Rancang Bangun Aplikasi PDF Signer Berbasis Android Pada PDAM Kabupaten Tuban
Main Article Content
Abstract
Perusahaan Air Minum Daerah (PDAM) Kabupaten Tuban selama ini menggunakan prosedur tanda tangan secara manual dengan kertas dan pena sehingga terkadang hal ini dapat menghambat proses persuratan. Hal ini biasa terjadi ketika surat tersebut harus ditandatangani dan dikirim ke pihak atau bagian lain di hari yang sama sementara yang berwenang untuk menandatangani tidak ada di tempat. Terlebih pada situasi pandemi covid-19 seperti yang terjadi saat ini, di mana para pegawai dianjurkan untuk bekerja dari rumah. Berangkat dari masalah tersebut kami mengusulkan rancang bangun aplikasi PDF signer dengan metode pengenalan wajah sebagai proses otentikasi. Metode pengembangan aplikasi yang diusulkan menggunakan metodologi prototyping. Aplikasi dibuat berdasarkan arsitektur perangkat Android menggunakan bahasa pemrograman Java. Aplikasi yang dihasilkan memiliki fitur yaitu registrasi pengguna, login pengguna, view dokumen, dan tanda tangan dokumen. Aplikasi dibuat menggunakan basis data SQLcipher untuk menyimpan passphrase pengguna pada direktori root aplikasi yang memudahkan pengguna karena tidak perlu mengisi passphrase setiap akan melakukan tanda tangan.
Downloads
Article Details

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work’s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal’s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
References
[2] Harakannanavar, S. S., Renukamurthy, P. C., & Raja, K. B., “Comprehensive Study of Biometric Authentication Systems, Challenges and Future Trends,” International Journal of Advanced Networking and Applications, 2019
[3] D. Wen, “Face Spoof Detection with Image Distortion Analysis,” IEEE Biometrics Compendium, vol. 10, no. 4, pp. 746 - 761, 2015.
[4] Ahmed, A., Hasan, T., Abdullatif,, M. & Rahim, M. S. M, “A Digital Signature System Based on Real Time Face Recognition,” IEEE 9th International Conference on System Engineering and Technology (ICSET), 2019
[5] B. Setiawan, “Face Anti-spoofing based on Color Texture Analysis,” 22nd IEEE International Conference on Image Processing (ICIP), Chicago, 2015.
[6] Y. A. Rahman, M. Liu and L. M. Po, “Deep learning for face anti-spoofing: An end-to-end approach,” Signal Processing: Algorithms, Architectures, Arrangements, and Applications (SPA), Hong Kong, 2017.
[7] E. Alexey, “Algorithm for optimization of Viola–Jones object detection framework parameters,” Journal of Physics Conference Series, no. 1, p. 945, 2018.
[8] Z. Boulkenafet, J. Komulainen and A. Hadid, “Face Anti-Spoofing Based on Color Texture Analysis,” Machine Vision Research, vol. 1, 2015.
[9] R. Hasan, H. Mahmud and X. Y. Li, “Face Anti-Spoofing Using Texture-Based Techniques and Filtering Methods,” Journal of Physics: Conference Series, 2019.
[10] I. B. Kusuma, A. Kartika, T. A. Budi, K. N. Ramadhani and F. Sthevanie, “Image Spoofing Detection Using Local Binary Pattern and Local Binary Pattern Variance,” International Journal on Information and Communication Technology (IJoICT), vol. 4, no. 2, pp. 11-18, 2018.
[11] K. Larbi, W. Ouarda, H. Drira, B. B. Amor and C. B. Amar, “DeepColorFASD: Face Anti Spoofing Solution Using a Multi Channeled Color Spaces CNN,” International Conference on Systems, Man, and Cybernetics (SMC), Miyazaki, 2018.
[12] A. Anjos, J. Komulainen, S. Marcel, A. Hadid and M. Pietik, “Face Anti-spoofing: Visual Approach,” Handbook of Biometric Anti-Spoofing: Trusted Biometrics under Spoofing Attacks, London, Springer, 2014, pp. 65-82.