Abstract
Paper-based documents are important and still widely used in government agencies and private entities as some documents cannot be replaced by electronic documents. These include loan agreements, dispatch or contracts, household registrations and passports. They must be paper-based. Paper-based documents can be easily forged with a printer and a scanner, and imaging software can easily edit them. This paper presents a paper-based document authentication by applying a digital signature and HC2D barcode to verify the integrity of the text message and the sender of the document. This is useful both for a quick inspection of documents with large quantities and monitoring that may help prevent fraud and forgery which may have occurred.
Keywords
Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
van Renesse, R.L.: Paper-based document security–A Review. In: European Conf. on Security and Detection (1997)
Garain, U., Halder, B.: On automatic authenticity verification of printed security documents. In: 6th Indian Conf. on Comput. Vision, Graphics & Image Process., pp. 706–713 (2008)
Gao, J.Z., Prakash, L., Jagatesan, R.: Understanding 2D-BarCode Technology and Applications in M-Commerce – Design and Implementation of A 2D Barcode Processing Solution. In: 31st Annual Intl. Computer Software and Applications Conference (COMPSAC 2007), Beijing, July 24-27 (2007)
Warasart, M., Kuacharoen, P.: Paper-based Document Authentication using Digital Signature and QR Code. In: International Proceedings of Computer Science and Information Technology, International Conference on Computer Engineering and Technology, vol. 40, pp. 94–98 (2012) ISSN 2010-460X
QR Code, http://www.denso-wave.com/qrcode/
Rong, C., et al.: Coding Principle and Implementation of Two-Dimensional PDF417 Bar code. In: 6th IEEE Conference on Industrial Electronics and Applications, pp. 466–468 (2011)
Ke, H., Zhang, G.: An Algorithm Correcting Flex Distortion of Aztec Code. In: 2nd IEEE International Conference on Information Management and Engineering, pp. 457–460 (2010)
Biao, L.: A DataMatrix-based mutant code design and recognition method research. In: Proceedings of the 4th International Conference on Image and Graphics, pp. 570–574 (2007)
Data Matrix, http://en.wikipedia.org/wiki/Data_Matrix
Subpratatsavee, P., Kuacharoen, P.: An Implementation of a High Capacity 2D Bar-code. In: Papasratorn, B., Charoenkitkarn, N., Lavangnananda, K., Chutimaskul, W., Vanijja, V. (eds.) IAIT 2012. CCIS, vol. 344, pp. 159–169. Springer, Heidelberg (2012)
Mamidi, S., et al.: Instruction Set Extensions for Reed-Solomon Encoding and Decoding. In: 16th IEEE International Conference on Application-Specific Systems, Architecture Processors, pp. 364–369 (2005)
Islam, M.R., Ahsan Rajon, S.A.: An Enhanced for Lossless Compression of Short Text for Resource Constrained Devices. In: 14th International Conference on Computer and Information Technology, pp. 292–297 (2011)
Singh, M., Garg, D.: Choosing best hashing strategies and hash functions. In: Int. Advance Computing Conf., pp. 50–55 (2009)
Kuacharoen, P.: Design and Analysis of Methods for Signing Electronic Documents Using Mobile Phones. In: International Conference on Computer Applications and Network Security (ICCANS 2011), pp. 154–158 (May 2011)
RSA Cryptography Standard, PKCS #1 v2.1 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 IFIP International Federation for Information Processing
About this paper
Cite this paper
Subpratatsavee, P., Kuacharoen, P. (2014). An Implementation of a Paper Based Authentication Using HC2D Barcode and Digital Signature. In: Saeed, K., Snášel, V. (eds) Computer Information Systems and Industrial Management. CISIM 2015. Lecture Notes in Computer Science, vol 8838. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45237-0_54
Download citation
DOI: https://doi.org/10.1007/978-3-662-45237-0_54
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-45236-3
Online ISBN: 978-3-662-45237-0
eBook Packages: Computer ScienceComputer Science (R0)