SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1944
Keep It – A system to store certificates and develop a profile
Amal Shaju1, Arun Joseph2, Smitha Joseph3
1,2 B.Tech Student, Dept. of Computer Science Engineering, Sahrdaya College of Engineering & Technology,
Kerala, India
3 Assistant Professor, Dept. of Computer Science Engineering, Sahrdaya College of Engineering & Technology,
Kerala, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract – Keep-It is a certificate wallet which is an
alternative to reduce workload in carrying certificate with
us. We store the certificates of different formats like
medical, professional, birth, driving license, course
certificates etc. The keep it will have separate profile which
is verified and authenticated using norms and conditions of
each individual and have separate area for uploading the
certificates. The certificate uploaded are original copy and it
is secured with a digital signature for security reasons and
later the file cannot be tampered. The profile will generate a
link where the other user can view profile and certificates he
holds in the wallets. As this wallet is a web application it is
easy to swap between pages and can be run on any device,
also the web app can be added to home screen as an
application for later time use. The password of the wallet
can also be stored and user can access the wallet even
offline and changes made will be effected when internet is
available.
1. INTRODUCTION
A Certificate of any type is a document or seal certifying
the authenticity of something, it can be any type of
certificate academic, medical, professional, birth, driving
etc. A Certificate Wallet refers to an electronic device that
allows an individual to store certificates of any type in a
wallet. This includes certificate with a verification id, so if
the certificate uploaded to the wallet is authenticated by
an authority or an organization. The certificate holds a
digital signature which is valid digital signature gives a
recipient reason to believe that the message was created
by a known sender (authentication), that the sender
cannot deny having sent the message. Advanced marks are
most usually utilized as a part of the fields programming
dissemination, budgetary exchanges, contract
administration programming, and in some different
situations where it is important to recognize falsification
or altering or some other interruptions. Advanced marks
utilize topsy-turvy cryptography.
A profile tells individuals that a record of open intrigue is
true. A record might be confirmed on the off chance that it
is resolved to be a record of open intrigue. Normally this
incorporates accounts kept up by clients in music, acting,
mold, government, legislative issues, religion, news
coverage, media, games, business, and other key intrigue
territories. The web application is brisk and responsive
with the end goal that once the page is stacked the
swapping between the pages does not require some other
downloading of information since this done utilizing
precise. The site page can be included as a symbol the
home screen.
A confirmed client approach Certification wallet Analytics.
Presently, anybody can gain admittance to Certification
wallet systematic through the typical channels, however
that includes turning into a promoter. Keeping in mind the
end goal to be qualified to be a publicist, you require to be
in particular areas where Twitter permits publicizing.
Certain nations aren't qualified, for instance. You can see
the list here. Your record additionally should be genuinely
dynamic; you can't join and turn into a publicist inside a
day, or even seven days.
The principle advantage of confirmation, obviously, is the
believe it accompanies. When you're confirmed, the wallet
of this record is who it cases to be." This is imperative
when it's extraordinarily simple to make a record with a
minor error or extra word in the URL, utilize a similar
show name and picture as another substance, and
continue acting like that element. Confirmation isn't an
ideal answer for this issue. All things considered, you must
be confirmed to get that sign of trust, and only one out of
every odd business can be checked. This once in a while
returns to hurt private companies, whose more wise
group of onlookers individuals won't not put stock in due
to their absence of confirmation. Of course, on the other
side, if confirmation worked constantly, frauds wouldn't
be fruitful. Indeed, even checked organizations get fakers
that effectively trick clients, since clients, in general, aren't
extremely canny. They won't not know or they won't not
mind what that blue check stamp means, thus they never
acknowledge they're giving their data to a sham demand
from the client of such records along these lines, you'll
need to evacuate that assurance all together.
Verification is likewise fantastically critical for client
outreach. On the off chance that it is a business kind of
authentication or instructive testament you need to
confirm it by an outsider or an association and include a
computerized signature with encryption procedures to
guarantee the genuineness of the endorsement, you nearly
must be checked. No sagacious client will give an ounce of
individual data to a record that doesn't have a
confirmation check, paying little respect to how
dependable they look. I do need to determine keen clients,
obviously; numerous less wise clients do substantially less
shrewd things consistently.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1945
2. SYSTEM ANALYSIS
In the analysis it is a way toward concentrate a strategy or
business with a specific end goal to distinguish its
objectives and purposes and make frameworks and
methods that will accomplish them in an effective way.
Another view sees framework examination as a critical
thinking procedure that disintegrates a framework into its
segment pieces with the end goal of the concentrate how
well those segment parts work and communicate to
achieve their motivation. Examination and union, as
logical techniques, dependably go as one; they supplement
each other. Each union expands upon the consequences of
a first examination, and each investigation requires a
consequent blend keeping in mind the end goal to confirm
and remedy its outcomes.
2.1 EXISTING SYSTEM
There is just a single frameworks existing at this point. It is
an administration site named DIGILOCKER where u can
simply transfer authentications. The framework needs
security issues and helps us to believe the authentications
since it isn't a checked profile and any individual can
control information in the locker, its only a locker idea of
putting away the declarations can be altered and may not
be unique duplicate. DigiLocker is an "advanced locker"
benefit worked by the Government of India that empowers
Indian natives to store certain official records on the
cloud.
This framework offers just less stockpiling which is 1 GB
of storage room is offered to clients to store recognizable
proof card issued by government offices, instruction
endorsements, PAN cards, driving permit, vehicle
proprietorship records and some different archives.
Clients need to have an Aadhar card to utilize DigiLocker.
For join, the Aadhar card number and the one-time secret
word sent to the Aadhar-related versatile number, should
be entered. For later log-ins, the client can set their own
particular secret word it interface the record to Facebook
or Google logins. The beta variant of the administration
was taken off in February 2015,and propelled by the
Prime Minister on 1 July 2015.
There is just 1 frameworks existing at this point. It is an
administration site named DIGILOCKER where u can
simply transfer endorsements. The framework needs
security issues and helps us to believe the endorsements
since it isn't a confirmed profile and any individual can
control information in the locker, its only a locker idea of
putting away the authentications can be altered and may
not be unique duplicate. DigiLocker is a "computerized
locker" benefit worked by the Government of India that
empowers Indian nationals to store certain official records
on the cloud. This framework offers just less stockpiling
which is 1 GB of storage room is offered to clients to store
distinguishing proof card issued by government offices,
instruction declarations, PAN cards, driving permit,
vehicle possession records and some different archives.
Clients need to have an Aadhar card to utilize DigiLocker
2.2 PROPOSED SYSTEM
A Certificate Wallet alludes to an electronic gadget that
enables a person to store authentications of any sort in a
wallet. This incorporates endorsement with a
confirmation id, so if the declaration transferred to the
wallet is validated by an expert or an association. The
declaration holds a computerized signature which is a
numerical plan for showing the genuineness of advanced
messages or records. An authentic propelled stamp gives a
recipient inspiration to assume that the message was
made by a known sender (confirmation) , that the sender
can't deny having sent the message (non-disavowal), and
that the message was not balanced in movement.
Advanced marks are a standard component of most
(cryptographic convention) suites, and are normally
utilized for programming dispersion, budgetary
exchanges, contract administration programming, and in
different situations where it is imperative to identify
phony or altering.
Wallet essentially is outlined in type of a wallet utilizing
Typescript and Angular into a Web Application with the
goal that it is anything but difficult to utilize and can be
gotten to from any gadget. The wallet idea is basic as that
it can hold any kind of testament of our decision whether
it is of instructive, affirmation course declaration,
restorative, proficient or any looked for can be put away
and saw by the clients like a wallet we convey. The profile
will have a connection created and this connection will be
the URL to the profile and the profile is checked by an
association or by other security and confirmation criteria
the site gives .Though it is a Web Application it has
awesome favorable position of client clicks "Add to home
screen", they will see the application being included the
home screen. Confirmation of the wallet is likewise
extraordinarily vital for client outreach.
On the off chance that it is a business sort of declaration or
instructive endorsement you need to confirm it by an
outsider or an association and include an advanced mark
with encryption systems to guarantee the legitimacy of the
authentication, you nearly must be checked. No astute
client will give an ounce of individual data to a record that
doesn't have a confirmation check, paying little mind to
how dependable they look. I do need to determine canny
clients, obviously; numerous less clever clients do
substantially less insightful things consistently.
3. SYSTEM DESIGN
The wallet KEEP-IT will be advanced pocket to hold
testament in computerized arrange where it can be gotten
to through a URL and this connection will be produced by
the watcher who needs the sort of declarations as
indicated by the class of endorsements. This module
comprise of how authentications are ordered by the kind
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1946
of the declaration and this will be in the organization of
any kind let it be testaments of scholastics, medicinal,
proficient, birth ,driving and so forth. A Certificate Wallet
alludes to an electronic gadget that enables a person to
store testaments of any sort in a wallet. This incorporates
testament with a confirmation id, so if the declaration
transferred to the wallet is validated by a specialist or an
association.
The authentication holds an advanced mark which is
substantial computerized signature gives a beneficiary
motivation to trust that the message was made by a
known sender (authentication), that the sender can't deny
having sent the message and that the message was not
adjusted in travel. Advanced marks are a standard
component of most suites, and are normally utilized for
programming dispersion, money related exchanges,
contract administration programming, and in different
situations where it is vital to recognize fraud or altering.
The Project we are creating has two modules mainly:
1 Profile view and Add certificate
2 Authentication and Digital signature
Fig – 1 : Flowchart of system
3.1 Profile View and Add Certificates
Each profile will have isolate see as per the client it might
be ensured or open profile and individuals with the sort
will have the capacity to see the profile in the way he
needs for ex: on the off chance that it is instructive client
he will have the capacity to see instructive endorsements
through the connection gave to him from the other client,
profile of each client has a connection created and this
connection is the thing that we are utilizing as a diverting
technique to the profile, utilization of this connection is
that we can utilize this connection even in resumes and as
an individual testament wallet interface.
A profile tells individuals that a record of open intrigue is
legitimate. A record might be checked on the off chance
that it is resolved to be a record of open intrigue.
Ordinarily this incorporates accounts kept up by clients in
music, acting, form, government, legislative issues,
religion, news coverage, media, games, business, and other
key intrigue zones. The web application is fast and
responsive with the end goal that once the page is stacked
the swapping between the pages does not require some
other downloading of information.
3.2 Authentication and Digital signature
We require a profile which extremely secure and to be
certain that the authentications transferred are honest to
goodness and unique duplicate of the testament for that
the this record will be secured with an open key
encryption gauges and by an outsider whoever it might be
a foundation or an association and will be confirmed and
this archive will be secured with a computerized signature
and the information can't be altered or reproduced,
utilization of QR code is additionally utilized another
security reason all together for the elective reference and
accessibility of the sort of information.
An authentic propelled stamp gives a recipient inspiration
to assume that the message was made by a known sender
(confirmation) , that the sender can't deny having sent the
message (non-disavowal), and that the message was not
balanced in movement. The profile will produce a
connection where this connection is utilized a connection
to our profile and it is made basic as that the outside client
just need this so they can see the profile and his
endorsements with the state of authentications that is
open unmistakable and the outer client can comprehend
about his profile through the connection. All connects to
different sites must take after certain designing guidelines.
4. CONCLUSION
KEEP IT will always be a companion with all age groups to
carry their certificates digitally and to provide all the
information about the person just through a URL link. The
link generated will redirect the user to view the verified
profile and the certificates he or she holds in keep it
wallet. An additional feature of this wallet is that we can
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1947
save passwords which is not again visible even for the
user and when the user once click this will redirect and
will load the website. A verified profile will show a view
that is needed for the client and easy scroll through the
certificates necessary. It will also later become an
alternative for curriculum vitae and no longer needed to
carry the resume because the profile will be genuine and
the certificates are authenticated using a third party
organization and tamper proof with a digital signature
.The wallet is portable, safe and easy access because it can
be retrieved anywhere just through a link and the benefit
of reducing paper with less hard copies of the certificates,
and lastly it is the most convenient way to carry the
original certificates with you.
REFERENCES
[1] Francesco Buccafurri; Gianluca Caminiti; Gianluca Lax,
“Signing the document content is not enough: A new
attack to digital signature”, ICADIWT, Pages: 520 –
525, 2008 IEEEXplore
[2] V.Nagarajan, “ Secure Data Transmission using
Content Fingerprinting Digital Watermarking
Techniques”, The 30th International Technical
Conference on Circuits/Systems, Computers and
Communications (ITC-CSCC 2015)June 29-July 2 at
Grand Hilton Seoul, Seoul, Korea .
[3] J. Barr; B. Bradley; B.T. Hannigan,"Using digital
watermarks with image signatures to mitigate the
threat of the copyattack”,ICASSP, 2000 IEEE.
[4] F. Leclerc and R. Plamondon, “Automatic signature
verification: The state of the art1989–1993,”
International Journal of Pattern Recognition and
Artificial Intelligence, vol. 8, no. 03, pp. 643–660,
1994.
[5] A. Pansare and S. Bhatia, “Offline signature verification
using neural network,” International Journal of
Scientific & Engineering Research, Volume3, no. 2,
2012

More Related Content

What's hot

Blockchain Privacy Innovation Insights from Patents
Blockchain Privacy Innovation Insights from PatentsBlockchain Privacy Innovation Insights from Patents
Blockchain Privacy Innovation Insights from Patents
Alex G. Lee, Ph.D. Esq. CLP
 
Digital signature certificate
Digital signature certificateDigital signature certificate
Digital signature certificate
Ashvini Soni
 
List of Top 50 Companies Using Blockchain Technology
List of Top 50 Companies Using Blockchain TechnologyList of Top 50 Companies Using Blockchain Technology
List of Top 50 Companies Using Blockchain Technology
101 Blockchains
 

What's hot (20)

Re-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity ManagementRe-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity Management
 
IRJET - A Survey of Issues in Health Insurance System and Solution through Bl...
IRJET - A Survey of Issues in Health Insurance System and Solution through Bl...IRJET - A Survey of Issues in Health Insurance System and Solution through Bl...
IRJET - A Survey of Issues in Health Insurance System and Solution through Bl...
 
Blockchain Privacy Innovation Insights from Patents
Blockchain Privacy Innovation Insights from PatentsBlockchain Privacy Innovation Insights from Patents
Blockchain Privacy Innovation Insights from Patents
 
Blockchain Interoperability Innovation Insights from Patents
Blockchain Interoperability Innovation Insights from PatentsBlockchain Interoperability Innovation Insights from Patents
Blockchain Interoperability Innovation Insights from Patents
 
Digital signature certificate
Digital signature certificateDigital signature certificate
Digital signature certificate
 
IRJET- Estimation of a Good Fit with Blockchain and Identity and Access Manag...
IRJET- Estimation of a Good Fit with Blockchain and Identity and Access Manag...IRJET- Estimation of a Good Fit with Blockchain and Identity and Access Manag...
IRJET- Estimation of a Good Fit with Blockchain and Identity and Access Manag...
 
Digital signature certificate provider in delhi
Digital signature certificate provider in delhiDigital signature certificate provider in delhi
Digital signature certificate provider in delhi
 
Mind- Boggling Features & Benefits of Video KYC
Mind- Boggling Features & Benefits of Video KYCMind- Boggling Features & Benefits of Video KYC
Mind- Boggling Features & Benefits of Video KYC
 
List of Top 50 Companies Using Blockchain Technology
List of Top 50 Companies Using Blockchain TechnologyList of Top 50 Companies Using Blockchain Technology
List of Top 50 Companies Using Blockchain Technology
 
Digital signature & PKI Infrastructure
Digital signature & PKI InfrastructureDigital signature & PKI Infrastructure
Digital signature & PKI Infrastructure
 
Access management
Access managementAccess management
Access management
 
eSign Brochure1.5
eSign Brochure1.5eSign Brochure1.5
eSign Brochure1.5
 
Technical Specifications DLTS ver 2.3
Technical Specifications DLTS ver 2.3Technical Specifications DLTS ver 2.3
Technical Specifications DLTS ver 2.3
 
Automated E-Pin Generator in Banking Sector
Automated E-Pin Generator in Banking SectorAutomated E-Pin Generator in Banking Sector
Automated E-Pin Generator in Banking Sector
 
Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04
 
IRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET- Easykey - Multipurpose RFID Card based IoT SystemIRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET- Easykey - Multipurpose RFID Card based IoT System
 
Digital Locker Dedicated Repository Api Specification v1 4
Digital Locker Dedicated Repository Api Specification v1 4Digital Locker Dedicated Repository Api Specification v1 4
Digital Locker Dedicated Repository Api Specification v1 4
 
The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010
 
10 Best Professional Blockchain Courses And Certifications
10 Best Professional Blockchain Courses And Certifications10 Best Professional Blockchain Courses And Certifications
10 Best Professional Blockchain Courses And Certifications
 
Design an active verification mechanism for certificates revocation in OCSP f...
Design an active verification mechanism for certificates revocation in OCSP f...Design an active verification mechanism for certificates revocation in OCSP f...
Design an active verification mechanism for certificates revocation in OCSP f...
 

Similar to IRJET- Keep It – A System to Store Certificates and Develop a Profile

Similar to IRJET- Keep It – A System to Store Certificates and Develop a Profile (20)

An Introduction to Authentication for Applications
An Introduction to Authentication for ApplicationsAn Introduction to Authentication for Applications
An Introduction to Authentication for Applications
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)
 
Identity Verification
Identity VerificationIdentity Verification
Identity Verification
 
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key SecurityIRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
 
IRJET- Sensitive Data Sharing using QRCODE
IRJET-  	  Sensitive Data Sharing using QRCODEIRJET-  	  Sensitive Data Sharing using QRCODE
IRJET- Sensitive Data Sharing using QRCODE
 
5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!
 
Digital signatures whitepaper_thinkdox
Digital signatures whitepaper_thinkdoxDigital signatures whitepaper_thinkdox
Digital signatures whitepaper_thinkdox
 
Digital signature price in chennai
Digital signature price in chennaiDigital signature price in chennai
Digital signature price in chennai
 
KYC VERIFICATION USING BLOCKCHAIN
KYC VERIFICATION USING BLOCKCHAINKYC VERIFICATION USING BLOCKCHAIN
KYC VERIFICATION USING BLOCKCHAIN
 
Automating trust with new technologies
Automating trust with new technologiesAutomating trust with new technologies
Automating trust with new technologies
 
Application on Know Your Customer Authentication
Application on Know Your Customer AuthenticationApplication on Know Your Customer Authentication
Application on Know Your Customer Authentication
 
The Trustable Technology Mark
The Trustable Technology MarkThe Trustable Technology Mark
The Trustable Technology Mark
 
ThingsCon: Trustable Tech Mark (10 Oct 2018)
ThingsCon: Trustable Tech Mark (10 Oct 2018)ThingsCon: Trustable Tech Mark (10 Oct 2018)
ThingsCon: Trustable Tech Mark (10 Oct 2018)
 
E AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTPE AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTP
 
Working with external identities: Learn how to enable partners, suppliers and...
Working with external identities: Learn how to enable partners, suppliers and...Working with external identities: Learn how to enable partners, suppliers and...
Working with external identities: Learn how to enable partners, suppliers and...
 
ThingsCon: Trustable Tech mark (26 Sept 2018)
ThingsCon: Trustable Tech mark (26 Sept 2018)ThingsCon: Trustable Tech mark (26 Sept 2018)
ThingsCon: Trustable Tech mark (26 Sept 2018)
 
ECS IRIS Know Your Client (KYC) Solution
ECS IRIS Know Your Client (KYC) SolutionECS IRIS Know Your Client (KYC) Solution
ECS IRIS Know Your Client (KYC) Solution
 
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
 
test
testtest
test
 
KYC Blockchain in Insurance Industry
KYC Blockchain in Insurance IndustryKYC Blockchain in Insurance Industry
KYC Blockchain in Insurance Industry
 

More from IRJET Journal

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
pritamlangde
 

Recently uploaded (20)

Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 

IRJET- Keep It – A System to Store Certificates and Develop a Profile

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1944 Keep It – A system to store certificates and develop a profile Amal Shaju1, Arun Joseph2, Smitha Joseph3 1,2 B.Tech Student, Dept. of Computer Science Engineering, Sahrdaya College of Engineering & Technology, Kerala, India 3 Assistant Professor, Dept. of Computer Science Engineering, Sahrdaya College of Engineering & Technology, Kerala, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – Keep-It is a certificate wallet which is an alternative to reduce workload in carrying certificate with us. We store the certificates of different formats like medical, professional, birth, driving license, course certificates etc. The keep it will have separate profile which is verified and authenticated using norms and conditions of each individual and have separate area for uploading the certificates. The certificate uploaded are original copy and it is secured with a digital signature for security reasons and later the file cannot be tampered. The profile will generate a link where the other user can view profile and certificates he holds in the wallets. As this wallet is a web application it is easy to swap between pages and can be run on any device, also the web app can be added to home screen as an application for later time use. The password of the wallet can also be stored and user can access the wallet even offline and changes made will be effected when internet is available. 1. INTRODUCTION A Certificate of any type is a document or seal certifying the authenticity of something, it can be any type of certificate academic, medical, professional, birth, driving etc. A Certificate Wallet refers to an electronic device that allows an individual to store certificates of any type in a wallet. This includes certificate with a verification id, so if the certificate uploaded to the wallet is authenticated by an authority or an organization. The certificate holds a digital signature which is valid digital signature gives a recipient reason to believe that the message was created by a known sender (authentication), that the sender cannot deny having sent the message. Advanced marks are most usually utilized as a part of the fields programming dissemination, budgetary exchanges, contract administration programming, and in some different situations where it is important to recognize falsification or altering or some other interruptions. Advanced marks utilize topsy-turvy cryptography. A profile tells individuals that a record of open intrigue is true. A record might be confirmed on the off chance that it is resolved to be a record of open intrigue. Normally this incorporates accounts kept up by clients in music, acting, mold, government, legislative issues, religion, news coverage, media, games, business, and other key intrigue territories. The web application is brisk and responsive with the end goal that once the page is stacked the swapping between the pages does not require some other downloading of information since this done utilizing precise. The site page can be included as a symbol the home screen. A confirmed client approach Certification wallet Analytics. Presently, anybody can gain admittance to Certification wallet systematic through the typical channels, however that includes turning into a promoter. Keeping in mind the end goal to be qualified to be a publicist, you require to be in particular areas where Twitter permits publicizing. Certain nations aren't qualified, for instance. You can see the list here. Your record additionally should be genuinely dynamic; you can't join and turn into a publicist inside a day, or even seven days. The principle advantage of confirmation, obviously, is the believe it accompanies. When you're confirmed, the wallet of this record is who it cases to be." This is imperative when it's extraordinarily simple to make a record with a minor error or extra word in the URL, utilize a similar show name and picture as another substance, and continue acting like that element. Confirmation isn't an ideal answer for this issue. All things considered, you must be confirmed to get that sign of trust, and only one out of every odd business can be checked. This once in a while returns to hurt private companies, whose more wise group of onlookers individuals won't not put stock in due to their absence of confirmation. Of course, on the other side, if confirmation worked constantly, frauds wouldn't be fruitful. Indeed, even checked organizations get fakers that effectively trick clients, since clients, in general, aren't extremely canny. They won't not know or they won't not mind what that blue check stamp means, thus they never acknowledge they're giving their data to a sham demand from the client of such records along these lines, you'll need to evacuate that assurance all together. Verification is likewise fantastically critical for client outreach. On the off chance that it is a business kind of authentication or instructive testament you need to confirm it by an outsider or an association and include a computerized signature with encryption procedures to guarantee the genuineness of the endorsement, you nearly must be checked. No sagacious client will give an ounce of individual data to a record that doesn't have a confirmation check, paying little respect to how dependable they look. I do need to determine keen clients, obviously; numerous less wise clients do substantially less shrewd things consistently.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1945 2. SYSTEM ANALYSIS In the analysis it is a way toward concentrate a strategy or business with a specific end goal to distinguish its objectives and purposes and make frameworks and methods that will accomplish them in an effective way. Another view sees framework examination as a critical thinking procedure that disintegrates a framework into its segment pieces with the end goal of the concentrate how well those segment parts work and communicate to achieve their motivation. Examination and union, as logical techniques, dependably go as one; they supplement each other. Each union expands upon the consequences of a first examination, and each investigation requires a consequent blend keeping in mind the end goal to confirm and remedy its outcomes. 2.1 EXISTING SYSTEM There is just a single frameworks existing at this point. It is an administration site named DIGILOCKER where u can simply transfer authentications. The framework needs security issues and helps us to believe the authentications since it isn't a checked profile and any individual can control information in the locker, its only a locker idea of putting away the declarations can be altered and may not be unique duplicate. DigiLocker is an "advanced locker" benefit worked by the Government of India that empowers Indian natives to store certain official records on the cloud. This framework offers just less stockpiling which is 1 GB of storage room is offered to clients to store recognizable proof card issued by government offices, instruction endorsements, PAN cards, driving permit, vehicle proprietorship records and some different archives. Clients need to have an Aadhar card to utilize DigiLocker. For join, the Aadhar card number and the one-time secret word sent to the Aadhar-related versatile number, should be entered. For later log-ins, the client can set their own particular secret word it interface the record to Facebook or Google logins. The beta variant of the administration was taken off in February 2015,and propelled by the Prime Minister on 1 July 2015. There is just 1 frameworks existing at this point. It is an administration site named DIGILOCKER where u can simply transfer endorsements. The framework needs security issues and helps us to believe the endorsements since it isn't a confirmed profile and any individual can control information in the locker, its only a locker idea of putting away the authentications can be altered and may not be unique duplicate. DigiLocker is a "computerized locker" benefit worked by the Government of India that empowers Indian nationals to store certain official records on the cloud. This framework offers just less stockpiling which is 1 GB of storage room is offered to clients to store distinguishing proof card issued by government offices, instruction declarations, PAN cards, driving permit, vehicle possession records and some different archives. Clients need to have an Aadhar card to utilize DigiLocker 2.2 PROPOSED SYSTEM A Certificate Wallet alludes to an electronic gadget that enables a person to store authentications of any sort in a wallet. This incorporates endorsement with a confirmation id, so if the declaration transferred to the wallet is validated by an expert or an association. The declaration holds a computerized signature which is a numerical plan for showing the genuineness of advanced messages or records. An authentic propelled stamp gives a recipient inspiration to assume that the message was made by a known sender (confirmation) , that the sender can't deny having sent the message (non-disavowal), and that the message was not balanced in movement. Advanced marks are a standard component of most (cryptographic convention) suites, and are normally utilized for programming dispersion, budgetary exchanges, contract administration programming, and in different situations where it is imperative to identify phony or altering. Wallet essentially is outlined in type of a wallet utilizing Typescript and Angular into a Web Application with the goal that it is anything but difficult to utilize and can be gotten to from any gadget. The wallet idea is basic as that it can hold any kind of testament of our decision whether it is of instructive, affirmation course declaration, restorative, proficient or any looked for can be put away and saw by the clients like a wallet we convey. The profile will have a connection created and this connection will be the URL to the profile and the profile is checked by an association or by other security and confirmation criteria the site gives .Though it is a Web Application it has awesome favorable position of client clicks "Add to home screen", they will see the application being included the home screen. Confirmation of the wallet is likewise extraordinarily vital for client outreach. On the off chance that it is a business sort of declaration or instructive endorsement you need to confirm it by an outsider or an association and include an advanced mark with encryption systems to guarantee the legitimacy of the authentication, you nearly must be checked. No astute client will give an ounce of individual data to a record that doesn't have a confirmation check, paying little mind to how dependable they look. I do need to determine canny clients, obviously; numerous less clever clients do substantially less insightful things consistently. 3. SYSTEM DESIGN The wallet KEEP-IT will be advanced pocket to hold testament in computerized arrange where it can be gotten to through a URL and this connection will be produced by the watcher who needs the sort of declarations as indicated by the class of endorsements. This module comprise of how authentications are ordered by the kind
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1946 of the declaration and this will be in the organization of any kind let it be testaments of scholastics, medicinal, proficient, birth ,driving and so forth. A Certificate Wallet alludes to an electronic gadget that enables a person to store testaments of any sort in a wallet. This incorporates testament with a confirmation id, so if the declaration transferred to the wallet is validated by a specialist or an association. The authentication holds an advanced mark which is substantial computerized signature gives a beneficiary motivation to trust that the message was made by a known sender (authentication), that the sender can't deny having sent the message and that the message was not adjusted in travel. Advanced marks are a standard component of most suites, and are normally utilized for programming dispersion, money related exchanges, contract administration programming, and in different situations where it is vital to recognize fraud or altering. The Project we are creating has two modules mainly: 1 Profile view and Add certificate 2 Authentication and Digital signature Fig – 1 : Flowchart of system 3.1 Profile View and Add Certificates Each profile will have isolate see as per the client it might be ensured or open profile and individuals with the sort will have the capacity to see the profile in the way he needs for ex: on the off chance that it is instructive client he will have the capacity to see instructive endorsements through the connection gave to him from the other client, profile of each client has a connection created and this connection is the thing that we are utilizing as a diverting technique to the profile, utilization of this connection is that we can utilize this connection even in resumes and as an individual testament wallet interface. A profile tells individuals that a record of open intrigue is legitimate. A record might be checked on the off chance that it is resolved to be a record of open intrigue. Ordinarily this incorporates accounts kept up by clients in music, acting, form, government, legislative issues, religion, news coverage, media, games, business, and other key intrigue zones. The web application is fast and responsive with the end goal that once the page is stacked the swapping between the pages does not require some other downloading of information. 3.2 Authentication and Digital signature We require a profile which extremely secure and to be certain that the authentications transferred are honest to goodness and unique duplicate of the testament for that the this record will be secured with an open key encryption gauges and by an outsider whoever it might be a foundation or an association and will be confirmed and this archive will be secured with a computerized signature and the information can't be altered or reproduced, utilization of QR code is additionally utilized another security reason all together for the elective reference and accessibility of the sort of information. An authentic propelled stamp gives a recipient inspiration to assume that the message was made by a known sender (confirmation) , that the sender can't deny having sent the message (non-disavowal), and that the message was not balanced in movement. The profile will produce a connection where this connection is utilized a connection to our profile and it is made basic as that the outside client just need this so they can see the profile and his endorsements with the state of authentications that is open unmistakable and the outer client can comprehend about his profile through the connection. All connects to different sites must take after certain designing guidelines. 4. CONCLUSION KEEP IT will always be a companion with all age groups to carry their certificates digitally and to provide all the information about the person just through a URL link. The link generated will redirect the user to view the verified profile and the certificates he or she holds in keep it wallet. An additional feature of this wallet is that we can
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1947 save passwords which is not again visible even for the user and when the user once click this will redirect and will load the website. A verified profile will show a view that is needed for the client and easy scroll through the certificates necessary. It will also later become an alternative for curriculum vitae and no longer needed to carry the resume because the profile will be genuine and the certificates are authenticated using a third party organization and tamper proof with a digital signature .The wallet is portable, safe and easy access because it can be retrieved anywhere just through a link and the benefit of reducing paper with less hard copies of the certificates, and lastly it is the most convenient way to carry the original certificates with you. REFERENCES [1] Francesco Buccafurri; Gianluca Caminiti; Gianluca Lax, “Signing the document content is not enough: A new attack to digital signature”, ICADIWT, Pages: 520 – 525, 2008 IEEEXplore [2] V.Nagarajan, “ Secure Data Transmission using Content Fingerprinting Digital Watermarking Techniques”, The 30th International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC 2015)June 29-July 2 at Grand Hilton Seoul, Seoul, Korea . [3] J. Barr; B. Bradley; B.T. Hannigan,"Using digital watermarks with image signatures to mitigate the threat of the copyattack”,ICASSP, 2000 IEEE. [4] F. Leclerc and R. Plamondon, “Automatic signature verification: The state of the art1989–1993,” International Journal of Pattern Recognition and Artificial Intelligence, vol. 8, no. 03, pp. 643–660, 1994. [5] A. Pansare and S. Bhatia, “Offline signature verification using neural network,” International Journal of Scientific & Engineering Research, Volume3, no. 2, 2012