The objective of this paper is to present a method of detecting forgery and fabrication in educational certificates and academic transcripts based on cryptography and QR codes. Discussed in detail are the requirements that need to be met by educational institutes issuing academic certificates or transcripts. The
cryptographic steps of converting certificate details into a cipher text, encoding it in a QR code and printing the same on the certificate or transcript to be issued are elaborated. This paper also explains in detail how the certificate owners, other institutes, employers and third-party verifiers can verify certificates for forgery and fabrication using the scanning app of the issuing institute. The encryption and decryption
formulae that should be used in computations to be performed before creating and after scanning a QR
code are documented. Educational institutes and universities can implement this method in their certificate issuing process just by obtaining a cryptographic key pair and publishing their QR code scanning app for download by verifiers.
CloudPass – a passport system based on Cloud Computing and Near Field Communi...cscpconf
Wireless communication has penetrated into all fields of technology, especially in mobility,
where wireless transactions are gaining importance with improvements in standards like 3G
and 4G. There are many technologies that support the wireless forms of interactions between devices. One among them is NFC – Near Field Communication. In addition to NFC, other external technologies like Quick Response (QR) Codes assist in establishing interactions among participating devices. In this paper, we examine an approach that will involve standards and technologies like NFC, QR Codes and Cloud Infrastructure to design a mobile application which will perform desired functionalities. Cloud Storage is used as a reservoir to store the artifacts used by the application. Development and testing of the application is initially carried out on emulators or simulators followed by testing on real handsets/devices.
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...acijjournal
In this paper, wepresenta novel solution to detect forgery and fabrication in passports and visas using cryptography and QR codes. The solution requires that the passport and visa issuing authorities obtain a cryptographic key pair and publish their public key on their website. Further they are required to encrypt the passport or visa information with their private key, encode the ciphertext in a QR code and print it on the passport or visa they issue to the applicant.
The issuing authorities are also required to create a mobile or desktop QR code scanning app and place it for download on their website or Google Play Store and iPhone App Store. Any individual or immigration authority that needs to check the passport or visa for forgery and fabrication can scan its QR code, which will decrypt the ciphertext encoded in the QR code using the public key stored in the app memory and displays the passport or visa information on the app screen. The details on the app screen can be compared with the actual details printed on the passport or visa. Any mismatch between the two is a clear indication of forgery or fabrication.
Discussed the need for a universal desktop and mobile app that can be used by immigration authorities and consulates all over the world to enable fast checking of passports and visas at ports of entry for forgery and fabrication.
QR code based two-factor authentication to verify paper-based documentsTELKOMNIKA JOURNAL
Important paper-based documents exposed to forgery such as: official certificates, birth, marriage, death certificates, selling and buying documents and other legal documents is more and more serious and sophisticated. With the purposes of fraud, appropriation of property, job application and assignment in order to swindle public authorities, this forgery has led to material loss, belief deterioration as well as social instability. There are many techniques has been proposed to overcome this issue such as: ink stamps, live signatures, documented the transaction in third party like the court or notary. In this paper, it’s proposed a feasible solution for forgery prevention for paper-based documents using cloud computing application. With the application of quick response bidirectional barcode and the usage of hash algorithm. The study aims at developing an electronic verification system for official and issued books (documents, endorsements, and other official books) to/from different sections of the Institute using QR technology.
E Authentication System with QR Code and OTPijtsrd
As a fast web framework is being created and individuals are informationized, even the budgetary undertakings are occupied with web field. In PC organizing, hacking is any specialized exertion to control the ordinary conduct of system associations and associated frameworks. The current web banking framework was presented to the threat of hacking and its result which couldnt be overlooked. As of late, the individual data has been spilled by a high degree technique, for example, Phishing or Pharming past grabbing a clients ID and Password. Along these lines, a protected client affirmation framework gets considerably more fundamental and significant. Right now, propose another Online Banking Authentication framework. This confirmation framework utilized Mobile OTP with the mix of QR code which is a variation of the 2D standardized identification. 1 6 7 Afrin Hussain "E-Authentication System with QR Code & OTP" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30808.pdf Paper Url :https://www.ijtsrd.com/computer-science/computer-security/30808/eauthentication-system-with-qr-code-and-otp/afrin-hussain
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...IJCSEA Journal
A counter challenge authentication method is presented for authentication of online users of web applications. The authentication method involves a counter challenge from a user to a web application asking to provide certain information from one or more user details recorded at the time of registration. The user enters his password and logs into the web application only in case the correct answer is received from the web application. This advanced authentication method protects online application users from phishing attacks. An incorrect answer or inability of the web application to provide the correct answer to the challenge is a clear indication of a phishing attack, thereby alerting the user and stopping submission of password to phishers. The authentication method is computer independent and eliminates dependency on two-factor authentication, hardware tokens, client software installations, digital certificates, and user defined seals.
CloudPass – a passport system based on Cloud Computing and Near Field Communi...cscpconf
Wireless communication has penetrated into all fields of technology, especially in mobility,
where wireless transactions are gaining importance with improvements in standards like 3G
and 4G. There are many technologies that support the wireless forms of interactions between devices. One among them is NFC – Near Field Communication. In addition to NFC, other external technologies like Quick Response (QR) Codes assist in establishing interactions among participating devices. In this paper, we examine an approach that will involve standards and technologies like NFC, QR Codes and Cloud Infrastructure to design a mobile application which will perform desired functionalities. Cloud Storage is used as a reservoir to store the artifacts used by the application. Development and testing of the application is initially carried out on emulators or simulators followed by testing on real handsets/devices.
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...acijjournal
In this paper, wepresenta novel solution to detect forgery and fabrication in passports and visas using cryptography and QR codes. The solution requires that the passport and visa issuing authorities obtain a cryptographic key pair and publish their public key on their website. Further they are required to encrypt the passport or visa information with their private key, encode the ciphertext in a QR code and print it on the passport or visa they issue to the applicant.
The issuing authorities are also required to create a mobile or desktop QR code scanning app and place it for download on their website or Google Play Store and iPhone App Store. Any individual or immigration authority that needs to check the passport or visa for forgery and fabrication can scan its QR code, which will decrypt the ciphertext encoded in the QR code using the public key stored in the app memory and displays the passport or visa information on the app screen. The details on the app screen can be compared with the actual details printed on the passport or visa. Any mismatch between the two is a clear indication of forgery or fabrication.
Discussed the need for a universal desktop and mobile app that can be used by immigration authorities and consulates all over the world to enable fast checking of passports and visas at ports of entry for forgery and fabrication.
QR code based two-factor authentication to verify paper-based documentsTELKOMNIKA JOURNAL
Important paper-based documents exposed to forgery such as: official certificates, birth, marriage, death certificates, selling and buying documents and other legal documents is more and more serious and sophisticated. With the purposes of fraud, appropriation of property, job application and assignment in order to swindle public authorities, this forgery has led to material loss, belief deterioration as well as social instability. There are many techniques has been proposed to overcome this issue such as: ink stamps, live signatures, documented the transaction in third party like the court or notary. In this paper, it’s proposed a feasible solution for forgery prevention for paper-based documents using cloud computing application. With the application of quick response bidirectional barcode and the usage of hash algorithm. The study aims at developing an electronic verification system for official and issued books (documents, endorsements, and other official books) to/from different sections of the Institute using QR technology.
E Authentication System with QR Code and OTPijtsrd
As a fast web framework is being created and individuals are informationized, even the budgetary undertakings are occupied with web field. In PC organizing, hacking is any specialized exertion to control the ordinary conduct of system associations and associated frameworks. The current web banking framework was presented to the threat of hacking and its result which couldnt be overlooked. As of late, the individual data has been spilled by a high degree technique, for example, Phishing or Pharming past grabbing a clients ID and Password. Along these lines, a protected client affirmation framework gets considerably more fundamental and significant. Right now, propose another Online Banking Authentication framework. This confirmation framework utilized Mobile OTP with the mix of QR code which is a variation of the 2D standardized identification. 1 6 7 Afrin Hussain "E-Authentication System with QR Code & OTP" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30808.pdf Paper Url :https://www.ijtsrd.com/computer-science/computer-security/30808/eauthentication-system-with-qr-code-and-otp/afrin-hussain
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...IJCSEA Journal
A counter challenge authentication method is presented for authentication of online users of web applications. The authentication method involves a counter challenge from a user to a web application asking to provide certain information from one or more user details recorded at the time of registration. The user enters his password and logs into the web application only in case the correct answer is received from the web application. This advanced authentication method protects online application users from phishing attacks. An incorrect answer or inability of the web application to provide the correct answer to the challenge is a clear indication of a phishing attack, thereby alerting the user and stopping submission of password to phishers. The authentication method is computer independent and eliminates dependency on two-factor authentication, hardware tokens, client software installations, digital certificates, and user defined seals.
EUNICERT: ETHEREUM BASED DIGITAL CERTIFICATE VERIFICATION SYSTEMIJNSA Journal
The fake certificate is a special global problem in today's digital age. Thousands of universities and educational institutions around the world do not exist but can release hundreds of millions of fake degrees. Verifying the integrity of qualifications is a real challenge for today's employers. Applying the anti-data
modifying properties of blockchain technology, this study proposes a solution issuing and verifying digital certificates called EUniCert to solve this problem. By changing the design and integrating new consensus algorithm used in Ethereum platform into the Unicoin network that was used to verify and store the information related to the issued digital certificate, the EUniCert improves the latency to validate transactions as well as the number of verified blocks in the blockchain network compared to the previous solution that we have proposed. We implement a simple blockchain system to illustrate the management operation of the digital certificates on the ethereum platform. Besides, we conduct a simulation to evaluate the performance of our proposal compared with the previous system. The result is that the average latency decreases by 3.27 times as well as the number of verified blocks increases by 11% compared with the previous system.
EUNICERT: ETHEREUM BASED DIGITAL CERTIFICATE VERIFICATION SYSTEMIJNSA Journal
The fake certificate is a special global problem in today's digital age. Thousands of universities and educational institutions around the world do not exist but can release hundreds of millions of fake degrees. Verifying the integrity of qualifications is a real challenge for today's employers. Applying the anti-data modifying properties of blockchain technology, this study proposes a solution issuing and verifying digital certificates called EUniCert to solve this problem. By changing the design and integrating new consensus algorithm used in Ethereum platform into the Unicoin network that was used to verify and store the information related to the issued digital certificate, the EUniCert improves the latency to validate transactions as well as the number of verified blocks in the blockchain network compared to the previous solution that we have proposed. We implement a simple blockchain system to illustrate the management operation of the digital certificates on the ethereum platform. Besides, we conduct a simulation to evaluate the performance of our proposal compared with the previous system. The result is that the average latency decreases by 3.27 times as well as the number of verified blocks increases by 11% compared with the previous system.
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...acijjournal
In this paper, we present a novel solution to detect forgery and fabrication in passports and visas using
cryptography and QR codes. The solution requires that the passport and visa issuing authorities obtain a
cryptographic key pair and publish their public key on their website. Further they are required to encrypt
the passport or visa information with their private key, encode the ciphertext in a QR code and print it on
the passport or visa they issue to the applicant.
The issuing authorities are also required to create a mobile or desktop QR code scanning app and place it
for download on their website or Google Play Store and iPhone App Store. Any individual or immigration
authority that needs to check the passport or visa for forgery and fabrication can scan its QR code, which
will decrypt the ciphertext encoded in the QR code using the public key stored in the app memory and
displays the passport or visa information on the app screen. The details on the app screen can be
compared with the actual details printed on the passport or visa. Any mismatch between the two is a clear
indication of forgery or fabrication.
Discussed the need for a universal desktop and mobile app that can be used by immigration authorities and
consulates all over the world to enable fast checking of passports and visas at ports of entry for forgery
and fabrication.
Smart Portal: A Platform for Student's Profile Creation, Evaluation and Clust...vivatechijri
In today's era where almost everything is digitized, even then at the end of the day we have to come across the paperwork when it comes to document submission and verification for any process. As a result, with increased advancement in the technology, easy availability and access of data and documents is the main concern. This project is intended to develop an application based system where student data and documents will be stored on a server and create a smart profile on the basis of student data. Student can also use that data and document anywhere anytime. The main aim is to provide a common application for all parts of education. Where each necessary details and document of a student will be available on one single portal also can be accessible by other higher authorities. Additionally, evaluating the profile and clustering of students can be done for better recommendation.
The Smart Portal system will be useful in document extraction during the admission process as well as it will be used for requirement of details and document of a candidate during interview. Students can upload their data and documents on the server after registration. Then their data will be analysed by the system by evaluating and clustering. This data is retrieved using QR code scanning system or Email verification/ OTP.
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...ijiert bestjournal
Quick Response (QR) code are 2D (two dimension) matrix code. Here it is use for secure authentication. Now days Internet is most commonlyused medium to access the information. People are using many website like online banking,insurance,shopping etc. these websites requires the strong authentication. Using a pair of username and password authentication scheme is not secure enough since attacker can collect information from web phishing and computer infection. Various malware or intended programs attempt to capture the confidential information from personal computer. Therefore,secure authentication scheme is required. Many authentication methods have been developed such as one time password,SMS base OTP system and some using bio-metric feature. Some of these authentications are fail due to network problem and increases the cost. People are increasingly used in all life fields,especially with the wide spread of Android smart phones which are used as QR-code scanners
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
More Related Content
Similar to Preventing forged and fabricated academic credentials using cryptography and qr codes
EUNICERT: ETHEREUM BASED DIGITAL CERTIFICATE VERIFICATION SYSTEMIJNSA Journal
The fake certificate is a special global problem in today's digital age. Thousands of universities and educational institutions around the world do not exist but can release hundreds of millions of fake degrees. Verifying the integrity of qualifications is a real challenge for today's employers. Applying the anti-data
modifying properties of blockchain technology, this study proposes a solution issuing and verifying digital certificates called EUniCert to solve this problem. By changing the design and integrating new consensus algorithm used in Ethereum platform into the Unicoin network that was used to verify and store the information related to the issued digital certificate, the EUniCert improves the latency to validate transactions as well as the number of verified blocks in the blockchain network compared to the previous solution that we have proposed. We implement a simple blockchain system to illustrate the management operation of the digital certificates on the ethereum platform. Besides, we conduct a simulation to evaluate the performance of our proposal compared with the previous system. The result is that the average latency decreases by 3.27 times as well as the number of verified blocks increases by 11% compared with the previous system.
EUNICERT: ETHEREUM BASED DIGITAL CERTIFICATE VERIFICATION SYSTEMIJNSA Journal
The fake certificate is a special global problem in today's digital age. Thousands of universities and educational institutions around the world do not exist but can release hundreds of millions of fake degrees. Verifying the integrity of qualifications is a real challenge for today's employers. Applying the anti-data modifying properties of blockchain technology, this study proposes a solution issuing and verifying digital certificates called EUniCert to solve this problem. By changing the design and integrating new consensus algorithm used in Ethereum platform into the Unicoin network that was used to verify and store the information related to the issued digital certificate, the EUniCert improves the latency to validate transactions as well as the number of verified blocks in the blockchain network compared to the previous solution that we have proposed. We implement a simple blockchain system to illustrate the management operation of the digital certificates on the ethereum platform. Besides, we conduct a simulation to evaluate the performance of our proposal compared with the previous system. The result is that the average latency decreases by 3.27 times as well as the number of verified blocks increases by 11% compared with the previous system.
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...acijjournal
In this paper, we present a novel solution to detect forgery and fabrication in passports and visas using
cryptography and QR codes. The solution requires that the passport and visa issuing authorities obtain a
cryptographic key pair and publish their public key on their website. Further they are required to encrypt
the passport or visa information with their private key, encode the ciphertext in a QR code and print it on
the passport or visa they issue to the applicant.
The issuing authorities are also required to create a mobile or desktop QR code scanning app and place it
for download on their website or Google Play Store and iPhone App Store. Any individual or immigration
authority that needs to check the passport or visa for forgery and fabrication can scan its QR code, which
will decrypt the ciphertext encoded in the QR code using the public key stored in the app memory and
displays the passport or visa information on the app screen. The details on the app screen can be
compared with the actual details printed on the passport or visa. Any mismatch between the two is a clear
indication of forgery or fabrication.
Discussed the need for a universal desktop and mobile app that can be used by immigration authorities and
consulates all over the world to enable fast checking of passports and visas at ports of entry for forgery
and fabrication.
Smart Portal: A Platform for Student's Profile Creation, Evaluation and Clust...vivatechijri
In today's era where almost everything is digitized, even then at the end of the day we have to come across the paperwork when it comes to document submission and verification for any process. As a result, with increased advancement in the technology, easy availability and access of data and documents is the main concern. This project is intended to develop an application based system where student data and documents will be stored on a server and create a smart profile on the basis of student data. Student can also use that data and document anywhere anytime. The main aim is to provide a common application for all parts of education. Where each necessary details and document of a student will be available on one single portal also can be accessible by other higher authorities. Additionally, evaluating the profile and clustering of students can be done for better recommendation.
The Smart Portal system will be useful in document extraction during the admission process as well as it will be used for requirement of details and document of a candidate during interview. Students can upload their data and documents on the server after registration. Then their data will be analysed by the system by evaluating and clustering. This data is retrieved using QR code scanning system or Email verification/ OTP.
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...ijiert bestjournal
Quick Response (QR) code are 2D (two dimension) matrix code. Here it is use for secure authentication. Now days Internet is most commonlyused medium to access the information. People are using many website like online banking,insurance,shopping etc. these websites requires the strong authentication. Using a pair of username and password authentication scheme is not secure enough since attacker can collect information from web phishing and computer infection. Various malware or intended programs attempt to capture the confidential information from personal computer. Therefore,secure authentication scheme is required. Many authentication methods have been developed such as one time password,SMS base OTP system and some using bio-metric feature. Some of these authentications are fail due to network problem and increases the cost. People are increasingly used in all life fields,especially with the wide spread of Android smart phones which are used as QR-code scanners
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Preventing forged and fabricated academic credentials using cryptography and qr codes
1. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.11, No.1, February 2021
DOI: 10.5121/ijcsea.2021.11102 11
PREVENTING FORGED AND FABRICATED
ACADEMIC CREDENTIALS USING CRYPTOGRAPHY
AND QR CODES
Cheman Shaik
VISH Consulting Services Inc, 6242 N Hoyne Avenue, Chicago IL 60659, USA
ABSTRACT
Theobjective of this paper is to present a method of detecting forgery and fabrication in educational
certificates and academic transcripts based on cryptography and QR codes. Discussed in detail are the
requirements that need to be met by educational institutes issuing academic certificates or transcripts. The
cryptographic steps of converting certificate details into a ciphertext, encoding it in a QR code and
printing the same on the certificate or transcript to be issued are elaborated. This paper also explains in
detail how the certificate owners, other institutes, employers and third-party verifiers can verify certificates
for forgery and fabrication using the scanning app of the issuing institute. The encryption and decryption
formulae that should be used in computations to be performed before creating and after scanning a QR
code are documented. Educational institutes and universities can implement this method in their certificate
issuing process just by obtaining a cryptographic key pair and publishing their QR code scanning app for
download by verifiers.
KEYWORDS
Educational Certificate, Transcript, Forgery Detection, Cryptography, Encryption, Decryption, Public
Key, Private Key, QR Code. Mobile App, Desktop App
1. INTRODUCTION
Fraudulent academic credentials, including forged and fabricated degree certificates and
transcripts, are a growing concern all over the world affecting institutions, universities,
employers, and even education loan offering banks. Such fraudulent credential holders seriously
affect the brand image of the higher institutions they are admitted to and the productivity of the
organizations they are hired by.
The level of forgeries practiced by miscreants varies from small high school diplomas to
doctorates, using which admissions are sought into higher institutions or even foreign
universities. Illegal Agencies offering forged diplomas and degrees are wide spread in certain
Asian and African countries. There is no fool-proof mechanism for the spot detection of forgery
and fabrication in an academic credential, other than referring it to the institute the certificate
claims to have been issued by, which is very time consuming and may take up to weeks.
Professional forging agencies create forged certificates for a price using the image editing
software, Photoshop and high-resolution color printers. As per a CNN report, a board member of
the Council for Higher Education Accreditation estimated that more than 100,000 fake degrees
are sold each year in the U.S. alone [1]
.
There are lot of educational certificate verification service agencies who provide their service for
a fee. They contact the college, university, or school that issued the degree or certificate for
2. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.11, No.1, February 2021
12
verification. Most of the credentials are verified by the institute's Admissions and Records Office.
However, such a verification process is subject to delays or even result into no output as some
institutions prohibit access to their records to people other than their previous students [2]
.
Recently, there has been lot of brain storming ongoing to consider blockchain technology in the
education sector. However, blockchain implementation throws several challenges to educational
institutes, such as standardization, governance and dependencies on third parties [3]
.
2. RELATED WORK
Proposals were made in the past to build blockchain networks for decentralized logging of
educational credentials. In 2017, Muhamed Turkanović et al proposed a global higher education
credit platform, named EduCTX, which is a higher education credit, and grading system that can
offer a globally unified viewpoint for students and higher education institutions, companies,
institutions, and organizations [4]
.
In 2017, the Japanese firm Sony announced that they developed a commercial digital system for
storing and managing educational records such as diplomas, degrees and tests on the blockchain
[5]
.
In 2018, Arenas et al discussed the application of permissioned blockchain in education,
specifically for verification of academic credentials by various interested education stakeholders
and relevant third parties to access data of candidates [6]
.
In 2019, Omar et al proposed a blockchain based framework for verifying educational certificates
focusing on themes including authentication, authorization, confidentiality, privacy and
ownership. They also identified the gaps and loopholes in the current blockchain based
educational certificate verification solutions [7]
.
In 2019, Melissa Rizzi published a list of signs to look out for in forged documents. The list of
signs includes misaligned printing, incorrect fonts, pixelated signatures, use of inappropriate
language, mismatching registrar name, outdated university name and illegitimate awarding body
[8]
.
All the technical work mentioned above is related to the blockchain approach to recording and
verification of educational certificates. However, blockchain is still in its infancy and has go a
long way before its maturity and standardization in the education sector.
No evidences are found in literature of using a blend of cryptography and QR codes for detecting
forgery and fabrication in educational certificates.
3. CRYPTOGRAPHY
Cryptography is a mathematical technique that converts the original data in to an illegible content
making no sense to its unintended readers [9]
. The converted data is produced by running on the
original data an algorithm with a key in encryption or without a key in hashing [10]
.
Basically, encryption can be classified into two categories – symmetric key encryption that uses a
single key for both encryption and decryption, and asymmetric key encryption that uses two
different keys, one for encryption and another for decryption. Advanced Encryption Standard
(AES) uses the symmetric key encryption while RSA (Rivest, Shamir, Adleman) and ECC
(Elliptic Curve Cryptography) fall under the asymmetric key encryption category [11]
.
3. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.11, No.1, February 2021
13
Asymmetric Key Cryptography, also called Public Key Cryptography, uses a public key to
encrypt the original data anda private key to decrypt the encrypted data. The encrypted data is
called ciphertext. The public and private keys are mathematically related but deriving one from
the other is practically infeasible as the computational effort required is enormous even if carried
over a cluster of super computers [12]
.
4. QR CODES
QR Code is a two-dimensional matrix, mostly square shaped, that can encode large amount of
data in byte, numeric and alphanumeric form. A QR Code can be decoded by a handheld scanner
or a QR Code scanner mobile app installed on a smartphone or desktop. A QR Code can store up
to 7,089 numeric characters or 2,953 alphanumeric characters [13]
.
Every QR Code is surrounded by a thick white border called quiet zone to differentiate the QR
Code image from its background images. The encoding region contains format information,
version information, data and error correction codes. Three position markers positioned at the
corners except the bottom right corner guide cameras and scanners to locate data modules and the
scanning direction[14]
.
QR Codes are useful several ways such as to connect to Facebook profiles, direct users to social
media accounts, share audio/video files, send text in any language, connect to websites and so
on[15]
.
5. APPLYING CRYPTOGRAPHY AND QR CODES
In this section, we present a method in which forged and fabricated certificates and transcripts
can be detected by applying a blend of cryptography and QR code technologies. In order to make
it possible, every institution that issues certificates and transcripts to its students should obtain a
public and private key pair of any cryptosystem. The public key must be published on their
website in the form of QR Code. A public key in the form of QR Code facilitates its easy
scanning and integration by certificate and transcript verifiers in the institute’s mobile and
desktop scanning applications. The institution also needs to create and publish a QR code
scanning app on their website for download by certificate verifiers. The institute should store its
publc key in the scanning application’s memory. The scanning app should be capable of
performing decryption of the content encoded in the QR codes printed on their certificates.
Further, the institution or the university issuing academic certificates and transcripts should
encrypt their content with the private key and encode the ciphertext in a QR code which should
be printed on the academic certificate or transcript issued to the student. Any verifier who wants
to verify the certificate of transcript can download the institute’s QR code scanning application
from the institute’s website and scan the QR code on the certificate or transcript. When the
verifier focusses the device camera on the QR code, the scanning application grabs the
information encoded in the QR code and decrypts it with the public key saved in the application’s
memory and displays the information on the device screen. As the information encoded in the QR
code is in encrypted form, it needs to be decrypted with the institute’s public key stored in the
scanning application’s memory, which will generate the actual information printed on the
certificate. The verifying party should verify this generated information with the information on
the hard copy of the certificate or transcript. Any mismatch of the information is a clear
indication of forgery.
4. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.11, No.1, February 2021
14
Fig. 1 below shows an example certificate issued to a student by a university without a QR code
as per the current practice in the education sector. Such a certificate provides no technical means
to verify its authenticity and detect forgery or fabrication.
Before issuing a print command to a printer to print the certificate, the university’s software
application captures all the fields of the certificate such as the university name, student name,
degree awarded, month and year of award, department and specialization and the signing
authority. The application retrieves the university’s private key from its database or a protected
folder and encrypts with it the captured data and encodes the ciphertext in a QR Code. Table.1
below shows the information captured and the QR Code encoding encrypted information.
Table 1. A certificate information and the QR code encoding the ciphertext
Student Certificate Information Captured QR Code
University: Silver Star University
Department: Computer Science
Student: John Powel
Degree: Graduate
Specialization: Computer Science
Month and Year: December 2018
Signed By: Robert Miller, Chair, Computer Science
The printed certificate bearing the QR code is issued to the student. Fig. 2 below shows the same
certificate issued with the QR code printed on it.
5. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.11, No.1, February 2021
15
6. MOBILE AND DESKTOP APPLICATION TO VERIFY AUTHENTICITY
Every educational institute and university issuing certificates with encrypted QR codes should
develop and publish a scanner application on their website, Google Play Store or Appstore for
download to enable students and third parties scan their issued certificates. The app should have
their public key stored in its memory. It also provides a button to open the device camera to scan
the QR code on a certificate. When the camera id focused on the QR code, the app performs
verification in two steps, first it captures the encoded ciphertext in the QR code, next it decrypts
the captured ciphertext into a plain text using the public key stored in its memory and displays the
information on the device screen. The verifying party can compare the plain text with the actual
printed content on the certificate. Any mismatch between the two proves forgery or fabrication of
the certificate. Table.2 below shows the screenshot of the app scanning the QR code on a
certificate and the retrieved plain text information pertaining to the certificate.
Table 2. A third-party verification of QR code on an academic certification
QR Code Scan of Certificate Certificate Information Derived on Decrypting
QR Code Ciphertext
University: Silver Star University
Department: Computer Science
Student: John Powel
Degree: Graduate
Specialization: Computer Science
Month and Year: December 2018
Signed By: Robert Miller, Chair, Computer
Science
Scanning a QR code with any general QR code scanner apps will retrieve only the encoded
ciphertext from the QR code. The QR code scanner app needs to have the additional
cryptographic functionality built into it in order to decrypt the encoded ciphertext using the
public key of the certificate issuing authority.
6. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.11, No.1, February 2021
16
Encrypted QR codes provide a light weight, low cost solution to detect forgery and fabrication in
educational certificates and transcripts compared to the blockchain solution. Encrypted QR codes
can be implemented with a very nominal cost to academic institutes and absolutely no cost to
students and third-party verifiers.
7. A UNIVERSAL MOBILE APP FOR ALL INSTITUTIONS
Download and install of QR code scanning apps of several institutions, especially by large
universities during admissions and corporate companies during mass recruitments could be very
time consuming. A universal mobile app may be developed and placed on Google Play Store and
iPhone App Store. The universal app may provide UI screens to add different institutes and their
corresponding public keys to the app memory. When a certificate verifier wants to scan a
certificate, he can select the institute issuing the certificate from the existing list and focus the
camera over the QR code which would capture and decrypt the ciphertext encoded therein with
the public key of the institute.
Academic institutes world wide could publish their public keys on their respective websites in the
form of QR code so it would be easy to capture and store them with the scanning app. Another,
better approach is to release the initial version of the app with the public keys of most popular
institutes and universities around the word built into it to avoid time consuming visits to all their
websites by verifying parties. Any missing institutes could be allowed to join the app later
through online registration. The additional institutes may be added to the already installed app
through over-the-air data updates. Alternatively, app users could integrate any missing institutes
and universities manually as required.
8. QR CODE SCAN OUTPUT OF FORGED CERTIFICATES
When a forger or fabricator alters or completely replaces the content in a genuine certificate with
QR code, he has two options, either leaving the QR code as is or replacing the actual QR code
with his own QR code encoding the altered or replacing information encrypted with his own
private key. Fig.3 below shows a forged certificate leaving the QR code as is.
7. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.11, No.1, February 2021
17
Table. 3 below shows content obtained on scanning the QR code and the content printed on the
forged certificate.
Table 3. Content obtained on QR code scan and content on the forged certificate
Content from QR Code Scan Content on Certificate Hard Copy
University: Silver Star University
Department: Computer Science
Student: John Powel
Degree: Graduate
Specialization: Computer Science
Month and Year: December 2018
Signed By: Robert Miller, Chair,
Computer Science
University: Silver Star University
Department: Computer Science
Student: Garry Smith
Degree: Graduate
Specialization: Computer Science
Month and Year: December 2018
Signed By: Robert Miller, Chair,
Computer Science
As the student name from QR code scan result mismatches with the one printed on the certificate,
it is a clear indication of forgery.
On the other hand, if the forger prints his own QR code that he generated encoding the printed
information using his own private key, it will produce a totally junk text on the QR code scan by
a verifier, which will again prove forgery of the academic certificate. This is because the forger’s
private key and the institute’s public key stored in the app memory are not mathematically related
to produces an exactly matching content to escape forgery detection.
9. CERTIFICATE ENCODING INTO QR CODE
Forgery verification of academic certificates can be implemented using any public key crypto
system. Today, the industry standard for RSA key length is 2048 bits. With RSA encryption, the
plain certificate information M is encrypted to generate a ciphertext C as shown below:
C = Me
mod n, where e is the private key exponent and should be kept secret.
The ciphertext C is encoded into a QR code that should be printed on the certificate.
When the QR code scanning app of the institute scans the QR code, it will capture the ciphertext
C from it and decrypt it to the original plain text M as shown below:
M = Cd
mod n, where d is the public key exponent stored in app memory
The key modulus n is common on both sides and should be stored in memory of both the
certificate printing and scanning applications.
In public key cryptography use cases of ecommerce and online communication, usually the plain
text is encrypted with the public key and the ciphertext is decrypted with the private key.
However, in this case the process is reversed, that is, the plain text is encrypted by the private key
and the ciphertext is decrypted with the public key.
10. PRECAUTIONS ON SELECTING THE PUBLIC KEY
Usually, small numbers like 3 or 65537 are chosen as the encrypting exponent of an RSA key in
order to minimize the ciphertext computation effort. This practice should be unfollowed for
generating keys for QR code verification of educational certificates and transcripts. The
8. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.11, No.1, February 2021
18
encrypting key exponent should be the order of the key modulus. Otherwise, it can minimize a
brute force attacker’s effort in guessing the right exponent that would generate the right QR code
to be printed on the forged certificates and transcripts to escape forgery detection.
11. BENEFICIARIES OF THE TECHNIQUE
Encrypted QR code certificates will be useful to a multitude of beneficiaries including:
students who like to scan their own certificates
institutes offering admissions to higher degrees courses for qualifying students with
lower degrees
universities offering admissions to native as well as foreign students
employers and recruiters offering jobs based on qualifications
third parties offering certificate verification and attestation services
immigration authorities
government agencies conducting competitive examinations
banks offering student loans
12. PRACTICAL IMPLEMENTATION AND ADOPTION
Adoption of encrypted QR Code certificates will spread rapidly once open-source mobile apps
are developed and educational institutes start issuing certificates with encrypted QR codes to their
passing students. The cost incurred by an institute or university would be very nominal as it
requires them only to acquire a cryptographic key pair and publish their public key on their
website.
Education ministries around the word may release policies mandating their academic institutes
and universities to printencrypted QR code on their certificates. An open-source trusted app that
can integrate and manage the public keys of institutes around the world will become a great thrust
for the adoption of QR coded certificates. Education ministries, universities, or large software
companies may take the initiative to develop and release such mobile and desktop apps to help
QR coded certificates evolve as a standard of the education industry. Also, branded mobile
phones may include such an app in their built-in apps provided with the device.
13. ENCRYPTED QR CODES VS BLOCKCHAIN
Of late blockchain technology is finding application in a wide range of sectors including
education. However, blockchain is a very complicated leger that brings lot of challenges and
burdens along with its advantages. Every small institute may not be able to afford products and
services based on the blockchain technology. Moreover, the growth of a blockchain ledger is tied
to the incentives provided for miners for solving a cryptography puzzle that would add a new
block to the leger. It is more suitable for financial and other such sectors where there is lot of
money spinning around.
On the other hand, encrypted QR codes provide a very light weight solution for forgery and
fabrication detection in educational certificates which brings only a nominal cost to the academic
institutes and universities and zero cost and burden to students and third-party verifiers. Forgery
detection can be done with both hard copy certificates as well as their digital copies.
9. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.11, No.1, February 2021
19
14.CONCLUSION
Certificate forgery is a serious concern for educational institutes, universities, employers,
organizations, immigration authorities and even government departments as it affects the
opportunities of those who earn educational degrees with sustained hard work throughout their
course duration. It also degrades the education standard of the society and affects productivity of
the organizations hiring the candidates holding such forged degrees.
A new method of detecting forgery in academic credentials using cryptography and QR codes has
been presented. Explained in detail is the procedure of encrypting a certificate content to produce
a ciphertext, creating a QR code encoding the ciphertext and printing it on the certificate to be
issued. Also explained in detail is how a mobile or desktop app can integrate the public key of the
institute issuing the certificate and scan it for forgery and fabrication.
The proposed method requires that academic institutes and universities obtain a cryptographic
key pair and also develop and publish a scanning app using which certificate verifiers can scan
the encrypted QR code on their issued certificates. It is also recommended that an opensource
mobile and desktop application be developed and placed on the web for download, which will
relieve the institutes from the burden of developing their own independent scanning apps.
QR coded certificates may be implemented very easily with minimal cost to academic institutes
and universities. These certificates enable quick detection of forgery and fabrication by the
verifying students, institutes, universities, employers, immigration authorities, banks and third
parties offering certificate verification services.
REFERENCES
[1] Embry-Riddle Aeronautical University, "Fraudulent Transcripts",
https://commons.erau.edu/cgi/viewcontent.cgi?article=2490&context=publication
[2] exactbackgroundchecks.com, "Education Verification",
“https://www.exactbackgroundchecks.com/education-verification.html
[3] Alexander Grech and Anthony F. Camilleri , “Blockchain in Education”,
https://publications.jrc.ec.europa.eu/repository/bitstream/JRC108255/jrc108255_blockchain_in_educ
ation%281%29.pdf
[4] M. Turkanović, M. Hölbl, K. Košič, M. Heričko and A. Kamišalić, "EduCTX: A Blockchain-Based
Higher Education Credit Platform," in IEEE Access, vol. 6, pp. 5112-5127, 2018, doi:
10.1109/ACCESS.2018.2789929.
[5] Jon Russell, “Sony wants to digitize education records using the blockchain”,
https://techcrunch.com/2017/08/09/sony-education-blockchain/
[6] R. Arenas and P. Fernandez, "Credence Ledger: A Permissioned Blockchain for Verifiable Academic
Credentials," 2018 IEEE International Conference on Engineering, Technology and Innovation
(ICE/ITMC), Stuttgart, 2018, pp. 1-6.
[7] OMAR S. SALEH, OSMAN GHAZALI, MUHAMMAD EHSAN RANA, "BLOCKCHAIN BASED
FRAMEWORK FOR EDUCATIONAL CERTIFICATES VERIFICATION", Journal of Critical
Reviews, Vol 7, Issue 3, 2020
10. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.11, No.1, February 2021
20
[8] Melissa Rizzi, "An Answer to University Document Fraud", https://www.digitary.net/answer-to-doc-
fraud/
[9] Kevin Stine and Quynh Dang, "Encryption Basics",
http://library.ahima.org/doc?oid=104090#.X_6MluhKhPY
[10] SSL2BUY.com, "Difference Between Hashing and Encryption",
https://www.ssl2buy.com/wiki/difference-between-hashing-and-encryption
[11] NICOLAS POGGI, "Types of Encryption: Symmetric or Asymmetric? RSA or AES?",
https://preyproject.com/blog/en/types-of-encryption-symmetric-or-asymmetric-rsa-or-aes/
[12] docstore.mik.ua,"ACryptographyPrimer",
https://docstore.mik.ua/orelly/networking_2ndEd/ssh/ch03_02.htm
[13] Scanova Blog, "What is a QR Code: A Beginner’s Guide", https://scanova.io/blog/what-is-a-qr-code/
[14] Sumit Tiwari, "An Introduction To QR Code Technology", 2016 International Conference on
Information Technology
[15] QR Code Generator, "How Does a QR Code Encode Data?", https://www.qr-code-
generator.com/blog/how-does-a-qr-code-encode-data/
AUTHOR
Cheman Shaik is a Research & Development professional in Computer Science and
Information Technology for the last twenty years. He has been an inventor in these
areas of technology with eight U.S Patents for his inventions in Cryptography,
Password Security, Codeless Dynamic Websites, Text Generation in Foreign
Languages, Anti-phishing Techniques and 3D Mouse for Computers. He is the
pioneer of the Absolute Public Key Cryptography in 1999. He is well known for his
Password Self Encryption Method which has earned him three U.S Patents. He has
published research papers in the international journals – IJCSEA, IJCIS and the
proceedings of EC2ND 2006 and CSC 20
DISCLAIMER
The educational certificate used in this paper is not a real one issued to any real student but a prepared one
only for the purpose of illustration.