241,301 research outputs found
Printed document integrity verification using barcode
Printed documents are still relevant in our daily life and information in it must be protected from threats and attacks such as forgery, falsification or unauthorized modification. Such threats make the document lose its integrity and authenticity. There are several techniques that have been proposed and used to ensure authenticity and originality of printed documents. But some of the techniques are not suitable for public use due to its complexity, hard to obtain special materials to secure the document and expensive. This paper discuss several techniques for printed document security such as watermarking and barcode as well as the usability of two dimensional barcode in document authentication and data compression with the barcode. A conceptual solution that are simple and efficient to secure the integrity and document sender's authenticity is proposed that uses two dimensional barcode to carry integrity and authenticity information in the document. The information stored in the barcode contains digital signature that provides sender's authenticity and hash value that can ensure the integrity of the printed document
Digital Signatures Chain and El Gamal Scheme Integration for Data Transmission Integrity in Digital Transaction
Digital signatures have been widely used by both private and government agencies. However, the use of chain digital signatures is still not widely used, especially in the military world. This results in a lack of ability to ensure data integrity, where it will be difficult to find out who has made changes to the document and to find out the original source of the document. This paper proposes a digital signature chain as a solution to guarantee data authenticity and prevent tampering during transmission. This technique involves creating a chain of digital signatures that are attached to data before it is sent over the network. The proposed method is expected to provide a more secure and efficient way to ensure data integrity, compared to traditional methods such as encryption and checksums. This paper evaluates the effectiveness of the proposed method through a series of experiments and shows that digital signature chains are an effective and reliable way to secure and maintain data transmission over networks. The proposed research aims to evaluate the effectiveness of digital signature chain technology in ensuring data security and integrity and to provide recommendations for its implementation
Document Delivery System in Digital Environment
Today information technology has greatly enhanced access to information by automating its organization, storage and retrieval. Lots of work has been done in the field of document delivery system also. This paper discusses the pros and cons of document delivery system in digital environment. It mainly focuses on the various kinds of technologies involved in document delivery system. Also describes issues like intellectual property rights, obstacles to document delivery, document integrity, bibliographic control, document archives, etc.Documentation Research and Training Centre
ARCHANGEL: Trusted Archives of Digital Public Documents
We present ARCHANGEL; a de-centralised platform for ensuring the long-term
integrity of digital documents stored within public archives. Document
integrity is fundamental to public trust in archives. Yet currently that trust
is built upon institutional reputation --- trust at face value in a centralised
authority, like a national government archive or University. ARCHANGEL proposes
a shift to a technological underscoring of that trust, using distributed ledger
technology (DLT) to cryptographically guarantee the provenance, immutability
and so the integrity of archived documents. We describe the ARCHANGEL
architecture, and report on a prototype of that architecture build over the
Ethereum infrastructure. We report early evaluation and feedback of ARCHANGEL
from stakeholders in the research data archives space.Comment: Submitted to ACM Document Engineering 201
Электронная цифровая подпись файлов PDF
A digital signature is a mathematical scheme for demonstrating the authenticity of a digitalmessage or document. A valid digital signature gives a recipient reason to believe that the message was createdby a known sender, such that the sender cannot deny having sent the message (authentication and nonrepudiation)and that the message was not altered in transit (integrity). Digital signatures are commonly usedfor software distribution, financial transactions, and in other cases where it is important to detect forgery ortampering
Penerapan Elliptic Curve Digital Signature Algorithm pada Tanda Tangan Digital dengan Studi Kasus Dokumen Surat – Menyurat
Changes in the pattern of human life through electronic digital media are the impact of very rapid technological developments, one of which is the change in patterns from paper to paperless. At the same time as the COVID-19 pandemic, which affected policies in most areas of employment and education, this was done online, so electronic documents were often used in every process in these fields. As in the case of administrative correspondence or other document exchange transactions. And the authenticity of the document is needed by using a mechanism, one of which is a digital signature. Digital signatures can assist in the process of maintaining the confidentiality, authentication, disclaimer, integrity and validity that signatures in a document have been sent and received. By utilizing the Elliptic Curve Digital Signature Algorithm (ECDSA) digital signature algorithm for encryption and decryption processes to improve data security and authentication. The final representation of the digital signature is applied to the correspondence document with PDF type, using the Python ECDSA programming language as the system running process.
Keywords: Digital Signature, ECDSA, Encryption, Decryption, Electronic Documen
Проверка подлинности электронных подписей в PDF файлах
A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. A valid digital signature gives a recipient reason to believe that the message was created by a known sender, such that the sender cannot deny having sent the message (authentication and nonrepudiation) and that the message was not altered in transit (integrity). Digital signatures are commonly used for software distribution, financial transactions, and in other cases where it is important to detect forgery or tampering
Paper-based Verification Design of Trade Business License in Indonesia
The trade business license certificate (SIUP) is a paper-based license to conduct trade businesses in Indonesia issued by the government. Until today, there is no mechanism for verifying the validity of document unless to verify it manually. The current paper presents a design that allows paper-based verification of the printed trade business license. It aims to provide the verification mechanism and ensure the document validity. Our design implemented digital signature with QR Code image that placed into the document and the digital certificate issued by a certification authority (CA). The proposed scheme generated 442Bytes of data and version 14 of QR Code to scan easily by a reader device. The experimental result indicates that our scheme is easy and feasible to implement in Indonesia with guaranteed the document integrity, authentication, and nonrepudiation
AES (Advanced Encryption Standard) and RSA (Rivest–Shamir–Adleman) Encryption on Digital Signature Document: A Literature Review
Distributed digital documents, it can utilize cryptographic methods to provide confidentiality, data integrity, authentication and non repudiation services. Watermark in this case serves as authentic proof of ownership of the data or document, and its existence should not damage or change the contents or counter of digital data or digital documents. The RSA and AES encryption methods in digital signatures are appropriate to be taken as a reliable method. But a unique biometric key idea emerged, one of which was used to authenticate users
Experimental quantum secure network with digital signatures and encryption
Cryptography promises four information security objectives, namely,
confidentiality, integrity, authenticity, and non-repudiation, to support
trillions of transactions annually in the digital economy. Efficient digital
signatures, ensuring the integrity, authenticity, and non-repudiation of data
with information-theoretical security are highly urgent and intractable open
problems in cryptography. Here, we propose a protocol of high-efficiency
quantum digital signatures using secret sharing, one-time universal
hashing, and the one-time pad. We just need to use a 384-bit key to sign
documents of up to lengths with a security bound of . If
one-megabit document is signed, the signature efficiency is improved by more
than times compared with previous quantum digital signature protocols.
Furthermore, we build the first all-in-one quantum secure network integrating
information-theoretically secure communication, digital signatures, secret
sharing, and conference key agreement and experimentally demonstrate this
signature efficiency advantage. Our work completes the cryptography toolbox of
the four information security objectives.Comment: 19 pages, 7 figures, 4 tables. Quantum digital signatures and quantum
private communication maintain a consistent level of practicalit
- …