<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Fusing Modalities in Forensic Identification with Score Discretization</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Y.L. Wong, S. M. Shamsuddin, S. S. Yuhaniz</string-name>
          <email>yeeleng28@gmail.com,mariyam@utm.my,sophia@utm.my</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sargur N. Srihari</string-name>
          <email>srihari@cedar.buffalo.edu</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Computer Science and Engineering, University at Buffalo,The State University of New York</institution>
          ,
          <addr-line>Buffalo, NY 14260</addr-line>
          <country country="US">USA</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Soft Computing Research Group, Universiti Teknologi Malaysia</institution>
          ,
          <addr-line>81310 Johor</addr-line>
          ,
          <country country="MY">Malaysia</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>-The fusion of different forensic modalities for arriving at a decision of whether the evidence can be attributed to a known individual is considered. Since close similarity and high dimensionality can adversely affect the process, a method of score fusion based on discretization is proposed. It is evaluated considering the signatures and fingerprints. Discretization is performed as a filter to find the unique and discriminatory features of each modality in an individual class before their use in matching. Since fingerprints and signatures are not compatible for direct integration, the idea is to convert the features into the same domain. The features are assigned an appropriate matched score, M Sbp which are based to their lowest distance. The final scores are then fed to the fusion, F Sbp. The top matches with F Sbp less than a predefined threshold value, are expected to have the true identity. Two standard fusion approaches, namely Mean and Min fusion, are used to benchmark the efficiency of proposed method. The results of these experiments show that the proposed approach produces a significant improvement in the forensic identification rate of fingerprint and signature fusion and this findings support its usefulness.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>I. INTRODUCTION</title>
      <p>
        The goal of forensic analysis is that of determining whether
observed evidence can be attributed to an individual. The
final decision of forensic analysis can take one of three
values: identification/no-conclusion/exclusion. Biometric systems
have a similar goal of going from input to conclusion but
with different goals and terminology: biometric identification
means determining the best match in a closed set of individuals
and verification means whether the input and known have the
same source. While biometric systems attempt to do the
entire process automatically, forensic systems narrow-down the
possibilities among a set of individuals with the final decision
being made by a human examiner. Automatic tools for forensic
analysis have been developed for several forensic modalities
including signatures [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], fingerprints [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], handwriting [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], and
footwear prints or marks [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. In both forensic analysis and
biometric analysis more than one modality of data can be
used to improve accuracy [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Examples of the need to
combine forensic evidence in forensic analysis are: signature
and fingerprints on the same questioned document, pollen
found on the clothing of an assailant together with human
DNA [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], multiple shoe-prints in a crime scene [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], etc. In
this paper we explore how evidence of different modalities can
be combined for the forensic decision. Biometric identification
systems such as token based and password based identification
systems, unimodal identification recognizes a user, by ”who
the person is”, using a one-to many matching process (1:M)
rather than by ”what the person carries along”. Conventional
systems suffer from numerous drawbacks such as forgotten
password, misplaced ID card, and forgery issues. To address
these problems, unimodal based identification was developed
and has seen extensive enhancements in reliability and
accuracy of identification. However, several studies have shown
that the poor quality of image samples or the methodology
itself can lead to a significant decreasing in the performance
of a unimodal based identification system [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. The
common issues include intra-class variability, spoof attack,
non-universality, and noisy data. In order to overcome these
difficulties in unimodal identification, multimodal based
identification systems (MIS) have been developed. As the name
suggests, in an MIS the identification process is based on
evidence presented by multiple modality sources from an
individual. Such systems are more robust to variations in the
sample quality than unimodal systems due to the presence of
multiple (and usually independent) pieces of evidence [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ].
A key to successful multimodal based system development
for forensic identification, is an effective methodology
organization and fusion process, capable to integrate and handle
important information such as distinctiveness characteristic of
an individual. Individual’s distinctive characteristics is unique
to forensic. Therefore, in this paper, the multi-matched scores
based discretization method is proposed for forensic
identification of an individual from different modalities. Compared to
previous methods, the proposed method is unique in the sense
that the extracted features correspond to the individuality of
a particular person which are discretized and represented into
standard sizes. The method is robust and capable to overcome
dimensionality issues without requiring image normalization.
The low dimension and standardized features make the design
of post-processing phase (classifier or decision)
straightforward. Moreover, the clear physical meanings of the discretized
features are meaningful and distinctive, and be used in more
complex systems (e.g., expert systems for interpretation and
inference).
      </p>
      <p>II. RELATED WORK</p>
      <p>In identification systems, fusion takes into account a set of
features that can reflect the individuality and characteristics
of the person under consideration. However, it is difficult to
extract and select features that are discriminatory, meaningful
and important for identification. Different sets of features may
have better performance when considering different groups
of individuals and therefore, a technique is needed to
represent for each sample set of features. In this paper,
multimatched scores fusion based discretization is proposed for
forensic identification to represent the distinctiveness in
multimodalities of an individual.</p>
      <sec id="sec-1-1">
        <title>A. Representation of individuality features</title>
        <p>Extracting and representing relevant features which contains
the natural characteristics of an individual is essential for a
good performance of the identification algorithms. Existing
multimodal based identification systems make the assumptions
that each modality feature set from an individual is local,
wide-ranging, and static. Thus, these extracted feature sets
are commonly fed to individual matching or and classification
algorithms directly.</p>
        <p>As a result, the identification system becomes more
complex, time consuming, and costly because a classifier is needed
for each modality. Furthermore, concatenating features from
different modalities after the feature extraction method leads
to the need of comparing high dimensional, heterogeneous
data which is a nontrivial issue. However, much work has
been proposed to overcome the dimensional issues in extracted
features such as implementation of normalization techniques
after extraction. Careful observation and experimental analysis
need to be performed in order to improve the performance of
identification. Too much of normalization will diminish the
originality characteristic of an individual from different
modality images. Thus, another process is needed to produce a more
discriminative, reliable, unique and informative feature
representation to represent these inherently multiple continuous
features into standardized discrete features (per individual).</p>
      </sec>
      <sec id="sec-1-2">
        <title>This leads to the multi-matched score fusion discretization</title>
        <p>approach introduced in this paper which is explored in the
context of forensic identification of different modalities for
distinguishing a true identity of a person.</p>
      </sec>
      <sec id="sec-1-3">
        <title>B. The discretization algorithm</title>
        <p>
          Discretization is a process whereby a continuous valued
variable is represented by a collection of discrete values. It
attracted a lot of interest from and work in several different
domains [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ], [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ], [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ]. The discretization method introduced
here is based on discretization defined in [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ].
        </p>
        <p>Given a set of features, the discretization algorithm first
computes the size of interval, i.e., it determines its upper
and lower bounds. The range is then divided by the number
of features which then gives each interval upper and lower
approximation. The number of intervals generated is equal
to the dimensionality of the feature vectors, maintaining the
original number of extracted features from different extraction
methods in this study. Subsequently, a single representation
value for each interval, or cut, is computed by taking the
midpoint of the lower approximation,Approxlower and upper
approximation, Approxupper interval. Algorithm 1 shows the
discretization steps discussed above.</p>
        <p>Algorithm 1: Discretization Algorithm
Require: Dataset with f continuous features, D samples and C classes;
Require: Discretized features, D′;
for each individual do</p>
        <p>Find the Max and the Min values of D samples
numb bin = numb extracted feature
Divide the range of Min to Max with numb bin
Compute representation values, RepV alue:
for each bin do</p>
        <p>Find the Approxlower and Approxupper</p>
        <p>Compute the midpoints of all Approxlower and Approxupper
end for
Form a set of all discrete values, Dis F eatures:
for 1 to numb extracted feature do
for each bin do
if (feature in range of interval) then</p>
        <p>Dis F eature = RepV alue
end if
end for
end for
end for</p>
      </sec>
      <sec id="sec-1-4">
        <title>C. Processing and extraction of Signature and Fingerprint</title>
        <p>
          For signature, the input image is first binarized by adaptive
thresholding, followed by morphology operations (i.e.,
remove and skel) to get the gray level of clean and universe
of discourse signature image (UOD) as illustrated in Fig.
1. The UOD of signature is extracted using geometry
based extraction approach [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ], which is based on 3x3
window concept. The process is done on individual window
instead of the whole image to give more information of
the signature image icludes the positions of different line
structures.
        </p>
        <p>Original Signature</p>
        <p>BinarizedSignature
(a)
Skeletonized Signature
(c)
(b)
UOD
(d)</p>
        <p>For fingerprint, two types of manutia points namely
termination and bifurcation points are extracted using Minutia
based extraction approach. Fig. 2 shows the block diagram
of minutia based extraction process. Fingerprint image are
binarized, thinned and false minutia are removed to extract
the region of interest (ROIs). Finally, the extracted ROI
for fingerprint and UOD for the signature are fed to the
discretization.
Fig. 2. Examples of preprocessed fingerprint image (a)Original image
(b)Binarized image (c)Thinned image (d)Minutia Points (e)False Minutia
removed (f)ROI.</p>
        <p>Unimodal extraction and the discretization step are
illustrated in Table I for signature data for individual 1, and
Table II for the fingerprint data for the same individual.
In each of these tables, the feature values are divided into
predefined number of bins, which is based on the number
of features for each modality image.</p>
        <p>In the top portion of these tables, for each bin, the lower
and upper values are recorded in columns two and three
respectively, and bin, RepV alue, the average of lower and
upper values, is recorded in column four. Max and Min
values are highlighted in bold face.In the bottom portion
of the table, the discretized features for signature and
fingerprint are displayed. These tables shows an example of
how the actual feature sets from individual are discretized.
As it can be seen from the Table I, the feature values,
35:259 occurs for every column of the nine features for the
signature data of the same individual.This means that the
first individual is uniquely recognized by this discriminatory
value. A similar discussion holds for Table II, where the
set of discriminatory values for fingerprint data for first
individual, obtained from four different images is 104.
The selected features are the representation values
(Discriminatory features, DF of an individual) that describe the
unique characteristics of an individual which will be used
for matching process. In matching module, the distance
between the discretized values with the stored feature values
are computed by Euclidean Distance equation as defined in
(1).</p>
        <p>N
∑ (
i=1
EDbp =</p>
        <p>Dfbp;i</p>
        <p>Dfb(pr;)i)
(1)
Where Dfbp;i represents ith discretized feature of new
modality image meanwhile Dfb(pr;)i defines the ith discretized
feature of reference modality image in stored template
and bp represents either behavioral or phisiological trait
of the individual. The ith total number of features
extracted from a single modality image is denoted by N.
Let Xsign = EDsign(x), where Xsign = (x1; :::xd)
denotes a distance for discretized signature features and
Yfinger = EDfinger(y), where Yfinger = (y1; :::yd) is a
distance for the discretized fingerprint features. The lowest
distance for signature can be denoted as min[EDsign(x)]
and lowest distance for fingerprint can be defined as
min[EDfinger(y)]. Then, we define the modality features
with the lowest distance as match score-1,(M Sbp = 1), the
second modality features with the second lowest distance as
M Sbp = 2 and so on. bp here defines either behavioral(i.e.,
signature) or phisiological(i.e., fingerprint) trait of the
individual. Then, the match score, M Sbp is fed to the fusion
approach.</p>
      </sec>
      <sec id="sec-1-5">
        <title>D. Multi-modality fusion</title>
        <p>After matching, the matched scores of signature
and fingerprint are fed to the fusion method.
Let Xsign=M Ssign(1),M Ssign(2),...M Ssign(n)
denotes the computed signature match scores and
Y f inger=M Sfinger(1),M Sfinger(2),...M Sfinger(n)
defines the computed match scores for fingerprint.In this
work, the final fused score, F Sbp of the individual are
computed using Equation (2), where k represents the
number of different modalities of an individual. The M S
for fingerprint and signature are combined and divided by
k to generate a single score which is then compared to a
predefined threshold to make the final decision.</p>
        <p>F Sbp = M Ssign +kM Sfinger (2)
Fusion approaches, namely Mean, M eanF Sbp and Min,
M inF Sbp fusion as defined in (3) and (4) are chosen for
comparisson to show the efficiency of the proposed method
on multi-modalities identification.</p>
        <p>M eanF Sbp = (xM Ssign + yM Sfinger)=2</p>
        <p>M inF Sbp = min(M Ssign; M Sfinger)
Finally, the F Sbp is forward to next phase for identification.
In identification process of one-to-many matching (1:M),
F Sbp is compared with the predefined identification
threshold, in order to identify the individual from M individuals.
In this work, the identity of a person is identified if,</p>
        <p>F Sbp</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>III. EXPERIMENTAL RESULTS</title>
      <p>The performance of this work is performed using ROC
curve which consists of Genuine Acceptance Rate (GAR) of
a system mapped against the False Acceptance Rate (FAR).
In this work, GAR is equal to 1-FRR. Fig. 1 shows the
performance of Unimodal identification for signature and
fingerprint. Discretization is applied in this experiment. No
normalization and fusion methods are implemented. The
performance of the identification for both discretized
signature and fingerprint and non-discretized dataset is compared.
(3)
(4)
(5)
tion on the unimodal dataset enhances the overall
performance of identification significantly over the performance
of identification without discretization. Due to efficiency of
the discretization method on unimodal identification, thus,
the same technique is applied to multimodal identification in
order to improve the accuracy of identification on multiple
modalities.
graph for two different fusion methods namely Mean
fusion rule and Min method with the implementation of
Z-Score normalization and matched scores fusion based
discretization approach on multiple modalities. From the
ROC graph depicted in Fig. 2, it can be seen that the
implementation of the proposed method based discretization
on the multi-modalities fusion of signature and fingerprint
shows a better performance than the standard signature and
fingerprint identification system. At FAR of 0.1%, 1.0%, and
10.0%, the implementation of the proposed method which
is based on discretization has a GAR of 96.9%, 98.9%, and
99.9% respectively, where the performance is better than
the Z-score normalization and Mean fusion on signature
and fingerprint modalities, 93.5%, 93.7%, and 96.4%. Fig.
3 shows the GAR performance on Min fusion based
Zscore normalization and the proposed multi-matched score
based discretization. Again, in Fig. 3, interestingly, the
proposed method based on discretization on signature and
fingerprint modalities yields the best performance over the
range of FAR. At 0.1%, 1.0%, and 10.0% of FAR, the Min
fusion method works the best with proposed method, 95.0%,
marized that the used of discretization and proposed fusion
of fingerprint and signature modalities generally performs
well over the use of normalization and conventional fusion
approaches for personal identification.
A key to successful multimodal based system
development for forensic identification, is an effective methodology
organization and fusion process, capable to integrate and
handle important information such as distinctiveness
characteristic of an individual. In this paper, the match scores
discretization is proposed and implemented on different
modality datasets of an individual. The experiments are
done on signature and fingerprint datasets, which consist
of 156 students (both female and male) where each
student contributes 4 samples of signatures and fingerprint.
Ten features describing the bifurcation and termination
points of fingerprint, were extracted using Minutia based
extraction approach whereas signature is extracted using
Geometry based extraction approach. In matching process,
each template-query pair feature sets is compared using
Euclidean distance. Two fusion approaches namely Mean
and Min fusion are performed to seek for the efficiency
of the proposed method in Multimodal identification. The
experimental results show that the proposed multi-matched
scores discretization perform well on multiple set of
individual traits, consequently improving the identification</p>
    </sec>
    <sec id="sec-3">
      <title>ACKNOWLEDGMENT</title>
      <p>This work is supported by The Ministry of Higher Education
(MOHE) under Research University Grant (GUP) and
Mybrain15. Authors would especially like to thank Universiti
Teknologi Malaysia, Skudai Johor Bahru MALAYSIA for
the support and Soft Computing Research Group (SCRG)
for their excellent cooperation and contributions to improve
this paper.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>S. N.</given-names>
            <surname>Srihari</surname>
          </string-name>
          , “
          <article-title>Computational methods for handwritten questioned document examination</article-title>
          ,
          <source>” National Criminal Justice Research Report</source>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>C.</given-names>
            <surname>Su</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Srihari</surname>
          </string-name>
          , “
          <article-title>Evaluation of rarity of fingerprints in forensics</article-title>
          ,
          <source>” Advances in Neural Information Processing Systems</source>
          , vol.
          <volume>23</volume>
          , pp.
          <fpage>1207</fpage>
          -
          <lpage>1215</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>S. N.</given-names>
            <surname>Srihari</surname>
          </string-name>
          and
          <string-name>
            <given-names>K.</given-names>
            <surname>Singer</surname>
          </string-name>
          , “
          <article-title>Role of automation in the examination of handwritten items,” in Frontiers in Handwriting Recognition (ICFHR</article-title>
          ),
          <source>2012 International Conference on. IEEE</source>
          ,
          <year>2012</year>
          , pp.
          <fpage>619</fpage>
          -
          <lpage>624</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Tang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Kasiviswanathan</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S. N.</given-names>
            <surname>Srihari</surname>
          </string-name>
          , “
          <article-title>An efficient clustering-based retrieval framework for real crime scene footwear marks</article-title>
          ,”
          <source>International Journal of Granular Computing, Rough Sets and Intelligent Systems</source>
          , vol.
          <volume>2</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>327</fpage>
          -
          <lpage>360</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>J.</given-names>
            <surname>Gonzalez-Rodriguez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Ortega-Garcia</surname>
          </string-name>
          , and J.
          <string-name>
            <surname>-L.</surname>
          </string-name>
          Sanchez-Bote, “
          <article-title>Forensic identification reporting using automatic biometric systems</article-title>
          ,” in Biometric Solutions. Springer,
          <year>2002</year>
          , pp.
          <fpage>169</fpage>
          -
          <lpage>185</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>J.</given-names>
            <surname>Gonzalez-Rodriguez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Fierrez-Aguilar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Ramos-Castro</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>J.</given-names>
            <surname>Ortega-Garcia</surname>
          </string-name>
          , “
          <article-title>Bayesian analysis of fingerprint, face and signature evidences with automatic biometric systems,” Forensic science international</article-title>
          , vol.
          <volume>155</volume>
          , no.
          <issue>2-3</issue>
          , pp.
          <fpage>126</fpage>
          -
          <lpage>140</lpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>K. J.</given-names>
            <surname>Craft</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. D.</given-names>
            <surname>Owens</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M. V.</given-names>
            <surname>Ashley</surname>
          </string-name>
          , “
          <article-title>Application of plant dna markers in forensic botany: Genetic comparison of¡ i¿ quercus¡/i¿ evidence leaves to crime scene trees using microsatellites,” Forensic science international</article-title>
          , vol.
          <volume>165</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>64</fpage>
          -
          <lpage>70</lpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Tang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. N.</given-names>
            <surname>Srihari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Kasiviswanathan</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J. J.</given-names>
            <surname>Corso</surname>
          </string-name>
          , “
          <article-title>Footwear print retrieval system for real crime scene marks</article-title>
          ,” in Computational Forensics. Springer,
          <year>2011</year>
          , pp.
          <fpage>88</fpage>
          -
          <lpage>100</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>A.</given-names>
            <surname>Jain</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Ross</surname>
          </string-name>
          , “Introduction to biometrics,” Handbook of Biometrics, pp.
          <fpage>1</fpage>
          -
          <lpage>22</lpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>A.</given-names>
            <surname>Ross</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Nandakumar</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Jain</surname>
          </string-name>
          , “Introduction to multibiometrics,” Handbook of Biometrics, pp.
          <fpage>271</fpage>
          -
          <lpage>292</lpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>N.</given-names>
            <surname>Solayappan</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Latifi</surname>
          </string-name>
          , “
          <article-title>A survey of unimodal biometric methods</article-title>
          ,”
          <source>in Proceedings of the 2006 International Conference on Security and Management</source>
          ,
          <year>2006</year>
          , pp.
          <fpage>57</fpage>
          -
          <lpage>63</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>A.</given-names>
            <surname>Ross</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Jain</surname>
          </string-name>
          , “
          <article-title>Information fusion in biometrics,” Pattern recognition letters</article-title>
          , vol.
          <volume>24</volume>
          , no.
          <issue>13</issue>
          , pp.
          <fpage>2115</fpage>
          -
          <lpage>2125</lpage>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>H.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Hussain</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. L.</given-names>
            <surname>Tan</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Dash</surname>
          </string-name>
          , “
          <article-title>Discretization: An enabling technique,” Data mining and knowledge discovery</article-title>
          , vol.
          <volume>6</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>393</fpage>
          -
          <lpage>423</lpage>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>R.</given-names>
            <surname>Ahmad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Darus</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. M. H.</given-names>
            <surname>Shamsuddin</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Bakar</surname>
          </string-name>
          , “
          <article-title>Pendiskretan set kasar menggunakan taakulan boolean terhadap pencaman simbol matematik</article-title>
          ,
          <source>” Journal Teknologi Maklumat &amp; Multimedia</source>
          , pp.
          <fpage>15</fpage>
          -
          <lpage>26</lpage>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>B. O.</given-names>
            <surname>Mohammed</surname>
          </string-name>
          and
          <string-name>
            <given-names>S. M.</given-names>
            <surname>Shamsuddin</surname>
          </string-name>
          , “
          <article-title>Feature discretization for individuality representation in twins handwritten identification</article-title>
          ,
          <source>” Journal of Computer Science</source>
          , vol.
          <volume>7</volume>
          , no.
          <issue>7</issue>
          , pp.
          <fpage>1080</fpage>
          -
          <lpage>1087</lpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>A.</given-names>
            <surname>Muda</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Shamsuddin</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Darus</surname>
          </string-name>
          , “
          <article-title>Invariants discretization for individuality representation in handwritten authorship</article-title>
          ,
          <source>” Computational Forensics</source>
          , pp.
          <fpage>218</fpage>
          -
          <lpage>228</lpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>K.</given-names>
            <surname>Huang</surname>
          </string-name>
          and
          <string-name>
            <given-names>H.</given-names>
            <surname>Yan</surname>
          </string-name>
          , “
          <article-title>Off-line signature verification based on geometric feature extraction and neural network classification,” Pattern Recognition</article-title>
          , vol.
          <volume>30</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>9</fpage>
          -
          <lpage>17</lpage>
          ,
          <year>1997</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>