-
Essay / Creation and verification of paper certificates...
CREATION AND VERIFICATION OF PAPER CERTIFICATES WITH SIGNATURE.Creation of the signature on the issuing certificateAccording to Murthy et al. (2011), the vital information that must be entered in this article, such as unique number, registration number, first name, middle name, last name, father's name, year of passage and the marks obtained) must be considered as an entry m. Then, m is hashed with a secure hashing algorithm (SHA-1) to create an md hash value. The md hash value is then encrypted using the private key of the issuing authority and the digital signature turns out to be an encrypted value (ds). Finally, ds is converted to BC barcode and then printed with the required information on the certificate.Signature Verification(Retrieved from: http://www.iaeng.org/publication/WCECS2011/WCECS2011_pp33-35.pdf)Model of certificate(Retrieved from: http://www.iaeng.org/publication/WCECS2011/WCECS2011_pp33-35.pdf)Certificate VerificationVital information which belongs to the appropriate candidate mentioned in the above procedure is considered entered m. On the other hand, m is hashed with a secure hashing algorithm (SHA-1) to create the hash value md1. The BC barcode which is normally available on the particular certificate is concerted into ASCII ds code then decrypted with the public key of the issuing authority which gives an md2 value. Differentiate between md1 and md2. The certificate is treated as false if md1 does not match md2; otherwise, it is authentic and original.Scanner identification with extension to counterfeit detectionAccording to Khanna et al. (2006), Digital images can be taken from different digital cameras and scanners. Nowadays, ...... middle of paper ...... line level. A generic method has been proposed which, in turn, avoids the use of a dedicated document template or record source pooling, as we have to deal with unknown document types. With the help of SEP counterfeiting, it is possible to produce fake documents. However, the fraudster may favor two techniques to create a fraudulent document: • Copy and paste a fake: a set of characters is replicated from the document and pasted on another region to restore or include data, as shown in the figure below below. As a result, the last fake scanned document will contain characters with exactly the same shape. The point at which characters are duplicated from an alternate archive with alternate font properties. Fraud belongs to the counterfeiting process below.(a) Copy-paste technique(b) Imitation techniqueFigure 1(Retrieved from: http://refbase.cvc.uab.es/files/BGR2013.pdf)