skip to main content
10.1145/3108421.3108428acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiceegConference Proceedingsconference-collections
research-article

A New Academic Certificate Authentication Using Leading Edge Technology

Published:14 June 2017Publication History

ABSTRACT

Fraud in certificate issuance of academic documents such as degree certificates are seen frequently. This scenario has been ongoing because conducting fraud certificate is extremely easy and inexpensive. It has become a worldwide problem and in addition the process of certificate validation is complicated. This type of fraud not only jeopardizes the reputation of an institute but companies that offer a job also cannot easily trust the issuer and the graduates anymore. With many people graduating and certificates becoming more important, anti- certificate counterfeit is an essential solution to protect the authenticity and an institute's reputation. We propose a mobile app solution supported by secure web services for any high institution and organization in securing issued certificates. The system will query student's detail from the institute's database and securely encrypt and save on a separate server while also embedding it into a QR code printed on a certificate. This QR code will be used by a mobile app for validation purposes.

References

  1. A. Singhal and R. S. Pavithr, 2015. Degree Certificate Authentication using QR Code and Smartphone. Int. J. Comput. Appl., vol. 120, no. 16. Google ScholarGoogle ScholarCross RefCross Ref
  2. K.Peng, H.Sanabria, D.Wu, C.Zhu, 2016. Security Overview of QR Codes. Massachusetts Institute of Technology 6.857. Web, 14 Sept 2016. https://courses.csail.mit.edu/6.857/2014/files/12-peng-sanabria-wu-zhu-qr-codes.pdfGoogle ScholarGoogle Scholar
  3. E.Oreilly, 2011. Encrypted QR Codes, Nov 27,2011. Web 14 Sept 2016. https://qrworld.wordpress/2011/11/27/encrypted-qr-codes/Google ScholarGoogle Scholar
  4. S. Dey, 2016. SD-EQR: A New Technique To Use QR CodesTM in Cryptography, Use of QR CodesTM In Data Hiding and Securing. Dept Of Computer Science, St Xavier's College, Kolkata India.Web 15 Sept 2016. https://arxiv.org/ftp/arxiv/papers/1205/1205.4829.pdfGoogle ScholarGoogle Scholar
  5. D. Omaresevic, N.Behlilovic, S.Mrdovic, 2014. An Implementation of Secure Key exchange by Using QR Codes. ELMAR(ELMAR),2014 56th International Symposium. 10-12 Sept 2014. Google ScholarGoogle ScholarCross RefCross Ref
  6. M. Warasat and P. Kuacharoen, 2014. Paper-Based Document Authentication Using Digital Signature and QR Code 2012. 4th International Conference and Technology (ICCET 2012). IEEE Xplore 16 Oct 2014.Google ScholarGoogle Scholar
  7. K. Ashwini N and N.M Kazi,2014. A Watermark Technique based on SVD and DWT Composite Function with QR-code. Int. Journal Of Application or Innovation in Engineering & Management (IJAIEM), vol 3, Issue 7, July 2014.Google ScholarGoogle Scholar
  8. S. Brindha et. al, 2013. Secure User Authentication using Sclera in Quick Response Codes. Int. Journal of Engineering and Technology (IJET)., vol 5, no 5, Nov 2013.Google ScholarGoogle Scholar
  9. J.C Chuang, Y. Hu, H. Ko, 2010. A Novel Secret Sharing Technique Using QR Code. Int. Journal of Image Processing (IJIP), vol 4, issue 5, 2010.Google ScholarGoogle Scholar
  10. Robert et. al,2006. Optimisation of the SHA-2 family of hash functions on FPGAs. ISVLSI 2006.Google ScholarGoogle Scholar
  11. Seagate, 2016. 128-Bit Versus 256-Bit AES Encryption. Web 25 Sept 2016. www.axatum.com/AxCrypt/etc/seagate128vs256.pdfGoogle ScholarGoogle Scholar
  12. ECMA International, 2016. The JSON Data Interchange Format. Web 25 Sept 2016. www.ecma-international.org/publications/files/ECMA-ST/ECMA-404.pdfGoogle ScholarGoogle Scholar
  13. H. Reif, 2016. The Beautiful Features of SSL And Why You Want to Use Them?. Web 25 Sept 2016. www.modssl.org/docs/ossc1999/ossctalk.pdfGoogle ScholarGoogle Scholar

Index Terms

  1. A New Academic Certificate Authentication Using Leading Edge Technology

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        ICEEG '17: Proceedings of the 1st International Conference on E-commerce, E-Business and E-Government
        June 2017
        100 pages
        ISBN:9781450352482
        DOI:10.1145/3108421

        Copyright © 2017 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 14 June 2017

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader