Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A Pattern Recognition Approach to Secure Cipher Documents


Affiliations
1 Department of Computer Science and Engineering, P.S.R. Rengasamy College of Engineering for Women, Sivakasi, India
     

   Subscribe/Renew Journal


This paper addresses public key cryptography concept, which involves the use of asymmetric key algorithms instead of or in addition to symmetric key algorithms. Unlike symmetric key algorithms, it does not require a secure initial exchange of one or more secret keys to both sender and receiver. Use of these keys allows protection of the authenticity of a message by creating a digital signature of a message using the private key, which can be verified using the public key. We present an approach to authenticating photo-ID documents that relies on pattern recognition and public-key cryptography and has security advantages over physical mechanisms that currently safeguard cards, such as optical laminates and holograms.

Keywords

Cryptography, Holograms, Pattern Recognition, Symmetric Key.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 293

PDF Views: 2




  • A Pattern Recognition Approach to Secure Cipher Documents

Abstract Views: 293  |  PDF Views: 2

Authors

M. Sindu
Department of Computer Science and Engineering, P.S.R. Rengasamy College of Engineering for Women, Sivakasi, India
M. Lakshmi Karthikeyani
Department of Computer Science and Engineering, P.S.R. Rengasamy College of Engineering for Women, Sivakasi, India

Abstract


This paper addresses public key cryptography concept, which involves the use of asymmetric key algorithms instead of or in addition to symmetric key algorithms. Unlike symmetric key algorithms, it does not require a secure initial exchange of one or more secret keys to both sender and receiver. Use of these keys allows protection of the authenticity of a message by creating a digital signature of a message using the private key, which can be verified using the public key. We present an approach to authenticating photo-ID documents that relies on pattern recognition and public-key cryptography and has security advantages over physical mechanisms that currently safeguard cards, such as optical laminates and holograms.

Keywords


Cryptography, Holograms, Pattern Recognition, Symmetric Key.