• Tidak ada hasil yang ditemukan

Hand Geometry Verification based on Chain Code and Dynamic Time Warping.

N/A
N/A
Protected

Academic year: 2017

Membagikan "Hand Geometry Verification based on Chain Code and Dynamic Time Warping."

Copied!
13
0
0

Teks penuh

(1)
(2)

Table of Contents

Sr. No

Topic

1.

Scope of the Journal

2.

The Model

3.

The Advisory and Editorial Board

4.

Papers

(3)

Scope of the Journal

International Journal of Computer Applications (IJCA) creates a place for publication of papers which covers the frontier issues in Computer Science and Engineering and their applications which will define new wave of breakthroughs. The journal is an initiative to identify the efforts of the scientific community worldwide towards inventing new-age technologies. Our mission, as part of the research community is to bring the highest quality research to the widest possible audience. International Journal of Computer Applications is a global effort to consolidate dispersed knowledge and aggregate them in a search-able and index-able form.

The perspectives presented in the journal range from big picture analysis which address global and universal concerns, to detailed case studies which speak of localized applications of the principles and practices of computational algorithms. The journal is relevant for academics in computer science, applied sciences, the professions and education, research students, public administrators in local and state government, representatives of the private sector, trainers and industry consultants.

Indexing

International Journal of Computer Applications (IJCA) maintains high quality indexing services such as Google Scholar, CiteSeer, UlrichsWeb, DOAJ (Directory of Open Access Journals) and Scientific Commons Index, University of St. Gallen, Switzerland. The articles are also indexed with SAO/NASA ADS Physics Abstract Service supported by Harvard University and NASA, Informatics and ProQuest CSA Technology Research Database. IJCA is constantly in progress towards expanding its contents worldwide for the betterment of the scientific, research and academic communities.

Topics

(4)

The Model

Open Review

International Journal of Computer Applications approach to peer review is open and inclusive, at the same time as it is based on the most rigorous and merit-based ‘blind’ peer-review processes. Our referee processes are criterion-referenced and referees selected on the basis of subject matter and disciplinary expertise. Ranking is based on clearly articulated criteria. The result is a refereeing process that is scrupulously fair in its assessments at the same time as offering a carefully structured and constructive contribution to the shape of the published paper.

Intellectual Excellence

(5)

The Advisory and Editorial Board

The current editorial and Advisory committee of the International Journal of Computer Applications (IJCA) includes members of research center heads, faculty deans, department heads, professors, research scientists, experienced software development directors and engineers.

Dr. T. T. Al Shemmeri, Staffordshire University, UK Bhalaji N, Vels University

Dr. A.K.Banerjee, NIT, Trichy Dr. Pabitra Mohan Khilar, NIT Rourkela

Amos Omondi, Teesside University Dr. Anil Upadhyay, UPTU

Dr Amr Ahmed, University of Lincoln Cheng Luo, Coppin State University Dr. Keith Leonard Mannock, University of London Harminder S. Bindra, PTU

Dr. Alexandra I. Cristea, University of Warwick Santosh K. Pandey, The Institute of CA of India Dr. V. K. Anand, Punjab University Dr. S. Abdul Khader Jilani, University of Tabuk Dr. Rakesh Mishra, University of Huddersfield Kamaljit I. Lakhtaria, Saurashtra University Dr. S.Karthik, Anna University Dr. Anirban Kundu, West Bengal University of

Technology

Amol D. Potgantwar, University of Pune Dr Pramod B Patil, RTM Nagpur University Dr. Neeraj Kumar Nehra, SMVD University Dr. Debasis Giri, WBUT

Dr. Rajesh Kumar, National University of Singapore Deo Prakash, Shri Mata Vaishno Devi University

Dr. Sabnam Sengupta, WBUT Rakesh Lingappa, VTU

D. Jude Hemanth, Karunya University P. Vasant, University Teknologi Petornas

Dr. A.Govardhan, JNTU Yuanfeng Jin, YanBian University

Dr. R. Ponnusamy, Vinayaga Missions University Rajesh K Shukla, RGPV

Dr. Yogeshwar Kosta, CHARUSAT Dr.S.Radha Rammohan, D.G. of Technological

Education

T.N.Shankar, JNTU Prof. Hari Mohan Pandey, NMIMS University

Dayashankar Singh, UPTU Prof. Kanchan Sharma, GGS Indraprastha

Vishwavidyalaya

Bidyadhar Subudhi, NIT, Rourkela Dr. S. Poornachandra, Anna University

Dr. Nitin S. Choubey, NMIMS Dr. R. Uma Rani, University of Madras

Rongrong Ji, Harbin Institute of Technology, China Dr. V.B. Singh, University of Delhi

Anand Kumar, VTU Hemant Kumar Mahala, RGPV

Prof. S K Nanda, BPUT Prof. Debnath Bhattacharyya, Hannam University

Dr. A.K. Sharma, Uttar Pradesh Technical University

Dr A.S.Prasad, Andhra University

Rajeshree D. Raut, RTM, Nagpur University Deepak Joshi, Hannam University Dr. Vijay H. Mankar, Nagpur University Dr. P K Singh, U P Technical University Atul Sajjanhar, Deakin University RK Tiwari, U P Technical University

Navneet Tiwari, RGPV Dr. Himanshu Aggarwal, Punjabi University

Ashraf Bany Mohammed, Petra University Dr. K.D. Verma, S.V. College of PG Studies & Research Totok R Biyanto, Sepuluh Nopember R.Amirtharajan, SASTRA University

Sheti Mahendra A, Dr. B A Marathwada University Md. Rajibul Islam, University Technology Malaysia

Koushik Majumder, WBUT S.Hariharan, B.S. Abdur Rahman University

Dr.R.Geetharamani, Anna University Dr.S.Sasikumar, HCET

Rupali Bhardwaj, UPTU Dakshina Ranjan Kisku, WBUT

Gaurav Kumar, Punjab Technical University A.K.Verma, TERI

Prof. B.Nagarajan, Anna University Vikas Singla, PTU

Dr H N Suma, VTU Dr. Udai Shanker, UPTU

Anu Suneja, Maharshi Markandeshwar University Prof. Rachit Garg, GNDU

Aung Kyaw Oo, DSA, Myanmar Dr Lefteris Gortzis, University of Patras, Greece.

Suhas J Manangi, Microsoft Mahdi Jampour, Kerman Institute of Higher Education

(6)

Dr. Vipan Kakkar, SMVD University Dr. Ian Wells, Swansea Metropolitan University, UK Dr M Ayoub Khan, Ministry of Communications

and IT, Govt. of India

Yongguo Liu, University of Electronic Science and Technology of China

Prof. Surendra Rahamatkar, VIT Prof. Shishir K. Shandilya, RGPV

M.Azath, Anna University Liladhar R Rewatkar, RTM Nagpur University

R. Jagadeesh K, Anna University Amit Rathi, Jaypee University

Dr. Dilip Mali, Mekelle University, Ethiopia. Dr. Paresh Virparia, Sardar Patel University Morteza S. Kamarposhti , Islamic Azad University

of Firoozkuh, Iran

Dr. D. Gunaseelan Directorate of Technological Education, Oman

Dr. M. Azzouzi, ZA University of Djelfa, Algeria. Dr. Dhananjay Kumar, Anna University

Jayant shukla, RGPV Prof. Yuvaraju B N, VTU

Dr. Ananya Kanjilal, WBUT Daminni Grover, IILM Institute for Higher Education

Vishal Gour, Govt. Engineering College Monit Kapoor, M.M University

Dr. Binod Kumar, ISTAR Amit Kumar, Nanjing Forestry University, China.

Dr.Mallikarjun Hangarge, Gulbarga University Gursharanjeet Singh, LPU

Dr. R.Muthuraj, PSNACET Mohd.Muqeem, Integral University

Dr. Chitra. A. Dhawale, Symbiosis Institute of Computer Studies and Research

Dr.Abdul Jalil M. Khalaf, University of Kufa, IRAQ.

Dr. Rizwan Beg, UPTU R.Indra Gandhi, Anna University

V.B Kirubanand, Bharathiar University Mohammad Ghulam Ali, IIT, Kharagpur Dr. D.I. George A., Jamal Mohamed College Kunjal B.Mankad, ISTAR

Raman Kumar, PTU Lei Wu, University of Houston – Clear Lake, Texas.

G. Appasami , Anna University S.Vijayalakshmi, VIT University

Dr. Gurpreet Singh Josan, PTU Dr. Seema Shah, IIIT, Allahabad

Dr. Wichian Sittiprapaporn, Mahasarakham University, Thailand.

Chakresh Kumar, MRI University, India

(7)

PAPERS

A New Validity Index for Fuzzy C-Means for Automatic Medical Image Clustering Authors : Sayed F. Bahght, Sultan Aljahdali, E. A. Zanaty, Ahmed S. Ghiduk, Ashraf Afifi

1-8

Voltage Stability Analysis comparing Generator Sensitivity based Method with V-Q Curve Method for Optimal Placement of STATCOM

Authors : Neena Ramesh, B.V Sanker Ram, Vedam Subrahmanyam

9-16

Hand Geometry Verification based on Chain Code and Dynamic Time Warping Authors : I Ketut Gede Darma Putra, Made Ari Sentosa

17-22

An Application of Genetic Algorithm for Solving Academic Personnel Planning Problems in University Management System via Fuzzy Goal Programming with Penalty Functions Authors : Debjani Chakraborti, Papun Biswas

23-32

An Application of Fuzzy Soft Set in Multicriteria Decision Making Problem Authors : P. K. Das, R. Borgohain

33-37

A Preprocessing Approach For Image Analysis Using Gamma Correction Authors : S. Asadi Amiri, H. Hassanpour

38-46

Isolated Word Recognition using Morph – Knowledge for Telugu Language Authors : Dr. K. V. N. Sunitha, N. Kalyani

47-54

Acyclic Coloring of Central Graphs Authors : R. Arundhadhi, Dr. R. Sattanathan

(8)

International Journal of Computer Applications (0975 8887) Volume 38 No.12, January 2012

17

Hand Geometry Verification based on Chain Code and

Dynamic Time Warping

I Ketut Gede Darma Putra

Made Ari Sentosa

Department of Electrical Engineering Alumni of Department of Electrical Engineering

Udayana University, Bali, Indonesia Udayana University, Bali, Indonesia

ABSTRACT

This research demonstrated a technique for hand geometry biometric verification using hand contour matching. Hand shape feature is obtained by using a chain code method. Since the vector length of the hand shape chain code of each user is distinct tendency then Dynamic Time Warping (DTW) is suitable metrics to match of two chain code features. System performance was tested by using databases that consists of 75 users with 12 hand image samples for each user. The experimental results show the system produces about 84% success rate with FNMR = 7.98% and FMR = 7.92%.

General Terms

Biometrics, Pattern Recognition, Image analysis.

Keywords

Hand geometry, DTW, chain code.

1.

INTRODUCTION

Hand geometry is one of the very well known physical biometrics and has been widely implemented in security system. Some of successful applications of hand geometry are employee time and attendance and physical access control. Highly public acceptance, easier to collect, relatively easy to user, and integration capabilities with other biometrics are the advantages of hand geometry. Acquisition of hand geometry does not require expensive device and unlike fingerprints, low quality of the skin do not impact to the hand geometry features. Hand geometry is suitable to be integrated with fingerprint and palmprint because these biometric are part of the hand so can be captured at the same time during acquisition phase. One of drawback of the hand geometry is not highly unique therefore the applications of hand geometry are limited to the verification system only.

The characteristic of hand geometry is based on geometric structure of hand shape such as: length and width of the fingers, size of the palm, distance between the knuckles, thickness, etc. Each finger is commonly taken one feature of each finger length and two or three measurement width of finger at the specific coordinate position. The researches in [1][2][3][4][5][6][7] used the technique to extract the hand geometry features. Measurement of width and length of fingers is not relatively easy task. To facilitate the measurement of length and width of each finger is used some of fixed points [5].

This paper demonstrates the use of the hand contours as a feature of hand geometry. The contour is extracted by chain code technique. To match of two chain code of hand is used dynamic time warping distance (DTW). The distance was chosen since the hand shape chain code of each user has tends to unequal length.

2.

METHODOLOGY

Overview diagram of the proposed hand geometry verification system in this research is shown in Figure 1.

Figure 1. Overview diagram of hand geometry verification

2.1

Hand Image Acquisition

This research has developed a hand image acquisition device as shown in figure 2. Component of the device consists of camera, hand pad, lamp and the box to enclose the components. The device used web camera (webcam) with resolution 320 x 240 pixel due to get the hand geometry feature does not need the high resolution camera, so the device has become very cheap. The webcam is connected to the computer by using USB port. The Hand pad has a black background to make significance different with hand object and also consist of some pegs that are placed at specific position. The pegs are useful to control the hand oriented, translation, and stretching and also to ensure that

Chain code Database Hand Image captured

Preprocessing Chain code extraction

Matching using DTW Decision (Score < T)

Authorized User or Not

(9)

International Journal of Computer Applications (0975 8887) Volume 38 No.12, January 2012

18 Figure 2. Hand image acquisition device

Figure 3. Software to capture the hand image

the hand fingers are not touching each other. The lamp serves as a light source to make a stable lighting in acquisition process.

Each user was requested to put his/her left hand on the hand pad and a software that has been installed on computer will be captured the hand image from the device (see Figure 3).

2.2

Preprocessing

The preprocessing aims to prepare hand images to be more easily processed on the feature extraction phase. There are four main processes in preprocessing stage are gray scaling, thresholding, median filtering and detecting of object boundary.

Gray scaling transform the color hand image that produced by device (webcam) to gray scale image.

Thresholding aims to convert the gray scale hand image to the binary image. The threshold value (T) is obtained automatically by Otsu method [8]. If pixel value of gray scale image less than T then the pixel value is converted to black (0), otherwise the pixel value is converted to white (1).

(a) (b)

(c) (d)

Figure 4. Preprocessing results, (a) gray scaled image, (b) binarized image, (c) median filtered image, (d)

boundarized image

Median filtering is applied to avoid the white pixels (not pixel object) outside of the hand object due to imperfections process of thresholding phase. Size of filter mask is 3 x 3 pixels.

Since the median filter applied on the binary image then pixel ordering process in median filter to determine the pixel median is not required any more. Determination of pixel median can be replaced by applying the following rule:

If sum of all pixels in sliding window is greater than 4 then pixel is set to 1 otherwise the pixel is set to 0.

The rule would make the median filtering process will be much faster.

The last process in this stage is hand boundary detection. The result of this process is only pixels on edge or boundaries of hand object will be set to black otherwise will be set to white. The results of each preprocessing step are shown in Figure 4.

2.3

Hand Chain Code Extraction

(10)

International Journal of Computer Applications (0975 8887) Volume 38 No.12, January 2012

19 Figure 5(b) illustrates how the chain code of hand shape is

generated from boundary hand image. The boundary hand image is scanned from top left until the first boundary pixel is found. This pixel is noted as starting pixel. In general, the location of the pixel is around the tip of middle finger because the finger is generally longer than other fingers. The next boundary pixel is traced by clockwise movement and assigned a code to this pixel by following Figure 5(a). Figure 5(c) shows its chain code feature.

(a) Close Up 0 } } } } } } } }} } } }

0 00 0 0070 7 7 6 (b) 0000007767666766666666666666666666676666667666666666766 6666666666666667666666666656666666666666667677001112122 2212212221212212121221212121121122112212121222212222122 2122212211010000070776676666566665666566655666566566665 6566566665666566566665666565665665656666656665666667770 0101110111111101011121101111011112111121121112100000776 6666665665566555655566565555655565555556555655565565656 5566665656666556666665666656666556666565666656655665665 5666565655656666444444444444444444444444444444444444444 4444444444444444444444444444433434333333333323334332323 3323332233233323333332232332333333334334334334434334334 3333232332332322211101001000000000007070777777770707077 7706707770700700070000001010101132222111121212212322222 2212222223223322233232322323223223222223323223223232223 2232223232223222322222222222121110007007777677676767676 6667766766776777676767676767677666667676667667667666767 7777700001122222123222222222322222222222222222222222221 22222212222222222222222222222222232212222222112101 (c)

Figure 5. Extraction of chain cod, (a) 8-connectivity chain code, (b) hand shape chain code extraction, (c) chain code

feature vector

In this research chain code as shown in Figure 5(c) is used as a hand shape feature without any modification or normalization process.

Two hand shape chain code of the same user have tends to unequal vector length and therefore dynamic time warping distance is used in this research to compute the similarity degree of each other.

2.4

Dynamic Time Warping Distance

Dynamic Time Warping (DTW) is a well known technique to measure the similarity between two given (time-dependant) sequences. One advantages of DTW is able to match of two feature vectors with unequal length. The feature vectors are warped to match each other and the DTW distance is measured based on optimal warping path of two feature vectors.

The DTW distance of two vectors U and V with length m and n respectively, can be expressed as follows:

)

,

(

)

,

(

U V m n

DTW

(1)

          ) 1 , ( ) 1 , 1 ( ) , 1 ( min ) , ( ) , ( j i j i j i v u d n

m ba se i j

    (2)      

0, (0, ) , ( ,0)

) 0 , 0

(

(3)

) ... 3 , 2 , 1 ; ... 3 , 2 , 1

(i  m j  n

The distance is commonly computed by creating the m by n distance matrix. The matrix contains element γ(i, j) that represent the cumulative distance of warping path from element (1,1) to (i, j) where (1≤ i ≤ m, 1 ≤ j ≤ n), therefore the matrix is called cumulative distance matrix.

Lets see the example of two chain code vectors U = (0 7 4 0), and V = (1 0 7 5 1). The DTW distance of these vectors is 3. Figure 6(a) to 6(e) shows cumulative distance computation is based on the column 1 to column 5 of V respectively, while the warping path from U to V is shown by shaded area in Figure 6 (f).

A threshold value (T) is used to decide whether two chain codes come from the same person (genuine) or not (impostor). If the DTW score less than or equal with T then the tested chain code is noted as authorized, otherwise the chain code is noted as not authorized.

d =d Cumulative =Cumulative Remark (1-0)2 1 1 + 0

1 Minimum (1-7)2 36 36 + 1 37

(1-4)2 9 9 + 37 46

(1-0)2 1 1 + 46 47

(11)

International Journal of Computer Applications (0975 8887) Volume 38 No.12, January 2012

20

D =d Cumulative =Cumulative Remark (0-0)2 0 0 + 1

1 Minimum (0-7)2 49 49 + 1 50

(0-4)2 16 16 + 37 53 (0-0)2 0 0 + 46 46

(b)

D =d Cumulative =Cumulative Remark (7-0)2 49 49 + 1 50

(7-7)2 0 0 + 1

1 minimum (7-4)2 9 9 + 1 10

(7-0)2 49 49 + 10 59

(c)

D =d Cumulative =Cumulative Remark (5-0)2 25 25 + 50 75

(5-7)2 4 4 + 1 5

(5-4)2 1 1 + 1 2 minimum

(5-0)2 25 25 + 2 27

(d)

D =d Cumulative =Cumulative Remark (1-0)2 1 1 + 75 76

(1-7)2 36 36 + 5 41

(1-4)2 9 9 + 2 11

(1-0)2 1 1 + 2

3 minimum

(e)

1 0 7 5 1

0 1 1 50 75 76 7 37 50 1 5 41 4 46 53 10 2 11 0 47 46 59 27 3

(f)

Figure 6. DTW distance computation of vector U = (0 7 4 0) and V=(1 0 7 5 1), (a), (b), (c), (d), (e) represents computation is based on column 1 to 5 of V respectively, (f) shaded area represents the warping path from U to V.

3.

EXPERIMENTS AND RESULTS

The hand shape chain code feature and DTW distance have been applied for hand geometry verification system. The total number of hand images used to test the system performance is 900 images that are generated from 12 samples from each of the 75 users randomly selected. To know the impact of increasing the database size to the system performance then these experiments create three type of database size is 25, 50 and 75 users with various numbers of reference samples in template databases and various numbers of query image samples in testing database.

The performance of the verification system is obtained by matching each of testing hand images with all of the reference

hand images in the database. A matching is noted as a correct matching if the two hand images are from the same hand and as incorrect if otherwise. This paper used FMR (false match rate), FNMR (false non match rate), system accuracy, and receiver operation curve (ROC) as indicators of the performance system.

A threshold value is used to determine the FNMR and FMR. This experiment tries various threshold values and each threshold value will be produces a pair of FNMR and FMR. A pair of FNMR and FMR is selected as system performance when the total of FNMR + FMR is smallest then the others and its threshold will be chosen as a threshold value of system.

FNMR, FMR and success rate are computed as:

% 100 x a ccess genuine of tota l

r a te genuine r eject of tota l

F NMR (4)

% 100 x a ccess impostor of tota l

r a te impostor a ccpet

of tota l

F MR (5)

) (

%

100 F NMR F MR

Ra te

Success    (6)

Table 1, Table 2 and Table 3 shows system performance by using database size 25, 50, and 75 users respectively with varying in number of reference samples (2 to 8 samples) in database. When the experiment use 2 samples as reference this mean 10 of 12 remain sample images are used as test image. The tables show increasing the number of training sample in database also tends to increase the success rate of the system. The best success rate achieved is about 84% when using eight training samples in database for whole database size (see the last row of Table 1, 2 and 3). The system performance in database with 25 users is FNMR= 7.63, FMR=7.71, and success rate = 84.67, database with 50 users is FNRM=7.88, FMR=7.99, and success rate = 84.13, while database with 75 users is FNRM=7.98, FMR=7.92, and success rate = 84.10.

Figure 7 shows graphics of genuine and impostor score distribution and receiver operating curve by using database with 75 users. Overlapping area in Figure 7(a) will be effect the system performance. The larger overlapping area, the higher the error rate system (decrease the system performance) and vice versa.

Table 1. Performance of system by using template database contains 25 users

Number of template

samples

Database 25 users Threshold Value FNMR (%) FMR (%) Success rate (%)

2 218 13.40 13.25 73.35

3 211 11.11 11.38 77.51

4 207 10.84 10.78 78.37

5 207 10.97 10.90 78.12

6 204 10.00 10.35 79.65

7 203 10.17 9.98 79.85

(12)

International Journal of Computer Applications (0975 8887) Volume 38 No.12, January 2012

21 Table 2. Performance of system by using template

database contains 50 users

Number of template

samples

Database 50 users Threshold Value FNMR (%) FMR (%) Success rate (%)

2 221 12.40 12.43 75.17

3 218 12.00 11.66 76.34

4 216 11.17 11.28 77.54

5 216 11.49 11.38 77.13

6 213 10.67 10.86 78.47

7 207 9.66 9.59 80.75

8 199 7.88 7.99 84.13

Table 3. Performance of system by using template database contains 75 users

Number of template

samples

Database 75 users Threshold Value FNMR (%) FMR (%) Success rate (%)

2 226 12.40 12.81 74.79

3 225 12.15 12.31 75.54

4 224 11.74 12.02 76.24

5 224 11.77 11.96 76.27

6 221 11.30 11.28 77.42

7 214 9.90 9.82 80.27

8 206 7.98 7.92 84.10

(a)

(b)

Figure 7. Performance of system using database with 75 users, (a) graphics of genuine and impostor score

distribution, (b) receiver operating curve (ROC)

Figure 8. The impact of increasing database size to the success rate of system

Figure 7(b) show the ROC of system. The cross point on the figure represents the cross error rate (CER) or equal error rate (EER) where FNMR ≈ FMR. The EER system is 7.92% with appropriate T is 206.

Figure 8 provides good information that the performance of system is relatively stable despite the size of database is increased from 25 to 75 users.

This research also noted that the average time that is needed to match two chain code vectors is about 0.028 second on notebook Intel Dual Core processor with 1 GB RAM.

4.

CONCLUSION

This paper has successfully demonstrated the use of chain code and dynamic time wrapping method for hand geometry verification. The experiment results show that the proposed method achieved success rate about 84% with FNMR = 7.98% and FMR =7.92%.

For further work in order to improve the system performance, we will combine with envelope feature [8] and other hand geometry features such as: perimeter and area of hand geometry that directly obtained from chain code [9] and also apply the normalization [10] and modification [11] techniques on the chain code.

5.

ACKNOWLEDGMENTS

Our thank goes to the Udayana University who has helped organize this research.

6.

REFERENCES

[1] Jain A.K., Ross A., and Pankanti S., A Prototype Hand Geometry-based Verification System, IEEE Trans. On Circuits and Systems for Video Technology, Vol. 4, No. 1, 1999.

[2] Ajay Kumar, David Zhang, Personal Recognition using Hand Shape and Texture, IEEE Transaction on Image Processing, 2006, Vol. 15, No. 8.

[3] Ajay Kumar, David Chang, Helen CS., Anil K. Jain, Personal Authentication using Hand Images, Pattern Recognition Letter 27, 2006, pp. 1478-1486.

(13)

International Journal of Computer Applications (0975 8887) Volume 38 No.12, January 2012

22 and Video-Based Biometric Authentication (AVBPA),

Guildford, UK, June 9-11, pp. 668-675.

[5] Setyawan, I.B., 2004, Sistem Verifikasi Telapak Tangan dan Geometri Tangan Dengan Metode Overlapping Block, Thesis, Electrical Engineering, Udayana University, Bali, Indonesia.

[6] Alexandra L.N.Wong., Pengcheng Shi, 2002, Peg-Free Hand Geometry Recognition Using Hierarchical Geometry and Shape Matching, IAPR Workshop on Machine Vision Application, Nara, Japan.

[7] Tee Connie Andrew Teoh Beng Jin Michael Goh Kah Ong and David Ngo Chek Ling., 2003, A single-sensor hand geometry and palmprint verification system, In Proceedings of the 2003 ACM SIGMM workshop on

Biometrics Methods and Applications (WBMA'03), New York, NY, USA, ACM Press, pp 100-106

[8] Darma Putra, IKG., 2009, Biometrics System, Andi Publisher, Yogyakarta, Indonesia

[9] Darma Putra, IKG., 2010, Digital Image Processing, Andi Publisher, Yogyakarta, Indonesia

[10] Rajput G., Mali SM., Marathi Handwritten Numeral Recognition Using Fourier Descriptor and Normalized Chain Code, IJCA special issue on Recent Trend in Image Processing and Pattern Recognition, 2010. [11] Amasyali MF., Nilgun E., Hakan H., Filiz Koyuncu,

Gambar

Figure 1. Overview diagram of hand geometry verification
Figure 4. Preprocessing results, (a) gray scaled image, (b) binarized image, (c) median filtered image, (d) boundarized image
Figure 5(b) illustrates how the chain code of hand shape is generated from boundary hand image
Figure 7 shows graphics of genuine and impostor score distribution and receiver operating curve by using database with 75 users
+2

Referensi

Dokumen terkait

Unit Layanan Pengadaan Bar ang/ Jasa pada Lembaga Pener bangan dan Antar iksa Nasional (LAPAN) akan melaksanakan Pelelangan Seder hana dengan pascakualifikasi untuk

UNIT LAYANAN PENGADAAN BARANG/JASA PEMERINTAH KABUPATEN KLATEN POKJA PENGADAAN JASA KONSULTANSI DAN JASA LAINNYA.. Klaten, 12

Mengingat hal demikian maka di ciptakanlah sebuah sistem yang mampu membantu user dalam menerima informasi mengenai data penduduk ataupun aktifitas kependudukan pada

Berdasarkan hasil penelitian di Balai Besar Kesehatan Paru Masyarakat tentang hubungan gender dengan keterlibatan orang terdekat dalam pengambilan keputusan pada program

In this paper, the effects of new methods for risk classification, e.g., genetic tests, on health insurance markets are studied using an insurance model with state contingent

Sanggahan secara elektronik disampaikan kepada Kelompok Kerja 2 Kantor Layanan Pengadaan Barang/Jasa Provinsi Kalimantan Barat melalui aplikasi SPSE pada website

[r]

Wajib Pajak sebagaimana dimaksud dalam contoh yang telah diterbitkan SKPDKB, apabila dalam jangka waktu paling lama 5 (lima) tahun sesudah pajak yang terutang ditemukan