International Journal of Advances in Science, Engineering and Technology(IJASEAT)
.
Follow Us On :
current issues
Volume-12,Issue-1  ( Jan, 2024 )
Past issues
  1. Volume-12,Issue-1  ( Jan, 2024 )
  2. Volume-11,Issue-4  ( Oct, 2023 )
  3. Volume-11,Issue-3  ( Jul, 2023 )
  4. Volume-11,Issue-2  ( Apr, 2023 )
  5. Volume-11,Issue-1  ( Jan, 2023 )
  6. Volume-10,Issue-4  ( Oct, 2022 )
  7. Volume-10,Issue-3  ( Jul, 2022 )
  8. Volume-10,Issue-2  ( Apr, 2022 )
  9. Volume-10,Issue-1  ( Jan, 2022 )
  10. Volume-9,Issue-4  ( Oct, 2021 )

Statistics report
Apr
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
  Journal Paper


Paper Title :
Document Authentication And Verification

Author :Namita Sarode, Reshma Shendge, Komal Kankariya, Vishal Khatal

Article Citation :Namita Sarode ,Reshma Shendge ,Komal Kankariya ,Vishal Khatal , (2014 ) " Document Authentication And Verification " , International Journal of Advances in Science, Engineering and Technology(IJASEAT) , pp. 19-23, Volume-2,Issue-2

Abstract : Abstract— The leading problem in passport, driving license, identity card authentication is to authenticate the document for its owner. The captious factor of this authentication procedure is to establish a correspondence between document's photo and its owner. A document contains holder details in supplement to the holder’s signature. We put forth an authentication scheme by extracting some details of the holder including number, name, and other relevant details converting them into a watermark and digesting them in a form by applying some techniques that can be hidden in the photo. The computers have revolutionized the document authentication process by using the computer in fixing the photo on the document during the issuing of document and also verifying the document by scanning it. During the issue of any document, a watermark can be created based on the details of the holder full name and unique number and it can be hidden in the photo on the document using watermarking technique. By using this technique, during the document verification process, computer can be used in scanning the photo to check whether the photo has been replaced by comparing the invisible watermark hidden in the photo with the holder’s details including the full name and other relevant details. Because this technique has used only one pixel for hiding the watermark, it satisfied the robustness against image compression.

Type : Research paper

Published : Volume-2,Issue-2


DOIONLINE NO - IJASEAT-IRAJ-DOIONLINE-617   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 39
| Published on 2014-04-16
   
   
IRAJ Other Journals
IJASEAT updates
Volume-11,Issue-4 (Oct,2023)
The Conference World

JOURNAL SUPPORTED BY