Corpus ID: 1705384

Paper-based Document Authentication using Digital Signature and QR Code

@inproceedings{Warasart2012PaperbasedDA,
  title={Paper-based Document Authentication using Digital Signature and QR Code},
  author={Maykin Warasart and Pramote Kuacharoen},
  year={2012}
}
There are still needs for paper-based documents in certain circumstances where electronic documents cannot efficiently replace them. [...] Key Method The proposed method can be automatic or semi-automatic. It is semi-automatic when the OCR is not accurate and it requires the user to visually compare the text message on the paper and the one obtained from the QR code; however, this method does provide convenience for the user in dealing with a large amount of documents.Expand
An Implementation of a Paper Based Authentication Using HC2D Barcode and Digital Signature
TLDR
This paper presents a paper-based document authentication by applying a digital signature and HC2D barcode to verify the integrity of the text message and the sender of the document. Expand
On Paper Digital Signature (OPDS)
TLDR
This paper presents a novel scheme for securing the authenticity and originality of certificates issued by an authority by implementing unique digital signatures created from the selected contents (words or characters) of the documents. Expand
Performance analysis and security dependence of on paper digital signature using random and critical content
TLDR
This paper presents a reliable and simple method for authenticating the content of a paper document by implementing an on paper digital signature that employs an online document verification system and the unauthorized access is denied by the user authentication mechanism. Expand
Authentication of Printed Document Using Quick Response (QR) Code
TLDR
A unique QR Code is created by utilising AES and SHA-256 that are difficult to produce by other people so that the authenticity of information about document content can be guaranteed and easily validated. Expand
Paper Document Authentication Using Print-Scan Resistant Image Hashing and Public-Key Cryptography
TLDR
Digital signature, extracted from a QR code, is decrypted with the public key of trusted authorities for identity verification, thus provides offline verification of printed documents without the need of online network access or database. Expand
Authentication of Physical Objects with Dot-Based 2 D Code
Counterfeit goods and documents are a global problem, which needs more and more sophisticated methods of resolving it. Existing techniques using watermarking or embedding symbols on objects are notExpand
IoT-based real time signature authentication and transfer from document to document with DNA encryption
TLDR
A way in which a person can sign a document in a particular place, and have it reflect simultaneously on a similar document elsewhere, in real time, is suggested by using the Internet of Things. Expand
Fast Offline Signature Verification using QR Code on Printed Cheques: A Review
TLDR
A survey of various approaches related to offline signature verification system using QR codes for bank cheques is presented and a quick response offline verification system is developed using QR Code for banking cheques. Expand
QR Code Integrity Verification Based on Modified SHA-1 Algorithm
TLDR
The modified SHA-1 algorithm was applied in the data integrity verification process of certificates with QR code technology and it was identified that the application successfully generated QR codes, printed certificates, and verified certificates with 100% accuracy. Expand
Paper-based Verification Design of Trade Business License in Indonesia
TLDR
The current paper presents a design that allows paper-based verification of the printed trade business license and implemented digital signature with QR Code image that placed into the document and the digital certificate issued by a certification authority (CA). Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 11 REFERENCES
On Automatic Authenticity Verification of Printed Security Documents
TLDR
Results show that a polynomial kernel based SVM gives about 99.5% accuracy discriminating duplicate cheques from genuine ones, which strongly attests the viability of the proposed approach for machine authentication of printed security documents. Expand
Paper based document security-a review
Inspection of documents and valuable products for authenticity can be divided into three categories: first line inspection-the inspection of the document or product with the human senses only withoutExpand
Barcode readers using the camera device in mobile phones
TLDR
New algorithms and the implementations of image reorganization for EAN/QR barcodes in mobile phones are shown and the introduced algorithm is based on the code area found by four corners detection for 2D barcode and spiral scanning for 1D barcodes using the embedded DSP. Expand
Design and Analysis of Methods for Signing Electronic Documents Using Mobile Phones
Mobile phones have become essential for modern living. They have influenced the way we live. Besides using a mobile phone to communicate, we use it to take pictures, listen to music, watch video,Expand
The QR-code reorganization in illegible snapshots taken by mobile phones
  • A. Sun, Yan Sun, Caixing Liu
  • Computer Science
  • 2007 International Conference on Computational Science and its Applications (ICCSA 2007)
  • 2007
TLDR
An algorithm for the analysis and correction of the distorted QR barcode (QR-code) image is given and a detail description on how to use inverse perspective transformation in rebuilding a QR-code image from a distorted one is given. Expand
Understanding 2D-BarCode Technology and Applications in M-Commerce - Design and Implementation of A 2D Barcode Processing Solution
TLDR
A research project to develop a 2D-barcode processing solution to support mobile applications is reported and the application examples, and case study using the solution are presented. Expand
Implementation of algorithm to decode two-dimensional barcode PDF-417
  • H. Hahn, J. Joung
  • Computer Science
  • 6th International Conference on Signal Processing, 2002.
  • 2002
TLDR
A novel method to extract the bar-space patterns directly from the gray-level bar code image, which employs the location and the distance between extreme points of each row of the barcode image, to be very robust for high convolution distortion environments such as defocussing and warping. Expand
Choosing Best Hashing Strategies and Hash Functions
  • Mahim Singh, D. Garg
  • Computer Science
  • 2009 IEEE International Advance Computing Conference
  • 2009
TLDR
The paper gives the guideline to choose a best suitable hashing method hash function for a particular problem and presents six suitable various classes of hash functions in which most of the problems can find their solution. Expand
Digital Signature Standard (DSS), FIPS PUB 186-3
  • Digital Signature Standard (DSS), FIPS PUB 186-3
  • 2009
RSA Cryptography Standard, PKCS #1 v2
  • RSA Cryptography Standard, PKCS #1 v2
  • 2002
...
1
2
...