Multi-Format Document Verification System
Keywords:
Digital signatures, content extraction, image processing, blockchain, decentralized storage, forgery detection, 2d barcodesAbstract
The spread of fake documents claiming to be from official sources on social media has led to increasing levels of skepticism and uncertainty in modern society. Currently, there is no easy access method of verification for documents that can be adopted by the public. This paper proposes a method of a multi-format document verification scheme using digital signatures and blockchain. We employ digital signature algorithms to sign document contents extracted using Optical Character Recognition (OCR) methods and attach this signature to the document by converting it into a 2D barcode format. This code can then be used on a shared document to retrieve the document’s digital signature and OCR can be used to verify the signature. In addition to this, we also provide an alternative method of verification in the form of forgery detection techniques. These signed documents are stored in a decentralized storage solution backed by blockchain technology, increasing the solution's overall reliability and security.
References
. S. Nelatury, “Digital forgery,” no. May 2017, 2018.
. S. Vosoughi, D. Roy, and S. Aral, “News On-line,” Science (80-. )., vol. 1151, no. March, pp. 1146–1151, 2018.
. W. DIEKE, “Die Klinik der Seifenaborte. Bemerkungen zur Arbeit von Dr. Horst Scholz,” Arztl. Wochensch., vol. 7, no. 26, pp. 611–613, 1952.
. K. K. Ezéchiel, S. Kant, and R. Agarwal, “A systematic review on distributed databases systems and their techniques,” J. Theor. Appl. Inf. Technol., vol. 97, no. 1, pp. 236–266, 2019.
. M. Xu, X. Chen, and G. Kou, “A systematic review of blockchain,” Financ. Innov., vol. 5, no. 1, 2019.
. A. Tenorio-Fornés, S. Hassan, and J. Pavón, “Open peer-to-peer systems over blockchain and IPFS: An agent oriented framework,” CRYBLOCK 2018 - Proc. 1st Work. Cryptocurrencies Blockchains Distrib. Syst. Part MobiSys 2018, pp. 19–24, 2018.
. S. Khatal, J. Rane, D. Patel, P. Patel, and Y. Busnel, “FileShare: A Blockchain and IPFS Framework for Secure File Sharing and Data Provenance,” pp. 825–833, 2021.
. A. Nair, “Overview of Tesseract OCR engine An overview of Tesseract OCR Engine Seminar Report Akhil S B130625CS Department of Computer Science and Engineering National Institute of Technology , Calicut Monsoon-2016,” no. December 2016, 2017.
. B. Li and L. Han, “Distance weighted cosine similarity measure for text classification,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 8206 LNCS, pp. 611–618, 2013.
. A. Drmic, M. Silic, G. Delac, K. Vladimir, and A. S. Kurdija, “Evaluating robustness of perceptual image hashing algorithms,” 2017 40th Int. Conv. Inf. Commun. Technol. Electron. Microelectron. MIPRO 2017 - Proc., pp. 995–1000, 2017.
. C. J. Muller and R. F. Maclehose, “Estimating predicted probabilities from logistic regression: Different methods correspond to different target populations,” Int. J. Epidemiol., vol. 43, no. 3, pp. 962–970, 2014.
. O. Andersson and S. R. Marquez, “A comparison of object detection algorithms using unmanipulated testing images: Comparing SIFT, KAZE, AKAZE and ORB,” 2016.
. F. Ahmad and L. M. Cheng, Paper Document Authentication Using Print-Scan Resistant Image Hashing and Public-Key Cryptography, vol. 11611 LNCS, no. July. Springer International Publishing, 2019.
. M. Warasart and P. Kuacharoen, “Paper-based Document Authentication using Digital Signature and QR Code,” 4TH Int. Conf. Comput. Eng. Technol., vol. 40, no. January, pp. 94–98, 2012.
. N. Nizamuddin, H. R. Hasan, and K. Salah, “IPFS-blockchain-based authenticity of online publications,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 10974 LNCS, no. June, pp. 199–212, 2018.
. M. Alidoost Nia, A. Sajedi, and A. Jamshidpey, “An Introduction to Digital Signature Schemes,” no. April, 2011.
. A. Singhal and R. S. Pavithr, “Degree Certificate Authentication using QR Code and Smartphone,” Int. J. Comput. Appl., vol. 120, no. 16, pp. 38–43, 2015.
. Pycryptodome, “ECC.” [Online]. Available: https://pycryptodome.readthedocs.io/en/latest/src/public_key/ecc.html.
Downloads
Published
How to Cite
Issue
Section
License
Authors who submit papers with this journal agree to the following terms.