Integration of Artificial Intelligence in Facial Recognition Systems for Software Security

Authors

  • Widi Santoso Faculty of Information Technology, Master of Computer Science, Budiluhur University of Jakarta, Indonesia
  • Rahayu Safitri Faculty of Information Technology, Master of Computer Science, Budiluhur University of Jakarta, Indonesia
  • Samidi Faculty of Information Technology, Master of Computer Science, Budiluhur University of Jakarta, Indonesia

DOI:

10.33395/sinkron.v8i2.13612

Keywords:

Artificial Intelligence, Facial Recognition, Software Security, Authentication, Ethical Considerations

Abstract

Facial recognition technology, a cornerstone in modern software security, has seen significant advancements through the integration of Artificial Intelligence (AI). This research focuses on enhancing facial recognition systems by incorporating sophisticated machine learning algorithms and deep neural networks. By doing so, the goal is to increase the accuracy and reliability of these systems in security applications. The study uses a variety of facial datasets to train AI models that are adept at extracting facial features and recognizing patterns. These models are subjected to rigorous testing to evaluate their performance in terms of identification accuracy, processing speed, and adaptability to different environmental conditions. One of the key challenges addressed in the research is the system's vulnerability to errors and potential misuse. Ethical considerations and privacy concerns are at the forefront of the study. The research highlights the importance of designing AI-based facial recognition systems that respect user privacy and are resistant to biases, thus fostering trust and acceptance among users. The results of the study show a marked improvement in system performance, demonstrating enhanced recognition accuracy and speed, while maintaining robustness across different conditions. By offering practical recommendations for the development of secure, ethical, and privacy-aware facial recognition systems, this research contributes valuable insights into the integration of AI in software security. It underscores the importance of continuous innovation and ethical responsibility in the deployment of facial recognition technologies, shaping the future landscape of technological security measures

GS Cited Analysis

Downloads

Download data is not yet available.

References

Aboukadri, S., Ouaddah, A., & Mezrioui, A. (2024). Machine Learning in Identity and Access Management Systems: Survey and Deep Dive. Computers & Security, 103729.

Adjabi, I., Ouahabi, A., Benzaoui, A., & Taleb-Ahmed, A. (2020). Past, present, and future of face recognition: A review. Electronics, 9(8), 1188.

Aldi, F. (2024). Extraction of Shape and Texture Features of Dermoscopy Image for Skin Cancer Identification. Sinkron: Jurnal Dan Penelitian Teknik Informatika, 8(2), 650–660.

Ali, E. S., Hasan, M. K., Hassan, R., Saeed, R. A., Hassan, M. B., Islam, S., Nafi, N. S., & Bevinakoppa, S. (2021). Machine learning technologies for secure vehicular communication in internet of vehicles: recent advances and applications. Security and Communication Networks, 2021, 1–23.

Alimi, O. A., Ouahada, K., & Abu-Mahfouz, A. M. (2020). A review of machine learning approaches to power system security and stability. IEEE Access, 8, 113512–113531.

Amiri, Z., Heidari, A., Navimipour, N. J., Unal, M., & Mousavi, A. (2024). Adventures in data analysis: A systematic review of Deep Learning techniques for pattern recognition in cyber-physical-social systems. Multimedia Tools and Applications, 83(8), 22909–22973.

Anthony, P., Ay, B., & Aydin, G. (2021). A review of face anti-spoofing methods for face recognition systems. 2021 International Conference on INnovations in Intelligent SysTems and Applications (INISTA), 1–9.

Awad, A. I., Babu, A., Barka, E., & Shuaib, K. (2024). AI-powered biometrics for Internet of Things security: A review and future vision. Journal of Information Security and Applications, 82, 103748.

Brundage, M., Avin, S., Clark, J., Toner, H., Eckersley, P., Garfinkel, B., Dafoe, A., Scharre, P., Zeitzoff, T., & Filar, B. (2018). The malicious use of artificial intelligence: Forecasting, prevention, and mitigation. ArXiv Preprint ArXiv:1802.07228.

Chen, A., Xing, H., & Wang, F. (2020). A Facial Expression Recognition Method Using Deep Convolutional Neural Networks Based on Edge Computing. Ieee Access. https://doi.org/10.1109/access.2020.2980060

Dargan, S., Kumar, M., Ayyagari, M. R., & Kumar, G. (2020). A survey of deep learning and its applications: a new paradigm to machine learning. Archives of Computational Methods in Engineering, 27, 1071–1092.

Daugherty, P. R., & Wilson, H. J. (2018). Human+ machine: Reimagining work in the age of AI. Harvard Business Press.

Dyson, M. R. (2022). Combatting AI’s Protectionism & Totalitarian-Coded Hypnosis: The Case for AI Reparations & Antitrust Remedies in the Ecology of Collective Self-Determination. SMU L. Rev., 75, 625.

Fontes, C., Hohma, E., Corrigan, C. C., & Lütge, C. (2022). AI-powered public surveillance systems: why we (might) need them and how we want them. Technology in Society, 71, 102137.

Ilmawati, F. I., Kusrini, K., & Hidayat, T. (2024). Optimizing Facial Expression Recognition with Image Augmentation Techniques: VGG19 Approach on FERC Dataset. Sinkron: Jurnal Dan Penelitian Teknik Informatika, 8(2), 632–640.

Jalaluddin, A. Z. (2020). An Exploration of Countermeasures to Defend Against Weaponized AI Malware Exploiting Facial Recognition. Capitol Technology University.

Kelly, P. (2022). Facial recognition technology and the growing power of artificial intelligence.

Khan, M., & Ghafoor, L. (2024). Adversarial Machine Learning in the Context of Network Security: Challenges and Solutions. Journal of Computational Intelligence and Robotics, 4(1), 51–63.

Komlavi, A. A., Chaibou, K., & Naroua, H. (2022). Comparative study of machine learning algorithms for face recognition. Revue Africaine de Recherche En Informatique et Mathématiques Appliquées.

Kumar, S., Gupta, U., Singh, A. K., & Singh, A. K. (2023). Artificial intelligence: revolutionizing cyber security in the digital era. Journal of Computers, Mechanical and Management, 2(3), 31–42.

Leslie, D. (2020). Understanding bias in facial recognition technologies. ArXiv Preprint ArXiv:2010.07023.

Li, S., & Deng, W. (2020). Deep facial expression recognition: A survey. IEEE Transactions on Affective Computing, 13(3), 1195–1215.

Manoharan, A., & Sarker, M. (2023). Revolutionizing Cybersecurity: Unleashing the Power of Artificial Intelligence and Machine Learning for Next-Generation Threat Detection. DOI: Https://Www. Doi. Org/10.56726/IRJMETS32644, 1.

Micali, S. (2016). ALGORAND: the efficient and democratic ledger. CoRR, Abs/1607.01341, 3(3), 3.

Neugebauer, R. (2019). Digital transformation. Springer.

Patel, K., Mehta, D., Mistry, C., Gupta, R., Tanwar, S., Kumar, N., & Alazab, M. (2020). Facial sentiment analysis using AI techniques: state-of-the-art, taxonomies, and challenges. IEEE Access, 8, 90495–90519.

Raparthi, M., Dodda, S. B., & Maruthi, S. (2020). Examining the use of Artificial Intelligence to Enhance Security Measures in Computer Hardware, including the Detection of Hardware-based Vulnerabilities and Attacks. European Economic Letters (EEL), 10(1).

Rathour, N., Khanam, Z., Gehlot, A., Singh, R., Rashid, M., AlGhamdi, A. S., & Alshamrani, S. S. (2021). Real-Time Facial Emotion Recognition Framework for Employees of Organizations Using Raspberry-Pi. Applied Sciences. https://doi.org/10.3390/app112210540

Roozkhosh, P., Pooya, A., & Agarwal, R. (2023). Blockchain acceptance rate prediction in the resilient supply chain with hybrid system dynamics and machine learning approach. Operations Management Research, 16(2), 705–725.

Smith, A. (2020). Using artificial intelligence and algorithms. FTC, Apr.

Udayana, I. P. A. E. D., Kherismawati, N. P. E., & Sudipa, I. G. I. (2022). Detection of Student Drowsiness Using Ensemble Regression Trees in Online Learning During a COVID-19 Pandemic. Telematika: Jurnal Informatika Dan Teknologi Informasi, 19(2), 229–244.

Ullah, I., Khan, I. U., Ouaissa, M., Ouaissa, M., & El Hajjami, S. (2024). Future Communication Systems Using Artificial Intelligence, Internet of Things and Data Science. CRC Press.

Wilkinson, S. (2020). Artificial intelligence, facial recognition technology and data privacy. Journal of Data Protection & Privacy, 3(2), 186–198.

Wu, J., Feng, W., Liang, G., Wang, T., Li, G., & Zheng, Y. (2022). A Privacy Protection Scheme for Facial Recognition and Resolution Based on Edge Computing. Security and Communication Networks. https://doi.org/10.1155/2022/4095427

Zebua, R. S. Y., Khairunnisa, K., Hartatik, H., Pariyadi, P., Wahyuningtyas, D. P., Thantawi, A. M., Sudipa, I. G. I., Prayitno, H., Sumakul, G. C., & Sepriano, S. (2023). FENOMENA ARTIFICIAL INTELLIGENCE (AI). PT. Sonpedia Publishing Indonesia.

Zhang, H., Jolfaei, A., & Alazab, M. (2019). A Face Emotion Recognition Method Using Convolutional Neural Network and Image Edge Computing. Ieee Access. https://doi.org/10.1109/access.2019.2949741

Zhang, J., & Tao, D. (2020). Empowering things with intelligence: a survey of the progress, challenges, and opportunities in artificial intelligence of things. IEEE Internet of Things Journal, 8(10), 7789–7817.

Downloads


Crossmark Updates

How to Cite

Santoso, W., Safitri, R. ., & Samidi, S. (2024). Integration of Artificial Intelligence in Facial Recognition Systems for Software Security. Sinkron : Jurnal Dan Penelitian Teknik Informatika, 8(2), 1208-1214. https://doi.org/10.33395/sinkron.v8i2.13612