Professional Documents
Culture Documents
Jurnal Kak Najib 2 HMM
Jurnal Kak Najib 2 HMM
ABSTRAK
Face recognition is a biometric technology that has been widely applied in security systems .This technology
allows us to identify or verify a person's face through images digitally by matching the face texture. Raspberry
PI is a small computer that has been installed complete like a real computer using the ARM SoC (System-ona-
chip) packaged and in intergration on PCB it uses SD card for booting and long term storage. Telegram is
an encrypted chat application that is known to be very safe and has a telegram bot feature can function as a
programmable user . The use of raspberry PI added with our camera can use face recognition technology , while
the telegram application will send photos someone who tried to enter the room. The communication used is two-
way communication that is, the user can perform commands to take photos, move the camera, open the door,
lock the door and check the condition of the door by using the telegram application.
1. INTRODUCTION
b. Create an application that can used to
Many things happen in the present crime such connect with the system this safeguard.
as theft, therefore many people employ In this study the problems discussed related to
professionals, like a security guard to maintain security. Utilization face recognition technology ,
property security owned, but it is assessed less researchers focus limitation problems for face
effective due to limited manpower human. Humans recognition include as follows :
cannot monitor for 24 hours, other than that it takes a. Face recognition algorithm ( face
a lot of money to pay them. This time the recognition ) is used, namely, HOG which
application of computers has grown rapidly just not will run on the raspberry PI.
able to do basic computing will but can do data b. Application used to connect with the
processing image (image). We can use technology system is a telegram mesanger application
use to monitor security, with image management which can be used to monitor the system
technology of scientific disciplines learn about
image processing techniques in digital referred to as
image processing digital ( Digital Image 2. THEORETICAL BASIS
Processing ).
One of the technologies of digital imagery 2.1 Face Detection
widely used for security is face recognition that Face detection is one of the very early
can recognize someone only by using a computer stages important before the introduction process
and a camera. So that can be connected to the is carried out face (Face Recegoniton) . Face
system to be created, needed an application that can detection considered a special case of object
do communication between users and systems, then detection. The object class detection task is find
the system This is made using the location and size of all objects in the picture
telegram messenger application which will connect that is the face. Detection algorithm faces by
the owner to the system. matching someone's image little by little. First,
Based on the background that has been the eye area humans that might be detected with
presented above, the formulation of the problem test all valley regions in the image level of
faced in system design, namely as the following: gray. Then the genetic algorithm used to
a. How researchers this could utilize face generate all regions face which may include
recognition technology in use to secure the eyebrows, irises, holes nose and mouth
room. corners. Every face candidate which may be
normalized to reduce lighting effect, which was as position values on the X axis and Y being the
caused by uneven lighting, shirring effect Polar coordinate like an equation (4) and (5)
caused by head movement, value the suitability
of each candidate is measured based on
projections on the eigen face. After all total
literacy of all candidates face with high scores
are selected for more verification continue. At
this stage facial symmetry is measured to
determine the face position.
Information :
G x, G y: gradient image of X and Y axes
Bu: initial image
b. Program Cons:
1.Use of raspberries with memory and low GPU
Gambar 9: Tampilan Layar Pencocokan Wajah resulted lag in the program.
2.Tool can only recognize faces but can't tell
Gambar 9 menjelaskan layar pencocokan
which face comes from a photo or someone's
wajah tentang bentuk layout tampilan awal didalam
face in real .
pencocokan wajah.
Gambar 10 berfungsi untuk melakukan Devito, D., Wihandika, R. C., & Widodo, A. W.
pengambilan gambar untuk direkam wajah (2019). Ekstraksi ciri untuk klasifikasi
karyawan yang baru oleh karena ini sangat penting gender berbasis citra wajah menggunakan
untuk mendapatkan gambar wajah pegawai. metode histogram of orieted gradients.
Jurnal Pengembangan Teknologi Informasi
dan Ilmu Komputer, 3 (8), 8002-8011.
Gambar 11 : Tampilan Layar Presensi Pegawai
Karyawan untuk Melakukan Pencocokan Wajah Herlambang, M., & Dicki. (2016). Rancang
bangun keamanan loker dengan
Gambar 11 berfungsi untuk melakukan autentifikasi wajah dan password berbasis
presensi karyawan yang sudah terdaftar akan bisa raspberry pi menggunakan notifikasi
melakukan presensi jika tidak terdaftar sebelumnya keamanan via android. Jurusan Teknik
maka tidak akan bisa melakukan presensi. Komputer. Politeknik Negeri Sriwijaya.
Mulyasari, N .L. M. A., Sucianti, N., & Wijaya,A. Suryadi, K., & Sukumbang, S. (2015). Human
Y. (2017). Implementasi deteksi copy- detection menggunakan metode histogram
move forgery pada citra menggunakan of orieted gradients (hog) berbasis
metode histogram of orieted gradients open_cv. Jurnal Pendidikan Teknik
(hog). Jurnal Teknik ITS, 6 (2), 2337-3520. Elektro, 2 (2), 639-645.
Nicco. (2015). Rancang bangun sistem biometrik Ummah, T. (2017). Deteksi kendaraan
pengenalan wajah menggunakan principal menggunakan histogram of orieted
component analysis. Jurusan Teknik gradients dan real adaboost. Skripsi.
Elektro. Politeknik Negeri Batam. Institut Teknologi Sepuluh Nopember.
Prasetyo, H., Muharom, L. A., & Oktavianto, H.
Wijaya, I. D., Nurhasan, U., & Barata, M. A.
(2016). Penerapan algoritma viola jones
(2017). Implementasi raspberry pi untuk
pada deteksi wajah. Jurusan Teknik
rancang bangun sistem keamanan pintu
Informatika. Universitas Muhammadiyah
ruang server dengan pengenalan wajah
Jember.
menggunakan metode triangle face.
Rianti, M. (2017). Rancang bangun alat ukur Jurusan Teknologi Informasi. Politeknik
intensitas cahaya dengan menggunakan Negeri Malang.
sensor bh-1750 berbasis arduino.
Departemen Fisika. Fakultas Matematika