scholarly journals Implementasi Deep Learning untuk Sistem Keamanan Data Pribadi Menggunakan Pengenalan Wajah dengan Metode Eigenface Berbasis Android

2021 ◽  
Vol 4 (2) ◽  
pp. 89
Author(s):  
Lintang Bagas Adrianto ◽  
Mohammad Iwan Wahyuddin ◽  
Winarsih Winarsih

The development of technology in security systems combined with facial recognition, of course, makes every protected data safe. Many methods can be combined with a security system, one of which is the eigenface method, which is part of facial recognition. In this study, a personal data security system was built using Android-based deep learning. Based on the results of tests carried out on three devices with different Android versions, it is known, if on Android 8.1 (Oreo) the maximum distance is ± 40 cm, on Android 9.0 (Pie) the maximum distance is ± 50 cm, and on the Android version, 10.0 (Q) the maximum distance for facial object recognition is ± 60 cm. From the test results, it is known that by using the eigenface method, the farther the face is from the camera, the face cannot be detected. The implementation of this system is expected to protect personal data safely.Keywords:Face recognition, Deep Learning, Android, Eigenface.

2020 ◽  
Vol 32 ◽  
pp. 03011
Author(s):  
Divya Kapil ◽  
Aishwarya Kamtam ◽  
Akhil Kedare ◽  
Smita Bharne

Surveillance systems are used for the monitoring the activities directly or indirectly. Most of the surveillance system uses the face recognition techniques to monitor the activities. This system builds the automated contemporary biometric surveillance system based on deep learning. The application of the system can be used in various ways. The face prints of the persons will be stored inside the database with relevant statistics and does the face recognition. When any unknown face is recognized then alarm will ring so one can alert the security systems and in addition actions will be taken. The system learns changes while detecting faces automatically using deep learning and gain correct accuracy in face recognition. A deep learning method including Convolutional Neural Network (CNN) is having great significance in the area of image processing. This system can be applicable to monitor the activities for the housing society premises.


2019 ◽  
Vol 1 (1) ◽  
pp. 226-233
Author(s):  
Grzegorz Chmielarz

AbstractThe paper presents the problem domain related to data safety management in the face of the threats that organisations of all types encounter in this scope. The Author’s particular concern are personal data management issues, which are of key importance for contemporary enterprises as they frequently determine wining the market advantage and growth in their competitiveness. Yet, incidents of personal data breaches, aimed at economic organisations have been on the increase in the recent years, leading not only to substantial financial losses, but what is worse, frequently resulting in damage to their reputation. Therefore, a vital issue for all enterprises is to make their employees acquainted with threats to data security and their potential harmful effects on the operations and financial results of organisations. The paper presents an analysis of breaches to personal data in organisations in a global dimension as well as analyses of their negative effects to their image and trust of their customers.


Author(s):  
Pankaj Mishra ◽  
Dev Ratna Singh

Nowadays, progress in technology have made life simple by giving us higher levels of knowledge through the innovation of various devices. However, all technical invention harbours the potential of invisible threats to its users. One leading danger is theft of private information and data. As digital database get more prevailing, user’s attempt to prevent their data with extremely encrypted Identity cards and passwords. However, the abuse and theft of these security measures are on the rise. Taking benefit of security fault in Identity cards result in the cards gets duplicated and get misused. This increasing conflict of the cyber safety has lead to the start of biometric security method. Defining the main variation between the methods of biometric system used to verify user identity will focus on the benefits and limitations of personal data security systems.


2018 ◽  
Author(s):  
Andysah Putera Utama Siahaan

Information security is the protection of personal and non-personal data from various threats to guarantee privacy. For business practices, data security can reduce business risk, and increase the return of investment and business opportunities. In designing information system security systems, there are information security aspects that need to be considered. Many threats will come before the information circulating. Information is a matter that will be targeted by wild parties. Cryptographic algorithms are needed to protect data from these threats. Data Encryption Standard (DES) belongs to the symmetry cryptography system and is classified as a block cipher type. DES operates on 64-bit block size. DES encrypts 64 plaintext bits into 64-bit ciphertext using 56 private key bits or subkeys. The internal key is generated from an external key that is 64 bits long. The DES method is an excellent cryptographic technique used to secure data. DES has 16 rounds to ensure safer data against unexpected attacks. Applying DES to data encryption will be very useful for protecting data.


Compiler ◽  
2017 ◽  
Vol 6 (2) ◽  
Author(s):  
Haruno Sajati ◽  
Astika Ayuningtyas ◽  
Dwi Kholistyanto

One of the development of computer technology is the availability of systems or applications that help human work everyday so that can be resolved quickly and correctly. The system, one of which is Computer Based Test (CBT). CBT is an application used for tests conducted using computers that are in the application there are some features of CBT security when working on the problem. CBT can use a stand-alone computer, a computer connected to a network or a computer connected to the internet. Facial recognition is a type of biometric application that can identify specific individuals in a digital image by analyzing and developing face patterns. In its implementation, CBT has a weakness in the security system that becomes the gap of CBT users to commit fraud, therefore required a good security system with the creation of CBT applications that use eigenface algorithm. It is necessary to have a security system that overcomes the problem that is required identification of face recognition of participants during the test so that cheating can be reduced. The results of the test using eigenface algorithm accuracy rate reached 82%, some things that affect the level of accuracy is, the intensity of light, facial position and the use of accessories on the face.


Author(s):  
Nuniek Fahriani ◽  
Indah Kurniawati

At HOTSPODT (Hospital Ship for Covid Disaster) there are no stages regarding the application of the use of information technology systems, especially for securing patient data which includes personal data and patient medical records. Confidential patient data collected during the current pandemic, including the patient’s name, address, diagnosis, family history and medical records without the patient’s consent, may pose a risk to the individual concerned. The concept of patient data security is adjusted to the user’s position on the importance of data. Access to patient data authorization is one of the security gaps that the security system needs to pay attention to and guard against. So, in this case applied a data security algorithm in the form of cryptography. The algorithm used is the Blowfish Algorithm. The test results of the scenario in the application prove that it can be successfully processed from the encrypted file to ciphertext until it is returned as the original file.


Author(s):  
Feri Susanto ◽  
Fauziah Fauziah ◽  
Andrianingsih Andrianingsih

In the field of industries, businesses, and offices the use of security systems and administrative management through data input using a face recognition system is being developed. Following the era of technological advances, communication and information systems are widely used in various administrative operational activities and company security systems because it is assessed by using a system that is based on facial recognition security levels and more secure data accuracy, the use of such systems is considered to have its characteristics so it is very difficult for other parties to be able to engineer and manipulate data produced as a tool to support the company's decision. Related to this, causing the author is to try to research the detection of facial recognition that is present in the application system through an Android device, then face recognition detection will be connected. and saved to the database that will be used as data about the presence of teaching lecturers. Using the local binary pattern histogram algorithm method to measure the face recognition system that can be applied as a technique in the attendance system of lecturers to be more effective and efficient. Based on testing by analyzing the false rate error rate and the false refusal rate can be seen that the average level of local binary pattern histogram accuracy reaches 95.71% better than through the Eigenface method which is equal to 76.28%.


2018 ◽  
Vol 7 (4.10) ◽  
pp. 55
Author(s):  
Arnab Pushilal ◽  
Sulakshana Chakraborty ◽  
Raunak Singhania ◽  
P. Mahalakshmi

In this paper, the design and development of a home security system has been detailed which uses facial recognition to conform the identity of the visitor and taking various security measures when an unauthorized personnel tries accessing the door. It demonstrates the implementation of one of the most popular algorithm for face recognition i.e. principal component analysis for the purpose of security door access. Since PCA converts the images into a lower dimension without losing on the important features, a huge set of training data can be taken. If the face is recognized as known then the door will open otherwise it will be categorized as unknown and the microcontroller (Arduino Uno) will command the buzzer to start ringing.  


Author(s):  
Pankaj Mishra ◽  
Dev Ratna Singh

Nowadays, progress in technology have made life simple by giving us higher levels of knowledge through the innovation of various devices. However, all technical invention harbours the potential of invisible threats to its users. One leading danger is theft of private information and data. As digital database get more prevailing, user’s attempt to prevent their data with extremely encrypted Identity cards and passwords. However, the abuse and theft of these security measures are on the rise. Taking benefit of security fault in Identity cards result in the cards gets duplicated and get misused. This increasing conflict of the cyber safety has lead to the start of biometric security method. Defining the main variation between the methods of biometric system used to verify user identity will focus on the benefits and limitations of personal data security systems.


2019 ◽  
Vol 23 (2) ◽  
pp. 121-128
Author(s):  
Zaenab Muslimin ◽  
Muhammad Arief Wicaksono ◽  
Muhammad Fandly Fadlurachman ◽  
Ilham Ramli

Security Systems and Guest Monitoring Prototypes on smart doors Based on Raspberry Pi and Telegram Chat Bot. Current technology is developing so rapidly that it can be used to help people carry out daily tasks at home by designing devices that can be controlled remotely (remote control) so as to create a dream home with increased comfort and safety of residents. This study aims to design a tool for monitoring guests equipped with a security system using the Raspberry Pi microprocessor to process data to be sent to Telegram Chat Bot. Data sent to the Chat Bot Telegram will later be accessed by a smartphone in the form of a guest image taken by a raspberry pi camera. This tool has two modes namely the smart mode that is used to take pictures of guests when a guest presses the bell button and the safe mode is used to take pictures of people who are at the door automatically using a PIR sensor. The results showed that the PIR sensor with maximum sensitivity can detect objects well within a maximum distance of 5 m, the Raspberry Pi camera can take pictures with good quality up to 11m distance and testing on the Chat Bot runs well, all commands have been tested and provide information in the form reciprocal chatter. This prototype allows homeowners to see guests or people at the door through a smartphone in real time.


Sign in / Sign up

Export Citation Format

Share Document