Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Journal of Informatics Management and Information Technology

Penerapan Metode Gabor Wavelet Dalam Pengenalan Wajah Pada Rekaman CCTV Sofi Andianis Fau; Sinar Sinurat
Journal of Informatics Management and Information Technology Vol. 1 No. 4 (2021): October 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jimat.v1i4.129

Abstract

Human facial recognition is an important field of research, and there are many applications today that can apply it. Through the development of a technique such as the Gabor Wavelet, computers can now outpace the human brain in a variety of tasks in facial recognition, particularly those that require searching large facial databases. The face recognition system is used to compare an input face image with a face database and produce the face that best matches that image if detected. Meanwhile, face authentication is used to test the authenticity / similarity of a face with face data that has been stored in the previous database. Applications have advantages over conventional methods. In case it is not easily stolen or used by unauthorized users. The purpose of this final project is to create a facial recognition software from CCTV footage using Gabor Wavelet to reduce the dimensions of facial images as well as to determine the capabilities of the technique. In this final project, the software created uses a still image as input. To build this application using Matlab. The system test results show that the use of Gabor Wavelet for facial recognition on CCTV footage provides a fairly high level of accuracy. Test results The results obtained will then be entered into the Gabor Wavelet Method to determine the identity of the face owner. For facial images that were included in the exercise, it was possible to get 85.71% correct identification
Modifikasi Algoritma XTEA dengan Pembangkitan Kunci Menggunakan Metode Linear Congruential Untuk Pengamanan File Dokumen Berliana Oktaviani Sinaga; Sinar Sinurat; Taronisokhi Zebua
Journal of Informatics Management and Information Technology Vol. 1 No. 4 (2021): October 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jimat.v1i4.130

Abstract

Confidential document files must have security both when the file process is sent or stored in the stroge media. This is done so that the confidential document file is not known by someone who does not have authority over the file, or to avoid loss if the file falls into the wrong hands. In order to achieve this, a document file security technique is needed that can convert document file data into unrecognized data. One of the techniques that can be used is cryptography. Cryptography makes use of algorithms to encode document files with an encryption process, and restore document files with a decryption process. One of the algorithms that can be used is the XTEA algorithm. XTEA divides the document file string into 2 parts, namely AL 32 bit and BL 32 bit. The weakness of the XTEA algorithm when carrying out the encryption or decryption process with repeated key scheduling so that it is not effective in optimizing the security of encrypted document files, therefore in this study the Linear Congruential Generator (LCG) method is added to generate XTEA keys. LCG has values ??a, c, m and X0 which triggers to get the XTEA key. So that in the process of distributing encrypted document files, the key sent is the LCG trigger value in the form of a, c, m and X0, if the value is known by the attacker, the encrypted document file cannot be returned. So that the results of the XTEA encryption algorithm with key optimizer based on the LCG method produce a document file cipher that is more optimal in security