creation and verification of paper certificates with signature.Creation of signature on the issuing certificateAccording to Murthy et al. (2011), the vital information to be entered in this document such as unique number, registration number, first name, middle name, last name, father's name, passing year and marks obtained) must be considered as an input m. Next, m is hashed with a secure hashing algorithm (SHA-1) to create a hash value md. The md hash value is then encrypted using the issuing authority's private key and the digital signature is an encrypted value (ds). Finally, the ds is converted into a BC barcode and then printed along with the required information on the certificate.Signature Verification(Retrieved from: http://www.iaeng.org/publication/WCECS2011/WCECS2011_pp33-35.pdf) Certificate Template(Retrieved from: http://www.iaeng.org/publication/WCECS2011/WCECS2011_pp33-35.pdf)Certificate VerificationVital information belonging to the appropriate candidate mentioned in the above procedure is considered input m. On the other hand, m is hashed with a secure hashing algorithm (SHA-1) to create the hash value md1. The BC barcode normally available on the particular certificate is bundled into the ASCII ds code and then decrypted with the issuing authority's public key providing an md2 value. Make the difference between md1 and md2. The certificate is considered false if md1 does not match md2; otherwise it is authentic and original. Scanner identification with extension to forgery detection According to Khanna et al. (2006), Digital images can be acquired by various digital cameras and scanners. Nowadays,...... middle of paper...... line level. A generic method has been proposed which in turn avoids the use of dedicated document templates or record source groupings since we have to deal with unknown document types. With the help of SEP forgery it is possible to produce fake documents. However, the fraudster may prefer two techniques to create a fraudulent document: • Copy and paste forgery: A series of characters is replicated from the document and stuck in an alternative area to restore or include data as demonstrated in the figure below. As a result, the last scanned fake document will contain characters with exactly the same shape. The point at which fonts are duplicated from an alternate store with alternate font properties. Fraud falls under the forgery process below. (a) Copy and paste technique (b) Imitation technique Figure 1 (Retrieved from: http://refbase.cvc.uab.es/files/BGR2013.pdf)
tags