- G. Farooque, A. B. Sargano, I. Shafi, and W. Ali, “Coin recognition with reduced feature set sift algorithm using neural network,” in the 14th International Conference on Frontiers of Information Technology, Islamabad, Pakistan, Dec. 2016, pp. 93–98. doi: 10.1109/FIT.2016.025
- B. Jiang, X. Li, L. Yin, W. Yue, and S. Wang, “Object recognition in remote sensing images using combined deep features,” in the 3rd Information Technology, Networking, Electronic and Automation Control Conference, Chengdu, China, Mar. 2019, pp. 606–610. doi: 10.1109/ITNEC.2019.8729392
- Y. Zhang and J. Liang, “A vision based method for object recognition,” in the 3rd International Conference on Information Science and Control Engineering, Beijing, China, Jul. 2016, pp. 139–142. doi: 10.1109/ICISCE.2016.40
- J. Xu, G. Yang, Y. Liu, and J. Zhong, “Coin recognition method based on SIFT algorithm,” in the 4th International Conference on Information Science and Control Engineering, Changsha, China, Jul. 2017, pp. 229–233. doi: 10.1109/ICISCE.2017.57
- A. Kuznetsov and A. Savchenko, “Sport teams logo detection based on deep local features,” in International Multi-Conference on Engineering, Computer and Information Sciences, Novosibirsk, Russia, Oct. 2019, pp. 548–552. doi: 10.1109/SIBIRCON48586.2019.8958301
- N. Dalal and B. Triggs, “Histograms of oriented gradients for human detection,” Lecture Notes in Computer Science, vol. 9284, pp. 498-515, 2015. doi: 10.1007/978-3-319-23528-8_31
- D. G. Lowe, “Distinctive image features from scale-invariant keypoints,” International Journal of Computer Vision, vol. 60, no. 2, pp. 91–110, 2004. doi: 10.1023/B:VISI.0000029664.99615.94
- H. Bay, A. Ess, T. Tuytelaars, and L. Vangool, “Speeded-Up Robust Features (SURF),” Computer Vision and Image Understanding, vol. 110, no. 3, pp. 346–359, 2006. doi: 10.1016/j.cviu.2007.09.014
- E. Rublee, V. Rabaud, K. Konolige, and G. Bradski, “ORB: An efficient alternative to SIFT or SURF,” in the IEEE International Conference on Computer Vision, Barcelona, Spain, Nov. 2011, pp. 2564–2571. doi: 10.1109/ICCV.2011.6126544
- P. F. Alcantarilla, J. Nuevo, and A. Bartoli, “Fast explicit diffusion for accelerated features in nonlinear scale spaces,” in the British Machine Vision Conference, Bristol, UK, Sep. 2013, pp. 1-9. doi: 10.5244/C.27.13
- M. L. Meharu and H. S. Worku, “Real-Time Ethiopian currency recognition for visually disabled peoples using convolutional neural network,” Research Square, preprint, pp. 1-24, 2020. doi: 10.21203/rs.3.rs-125061/v1
- Q. Zhang, W. Q. Yan, and M. Kankanhalli, “Overview of currency recognition using deep learning,” Journal of Banking and Financial Technology, vol. 3, no. 1, pp. 59–69, 2019. doi: 10.1007/s42786-018-00007-1
- D. Henry, Y. Yao, R. Fulton, and A. Kyme, “An optimized feature detector for markerless motion tracking in motion-compensated neuroimaging,” in the IEEE Nuclear Science Symposium and Medical Imaging Conference, Atlanta, USA, Oct. 2017, pp. 1–4. doi: 10.1109/NSSMIC.2017.8532865
- P. Soleimani, D. W. Capson, and K. F. Li, “Real-time FPGA-based implementation of the AKAZE algorithm with nonlinear scale space generation using image partitioning,” Journal of Real-Time Image Processing, vol. 18, pp. 2123-2134, 2021. doi: 10.1007/s11554-021-01089-9
- H. Seong, H. Choi, H. Son, and C. Kim, “Image-based 3D building reconstruction using A-KAZE feature extraction algorithm,” in the International Symposium on Automation and Robotics in Construction, Berlin, Germany, Jul. 2018. doi: 10.22260/isarc2018/0127
- L. Kalms, K. Mohamed, and D. Göhringer, “Accelerated embedded AKAZE feature detection algorithm on FPGA,” in ACM International Conference Proceeding Series, Bochum, Germany, Jun. 2017, pp. 3–8. doi: 10.1145/3120895.3120898
- B. Soni, V. Anji Reddy, N. B. Muppalaneni, and C. Lalrempuii, “Image forgery detection using AKAZE keypoint feature extraction and trie matching,” International Journal of Innovative Technology and Exploring Engineering, vol. 9, no. 1, pp. 2208–2213, 2019. doi: 10.35940/ijitee.A4784.119119
- D. K. Iakovidis, E. Spyrou, and D. Diamantis, “Efficient homography-based video visualization for wireless capsule endoscopy,” in the IEEE International Conference on BioInformatics and BioEngineering, Chania, Greece , Nov. 2013, pp. 1–4. doi: 10.1109/BIBE.2013.6701598
- M. Muja and D. Lowe, “FLANN - Fast Library for Approximate Nearest Neighbors: User manual,” Univ. of British Columbia, Canada, pp. 1–21, 2009
- J. Jo, J. Seo, and J. D. Fekete, “PANENE: A Progressive Algorithm for Indexing and Querying Approximate k-Nearest Neighbors,” IEEE Transactions on Visualization and Computer Graphics, vol. 26, no. 2, pp. 1347–1360, 2020. doi: 10.1109/TVCG.2018.2869149
- I. W. A. Suryawibawa, I. K. G. D. Putra, and N. K. A. Wirdiani, “Herbs recognition based on Android using OpenCV,” International Journal of Image, Graphics and Signal Processing, vol. 7, no. 2, pp. 1–7, 2015. doi: 10.5815/ijigsp.2015.02.01
- M. Naharul, H. Najihul, and S. Adinugroho, “Implementasi metode template matching untuk mengenali nilai angka pada citra uang kertas yang dipindai,” Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer, vol. 3, no. 2, pp. 1550–1556, 2019
- N. P. Lestari, “Uji recall and precision sistem temu kembali informasi OPAC Perpustakaan ITS Surabaya,” B.Eng thesis, Universitas Airlangga, Surabaya, Indonesia, 2016
- F. D. Adhinata, M. Ikhsan, and W. Wahyono, “People counter on CCTV video using histogram of oriented gradient and Kalman filter methods,” Jurnal Teknologi dan Sistem Komputer, vol. 8, no. 3, pp. 222–227, 2020. doi: 10.14710/jtsiskom.2020.13660
- F. D. Adhinata, A. Harjoko, and Wahyono, “Object searching on video using orb descriptor and support vector machine,” in Advances in Computational Collective Intelligence, Da Nang, Vietnam, Nov. 2020, pp. 239–251. doi: 10.1007/978-3-030-63119-2_20
Last update:
No citation recorded.
Last update: 2025-07-13 13:50:39
No citation recorded.
Copyright (c) 2021 The Authors. Published by Department of Computer Engineering, Universitas Diponegoro

This work is licensed under a
Creative Commons Attribution-ShareAlike 4.0 International License.
Starting from 2021, the author(s) whose article is published in the JTSiskom journal attain the copyright for their article and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. By submitting the manuscript to JTSiskom, the author(s) agree with this policy. No special document approval is required.
The author(s) guarantee that:
- their article is original, written by the mentioned author(s),
- has never been published before,
- does not contain statements that violate the law, and
- does not violate the rights of others, is subject to copyright held exclusively by the author(s), is free from the rights of third parties, and the necessary written permission to quote from other sources has been obtained by the author(s).
The author(s) retain all rights to the published work, such as (but not limited to) the following rights:
- Copyright and other proprietary rights related to the article, such as patents,
- The right to use the substance of the article in its own future works, including lectures and books,
- The right to reproduce the article for its own purposes,
- The right to archive all versions of the article in any repository, and
- The right to enter into separate additional contractual arrangements for the non-exclusive distribution of published versions of the article (for example, posting them to institutional repositories or publishing them in a book), acknowledging its initial publication in this journal (Jurnal Teknologi dan Sistem Komputer).
Suppose the article was prepared jointly by more than one author. Each author submitting the manuscript warrants that all co-authors have given their permission to agree to copyright and license notices (agreements) on their behalf and notify co-authors of the terms of this policy. JTSiskom will not be held responsible for anything arising because of the writer's internal dispute. JTSiskom will only communicate with correspondence authors.
Authors should also understand that their articles (and any additional files, including data sets and analysis/computation data) will become publicly available once published. The license of published articles (and additional data) will be governed by a Creative Commons Attribution-ShareAlike 4.0 International License. JTSiskom allows users to copy, distribute, display and perform work under license. Users need to attribute the author(s) and JTSiskom to distribute works in journals and other publication media. Unless otherwise stated, the author(s) is a public entity as soon as the article is published.