Implementasi Metode Local Binary Pattern Histogram Dan Facial Landmark Pada Keamanan Akses Login

Authors

  • Frindi Mangimbulude Universitas Sam Ratulangi
  • Pinrolinvic D.K. Manembu Universitas Sam Ratulangi
  • Feisy Diane Kambey Universitas Sam Ratulangi

DOI:

https://doi.org/10.31154/cogito.v9i1.453.97-108

Keywords:

Face Detection, Face Recognition, Facial blink detection

Abstract

Facial recognition technology is widely used as one of the technologies to authenticate someone. However, some devices do not yet have a facial recognition component that is able to recognize real people who have been recognized or only photos because they only embed a 2D facial recognition system which is less secure, especially on devices with low specifications and older devices, and there are still many people at this time who still use such devices but they also need security. So in this study a login system with facial recognition and eye blink detection was created which aims to provide more security on older devices or devices with low specifications. This study uses the Local Binary Pattern Histogram facial recognition algorithm and the Face landmark wink detection algorithm from the dlib library. So that the application can run properly on older devices or devices with low specifications.    

References

B. A. Malin, MS, and MPhil, “An Evaluation of the Current State of Genomic Data Privacy Protection Technology and a Roadmap for the Future”, Journal of the American Medical Informatics Association, vol. 12, no. 1, pp. 28-34, 2005, doi: 10.1197/jamia.M1603.

P. W. Dowd, and J. T. McHenry, “Network Security: It’s Time To Take It Seriously”, IEEE Computer, vol 31, no. 9, pp. 24-28, 1998, doi: 10.1109/2.708446.

Dyna Marisa Khairina, “Analisis Keamanan Sistem Login”, Jurnal Informatika Mulawarman, vol. 6, no. 2, pp. 64-67, 2011.

V. Beal, “What is username”, 1998. https://www.webopedia.com/definitions/username/ (accessed Feb. 5, 2023)

Azhar Azhar, Wais Alkarni, Atthariq Atthariq, “Sistem Keamanan Pada Halaman Login Menggunakan One Time Password”, Journal Of Embedded System And Intelligent System, vol. 1, no. 2, hal 107-113, 2020.

Y. Han, and J. Kim, “An Analysis of Security Threats and Countermeasures for Passwords”, Security and Communication Networks, vol. 10, no. 7, pp. 1067-1082, 2017.

S. Z. Li, and A. K. Jain, “A Survey of Face Recognition Technologies”, Pattern Recognition, vol. 40, no. 3, pp. 1106-1122, 2007.

Arnold Nasir, “Perancangan Aplikasi Pengenalan Wajah Sebagai Media Akses Kontrol Pada Organisasi XYZ”, Jurnal Edukasi Dan Penelitian Informatika, vol. 2, no. 1, pp. 71-77, 2016, doi: 10.26418/jp.v2i1.14767.

Shilpi Singha ,S.V.A.V.Prasad, “Techniques and Challenges of Face Recognition: A Critical Review”, Procedia Computer Science, vol. 143, pp. 536–543, 2018, doi: 10.1016/j.procs.2018.10.427.

R. C. Seacord, Daniel Plakosh, G. A. Lewis, Modernizing Legacy Systems: Software Technologies, Engineering Processes, and Business Practices, Addison-Wesley Professional, Lake Ave Glenview, 2003.

Reyvan Maulid, “Penerapan Algoritma Machine Learning Pada Face Recognition”, 2021, https://www.dqlab.id/penerapan-algoritma-machine-learning-pada-face-recognition , (accessed Des. 20, 2022).

A. Nene, H. Jain, K. Gaikar, S. Bohra, and N. Mahajan, “Facial Recognition System Using LBPH Algorithm and Raspberry Pi”, IRJET, vol. 08, no. 6, pp. 4411-4415, 2021.

A. Arora, A. Sinha, K. Bhansali, R. Goel, I. Sharma, and A. Jayal, “SVM and Logistic Regression for Facial Palsy Detection Utilizing Facial Landmark Features”, Association for Computing Machinery (ACM), pp. 43-48, 2022.

R. Kosasih, & C. Daomara, “Pengenalan Wajah dengan Menggunakan Metode Local Binary Patterns Histograms (LBPH)”, JURNAL MEDIA INFORMATIKA BUDIDARMA, vol. 5, no. 4, pp. 1258-1264, 2021, doi: 10.30865/mib.v5i4.3171.

Nggiku, C. K, “Deteksi Kantuk Pada Pengemudi Mobil Menggunakan Eye Aspect Ratio Dengan Metode Facial Landmark”, SinarFe7, vol. 5, no. 1, pp. 72-78, 2022.

A. Moenir, & F. Yuliyanto, “Perancangan Sistem Informasi Penggajian Berbasis Web dengan Metode Waterfall pada PT. Sinar Metrindo Perkasa (Simetri)”, Jurnal Informatika Universitas Pamulang, vol. 3, no. 2, pp. 127-137, 2017, doi: 10.32493/informatika.v2i3.1237.

P. Nurmala, W. Gazali, & W. Budiharto, “Sistem Kontrol Akses Berbasis Real Time Face Recognition dan Gender Information”, ComTech: Computer, Mathematics and Engineering Applications, vol. 6, no. 2, pp. 198-207, 2015.

Bintang Anugrah, Uji Keakurasian Metode Eigenface Dalam Face Recognition, Sekolah Tinggi Manajemen Informatika & Komputer Indonesia Mandiri, Bandung, 2019.

A. Cockburn, Writing effective use cases, Pearson Education India, Uttar Pradesh, 2001.

M. Fowler, UML distilled: a brief guide to the standard object modeling language, Addison-Wesley Professional, Glenview, 2004.

Downloads

Published

2023-06-30

How to Cite

Mangimbulude, F., Manembu, P. D. ., & Kambey, F. D. . (2023). Implementasi Metode Local Binary Pattern Histogram Dan Facial Landmark Pada Keamanan Akses Login. CogITo Smart Journal, 9(1), 97–108. https://doi.org/10.31154/cogito.v9i1.453.97-108