eprintid: 8759 rev_number: 8 eprint_status: archive userid: 11 dir: disk0/00/00/87/59 datestamp: 2024-08-12 04:01:54 lastmod: 2024-08-12 04:01:54 status_changed: 2024-08-12 04:01:54 type: monograph metadata_visibility: show contact_email: repository@staff.ukdw.ac.id creators_name: , I Kadek Dendy Senapartha creators_name: , Gabriel Indra Widi Tamtama creators_id: 8908120021 contributors_type: http://www.loc.gov/loc.terms/relators/RTM contributors_name: , Albertus Adrian Susanto title: SISTEM DETEKSI WAJAH PALSU MENGGUNAKAN ARSITEKTUR MOBILENETS ispublished: unpub subjects: QA75 divisions: tek_informatika full_text_status: restricted monograph_type: project_report abstract: Sistem pengenalan wajah merupakan salah satu metode dalam teknik biometric yang menggunakan wajah untuk proses identifikasi dan verifikasi seseorang. Teknologi pengenalan wajah saat ini menjadi booming dikarenakan tidak memerlukan kontak fisik seperti verifikasi sidik jari. Terdapat dua fase utama dalam sistem biometrik pengenalan wajah otomatis, yaitu pengenalan wajah palsu (Presentation Attack (PA) detection ) dan pengenalan wajah (face recognition). Penelitian ini melakukan eksperimen untuk membangun sebuah model pembelajaran mesin (machine learning) untuk melakukan deteksi wajah palsu ataupun memverifikasi keaslian wajah yang pengguna menggunakan arsitektur Mobilenets. Model antispoof wajah dibangun dengan menggunakan arsitektur MobilenetV2 dengan menambahkan 3 layer neural network yang digunakan sebagai layer klasifikasi. Model dilatih dengan menggunakan 3 jenis dataset publik, yaitu REPLAY-Mobile, RECOD-MPAD, dan LLC-FSAD. Kemudian pengujian secara terkontrol dilakukan dengan menggunakan program komputer menghasilkan nilai HTER 0.17. sedangkan hasil pengujian secara tidak terkontrol menggunakan aplikasi prototipe Android menghasilkan nilai HTER sebesar 0.21. Dari hasil pengujian ini menghasilkan selisih nilai HTER sebesar 0.04 yang mengindikasikan bahwa model antispoof wajah akan memiliki performa yang cenderung menurun bila digunakan secara real. date: 2022-11-28 publisher: Program Studi Informatika, Universitas Kristen Duta Wacana place_of_pub: Yogyakarta institution: Universitas Kristen Duta Wacana department: Informatika referencetext: [1] S. Chakraborty and D. Das, “An Overview of Face Liveness Detection,” Int. J. Inf. Theory, vol. 3, no. 2, pp. 11–25, Apr. 2014, doi: 10.5121/ijit.2014.3202. [2] Z. Yu, Y. Qin, X. Li, C. Zhao, Z. Lei, and G. Zhao, “Deep Learning for Face Anti-Spoofing: A Survey.” arXiv, May 16, 2022. Accessed: Jul. 20, 2022. [Online]. Available: http://arxiv.org/abs/2106.14948 [3] A. G. Howard et al., “MobileNets: Efficient Convolutional Neural Networks for Mobile Vision Applications.” arXiv, Apr. 16, 2017. Accessed: Jul. 20, 2022. [Online]. Available: http://arxiv.org/abs/1704.04861 [4] W. Z. Khan, E. Ahmed, S. Hakak, I. Yaqoob, and A. Ahmed, “Edge computing: A survey,” Future Gener. Comput. Syst., vol. 97, pp. 219–235, Aug. 2019, doi: 10.1016/j.future.2019.02.050. [5] Z. Ming, M. Visani, M. M. Luqman, and J.-C. Burie, “A Survey On Anti-Spoofing Methods For Face Recognition with RGB Cameras of Generic Consumer Devices.” arXiv, Oct. 08, 2020. Accessed: Jul. 20, 2022. [Online]. Available: http://arxiv.org/abs/2010.04145 [6] I. K. D. Senapartha, “Studi Literatur Presentation Attack dan Set Data Anti-Spoof Wajah,” vol. 14, no. 1, p. 8, 2022. [7] A. Costa-Pazo, S. Bhattacharjee, E. Vazquez-Fernandez, and S. Marcel, “The ReplayMobile Face Presentation-Attack Database,” in 2016 International Conference of the Biometrics Special Interest Group (BIOSIG), Darmstadt, Sep. 2016, pp. 1–7. doi: 10.1109/BIOSIG.2016.7736936. [8] W. R. Almeida et al., “Detecting face presentation attacks in mobile devices with a patchbased CNN and a sensor-aware loss function,” PLOS ONE, vol. 15, no. 9, p. e0238058, Sep. 2020, doi: 10.1371/journal.pone.0238058. [9] D. Timoshenko, K. Simonchik, V. Shutov, P. Zhelezneva, and V. Grishkin, “Large Crowdcollected Facial Anti-Spoofing Dataset,” in 2019 Computer Science and Information Technologies (CSIT), Yerevan, Armenia, Sep. 2019, pp. 123–126. doi: 10.1109/CSITechnol.2019.8895208. [10] S. Ioffe and C. Szegedy, “Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift.” arXiv, Mar. 02, 2015. Accessed: Jul. 25, 2022. [Online]. Available: http://arxiv.org/abs/1502.03167[11] N. Srivastava, G. Hinton, A. Krizhevsky, I. Sutskever, and R. Salakhutdinov, “Dropout: A Simple Way to Prevent Neural Networks from Overfitting,” p. 30. [12] F. Zhuang et al., “A Comprehensive Survey on Transfer Learning.” arXiv, Jun. 23, 2020. doi: 10.48550/arXiv.1911.02685. [13] J. Deng, W. Dong, R. Socher, L.-J. Li, K. Li, and L. Fei-Fei, “ImageNet: A Large-Scale Hierarchical Image Database,” p. 8. [14] B. Pang, E. Nijkamp, and Y. N. Wu, “Deep Learning With TensorFlow: A Review,” J. Educ. Behav. Stat., vol. 45, no. 2, pp. 227–248, Apr. 2020, doi: 10.3102/1076998619872761. [15] R. David et al., “TensorFlow Lite Micro: Embedded Machine Learning on TinyML Systems.” arXiv, Mar. 13, 2021. Accessed: Aug. 01, 2022. [Online]. Available: http://arxiv.org/abs/2010.08678 [16] “Illuminance - Recommended Light Level,” Illuminance - Recommended Light Level. https://www.engineeringtoolbox.com/light-level-rooms-d_708.html (accessed Nov. 02, 2022). funders: dendy.prtha@staff.ukdw.ac.id citation: I Kadek Dendy Senapartha and Gabriel Indra Widi Tamtama (2022) SISTEM DETEKSI WAJAH PALSU MENGGUNAKAN ARSITEKTUR MOBILENETS. Research Report (Lecturer). Program Studi Informatika, Universitas Kristen Duta Wacana, Yogyakarta. (Unpublished) document_url: https://katalog.ukdw.ac.id/8759/1/248_PENDAHULUAN_KESIMPULAN.pdf document_url: https://katalog.ukdw.ac.id/8759/2/248_FULLTEXT.pdf