Printed Document Integrity Verification Using Barcode

979 Words2 Pages

1.0 INTRODUCTION Data is a collection of facts and statistical that can be used for reference, analysis and as knowledge [1]. Data has been preserved in digital and analog world. Even until now people are still preserving data in the analog world using paper documents such as newspaper, books, printed records and much more. But the world is becoming paperless and data preservation in digital form becomes popular. However, printed documents to represent information such as birth certificates, educational transcript and certificates, land titles, official letters, wills, contracts and many more are still relevant. Data or information must be secured from attacks or unauthorized access. There are many techniques that have been used to protect digital data and one of the available techniques that is widely used is cryptography. There are also steganography techniques that have been used for data hiding into objects such as images, audio, video and even within text. Data in analog world are susceptible to attacks. Threats on printed documents such as counterfeiting and forgeries are common threats to printed document security [2][3]. Printed documents are often being forged, altered or faked to deceive intended parties who thought that the documents are real in order to gain benefits from it such as cases happened in US where two criminals mistakenly released due to forged court orders [2] and illegal immigrants from India able to seek employment in Malaysia using counterfeit social visit passes [3]. This paper is organized as follows; Section 2.0 describes current security issues in printed documents, Section 3.0 focuses on related works in printed document security, Section 4.0 discusses the proposed conceptual solution and Secti... ... middle of paper ... ...Journal of Wisdom Based Computing. Vol. 1 (3), 68-76. [20] Laine, M. and Nevalainen, O. S. (2006). A STANDALONE OCR SYSTEM FOR MOBILE CAMERAPHONES. The 17th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications. 11-14 September. Helsinki, Finland : IEEE, 1-5. [21] Preneel, B. (2003). Analysis and Design of Cryptographic Hash Functions. Doctor of Philosophy. Katholieke Universiteit Leuven, Belgium. [22] Gilbert, H. and Handschuh, H. (2004). Security Analysis of SHA-256 and Sisters.10th Annual International Workshop, SAC 2003. 14-15 August. Ottawa, Canada, 175-193. [23] Yoshida, H. and Biryukov, A. (2006). Analysis of a SHA-256 Variant. In Preneel, B. and Tavares, S. (Ed.) Selected Areas in Cryptography (pp.245-260). Berlin-Heidelberg : Springer. [24] Forouzan, B. A. (2008). Cryptography and Network Security (InternationalAEdition).

Open Document