Identifikasi Objek Menggunakan Proses Deteksi Tepi Metode Laplacian of Gaussian Dan Canny Terhadap Citra Sidik Jari
DOI:
https://doi.org/10.30865/mib.v6i1.3459Keywords:
Laplacian of Gaussian, Canny, Fingerprint, Identification, Prediction, CombinationAbstract
Identification is the identification or determination of an object based on evidence as a clue. The objective of the research was to identify biometric images using edge detection of LoG (Laplacian of Gaussian), Canny, and LoG+Canny with different shapes and dimensions. It is expected that the object can still be identified with different shapes and dimensions. The sample of data used was 20 fingerprint images. This fingerprint image was tested using the methods LoG, Canny and LoG+Canny. The process begins with the image reading, and then the image is converted to grayscale, edge detection and image segmentation. The final result is the identification of the image. The results show that the average accuracy is 89.9 per cent for the LoG method, while 81.8 per cent for the Canny method and 90.7 per cent for the LoG + Canny method. From 10 fingerprint image tests, 8 fingerprint images can be identified by both methods. While the LoG + Canny method is capable of identifying 9 fingerprint images. The LoG method can detect images of 2, 4, 5, 6, 7, 8, 9, 10; while the Canny method can detect images of 2, 3, 4, 6, 7, 8, 9, 10; and the LoG + Canny method can detect images of 1, 2, 3, 4, 6, 7, 8, 9, 10. The minimum and maximum pixel values for the LoG method are 11 pixels for the test image and 25327 pixels for the database image. While the minimum and maximum pixel values for the Canny method are 148 pixels for the test image and 42323 pixels for the database image. In the meantime, the minimum and maximum pixel values for the LoG + Canny method are 806 pixels for the test image and 57972 pixels for the database image. The LoG + Canny method can outperform other methods for the identification of fingerprint images from the results of the tests carried out. In addition to the higher accuracy value, the resulting error value is also much smaller. The object images in the LoG method that have not been identified are numbers 1 and 3 with an error of 27.27 percent and 58.33. While the Canny method that has not been identified is number 1 and 5 with an error of 98.31 per cent and 59.92 per cent. The LoG + Canny method that cannot be identified is number 5 with an error of 61.69 per cent. The mean error values for the three methods were 10.1%, 18.2% and 9.3% (LoG, Canny, LoG + Canny).References
B. O. Mohammed, Z. A. Kakarash, and S. H. Salih, “Fingerprint biometric identification with geometric moment features,†Journal of Theoretical and Applied Information Technology, vol. 95, no. 5, pp. 1063–1071, 2017.
S. Wable and C. Laulkar, “Fingerprint Recognition Scheme using Assembling Invariant Moments and SVM,†International Journal of Advanced Research in Computer and Communication Engineering Vol., vol. 2, no. 10, pp. 3905–3911, 2013.
T. Z. Mazakov, S. A. Jomartova, T. S. Shormanov, G. Z. Ziyatbekova, B. S. Amirkhanov, and P. Kisala, “The Image Processing Algorithms For Biometric Identification By Fingerprints,†N E W S of the Academy of Sciences of the Republic of Kazakhstan, vol. 5278, no. February, 2020.
S. Sumijan, S. Arlis, and P. A. W. Purnama, “Fingerprint Identification Using the Hybrid Thresholding and Edge detection for the Room Security,†TEM Journal, vol. 9, no. 4, pp. 1396–1400, 2020, doi: 10.18421/TEM94-10.
H. N. Monday, I. D. Dike, J. P. Li, D. Agomuo, G. U. Nneji, and A. Ogungbile, “Enhanced attendance Management System: A Biometrics System of Identification Based on Fingerprint,†2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference, IEMCON 2018, pp. 500–505, 2019, doi: 10.1109/IEMCON.2018.8614776.
P. Mohan, S. Anand, R. B. Varghese, P. Aravinth, and D. Raveena Judie Dolly, “Analysis on Fingerprint Extraction Using Edge detection and Minutiae Extraction,†2nd International Conference on Signal Processing and Communication, ICSPC 2019 - Proceedings, pp. 161–164, 2019, doi: 10.1109/ICSPC46172.2019.8976803.
L. Gan, J. Gao, Y. Hu, and W. Cao, “Fingerprint image edge detection based on fractal Brownian motion,†Second International Conference on Image and Graphics, vol. 4875, no. 60175011, p. 633, 2002, doi: 10.1117/12.477209.
G. Cao, Q. S. Sun, Z. Mao, and Y. Mei, “Detection of core points in fingerprint images based on edge map,†Proceedings - 2009 International Conference on Electronic Computer Technology, ICECT 2009, vol. 1, pp. 126–129, 2009, doi: 10.1109/ICECT.2009.22.
M. R. V. A. K. M. B. Chatterjee, “Edge Detection In Fingerprints,†Pattern Recognition, vol. 20, no. 5, pp. 513–523, 1987.
W. Zhou, J. Han, X. Zeng, and W. Yan, “Fingerprint verification based on wavelet and edge detection,†ICEMI 2009 - Proceedings of 9th International Conference on Electronic Measurement and Instruments, vol. 1, pp. 31001–31004, 2009, doi: 10.1109/ICEMI.2009.5274401.
R. Swathika, T. S. Sharmila, and D. Bhattacharya, “Edge Detection Using Simple Image Arithmetic,†2nd International Conference on Computer, Communication, and Signal Processing: Special Focus on Technology and Innovation for Smart Environment, ICCCSP 2018, no. Icccsp, pp. 1–5, 2018, doi: 10.1109/ICCCSP.2018.8452858.
X. Li, H. Jiao, and Y. Wang, “Edge detection algorithm of cancer image based on deep learning,†Bioengineered, vol. 11, no. 1, pp. 693–707, 2020, doi: 10.1080/21655979.2020.1778913.
M. Radhakrishnan, An, an Panneerselvam, N, and hagopal Nachimuthu, “Canny Edge Detection Model in MRI Image Segmentation Using Optimized Parameter Tuning Method,†Intelligent Automation & Soft Computing, vol. 26, no. 4, pp. 1185–1199, 2020, doi: 10.32604/iasc.2020.012069.
M. Shafiabadi, A. Kamkar-Rouhani, S. R. Ghavami Riabi, A. R. Kahoo, and B. Tokhmechi, “Identification of reservoir fractures on FMI image logs using Canny and Sobel edge detection algorithms,†Oil & Gas Science and Technology – Revue d’IFP Energies nouvelles, vol. 76, p. 10, 2021, doi: 10.2516/ogst/2020086.
R. C. N. Santi, “Identifikasi Biometrik Sidik Jari dengan Metode Fraktal,†Jurnal Teknologi Informasi DINAMIK, vol. XIII, no. 1, pp. 68–72, 2008.
H. Sajati, D. Nugraheny, and N. A. Suwarso, “Haruno Sajati, Dwi Nugraheny, Nova Adi Suwarso,†MIB, vol. 6, no. 1, pp. 60–68, 2017.
C. Ji, K. Yin, T. Zhu, and C. Bian, “Canny Algorithm for High-speed Railway Apparatus Identification,†in 10th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI 2017), 2017, vol. 4.
Y. Liu, L. Sun, L. Li, Y. Zhang, Z. Dai, and Z. Xiong, “Image identification of a moving object based on an improved Canny edge detection algorithm,†ASME International Mechanical Engineering Congress and Exposition, Proceedings (IMECE), vol. 4A-2018, pp. 1–6, 2018, doi: 10.1115/IMECE2018-86792.
W. Wu, “Paralleled Laplacian of Gaussian (LoG) edge detection algorithm by using GPU,†Eighth International Conference on Digital Image Processing (ICDIP 2016), vol. 10033, no. Icdip, p. 1003309, 2016, doi: 10.1117/12.2244599.
M. H. N, “Penerapan Metode Log ( Laplacian Of Gaussian ) Dalam Mendeteksi Tepi Citra Pada Penyakit Aterosklerosis,†Pelita Informatika, vol. 8, no. April, pp. 435–438, 2020.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).