Implementasi Face Recognition Pada Absensi Karyawan Menggunakan Local Binary Pattern Histogram dan SHA 256 bit
DOI:
https://doi.org/10.30865/mib.v6i4.4923Keywords:
Attendance, Face Recognition, Cryptography, SHA256 Bit, Local Binary Pattern HistogramAbstract
Attendance is an activity that states the presence or absence of an employee. One of the technology models used to express the presence of an employee is a fingerprint machine. PT Global Andalas Cargotama has implemented an employee attendance system using a fingerprint. However, in the process of implementation, the fingerprint machine has weaknesses that are vulnerable to manipulation, fingerprint identification which is often hampered due to the need for routine machine maintenance and attendance recapitulation which is still done manually and not in real time. The face recognition system is an application to recognize faces in real time and accurately and can be applied to overcome the weaknesses of the fingerprint machine. This study uses the LBPH (Local Binary Pattern Histogram) method in recognizing employees' faces when doing attendance, this is based on several studies that have been done previously, this method has a high level of accuracy in recognizing faces. Meanwhile, SHA256 bit cryptography is used to solve the problem of attendance manipulation. The results of facial recognition both when attendance comes in and attendance goes home will be stored on the server computer locally to state employee attendance. The test results from this study showed that the attendance application was able to recognize the employee's face accurately with an average accuracy rate of 0.9511 by paying attention to the room lighting parameters, accessories on the face and the distance from the camera to the face. Through this research, it is expected to be able to overcome the problem of the weakness of the fingerprint machine and the attendance process at PT Global Andalas Cargotama to be more effective.
References
M. Fuadi, U. Darusalam, and A. Kusuma Whardana, “Face Recognition Menggunakan OpenCV Dengan Bahasa Pemograman Python OOP Untuk Sistem Presensi Rumah Sakit,†Journal of Artificial Intelligence and Innovative Applications, vol. 2, no. 3, pp. 218–224, 2021.
I. Salamah, M. R. A. Said, and S. Soim, “Perancangan Alat Identifikasi Wajah Dengan Algoritma You Only Look Once (YOLO) Untuk Presensi Mahasiswa,†Jurnal Media Informatika, vol. 6, no. 3, pp. 1492–1500, 2022.
A. LinovHR, “5 Kelemahan Fingerprint yang Menghambat Absensi Karyawan,†https://www.linovhr.com: https://www.linovhr.com/kelemahan-fingerprint/, Jan. 28, 2021.
Sunardi, A. Yudhana, and M. Alwi Talib, “Perancangan Sistem Pengenalan Wajah untuk Keamanan Ruangan Menggunakan Metode Local Binary Pattern Histogram,†Jurnal Teknologi Elektro, vol. 12, no. 2, pp. 123–129, 2022.
Sulastri Santi and Defi Mahadji Putri Riana, “Implementasi Enkripsi Data Secure Hash Algorithm (SHA-256) dan Message Digest Algorithm (MD5) pada Proses Pengamanan Kata Sandi Sistem Penjadwalan Karyawan,†Jurnal Teknik Elektro, vol. 10, no. 2, pp. 70–74, 2018.
M. T. Susitanto, S. Sakinah, and M. A. Haris, “Implementasi face detection dan recognition menggunakan python dengan numpy dan opencv menggunakan metode haar-cascade dan lbph (local binary pattern histogram),†Jurnal Teknik, vol. 14, no. 1, 2021.
A. Ahmed, J. Guo, F. Ali, F. Deeba, and A. Ahmed, “LBPH based improved face recognition at low resolution,†in 2018 International Conference on Artificial Intelligence and Big Data, ICAIBD 2018, 2018. doi: 10.1109/ICAIBD.2018.8396183.
A. W. Wibowo, A. Karima, Wiktasari, A. Yobioktabera, and S. Fahriah, “Pendeteksian dan Pengenalan Wajah Pada Foto Secara Real Time Dengan Haar Cascade dan Local Binary Pattern Histogram,†JTET (Jurnal Teknik Elektro Terapan), vol. Vol. 9 No., 2020.
Andri Nugraha Ramdhon and Fadly Febriya, “Penerapan Face Recognition Pada Sistem Presensi,†Journal of Applied Computer Science and Technology, vol. 2, no. 1, 2021, doi: 10.52158/jacost.v2i1.121.
Sutarti, S. Samsuni, and I. Asseghaf, “Sistem Keamanan Rumah melalui Pengenalan Wajah Menggunakan Webcam dan Library Opencv Berbasis Raspberry Pi,†Jurnal Dinamika Informatika, vol. 8, no. 2, 2019.
H. Sembiring, F. Y. Manik, and T. Zaidah, “Penerapan Algoritma Secure Hash Algorithm (SHA) Keamanan Pada Citra,†MEANS (Media Informasi Analisa dan Sistem), 2019, doi: 10.54367/means.v4i1.316.
Robith Adani Muhammad, “Server: Pengertian, Fungsi, Jenis, Cara Kerja dan Manfaat,†https://www.sekawanmedia.co.id/blog/pengertian-server/, Jan. 06, 2021.
F. Sunarya and C. Hardyanto, “Implementasi Face Recognition Dan Global Positioning System Pada Sistem Presensi Di Desa Mekarjati Kab Indramayu Berbasis Mobile,†JUPITER :Jurnal Penelitian Mahasiswa Teknik Dan Ilmu Komputer, vol. 1, no. 2, pp. 52–60, 2021.
A. Purnomo, “Pengembangan User Experience (UX) Dan User Interface (UI) Aplikasi Ibeauty Berbasis Android,†JSTIE (Jurnal Sarjana Teknik Informatika) (E-Journal), vol. 6, no. 3, 2018.
H. Sabita, R. Herwanto, Y. Syafitri, and B. Dwi Prasetyo, “Pengembangan Aplikasi Akreditasi Program Studi Berbasis Framework Django,†Jurnal Informatika, vol. 22, no. 1, pp. 33–37, 2022.
Suanda, “Sistem Informasi Absensi Pegawai Berbasis Web Pada Kantor Kelurahan Sako Palembang,†Jurnal Sigmata, vol. 7, no. April, 2019.
B. Santoso and R. P. Kristianto, “Implementasi Penggunaan OpenCV Pada Face Recognition Untuk Sistem Presensi Perkuliahan Mahasiswa,†SISTEMASI, vol. 9, no. 2, 2020, doi: 10.32520/stmsi.v9i2.822.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).