2  BACKGROUND 
In this section, we will  discuss  the theoretical basis 
and methods used in this study. Theories and methods 
that will be discussed include medical records, public 
health  centers,  fingerprints,  cryptography,  and 
advanced encryption standards (AES). 
2.1  Medical Record 
Data  privacy  of  medical  records  of  each  patient 
consists of personal data, medical history, and others. 
The  medical  record  is  sensitive  of  data  and  privacy 
(Dubovitskaya et al., 2017), medical record data can 
be used for various purposes, such as for Memory aid, 
Communication  devices,  instrument  Quality 
Assurance,  Risk  reduction  aid,  aid  reimbursement, 
Evaluation  and  Research  tool  (Dehn  &  Asprey, 
2007).  Besides,  medical  record  data  can  be  used  to 
plan further treatment or investigation at a later date. 
Medical  record  data  is  also  used  as  evidence  of 
disease diagnosis and medical care of patients. 
The benefits of medical records very much, and it 
is  essential  for  the  well-managed  so  that  these 
benefits can  be  felt by the service  provider and the 
service  recipient.  Benefits  include  medical  records, 
first as a basis for planning treatment, care, and 
preventive action. Secondly, to improve the quality of 
service  and  to  protect  medical  personnel.  The  third 
medical  records  can  be  used  for  education  and 
research.  Fourth,  care  financing  will  be  more 
transparent  and  accountable.  Fifth  medical  records 
can be used as health statistics. Sixth medical record 
data can be used for evidentiary law, discipline, and 
ethics of health personnel (Dehn & Asprey, 2007). 
2.2  Public Health Center 
Puskesmas stand for public health center, According 
to the DEPKES-RI Puskesmas Work Guidelines, the 
Puskesmas is a functional health organization which 
is a center for community health development which 
also  fosters  community  participation  in  addition  to 
providing comprehensive and  integrated  services  to 
the community in its working area in the form of main 
activities. puskesmas has three main functions: 
1.  As a centre for community health development 
in the working area.  The  Puskesmas is  in the 
middle of  a  community  that  can  quickly  find 
out  the  successes  and  obstacles  faced  in 
building public health. 
2.  Fostering  community  participation  in  the 
working area for  increasing the  ability to  live 
healthy.  
3.  Providing comprehensive and integrated health 
services to the community in its working area. 
2.3  Fingerprint 
The fingerprint is a technology that can easily identify 
someone. Even today fingerprints are widely used by 
the  world's  technological  development  because  the 
use  of  fingerprints  is  relatively  safe,  accurate  and 
convenient for  the  authentication process  compared 
to  other  authentication  methods, this is  because  the 
fingerprint is feasible, distinct, permanent, accurate, 
reliable, and acceptable(S. Tarare, 2015). 
Fingerprint  has  a  function  as  a  verification 
medium, just like a password or pin. It's just that the 
fingerprint  uses  a  human  fingerprint  pattern  as  the 
primary key stored in the database (Sifaunajah, 2015). 
The work process of the fingerprint is to compare the 
current  fingerprint  feature  with  some  fingerprint 
features that have been stored in the database before 
(Ngantung et al., 2014). Many methods can match the 
current fingerprint with the fingerprint that has been 
stored  in  the  database  (Soni  &  Goyani,  2018)(H. 
kumar, 2013), such as template matching (Leksono et 
al., 2011), Bank Gabor Filter (Verifikasi et al., 2009), 
Minutiae Feature (H. kumar, 2013), and so on.  
 
Figure 1: Fingerprint Patterns 
Template  matching  is  an  image  processing 
technique  to  find  small  parts  of  the  image  that 
matches  a  model  that  has  saved  previously.  The 
essential  idea  template  matching  explains  how  the 
brain  recognizes  re-shapes  or  patterns  that  known 
before.  The  Bank  Gabor  Filter  method  works  by 
finding  fingerprint  features  based  on  the  Average 
Absolute  Deviation  (AAD)  value  of  the  fingerprint 
image.  These  features  are  known  as  finger  codes 
(Verifikasi et al., 2009). Minutiae are some lines that 
form  a  pattern  of  the  fingerprint  pattern.  At  one 
fingerprint may be formed of hundreds of minutiae as 
an individual characteristic.