Abstract
AbstractAdvances in digital technology and communication are reducing the popularity of physical or paper-based documents, particularly in the official academic field. Many academic institutions have shifted from paper-based academic documents to electronic formats. However, with the availability of document-editing and photo-editing software, an adversary can illegally modify original academic documents to suit their needs. Therefore, it is essential that receivers of these digital academic documents must verify the authenticity and detect the forgery of the documents. In this study, a cryptographic hash function, which is concerned with data integrity, is used to detect modifications of digital academic documents. Experiments were conducted to evaluate the correctness and speed of academic document verification. The proposed system was compared with other conventional methods such as digital signature-based, convolutional neural network, and blockchain-based methods. Our study shows that the proposed system can efficiently detect forged digital academic documents with 100% accuracy and a verification speed of 0.352 ms, which is considerably faster than the current digital signature-based, convolutional neural network and blockchain-based technologies. The proposed cryptographic hash function-based method provides another way to help detect forged academic documents.
Publisher
Springer Science and Business Media LLC
Reference40 articles.
1. Ali S, Anwer F (2024) Secure IoT framework for authentication and confidentiality using hybrid cryptographic schemes. Int J Inf Tecnol. https://doi.org/10.1007/s41870-024-01753-w
2. Babu SBGT, Rao CS (2023) Efficient detection of copy-move forgery using polar complex exponential transform and gradient direction pattern. Multimed Tools Appl 82:10061–10075. https://doi.org/10.1007/s11042-022-12311-6
3. Baldi M, Chiaraluce F, Kodra M, et al (2020) Security analysis of a blockchain-based protocol for the certification of academic credentials. In: Proceedings of the 3rd distributed ledger technology workshop co-located with ITASEC 2020, CEUR workshop proceedings, vol 2580. CEUR-WS.org, Ancona
4. Boonkrong S (2021) Authentication and access control: practical cryptography methods and tools. Apress Berkeley, Berkeley
5. Caldarelli G, Ellul J (2021) Trusted academic transcripts on the blockchain: a systematic literature review. Appl Sci 11(4):1842. https://doi.org/10.3390/app11041842