
Dr. S. KARTHIKEYAN
Engineering, International Islamic University,
Caledonian College of Engineering,
Islamabad. PAKISTAN.
OMAN
Dr. T.C.MANJUNATH,
Dr. DRAGAN R. MILIVOJEVIĆ
Professor & Head of the Dept.,Electronicis &
Mining and Metallurgy Institute Bor Zeleni
Communication Engg. Dept,
bulevar 35, 19210 Bor, SERBIA
New Horizon College of Engg.,Bangalore560087, Karnataka, INDIA.
Dr. ABDUL AZIZ
Professor of Computer Science, University of
Dr. Nacer eddine ZAROUR
Central Punjab, PAKISTAN
LIRE Laboratory, Computer Science
Departement, University Mentouri of
Dr.P.DANANJAYAN
Constantine (UMC)
Professor, Department of ECE, PEC, Puducherry,
INDIA.
Dr. RIKTESH SRIVASTAVA
Assistant Professor, Information Systems,
Dr. E. SREENIVASA REDDY
Principal - Vasireddy Venkatadri Institute of
Skyline University College
P O Box 1797, Sharjah, UAE
Technology, Guntur, A.P., INDIA
Dr. Mohd ZAINAL ABIDIN AB
Dr. SANTOSH DHONDOPANT
KHAMITKAR
Ramanand Teerth Marathwada University,
Nanded. Maharashtra 431605, INDIA
Dr. M. IQBAL SARIPAN
(MIEEE, MInstP, Member IAENG, GradBEM)
Dept. of Computer and Communication Systems
Engineering, Faculty of Engineering, Universiti
Putra MALAYSIA
Dr. E. SREENIVASA REDDY
Principal - Vasireddy Venkatadri Institute of
Technology, Guntur, A.P., INDIA
KADIR, PhD, MIEEE
Centre of Excellence on Lightning Protection
(CELP)
Dept. of Electrical and Electronics Engineering,
Faculty of Engineering, UPM,
Selangor,MALAYSIA
Dr. OUSMANE THIARE
Gaston Berger University, Department of
Computer Science, UFR S.A.T
BP 234 Saint-Louis, SENEGAL
Dr. SIDDHIVINAYAK KULKARNI
Graduate School of Information Technology and
Mathematics University of BallartAUSTRALIA
Journal of Theoretical and Applied Information Technology
20th July 2013. Vol. 53 No.2
© 2005 - 2012 JATIT & LLS. All rights reserved.
ISSN: 1992-8645
www.jatit.org
E-ISSN: 1817-3195
Dr. BONNY BANERJEE
Dept. of Computer Science & Engineering, Sri
Senior Scientist Audigence, FL, USA, The Ohio
Sai Madhavi Institute of Science & Technology,
State University, Columbus, OH, USA
Mallampudi,
Rajahmundry, A.P, INDIA
Dr. NICKOLAS S. SAPIDIS
Department of Mechanical Engineering,
Dr. KHALID USMANI
University of Western Macedonia
Department of Computer Science, Arid
Kozani GR-50100, GREECE.
Agriculture University, Rawalpindi, PAKISTAN.
Dr. NAZRI BIN MOHD NAWI
Dr. GUFRAN AHAMD ANSARI
Software Engineering Department, Faculty of
Qassim University, College of Computer
Science Computer Information Technology,
Science, Ministry of Higher Education, Qassim
Universiti Tun Hussein Onn
University, KINGDOM OF SAUDI ARABIA
MALAYSIA
Dr. Defa Hu
Dr. JOHN BABALOLA OLADOSU
School of Information, Hunan University of
Ladoke Akintola University of Technology,
Commerce, Changsha 410205, Hunan, P. R. of
Ogbomoso, NIGERIA
CHINA
Dr. ABDELLAH IDRISSI
Department of Computer Science, Faculty of
Science, Mohammed V University - Agdal,
Rabat, MOROCCO
Dr. AMIT CHAUDHRY
University Institute of Engineering and
Technology, Panjab University, Sector-25,
Chandigarh, INDIA
Dr. ASHRAF IMAM
Aligarh Muslim University, Aligarh-INDIA
Dr. MUHAMMAD UMER KHAN
Department of Mechatronics, Faculty of
Engineering, Air University, Islamabad.
PAKISTAN
Dr. MOHAMMED ALI HUSSAIN
Journal Search
Home
Journal Rankings
Search query
Journal Search
in Journal Title
Exact phrase
Country Rankings
Country Search
Compare
Search
J ou r n a l of Th eor etica l a n d Applied In f or ma tion Tech n ology
Country: Pakistan
Map Generator
Help
Subject Area: Computer Science | Mathematics
Subject Category: Computer Science (miscellaneous)
About Us
, Theoretical Computer Science
Publisher: Asian Research Publishing Network (ARPN). Publication type: Journals. ISSN: 18173195, 19928645
Coverage: 2010-2013
H Index: 5
Charts
Indicators
SJR
Display journal title
Just copy the code below and
paste within your html page:
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
Data
2011
2012
0,000 0,000 0,000 0,000 0,000 0,000 0,000 0,000 0,000 0,000 0,000 0,000 0,137 0,167
Total Documents
0
0
0
0
0
0
0
0
0
0
0
222
229
622
Total Docs. (3years)
0
0
0
0
0
0
0
0
0
0
0
0
222
451
Total References
0
0
0
0
0
0
0
0
0
0
0
Total Cites (3years)
0
0
0
0
0
0
0
0
0
0
0
0
61
Self Cites (3years)
0
0
0
0
0
0
0
0
0
0
0
0
4
17
Citable Docs. (3years)
0
0
0
0
0
0
0
0
0
0
0
0
222
451
Cites / Doc. (4years)
0,00
0,00
0,00
0,00
0,00
0,00
0,00
0,00
0,00
0,00
0,00
0,00
0,27
0,39
Cites / Doc. (3years)
0,00
0,00
0,00
0,00
0,00
0,00
0,00
0,00
0,00
0,00
0,00
0,00
0,27
0,39
Cites / Doc. (2years)
0,00
0,00
0,00
0,00
0,00
0,00
0,00
0,00
0,00
0,00
0,00
0,00
0,27
0,39
3.880 4.120 9.475
178
References / Doc.
0,00 0,00 0,00 0,00 0,00 0,00
0,00 0,00
0,00
0,00
17,48 17,99
15,23src="http://ww
x D and y R ≥ y D
x R > x D and y R ≤ y D
x R < x D and y R ≤ y D
x R = x D and y R ≥ y D
x R = x D and y R ≤ y D
then α i = α i
then α i = 180 − α i
then α i = 180 + α i
then α i = 360 − α i
then α i = 90
then α i = 270
The rest of the steps of this method are
similar with the step (b) and (c) in DIFC method.
AIFC method is depend on the selection of
tolerance value (є), filter size (m and n), and M
parameters. The result of each step of FDIFC
method is shown in figure 5.
(a)
E-ISSN: 1817-3195
where size represent the size of range blocks (see
formula (8)), and L represent quadtree
decomposition level. The maximum value (K) of
the level L can be computed as follows.
2 K = min( M 1 , M 2 )
in this case K = 7 because M 1 = M 2 = 128.
Figure 2(b), 4(b), and 5(b) show the
palmprint image representation by using the
criterion with L = K and figure 3(b) is the image
without the criterion.
All methods have been explained above
depend on the selection of tolerance value (є).
Figure 6 show the impact of the tolerance value to
the fractal dimension image representation.
According to the figure, the smaller tolerance value
produced more detail information and the higher
tolerance produced less detail information.
The main advantage of our proposed
methods is the palmprint features can be obtained
directly from the fractal codes palmprint image. Its
mean we can form the palmprint feature directly
from the compressed palmprint image because the
compressed image is collection of fractal codes.
(b)
(a)
(c)
(d)
Figure 5: AIFC method. (a) original palmprint image, (b)
angle image, (c) filtered image, and (d) palmprint feature
representation
3.5 Criterion
The binary image, distance image, and
angle image representation are formed based on the
position of range block. The criterion bellow can be
used to filter the range blocks that will be used to
form those images.
sizei = L − 1
(20)
(19)
(b)
(d)
(e)
Figure 6: Fractal dimension image with various
tolerance є, (a),(b),(c), and (d), represent fractal
dimension image with tolerance 2,3,4, and 5,
respectively.
4.
PALMPRINT FEATURE MATCHING
The degree of similarity between two
palmprint features is computed as follows:
278
Journal of Theoretical and Applied Information Technology
th
20 July 2013. Vol. 53 No.2
© 2005 - 2013 JATIT & LLS. All rights reserved.
ISSN: 1992-8645
d rs
www.jatit.org
(xr − xr )(xs − xs )T
(21)
= 1−
[(xr − xr )(xr − xr )T ]12 [(xs − xs )(xs − xs )T ]12
5.
where x r , x s are the mean of palmprint feature x r
and x s respectively. The above equation computes
one minus normalized correlation between
palmprint feature vector x r and x s . The value of d rs
is between 0 – 2. The d rs will be closed to 0 if x r
and x s obtained from two image of the same
palmprint. Otherwise, the d rs will be far from 0.
Figure 7 shows three groups of palmprint
from the same palm and palms with
similar/different line structures and their averages
score are listed in Table 1. The matching score of
group A are close to 0, and the matching score of
group B and C are far from 0. It is easy to
distinguish group A from group B and C using
these scores.
Table 1:Matching Score of groups A, B, and C in figure 7
Metode
FDFC
FDIFC
DIFC
AIFC
Group A
0,1873
0,1093
0,1679
0,1762
Group B
0,6029
0,5462
0,6563
0,5057
Group C
0,7121
0,5763
0,8911
0,6425
(a1)
(a2)
(a3)
Group A: palms from the same person
(b1)
(b2)
(b3)
Group B: palms from different person with similar line
structure
E-ISSN: 1817-3195
EXPERIMENT RESULTS
Those methods have been applied for
palmprint verification system. Verification system
is tested using database of 1050 palmprint images,
are generated from 5 samples from each of the 210
persons randomly selected. The averages of the first
three images from each user were used for training
and the rest were used for testing.
The performance of verification system is obtained
by matching each of testing palmprint images with
all of the training palmprint images in the database.
A matching is noted as a correct matching if the
two palmprint images are from the same palm and
as incorrect if otherwise.
Figure 8 (a) show the probability
distributions of genuine and imposter parts of
FDFC method used tolerance = 3, and feature
vector length = 256 (16 x 16 blocks). The genuine
and imposter parts are estimated from correct and
incorrect matching scores, respectively. Figure 8(b)
show its curve characteristics. The FAR, FRR, and
EER of the system are 0.3226%, 2.0734%, and
1.4523% respectively. We also tested the FDFC
method with tolerance=2.5 and the result show the
FAR=0.2312% and FRR=1.4423%.
Figure 9 (a) show the probability
distributions of genuine and imposter parts of
FDIFC method used tolerance = 3, filter size 5 x 5,
and feature vector length = 256 (16 x 16 blocks).
Figure 9(b) show its curve characteristics. The
FAR, FRR, and EER of the system are 0.344%,
0.479%, and 0.4092% respectively.
FAR and FRR values of FDIFC method in
various filter size and feature vector length with
tolerance = 3 are shown in table 2.
Figure 10 (a) show the probability
distributions of genuine and imposter parts of DIFC
method used tolerance = 3, filter size 5 x 3, and
feature vector length = 256 (16 x 16 blocks). Figure
10(b) show its curve characteristics. The FAR,
FRR, and EER of the system are 0.8445%,
1,7544%, and 1.1164% respectively.
Figure 11 (a) show the probability
distributions of genuine and imposter parts of DIFC
method used tolerance = 3, filter size 5 x 3, and
feature vector length = 256 (16 x 16 blocks). Figure
11(b) show its curve characteristics. The FAR,
FRR, and EER of the system are 0,6743%,
1,7544%, and 1.2759% respectively.
(c1)
(c2)
(c3)
Group 3: palms from different person with different line
structure
Figure 7: Groups of palmprint based on typical of
principal lines
279
Journal of Theoretical and Applied Information Technology
th
20 July 2013. Vol. 53 No.2
© 2005 - 2013 JATIT & LLS. All rights reserved.
ISSN: 1992-8645
www.jatit.org
E-ISSN: 1817-3195
(a)
(b)
Figure 9: (a) Genuine and impostor distributions of
FDIFC (b) its curve characteristics
(b)
Figure 8: (a) Genuine and impostor distributions of
FDFC, (b) its curve characteristics
(a)
(a)
(b)
Figure 10: (a) Genuine and impostor distributions of
DIFC (b) its curve characteristics
280
Journal of Theoretical and Applied Information Technology
th
20 July 2013. Vol. 53 No.2
© 2005 - 2013 JATIT & LLS. All rights reserved.
ISSN: 1992-8645
www.jatit.org
E-ISSN: 1817-3195
Table 2: FAR and FRR of FDIFC method in various filter
size and feature vector length with tolerance = 3
6.
Feature
Vector
Length
(8 x 8)
FRR
FAR
FRR
FAR
FRR
FAR
0.638
0.609
0.479
0.563
0.479
0.463
(16 x 8)
0.638
0.399
0.479
0.574
0.479
0.489
(16 x 16)
0.638
0.529
0.479
0.504
0.479
0.344
(32 x 16)
0.479
0.675
0.479
0.451
0.479
0.304
(32 x 32)
0.638
0.674
0.479
0.675
0.479
0.344
In this paper, we offer new methods
(FDFC, FDIFC, DIFC and AIFC methods) based
on fractal characteristics to represent the palmprint
features. Those methods have been applied for
palmprint verification system. The experiment
results show that the proposed methods can achieve
an acceptable accuracy rate. The FDIFC method
shows the best performance than other proposed
methods.
The main advantage of using those
methods for feature extraction is the methods can
be formed directly by exploitation fractal codes.
Because of fractal is a great method for image
coding and decoding (image compression), so in
the future, we will applied those proposed methods
for palmprint recognition system from compressed
palmprint images.
Filter 3 x 3
Filter 5 x 3
Filter 5 x 5
CONCLUSIONS AND FUTURE WORK
ACKNOWLEDGEMENT
The authors would like to thank
Directorate General of Higher Education of
Indonesia and Udayana University for supporting
this research.
(a)
REFERENCES:
(b)
Figure 11: (a) Genuine and impostor distributions of
AIFC (b) its curve characteristics
FAR and FRR values of DIFC and AIFC
method in various filter size and feature vector
length with tolerance = 3 are shown in table 3.
Table 3: FAR and FRR of DIFC and AIFC method in
various filter size and feature vector length with
tolerance = 3
DIFC
AIFC
Filter Size/
Number of Blocks
FRR
FAR
FRR
FAR
3 x 3 (8 x 8 block)
2,8708
0,7382
2,5518
0,7877
5 x 3 (8 x 8 block)
2,7113
0,8189
2,8708
0,7683
5 x 5 (8 x 8 block)
2,7113
0,7576
2,8708
0,8199
3 x 3 (16x16 block)
1,7544
0,9222
1,7544
0,8925
5 x 3 (16x16 block)
1,7544
0,8445
1,7544
0,6743
5 x 5 (16x16 block)
1,7544
0,8619
1,7544
0,6998
[1] D. Zhang, W.K. Kong, J.You & M.Wong,
Online Palmprint Identification, IEEE
Transaction on Pattern Analysis and Machine
Intelligence, 25(9), 2003.
[2] Darma Putra, PIFS Code based for Biometric
Palmprint Verification, International Journal
of Computer Science and Information Security
(IJCSIS), Vol. 9, No. 2, 2011, p. 47-52.
[3] T. Yokoyama, K. Sugawara & T. Watanabe,
Similarity-based image retrieval system using
partitioned iterated function system codes, The
8th International Symposium on Artificial Life
and Robotics, Oita, Japan, 2006.
[4] Darma Putra, Erdiawan, High Performance
Palmprint Identification System Based On
Two Dimensional Gabor, Telkomnika UAD,
Vol. 8, No. 3, 2010, p. 195-326
[5] A.K. Jain, Ross A. & S. Pankanti, A Prototype
Hand Geometry-based Verification System,
IEEE Trans. On Circuits and System for Video
Technology, 4(1), 1999.
[6] Darma Putra, Wira Bhuana, Erdiawan,
Pembentukan Kode Telapak Tangan (Palm
Code) berbasis Metode Gabor 2D, Makara UI,
Vol. 15 No. 2, 2011, p. 161-167
281
Journal of Theoretical and Applied Information Technology
th
20 July 2013. Vol. 53 No.2
© 2005 - 2013 JATIT & LLS. All rights reserved.
ISSN: 1992-8645
www.jatit.org
[7] D. Zhang, W. Shu, Two novel characteristics
in palmprint verification: datum point
invariance and line feature matching, pattern
recognition, 32(1), 1999, 691-702.
[8] I Ketut Gede Darma Putra, Sistem Verifikasi
Biometrika Telapak Tangan dengan metode
dimensi fraktal dan lacunarity, Teknologi
Elektro UNUD, Vol. 8 No. 2, 2009, p. 1-6
[9] X.Q. WU, K.Q. Wang & D. Zhang, An
Approach to Line Feature Representation and
Matching for Palmprint Recognition, Journal
of Software, 15(6), 2004.
[10] N. Duta, A.K. Jain & K.V. Mardia, Matching
of Palmprints, Pattern Recognition Letters,
23(1), 2002, 477-485.
[11] Y. Pang, T.B.J. Andrew, N.C.L. David & H.F.
San, Palmprint Verification with Moments,
Journal of WSCG, 12(1-3), 2003.
[12] W. LI, D. Zhang & S. XU, Palmprint
Recognition Based on Fourier Transform,
Journal of Software, 13(5), 2002.
[13] W. Shu & D. Zhang, Automated personal
identification by palmprint, Opt. eng., 37(8),
1998, 2359-2363.
[14] A. Kumar, D.C.M.Wong, C.S. Helen, Anil K.
Jain, Personal Verification using Palmprint
and Hand Geometry Biometric, 2004,
http:/biometrics.cse.msu.
edu/Kumar_AVBPA2003.pdf
[16] T. Connie., A. Teoh, M. Goh & D. Ngo,
Palmprint Recognition with PCA and ICA,
2003,
sprg.massye.ac.nz/ivcnz/proccedings/ivcnz_41
.pdf.
282
E-ISSN: 1817-3195