ABSTRACT
Fraud in certificate issuance of academic documents such as degree certificates are seen frequently. This scenario has been ongoing because conducting fraud certificate is extremely easy and inexpensive. It has become a worldwide problem and in addition the process of certificate validation is complicated. This type of fraud not only jeopardizes the reputation of an institute but companies that offer a job also cannot easily trust the issuer and the graduates anymore. With many people graduating and certificates becoming more important, anti- certificate counterfeit is an essential solution to protect the authenticity and an institute's reputation. We propose a mobile app solution supported by secure web services for any high institution and organization in securing issued certificates. The system will query student's detail from the institute's database and securely encrypt and save on a separate server while also embedding it into a QR code printed on a certificate. This QR code will be used by a mobile app for validation purposes.
- A. Singhal and R. S. Pavithr, 2015. Degree Certificate Authentication using QR Code and Smartphone. Int. J. Comput. Appl., vol. 120, no. 16. Google ScholarCross Ref
- K.Peng, H.Sanabria, D.Wu, C.Zhu, 2016. Security Overview of QR Codes. Massachusetts Institute of Technology 6.857. Web, 14 Sept 2016. https://courses.csail.mit.edu/6.857/2014/files/12-peng-sanabria-wu-zhu-qr-codes.pdfGoogle Scholar
- E.Oreilly, 2011. Encrypted QR Codes, Nov 27,2011. Web 14 Sept 2016. https://qrworld.wordpress/2011/11/27/encrypted-qr-codes/Google Scholar
- S. Dey, 2016. SD-EQR: A New Technique To Use QR CodesTM in Cryptography, Use of QR CodesTM In Data Hiding and Securing. Dept Of Computer Science, St Xavier's College, Kolkata India.Web 15 Sept 2016. https://arxiv.org/ftp/arxiv/papers/1205/1205.4829.pdfGoogle Scholar
- D. Omaresevic, N.Behlilovic, S.Mrdovic, 2014. An Implementation of Secure Key exchange by Using QR Codes. ELMAR(ELMAR),2014 56th International Symposium. 10-12 Sept 2014. Google ScholarCross Ref
- M. Warasat and P. Kuacharoen, 2014. Paper-Based Document Authentication Using Digital Signature and QR Code 2012. 4th International Conference and Technology (ICCET 2012). IEEE Xplore 16 Oct 2014.Google Scholar
- K. Ashwini N and N.M Kazi,2014. A Watermark Technique based on SVD and DWT Composite Function with QR-code. Int. Journal Of Application or Innovation in Engineering & Management (IJAIEM), vol 3, Issue 7, July 2014.Google Scholar
- S. Brindha et. al, 2013. Secure User Authentication using Sclera in Quick Response Codes. Int. Journal of Engineering and Technology (IJET)., vol 5, no 5, Nov 2013.Google Scholar
- J.C Chuang, Y. Hu, H. Ko, 2010. A Novel Secret Sharing Technique Using QR Code. Int. Journal of Image Processing (IJIP), vol 4, issue 5, 2010.Google Scholar
- Robert et. al,2006. Optimisation of the SHA-2 family of hash functions on FPGAs. ISVLSI 2006.Google Scholar
- Seagate, 2016. 128-Bit Versus 256-Bit AES Encryption. Web 25 Sept 2016. www.axatum.com/AxCrypt/etc/seagate128vs256.pdfGoogle Scholar
- ECMA International, 2016. The JSON Data Interchange Format. Web 25 Sept 2016. www.ecma-international.org/publications/files/ECMA-ST/ECMA-404.pdfGoogle Scholar
- H. Reif, 2016. The Beautiful Features of SSL And Why You Want to Use Them?. Web 25 Sept 2016. www.modssl.org/docs/ossc1999/ossctalk.pdfGoogle Scholar
Index Terms
- A New Academic Certificate Authentication Using Leading Edge Technology
Recommendations
Document Certificate Authentication System Using Digitally Signed QR Code Tag
IMCOM '18: Proceedings of the 12th International Conference on Ubiquitous Information Management and CommunicationNow a day document such as Degree certificate can be easily forged fully or partially modifying obtained score result like GPA (Grade Point Average). Digital signature are used to detect unauthorized modification to data and to authenticate the identity ...
Guided differential testing of certificate validation in SSL/TLS implementations
ESEC/FSE 2015: Proceedings of the 2015 10th Joint Meeting on Foundations of Software EngineeringCertificate validation in SSL/TLS implementations is critical for Internet security. There is recent strong effort, namely frankencert, in automatically synthesizing certificates for stress-testing certificate validation. Despite its early promise, it ...
Coverage-directed Differential Testing of X.509 Certificate Validation in SSL/TLS Implementations
Secure Sockets Layer (SSL) and Transport Security (TLS) are two secure protocols for creating secure connections over the Internet. X.509 certificate validation is important for security and needs to be performed before an SSL/TLS connection is ...
Comments