Implementasi Metode Local Binary Pattern Histogram Dan Facial Landmark Pada Keamanan Akses Login
DOI:
https://doi.org/10.31154/cogito.v9i1.453.97-108Keywords:
Face Detection, Face Recognition, Facial blink detectionAbstract
Facial recognition technology is widely used as one of the technologies to authenticate someone. However, some devices do not yet have a facial recognition component that is able to recognize real people who have been recognized or only photos because they only embed a 2D facial recognition system which is less secure, especially on devices with low specifications and older devices, and there are still many people at this time who still use such devices but they also need security. So in this study a login system with facial recognition and eye blink detection was created which aims to provide more security on older devices or devices with low specifications. This study uses the Local Binary Pattern Histogram facial recognition algorithm and the Face landmark wink detection algorithm from the dlib library. So that the application can run properly on older devices or devices with low specifications.References
B. A. Malin, MS, and MPhil, “An Evaluation of the Current State of Genomic Data Privacy Protection Technology and a Roadmap for the Future”, Journal of the American Medical Informatics Association, vol. 12, no. 1, pp. 28-34, 2005, doi: 10.1197/jamia.M1603.
P. W. Dowd, and J. T. McHenry, “Network Security: It’s Time To Take It Seriously”, IEEE Computer, vol 31, no. 9, pp. 24-28, 1998, doi: 10.1109/2.708446.
Dyna Marisa Khairina, “Analisis Keamanan Sistem Login”, Jurnal Informatika Mulawarman, vol. 6, no. 2, pp. 64-67, 2011.
V. Beal, “What is username”, 1998. https://www.webopedia.com/definitions/username/ (accessed Feb. 5, 2023)
Azhar Azhar, Wais Alkarni, Atthariq Atthariq, “Sistem Keamanan Pada Halaman Login Menggunakan One Time Password”, Journal Of Embedded System And Intelligent System, vol. 1, no. 2, hal 107-113, 2020.
Y. Han, and J. Kim, “An Analysis of Security Threats and Countermeasures for Passwords”, Security and Communication Networks, vol. 10, no. 7, pp. 1067-1082, 2017.
S. Z. Li, and A. K. Jain, “A Survey of Face Recognition Technologies”, Pattern Recognition, vol. 40, no. 3, pp. 1106-1122, 2007.
Arnold Nasir, “Perancangan Aplikasi Pengenalan Wajah Sebagai Media Akses Kontrol Pada Organisasi XYZ”, Jurnal Edukasi Dan Penelitian Informatika, vol. 2, no. 1, pp. 71-77, 2016, doi: 10.26418/jp.v2i1.14767.
Shilpi Singha ,S.V.A.V.Prasad, “Techniques and Challenges of Face Recognition: A Critical Review”, Procedia Computer Science, vol. 143, pp. 536–543, 2018, doi: 10.1016/j.procs.2018.10.427.
R. C. Seacord, Daniel Plakosh, G. A. Lewis, Modernizing Legacy Systems: Software Technologies, Engineering Processes, and Business Practices, Addison-Wesley Professional, Lake Ave Glenview, 2003.
Reyvan Maulid, “Penerapan Algoritma Machine Learning Pada Face Recognition”, 2021, https://www.dqlab.id/penerapan-algoritma-machine-learning-pada-face-recognition , (accessed Des. 20, 2022).
A. Nene, H. Jain, K. Gaikar, S. Bohra, and N. Mahajan, “Facial Recognition System Using LBPH Algorithm and Raspberry Pi”, IRJET, vol. 08, no. 6, pp. 4411-4415, 2021.
A. Arora, A. Sinha, K. Bhansali, R. Goel, I. Sharma, and A. Jayal, “SVM and Logistic Regression for Facial Palsy Detection Utilizing Facial Landmark Features”, Association for Computing Machinery (ACM), pp. 43-48, 2022.
R. Kosasih, & C. Daomara, “Pengenalan Wajah dengan Menggunakan Metode Local Binary Patterns Histograms (LBPH)”, JURNAL MEDIA INFORMATIKA BUDIDARMA, vol. 5, no. 4, pp. 1258-1264, 2021, doi: 10.30865/mib.v5i4.3171.
Nggiku, C. K, “Deteksi Kantuk Pada Pengemudi Mobil Menggunakan Eye Aspect Ratio Dengan Metode Facial Landmark”, SinarFe7, vol. 5, no. 1, pp. 72-78, 2022.
A. Moenir, & F. Yuliyanto, “Perancangan Sistem Informasi Penggajian Berbasis Web dengan Metode Waterfall pada PT. Sinar Metrindo Perkasa (Simetri)”, Jurnal Informatika Universitas Pamulang, vol. 3, no. 2, pp. 127-137, 2017, doi: 10.32493/informatika.v2i3.1237.
P. Nurmala, W. Gazali, & W. Budiharto, “Sistem Kontrol Akses Berbasis Real Time Face Recognition dan Gender Information”, ComTech: Computer, Mathematics and Engineering Applications, vol. 6, no. 2, pp. 198-207, 2015.
Bintang Anugrah, Uji Keakurasian Metode Eigenface Dalam Face Recognition, Sekolah Tinggi Manajemen Informatika & Komputer Indonesia Mandiri, Bandung, 2019.
A. Cockburn, Writing effective use cases, Pearson Education India, Uttar Pradesh, 2001.
M. Fowler, UML distilled: a brief guide to the standard object modeling language, Addison-Wesley Professional, Glenview, 2004.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 CogITo Smart Journal

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).