Design and Implementation of Safe Security System Using Multi-Factor Authentication: Facial Recognition, National ID Card and PIN

Authors

  • Syahri Muharom Electrical Engineering, Institut Teknologi Adhi Tama Surabaya
  • Sigit Adhi Sulistianto Electrical Engineering, Institut Teknologi Adhi Tama Surabaya
  • Riza Agung Firmansyah Electrical Engineering, Institut Teknologi Adhi Tama Surabaya
  • Wahyu Setyo Pambudi Electrical Engineering, Institut Teknologi Adhi Tama Surabaya
  • Muchammad Kurniawan Informatics Engineering, Institut Teknologi Adhi Tama Surabaya

DOI:

https://doi.org/10.35447/jitekh.v14i1.1306

Keywords:

Security System, Face Recognition, PIN, Identity Card, storage

Abstract

Traditional storage cabinets that rely on conventional locks and provide unrestricted access are highly vulnerable to theft. To safeguard documents and other valuable items from loss, an integrated security system is required to regulate and secure access to storage compartments. This study aims to develop a security system based on facial recognition, ID cards, and a keypad interface The Haar Cascade classifier combine with LPBH utilizing the OpenCV library is employed for facial identification by storing 30 photos per person in a designated folder, and subsequently comparing facial objects captured by a webcam against pre-stored and trained facial data in the database. The analysis indicates that the optimal detection range of the system is between 100 and 300 cm. In facial orientation testing, the best recognition performance is achieved at angles between 0° and 40°. Based on 20 experimental trials, the system demonstrates an average success rate of 80%. These results suggest that a facial‑recognition‑based security system utilizing the Haar Cascade approach is feasible for implementation as a protective mechanism for storage cabinets.

Downloads

Download data is not yet available.

References

V. V. Muthuswamy, “An Empirical Exploration of Human Factors, Sense of Security, and Well-Being in Contemporary Social Work Environments,” J. Hum. Secur., vol. 19, no. 2, 2023, Accessed: Feb. 23, 2026. [Online]. Available: https://jhumansecurity.com/menuscript/index.php/jhe/article/view/117

Ö. Aslan, S. S. Aktuğ, M. Ozkan-Okay, A. A. Yilmaz, and E. Akin, “A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions,” Electronics, vol. 12, no. 6, p. 1333, Jan. 2023, doi: 10.3390/electronics12061333.

J. Qiang, D. Wu, H. Du, H. Zhu, S. Chen, and H. Pan, “Review on Facial-Recognition-Based Applications in Disease Diagnosis,” Bioengineering, vol. 9, no. 7, p. 273, Jul. 2022, doi: 10.3390/bioengineering9070273.

A. A. Nair, R. Adithyan, A. Unni, and S. Nalinakshan, “RFID Door Lock Access Control Systems: Trends, Technologies and Applications,” in 2025 3rd International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT), Feb. 2025, pp. 906–912. doi: 10.1109/IDCIOT64235.2025.10914928.

C. Adams, “Identification,” in Encyclopedia of Cryptography, Security and Privacy, Springer, Cham, 2025, pp. 1165–1165. doi: 10.1007/978-3-030-71522-9_77.

D. Antonio, “Rancang Bangun Aplikasi Keamanan Brankas Berbasis Sinar Laser Dengan Mikrokontroller Arduino Nano Dan Uno R3,” J. Sisfokom Sist. Inf. Dan Komput., vol. 2, no. 2, Art. no. 2, Sep. 2013, doi: 10.32736/sisfokom.v2i2.90.

N. W. Anggara, G. Dewantoro, and A. A. Febrianto, “Sistem Pembuka Brankas Menggunakan E-KTP atau Password Dilengkapi dengan GPS,” J. Teknol. Elektro, vol. 13, no. 2, Art. no. 2, May 2022, doi: 10.22441/jte.2022.v13i2.009.

T. Tukadi, “Rancang Bangun Aplikasi Presensi Menggunakan SmartCard RFID Berbasis Web,” CYCLOTRON, vol. 4, no. 2, Art. no. 2, Aug. 2021, doi: http://dx.doi.org/10.30651/cl.v4i2.5649.

M. L. B. Pamungkas, A. Rachmawan, and S. Muharom, “Rancang Bangun Vending Machine dengan RFID Sebagai Pembayaran Elektronik Berbasis Arduino,” Pros. Semin. Nas. Tek. Elektro Sist. Inf. Dan Tek. Inform. SNESTIK, vol. 1, no. 1, Art. no. 1, Jun. 2021, doi: 10.31284/p.snestik.2021.1747.

M. H. Khairuddin, S. Shahbudin, and M. Kassim, “A smart building security system with intelligent face detection and recognition,” IOP Conf. Ser. Mater. Sci. Eng., vol. 1176, no. 1, p. 012030, Aug. 2021, doi: 10.1088/1757-899X/1176/1/012030.

E. Alfianto, S. Agustini, S. Muharom, F. Rusydi, and I. Puspitasari, “Design Monitoring Electrical Power Consumtion at Computer Cluster,” J. Phys. Conf. Ser., vol. 1445, p. 012027, Jan. 2020, doi: 10.1088/1742-6596/1445/1/012027.

O. Derek, E. K. Allo, and N. M. Tulung, “Rancang Bangun Alat Monitoring Kecepatan Angin Dengan Koneksi Wireless Menggunakan Arduino Uno,” J. Tek. Elektro Dan Komput., vol. 5, no. 4, Art. no. 4, Aug. 2016, doi: 10.35793/jtek.v5i4.13199.

D. T. L. Praing, A. Purba, and S. Muharom, “Monitoring Suhu Dan Infus Pasien Rumah Sakit Pasca Pandemic Berbasis Android,” Pros. Semin. Nas. Sains Dan Teknol. Terap., no. 0, Art. no. 0, Nov. 2022, Accessed: Jan. 18, 2023. [Online]. Available: http://ejurnal.itats.ac.id/sntekpan/article/view/3445

R. Firnanda et al., “Sistem Pemilah Sampah Otomatis Berdasarkan Jenis Sampah Berbasis Microcontroller Arduino Uno,” Pros. Semin. Nas. Tek. Elektro Sist. Inf. Dan Tek. Inform. SNESTIK, vol. 1, no. 1, pp. 7–15, May 2024, doi: 10.31284/p.snestik.2024.5724.

M. Shofiyullah and S. Muharom, “Sistem Pengering Pakaian Otomatis Berbasis Microcontroller,” Pros. Semin. Nas. Tek. Elektro Sist. Inf. Dan Tek. Inform. SNESTIK, vol. 1, no. 1, Art. no. 1, Apr. 2023, doi: 10.31284/p.snestik.2023.3978.

A. Ramadhan, “Design and Build a Telegram – Based Infusion Droplet Control and Monitoring System | Procedia of Engineering and Life Science.” Accessed: Jan. 27, 2023. [Online]. Available: https://pels.umsida.ac.id/index.php/PELS/article/view/1225

T. Puasandi, “SISTEM AKSES KONTROL KUNCI ELEKTRIK MENGGUNAKAN PEMBACAAN E-KTP,” p. 6, 2014.

M. R. Muliawan, B. Irawan, and Y. Brianorman, “IMPLEMENTASI PENGENALAN WAJAH DENGAN METODE EIGENFACE PADA SISTEM ABSENSI,” vol. 03, no. 1, p. 11, 2015.

W. Sulaeman, E. Alimudin, and A. Sumardiono, “SISTEM PENGAMAN LOKER DENGAN MENGGUNAKAN DETEKSI WAJAH,” J. Energy Electr. Eng. JEEE, vol. 3, no. 2, Art. no. 2, Apr. 2022, doi: 10.37058/jeee.v3i2.4756.

“Rapid Object Detection using a Boosted Cascade of Simple Features.” Accessed: Apr. 09, 2026. [Online]. Available: https://www.computer.org/csdl/proceedings-article/cvpr/2001/127210511/12OmNyXMQaN

T. Ahonen, A. Hadid, and M. Pietikainen, “Face Description with Local Binary Patterns: Application to Face Recognition,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 28, no. 12, pp. 2037–2041, Dec. 2006, doi: 10.1109/TPAMI.2006.244.

Y. Putra, C. Prabowo, and E. Asri, “Keamanan Laci Berbasis Mikrokontroler dengan Sensor LDR dan RFID,” JITSI J. Ilm. Teknol. Sist. Inf., vol. 1, no. 3, Art. no. 3, Sep. 2020, doi: 10.30630/jitsi.1.3.15.

Downloads

Published

31-03-2026

How to Cite

Muharom, S., Sulistianto, S. A., Firmansyah, R. A., Pambudi, W. S., & Kurniawan, M. (2026). Design and Implementation of Safe Security System Using Multi-Factor Authentication: Facial Recognition, National ID Card and PIN. JiTEKH, 14(1), 79–87. https://doi.org/10.35447/jitekh.v14i1.1306