Abstract
This study presents the development and evaluation of a secure and efficient real-time face recognition system for school attendance, integrating cancelable biometrics with cryptographic hashing. A total of 115 face samples were collected from students and teachers under diverse lighting, pose, and expression conditions. Images were pre-processed using Contrast Limited Adaptive Histogram Equalization (CLAHE) and Gamma Correction, followed by feature extraction with ResNet-128D, key-based random projection, binarization into 128-bit templates, and SHA-256 hashing. Evaluation results demonstrated an accuracy of 86.09%, precision of 100%, recall of 86.09%, and F1-score of 92.52%, with an average latency of 281.71 ms, remaining well below the operational threshold of 500 ms. Offline pre-processing improved the F1-Score by 7.50% on large datasets and 7.28% on smaller datasets without sacrificing processing speed. From a security perspective, the system achieved zero false acceptances (FAR = 0%) and allowed template regeneration when compromised, reinforcing privacy preservation. These findings validate the feasibility of combining cancelable biometrics with cryptographic hashing to balance accuracy, speed, and security in practical attendance systems. The research underscores its broader applicability to access control and public security, while future work should emphasize adaptive pre-processing, diverse hardware validation, and hardware acceleration for robust real-time deployment.
References
-
Abdullahi, S. M., Sun, S., Wang, B., Wei, N., & Wang, H. (2024). Biometric template attacks and recent protection mechanisms: A survey. Information Fusion, 103, 102144. https://doi.org/10.1016/j.inffus.2023.102144
-
Ali, A., Migliorati, A., Bianchi, T., & Magli, E. (2024). Cancelable templates for secure face verification based on deep learning and random projections. EURASIP Journal on Information Security, 2024(1). https://doi.org/10.1186/s13635-023-00147-y
-
Bai, J., et al. (2023). CryptoMask: Privacy-preserving face recognition.
-
Banerjee, S., Jain, A., Hegde, C., & Memon, N. (2025). FaceCloak: Learning to protect face templates. IEEE Transactions on Information Forensics and Security.
-
Bharat, Y., Kaushik, A. R., Ross, A., Boddeti, V., & Ratha, N. (2024). Enhancing privacy in face analytics using fully homomorphic encryption. IEEE Transactions on Information Forensics and Security.
-
Chen, Y., et al. (2025). Efficient face information encryption and verification scheme based on full homomorphic encryption. Scientific Reports, 15(1), 95383. https://doi.org/10.1038/s41598-025-95383-2
-
Choi, H., Kim, J., Song, C., Woo, S. S., & Kim, H. (2024, October). Blind-Match: Efficient homomorphic encryption-based 1 matching for privacy-preserving biometric identification. In Proceedings of the International Conference on Information and Knowledge Management (pp. 4423–4430). Association for Computing Machinery. https://doi.org/10.1145/3627673.3680017
-
Choi, H., Kim, J., & Lee, S. (2020). Illumination normalization for robust face recognition: A comparative study. IEEE Access, 8, 104912–104923. https://doi.org/10.1109/ACCESS.2020.2999132
-
Kaushik, A. R., Yalavarthi, B. C., Ross, A., Boddeti, V., & Ratha, N. (2025). Shielding latent face representations from privacy attacks. In Proceedings of the IEEE International Conference on Automatic Face and Gesture Recognition (FG 2025).
-
Li, X., Sun, Y., & Zhao, Q. (2019). Real-time face recognition with pre-processing optimization: Balancing speed and accuracy. Journal of Visual Communication and Image Representation, 64, 102597. https://doi.org/10.1016/j.jvcir.2019.102597
-
Mi, Y., et al. (2023). Privacy-preserving face recognition using random frequency components. Retrieved from https://github.com/Tencent/TFace
-
Serengil, S., & Ozpinar, A. (2025). CipherFace: A fully homomorphic encryption-driven framework for secure cloud-based facial recognition. Retrieved from http://github.com/
-
Serengil, S., & Ozpinar, A. (2025). Encrypted vector similarity computations using partially homomorphic encryption: Applications and performance analysis.
-
Song, B., Zhao, D., Yan, J., Li, H., & Jiang, H. (2024). BioDeepHash: Mapping biometrics into a stable code. Pattern Recognition Letters, 177, 1–8. https://doi.org/10.1016/j.patrec.2023.12.009
-
Xu, G., et al. (2025). Pura: An efficient privacy-preserving solution for face recognition. IEEE Transactions on Information Forensics and Security.
-
Zhao, W., Chellappa, R., Phillips, P. J., & Rosenfeld, A. (2021). Face recognition: A literature survey. ACM Computing Surveys, 35(4), 399–458. https://doi.org/10.1145/954339.954342
Author Biographies
Rodhi Shafia Zaidan
Sekolah Tinggi Ilmu Komputer Cipta Karya Informatika
Informatics Engineering Study Program, Sekolah Tinggi Ilmu Komputer Cipta Karya Informatika, East Jakarta City, Special Capital Region of Jakarta, Indonesia.
Kastum
Sekolah Tinggi Ilmu Komputer Cipta Karya Informatika
Informatics Engineering Study Program, Sekolah Tinggi Ilmu Komputer Cipta Karya Informatika, East Jakarta City, Special Capital Region of Jakarta, Indonesia.
Dadang Iskandar Mulyana
Sekolah Tinggi Ilmu Komputer Cipta Karya Informatika
Informatics Engineering Study Program, Sekolah Tinggi Ilmu Komputer Cipta Karya Informatika, East Jakarta City, Special Capital Region of Jakarta, Indonesia.