Identification of Fingerprint Image With Minkowski Distance Algorithm Approach
Identification of Fingerprint Image With Minkowski Distance Algorithm Approach
Introduction
The rapid growth in technology and information systems in the digital age is undergoing significant
changes. Easy access to information through the internet has become a primary need, but the
increasing use of digital technology also brings the risk of increased threats to security. Therefore,
it is important to prioritize digital security protection that includes aspects of personal data
protection, network security, and information system security(Gani, n.d.; Mayamin & Usuluddin,
2023; Nuriadin et al., 2021; Nuriadin, 2021).
Fingerprint sensors, as part of management information systems, play a role in the
management of personal information. In the digital age, technological advancements impact on the
vulnerability of information security. In the digital financial sector, this poses a threat of loss of
assets or leakage of customer data, requiring simple and valid identification. Fingerprint sensors
have several advantages, such as simplifying the identification process and data storage, while
increasing the security of personal information(Emelda, n.d.; Rizaldi et al., n.d.; Nurliza & Widodo,
2018).
Fingerprint identification can be used to improve security and prevent data leakage. A study
conducted by Satria et. al. (2017) showed that the fingerprint system can prevent personal data
69
BAMME Vol. 3 No. 2, 2023, pp. 69-78
leakage up to 99.9%. In addition, another study conducted by Arifandi (2023) showed that a door
security system using fingerprints based on Arduino Uno ATMega328 and SMS Gateway can
identify residents of the house and provide solutions to homes left by their owners. In the study,
the test results show access to open the door using fingerprints from outside can run well and
homeowners can easily get information when someone breaks into the door by force (Arifandi,
2019; Aziz, n.d.; Gusri et al., n.d.; Hartono et al., 2023; Hermawan et al., 2023).
Various methods can be used in fingerprint identification, one of which is the Minkowski
distance. The Minkowski distance method acts as an important metric for vector spaces, serving as
a norm in the space, encompassing the generalized forms of Euclidean and Manhattan distances.
The use of Minkowski distance in the fingerprinting approach contributes to the formation of a
unique signature, ensuring a distinctive and non-copyable identification. This methodology, which
is an integral part of vector space analysis, highlights the precision and complexity essential for
robust applications, making it a key element in a collection of advanced techniques in the domain
of data science and pattern recognition(Nurliza & Widodo, 2018; Pradana, 2017; Safwandi &
Muthmainnah, n.d.).
Research that adopts the Minkowski distance method to perform distance analysis between
data points in vector space can result in a deeper understanding of the structure and distribution
of the data, open up the potential for discovering relevant patterns, and improve the accuracy of the
analysis in the context in question. The Minkowski distance method is a very suitable method for
translating distance analysis between data points, because it provides flexibility and generalization
in measuring distance. The steps of this research involve calculating distance using the Minkowski
distance formula to describe the relationships and patterns that exist in the data(Khairunnisa et al.,
n.d.; Nishom, 2019; Safwandi & Muthmainnah, n.d.; Thant & Aye, 2020).
Method
This research adopting the Minkowski distance method to perform distance analysis between data
points in vector space can lead to a deeper understanding of the structure and distribution of the
data, open up the potential for discovering relevant patterns, and improve the accuracy of the
analysis in the context in question. The Minkowski distance method is a very suitable method for
translating distance analysis between data points, as it provides flexibility and generality in
measuring distance. The steps of this research involved calculating distances using the Minkowski
distance formula to illustrate the relationships and patterns present in the data.
70 10.12928/bamme.v3i2.9949
e-ISSN 2776-1029 p-ISSN 2776-1002
retrieval process was carried out with respect to the distance in which the photos were taken and
involved cropping the data. This approach allows for a more structured selection and customization
of data from such secondary sources to support proper analysis in a pre-defined method.
The calculation process to evaluate the accuracy of a method or procedure that has been
implemented (See Figure 1). This accuracy analysis aims to measure the extent to which the results
obtained are in accordance with the expected standards or meet predetermined criteria. This stage
makes it possible to identify the advantages and disadvantages of a method or technique used in
the context of data processing or analysis being carried out. The general formula for accuracy is,
∑𝑚𝑎𝑛𝑦 𝑠𝑢𝑐𝑐𝑒𝑠𝑠𝑒𝑠,
𝐴𝑐𝑐𝑢𝑟𝑎𝑐𝑦(%) = × 100%
∑𝑡𝑜𝑡𝑎𝑙 𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑑𝑎𝑡𝑎
(2)
72 10.12928/bamme.v3i2.9949
e-ISSN 2776-1029 p-ISSN 2776-1002
4 × 4 resize matrix
With a similar approach, calculations were made using Guideline 1 to Guideline 6 against the
responses from Respondent 1 to Respondent 30. This step was carried out to analyze and evaluate
the suitability and similarity between each guideline and the respective responses generated by the
respondents involved in this study and the following Table 1 was obtained.
From the previously tested data, the accuracy and success of the tested image matching can
be evaluated using the following methods.
∑𝑚𝑎𝑛𝑦 𝑠𝑢𝑐𝑐𝑒𝑠𝑠𝑒𝑠,
𝐴𝑐𝑐𝑢𝑟𝑎𝑐𝑦(%) = × 100%
∑𝑡𝑜𝑡𝑎𝑙 𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑑𝑎𝑡𝑎
17
𝐴𝑐𝑐𝑢𝑟𝑎𝑐𝑦(%) = × 100%
30
𝐴𝑐𝑐𝑢𝑟𝑎𝑐𝑦(%) = 56,67%
Then, we continue to analyze the following steps (See Figure 3). Matrix P1 refers to the matrix
derived from guideline 1. Using the established definition of 1, the Minkowski distance will be
calculated for the matrix. This process is part of the evaluation of the similarity or difference
between the reference matrix and other matrices within the framework of the predefined method.
The manual calculation is as follows. Comparison of respondent1 with guideline 1.
74 10.12928/bamme.v3i2.9949
e-ISSN 2776-1029 p-ISSN 2776-1002
𝑑(𝑥, 𝑦) = 84.22309366304167
22 255 0 239
⎡1 ⋯
⎢ 199 0 220⎤⎥
⎢ ⋮ ⋱ ⋮ ⎥
⎢ 0 0
⋯
0 0 ⎥
⎣ 0 0 0 0 ⎦
4 × 4 resize matrix
With a similar approach, calculations were made using Guideline 1 to Guideline 6 against the
responses from Respondent 1 to Respondent 30. This step was carried out to analyze and evaluate
the suitability and similarity between each guideline and the respective responses generated by the
respondents involved in this study and Table 2 was obtained.
From the previously tested data, the accuracy and success of the tested image matching can
be evaluated using the following methods:
∑𝑚𝑎𝑛𝑦 𝑠𝑢𝑐𝑐𝑒𝑠𝑠𝑒𝑠,
𝐴𝑐𝑐𝑢𝑟𝑎𝑐𝑦(%) = × 100%
∑𝑡𝑜𝑡𝑎𝑙 𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑑𝑎𝑡𝑎
28
𝐴𝑐𝑐𝑢𝑟𝑎𝑐𝑦(%) = × 100%
30
𝐴𝑐𝑐𝑢𝑟𝑎𝑐𝑦(%) = 93%
From the results of the first data processing, an accuracy rate of 56.67% was obtained. While
in the second data processing, the accuracy rate increased to 93%. This significant difference is due
to the different approaches in data collection. In the first data collection, there was no consideration
of the data collection distance or cropping process on the data set. In contrast, in the second data
collection, a more structured approach was used with data collection at a uniform distance and the
application of a cropping process, which resulted in a significant increase in data accuracy.
Conclusion
The results of using the Minkowski Distance method on the first data showed an accuracy rate of
56.67%, which is significant but worth noting for further improvement. The use of the second data
that considered the capture distance and applied cropping resulted in an increase in accuracy to
93%, confirming the importance of a structured approach to data capture. A suggestion for future
research is to consider other factors that affect accuracy, such as variations in image capture angle
or more complex preprocessing techniques. Further evaluation of these factors can help improve
the accuracy of the method in fingerprint image recognition.
Suggestions for further research include several things that can be optimized. Firstly, it is
recommended to consider the use of additional data to improve a greater level of accuracy in
fingerprint recognition. Second, it is recommended to consider an approach to minimize the
fingerprint image in certain parts of the diagram to obtain a more optimized matrix. Thirdly, it is
recommended to further normalize the matrix to produce smaller values, simplifying the
calculation process. Finally, it is important to pay attention to the pixel size when photographing
fingerprint data, considering it as a key factor in image capture for more accurate analysis. With
these suggestions in mind, future research is expected to make significant progress in the
development of more reliable and efficient fingerprint recognition methods.
References
Arifandi, M. (2019). Prototype Sistem Keamanan Pintu Menggunakan Sidik Jari (Fingerprint)
Berbasis Arduino Uno ATMega328 dan SMS Gateway.
https://www.researchgate.net/publication/340165694
Aziz, N. (n.d.). Pemanfaatan teknologi internet dalam pendidikan.
Emelda. (n.d.). Pengaruh Absensi Fingerprint dan Sanksi Hukuman Terhadap Disiplin
Kerja Pegawai Pada Dinas Perdagangan Provinsi Sumatera Selatan. STIE Rahmaniyah Sekayu.
Gani, A. G. (n.d.). Pengenalan teknologi internet serta dampaknya.
76 10.12928/bamme.v3i2.9949
e-ISSN 2776-1029 p-ISSN 2776-1002
Gusri, M., Dan, A., & Kadarisman, Y. (n.d.). Penggunaan Teknologi Internet Dikalangan Mahasiswa
Fakultas Ilmu Sosial Dan Ilmu Politik Universitas Riau.
Hartono, B., Eniyati, S., & Hadiono, K. (2023). Perbandingan Metode Perhitungan Jarak pada Nilai
Centroid dan Pengelompokan Data Menggunakan K-Means Clustering. Jurnal Sistem Komputer
Dan Informatika (JSON), 4(3), 503. https://doi.org/10.30865/json.v4i3.6021
Hermawan, D., Ullah, A., & Faizal, A. (2023). Rancang Bangun Keamanan Kotak Amal dengan Akses
Fingerprint Menggunakan ESP32-Cam dan Telegram Berbasis IOT. 7(3), 1013–1021.
https://doi.org/10.30865/mib.v7i3.6252
Kasus Cybercrime Dengan Studi Kasus Hacker Bjorka Terhadap Pembocoran Data Zaki Rizaldi, A.
M., Dwi Putra, R., Ul Hosnah, A., & Zaki Rizaldi, M. (n.d.). Analisis Kasus Cybercrime Dengan Studi
Kasus Hacker Bjorka Terhadap Pembocoran Data. http://jurnal.um-
tapsel.ac.id/index.php/justitia
Khairunnisa, A., Putri Efendy, M., Zamri, M., & Tusakdiyah, S. H. (n.d.). Aplikasi Pendeteksi Gejala
Penyakit Jantung Menggunakan Metode Minkowski Distance Dengan Citra Matlab (Vol. 3, Issue
1).
Mayamin, M., & Usuluddin, L. (2023). Pengaruh Absensi Sidik Jari (Finger Print) terhadap Disiplin
Kerja Pegawai. Remik, 7(1), 602–609. https://doi.org/10.33395/remik.v7i1.12091
Nishom, M. (2019). Perbandingan Akurasi Euclidean Distance, Minkowski Distance, dan Manhattan
Distance pada Algoritma K-Means Clustering berbasis Chi-Square. Jurnal Informatika: Jurnal
Pengembangan IT, 4(1), 20–24. https://doi.org/10.30591/jpit.v4i1.1253
Nuriadin, A., Dyan Nofia Harumike, Y., Tana Sanggamu, D. (2021). Sejarah perkembangan dan
implikasi internet pada media massa dan kehidupan masyarakat. SELASAR KPI: Referensi
Media Komunikasi Dan Dakwah, 1(1). https://ejournal.iainu-
kebumen.ac.id/index.php/selasar/index
Nuriadin, A. Y. D. N. (2021). Sejarah Internet di Indonesia.
Nurliza, N. N., & Widodo, E. et al. (2018). Penerapan euclidean distance pada pengenalan pola citra
sidik jarI.
Pradana, I. H. (2017). Klasifikasi citra sidik jari berdasarkan enam tipe pattern menggunakan metode
euclidean distance.
Safwandi, & Muthmainnah. (n.d.). Sistem Pendeteksi Terjemahan Kifayatul Muhtadi Ke Dalam
Bahasa Indonesia Menggunakan Metode Minkowski Distance.
Thant, A. A., & Aye, S. M. (2020). Euclidean, Manhattan and Minkowski Distance Methods For
Clustering Algorithms. International Journal of Scientific Research in Science, Engineering and
Technology, 553–559. https://doi.org/10.32628/ijsrset2073118
78 10.12928/bamme.v3i2.9949