Creation and Verification of Paper Based Certificates with Signatures

1603 Words4 Pages

CREATION AND VERIFICATION OF THE PAPER BASED CERTIFICATES WITH SIGNATURE. Creation of Signature on the issuing Certificate According to Murthy et al. (2011), the vital information that has to input in this paper such as Unique no, Reg no, first name, middle name, last name, Father’s name, passing year and obtained marks) need to be considered as an input m. Then after, m is hashed with a secure hashing algorithm (SHA-1) to create a hash value md. The hash value md is then encrypted using the issuing authority private key and the digital signature is found to be encrypted value (ds). Ultimately, ds is converted into a barcode BC and then printed along with the information required on the certificate. Verification of signature(Extract from: http://www.iaeng.org/publication/WCECS2011/WCECS2011_pp33-35.pdf) Model of certificate (Extract from: http://www.iaeng.org/publication/WCECS2011/WCECS2011_pp33-35.pdf) Verification of the certificate The vital information which belongs to the appropriate candidate mentioned in the above procedure is considered to be input m. On the other hand, m is hashed with a secure hashing algorithm (SHA-1) to create hash value md1. Bar code BC which is normally available on the particular certificate is concerted into ASCII code ds and it then decrypted with the public key of the issuing authority which gives a value md2. Make a difference between md1 and md2. Certificate is treated fake if md1 does not match to md2; otherwise it is genuine and original. Scanner identification with Extension to Forgery Detection According to Khanna et al. (2006), Digital images can be taken and from different digital cameras and scanners. Nowadays, ... ... middle of paper ... ...line level. A generic method was proposed which in turn avoid the use of dedicated document model or record sources grouping as we need to manage unknown document types. With the help of SEP forgery it is possible to produce fake document. However, the fraudster may favor two techniques to create fraudulent document: • Copy and paste forgery: a set of characters is replicated from the document and stuck on an alternate region to reinstate or include data as demonstrated in Figure below. Accordingly, the last digitized fake document will hold characters with precisely the same shape. The point when the characters are duplicated from an alternate archive with alternate font properties. The fraud belongs to the forgery process below. (a) Copy and paste technique (b) Imitation technique Figure 1(Extract from: http://refbase.cvc.uab.es/files/BGR2013.pdf)

More about Creation and Verification of Paper Based Certificates with Signatures

Open Document