Automatic Inspection Verification Using Digital Certificate

  • B. AkshayaEmail author
  • M. Rajendiran
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 35)


Digital certificates are a core component in the provision of secure data communication. We propose the concept of digital certificate that can be used to provide client verification. Cryptographic methods are used to explore these aspects of data security and there are many drawbacks in current encryption algorithms in respect of security, real-time performance and so on. Among them, the elliptic curve cryptography (ECC) and Rivest, Shamir, Adelman (RSA) is evolving as important cryptographic methods since it offers high security. In our proposed system, Optical Character Recognition is used to convert the scanned image to extract the parameters in it and the parameters are encrypted and decrypted using RSA and ECC. So, encrypted digital certificate is created for each individual and stored in a private database for inspection purpose. The public or private sector organization verifies the digital certificate by sending a request to authorization server and the response is generated by referring the parameters of encrypted digital certificate with the parameters extracted from the local database. The main purpose of the digital certificate is to avert duplicates and forgeries.


Digital certificate Optical Character Recognition RSA ECC Authorization server 


  1. 1.
    Kuznetsov, A., Pushkar, A., Kiyan, N., Kuznetsova, T.: Code-based electronic digital signature. In: IEEE International Conference on Dependable Systems, Services and Technologies, vol. 9, no. 29 (2015)Google Scholar
  2. 2.
    Fujisaki, M., Iwamura, K., Inamura, M., Kaneda, K.: Improvement and implementation of digital content protection scheme using identity based signature. IEEE Trans. Inf. Forensics Secur. 7(6), 1673–1686 (2012)CrossRefGoogle Scholar
  3. 3.
    Saha, P.: A comprehensive study on digital signature for internet security. ACCENTS Trans. Inf. Secur. 11 (2016). ISSN 2455-7196Google Scholar
  4. 4.
    Wu, C.: Self generated certificate. In: IEEE Conference on Data Appications, Security and Privacy, pp. 159–174 (2012)Google Scholar
  5. 5.
    Hwang, T., Gope, P.: Forward/backward unforgeable digital signature scheme using symmetric-key crypto-system. J. Inf. Sci. Eng. 26(6), 2319–2329 (2013)Google Scholar
  6. 6.
    Kozlov, A., Reyzin, L.: Forward-secure signatures with fast key update. In: Proceedings of Security in Communication Networks. LNCS, vol. 2576, pp. 247–262 (2002)Google Scholar
  7. 7.
    Zhu, G., Zheng, Y., Doermann, D., Jaeger, S.: Signature detection and matching for document image retrieval. IEEE Trans. Pattern Anal. Mach. Intell. 31(11), 2015–2031 (2013)Google Scholar
  8. 8.
    Zhou, C., Cui, Z.: Certificate based signature in the standard model. IEEE Trans. Inf. Forensics Secur. 48, 313–317 (2016)Google Scholar
  9. 9.
    Hinarejos, M.F., Almenarez, F., Arias-Cabarcos, P., Ferrer-Gomila, J.-L., Lopez, A.M.: A probabilistic approach for assessing risk in certificate-based security. IEEE Trans. Inf. Forensics Secur. 13, 202–217 (2018)CrossRefGoogle Scholar
  10. 10.
    Saha, G.: Digital signature system for paperless operation. In: International Conference on Communication and Signal Processing, vol. 10, no. 18 (2017)Google Scholar
  11. 11.
    Idalino, T.B., Coelho, M., Martina, J.E.: Automated issuance of digital certificates through the use of federations. In: IEEE International Conference on Availability, Reliability and Security, pp. 189–195 (2016)Google Scholar
  12. 12.
    Zhu, W.-T., Lin, J.: Generating correlated digital certificates: framework and applications. IEEE Trans. Inf. Forensics Secur. 11(12), 1117–1127 (2016)CrossRefGoogle Scholar
  13. 13.
    Singh, S.: Generation and verification of digital certificate. In: IEEE International Conference on Advanced Technologies for Communications, vol. 10, no. 12 (2014)Google Scholar
  14. 14.
    Feng, J., Saha, P.: A new certificate-based digital signature scheme. IET Inf. Secur. 31(8) (2013)Google Scholar
  15. 15.
    Mali, A.: Authenticated document transfer based on digital signature and a survey of its existing techniques. Int. Res. J. Eng. Technology. 3(12) (2016). ISSN 2395-0056Google Scholar
  16. 16.
    Murthy, M.S., Kittichokechai, K.: Digital signature and watermark methods for image authentication using cryptography analysis. IEEE Trans. Inf. Theor. 19(8), 1803–1976 (2016)Google Scholar
  17. 17.
    Lin, D.R., Wang, C.I., Guan, D.J.: A forward-backward secure signature scheme. J. Inf. Sci. Eng. 26(6), 2319–2329 (2010)MathSciNetGoogle Scholar
  18. 18.
    Blakley, G.R., et al.: Safeguarding cryptographic keys. In: Proceedings of the National Computer Conference, vol. 48, pp. 313–317 (1979)Google Scholar
  19. 19.
    Harn, L., Lin, C.: Detection and identification of cheaters in (t, n) secret sharing scheme. Des. Codes Crypt. 52(1), 15–24 (2009)MathSciNetCrossRefGoogle Scholar
  20. 20.
    Park, J., Lee, J., Lee, H., Park, S., Polk, T.: Internet X.509 public key infrastructure subject identification method (SIM), RFC 4683, October 2006Google Scholar
  21. 21.
    Lin, J., Zhu, W.-T., Wang, Q., Zhang, N., Jing, J., Gao, N.: RIKE+: using revocable identities to support key escrow in public key infrastructures with flexibility. IET Inf. Secur. 9(2), 136–147 (2015)CrossRefGoogle Scholar
  22. 22.
    Steinfeld, R., Bull, L., Wang, H., Pieprzyk, J.: Universal designated verifier signatures. In: Asiacrypt 2003. LNCS, vol. 2894, pp. 523–542 (2013)CrossRefGoogle Scholar
  23. 23.
    Schnorr, C.: Efficient signature generation by smart cards. J. Cryptol. 4(3), 161–174 (2011)zbMATHGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringPanimalar Engineering CollegeChennaiIndia

Personalised recommendations