IMPLEMENTASI GOOGLE ML KIT UNTUK LIVENESS DETECTION DALAM SISTEM FACE RECOGNITION: ANALISIS KINERJA DAN KEAMANAN PADA APLIKASI MOBILE
Google ML Kit, Liveness Detection, Face Recognition, Mobile Application
Abstract
Penelitian ini mengkaji implementasi Google ML Kit untuk deteksi liveness dalam sistem pengenalan wajah pada aplikasi mobile dengan tujuan untuk meningkatkan keamanan aplikasi dan mencegah ancaman spoofing. Pengenalan wajah telah banyak diterapkan dalam berbagai aplikasi, namun kerentanannya terhadap serangan menggunakan foto atau video statis menimbulkan tantangan besar dalam hal keamanan. Oleh karena itu, deteksi liveness yang mengidentifikasi apakah wajah yang dikenali merupakan wajah hidup menjadi sangat penting. Penelitian ini fokus pada integrasi teknologi liveness detection dalam pengenalan wajah menggunakan Google ML Kit, yang memungkinkan aplikasi mobile untuk mendeteksi gerakan kepala (geleng kanan, kiri) dan kedipan mata sebagai indikator wajah yang hidup. Hasil implementasi menunjukkan bahwa sistem dapat mencapai akurasi tinggi dengan kecepatan pengenalan yang baik, serta mampu mengurangi potensi serangan spoofing. Penelitian ini memberikan kontribusi pada pengembangan aplikasi mobile yang lebih aman dan dapat diandalkan dalam pengenalan wajah, dengan memastikan bahwa sistem tidak hanya mengenali wajah, tetapi juga memastikan bahwa wajah tersebut adalah wajah yang hidup.
Downloads
References
[2] Y. Kortli, M. Jridi, A. Al Falou, and M. Atri, “Face Recognition Systems: A Survey,” Sensors, vol. 20, no. 2, p. 342, 2020, doi: 10.3390/s20020342.
[3] E. AVUCLU and M. KOKLU, “Development of Voice and Face Recognition Based Security Software for Biometric Systems,” 2023, doi: 10.58190/icontas.2023.52.
[4] O. E. Putra, R. Devita, and N. Wahyudi, “Safe Security System Using Face Recognition Based on IoT,” Sinkron, vol. 8, no. 2, pp. 1021–1030, 2023, doi: 10.33395/sinkron.v8i2.12231.
[5] S. Quirolgico, J. Voas, T. Karygiannis, C. Michael, and K. Scarfone, “Vetting the Security of Mobile Applications,” 2019, doi: 10.6028/nist.sp.800-163r1.
[6] A. Efe and Ş. Özdamarlar, “Security Controls Against Mobile Application Threats,” International Journal of Engineering and Innovative Research, vol. 3, no. 2, pp. 145–162, 2021, doi: 10.47933/ijeir.838873.
[7] E. Zaitseva, T. Hovorushchenko, O. Pavlova, and Y. Voichur, “Identifying the Mutual Correlations and Evaluating the Weights of Factors and Consequences of Mobile Application Insecurity,” Systems, vol. 11, no. 5, p. 242, 2023, doi: 10.3390/systems11050242.
[8] A. Wambua, “Security-Aware Mobile Application Development Lifecycle (sMADLC),” International Journal of Education and Management Engineering, vol. 13, no. 2, pp. 36–42, 2023, doi: 10.5815/ijeme.2023.02.05.
[9] P. Subramani, G. Rajendran, J. Sengupta, R. P. de Prado, and B. D. Parameshachari, “A Block Bi-Diagonalization-Based Pre-Coding for Indoor Multiple-Input-Multiple-Output-Visible Light Communication System,” Energies (Basel), vol. 13, no. 13, p. 3466, 2020, doi: 10.3390/en13133466.
[10] S. A. Tovino, “Privacy and Security Issues With Mobile Health Research Applications,” The Journal of Law Medicine & Ethics, vol. 48, no. S1, pp. 154–158, 2020, doi: 10.1177/1073110520917041.
[11] C. S. Keau, C. K. On, M. H. A. Hijazi, and M. Singh, “Smart-Hadir – Mobile Based Attendance Management System,” International Journal of Interactive Mobile Technologies (Ijim), vol. 15, no. 14, p. 4, 2021, doi: 10.3991/ijim.v15i14.22677.
[12] T. Mazakov and D. N. Narynbekovna, “Development of Biometric Methods and Information Security Tools,” News of the National Academy of Sciences of the Republic of Kazakhstan, vol. 2, no. 336, pp. 121–124, 2021, doi: 10.32014/2021.2518-1726.30.

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
An author who publishes in this Journal agrees to the following terms:
- Author retains the copyright and grants the journal the right of first publication of the work simultaneously licensed under the Creative Commons Attribution-ShareAlike 4.0 License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal
- Author is able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book) with the acknowledgement of its initial publication in this journal.
- Author is permitted and encouraged to post his/her work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of the published work (See The Effect of Open Access).