CFP last date
20 January 2025
Reseach Article

Toward Safe and Secure Electronic Documents of E-Governments: Generating Authentic Documents using Image Processing Techniques

by Abdullah Al-shraideh, Sulieman Bani-ahmad, Audeh Bani-ahmad
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 63 - Number 8
Year of Publication: 2013
Authors: Abdullah Al-shraideh, Sulieman Bani-ahmad, Audeh Bani-ahmad
10.5120/10485-5235

Abdullah Al-shraideh, Sulieman Bani-ahmad, Audeh Bani-ahmad . Toward Safe and Secure Electronic Documents of E-Governments: Generating Authentic Documents using Image Processing Techniques. International Journal of Computer Applications. 63, 8 ( February 2013), 10-19. DOI=10.5120/10485-5235

@article{ 10.5120/10485-5235,
author = { Abdullah Al-shraideh, Sulieman Bani-ahmad, Audeh Bani-ahmad },
title = { Toward Safe and Secure Electronic Documents of E-Governments: Generating Authentic Documents using Image Processing Techniques },
journal = { International Journal of Computer Applications },
issue_date = { February 2013 },
volume = { 63 },
number = { 8 },
month = { February },
year = { 2013 },
issn = { 0975-8887 },
pages = { 10-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume63/number8/10485-5235/ },
doi = { 10.5120/10485-5235 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:13:46.725855+05:30
%A Abdullah Al-shraideh
%A Sulieman Bani-ahmad
%A Audeh Bani-ahmad
%T Toward Safe and Secure Electronic Documents of E-Governments: Generating Authentic Documents using Image Processing Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 63
%N 8
%P 10-19
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

E-governmental applications have to find a solution for efficient and effective mechanism for authenticating and signing official documents. We propose and implement a mechanism for issuing secure electronic authentic governmental documents using watermark technology. The proposed mechanism constructs a watermark from domain name and MAC address of the governmental institution of interest. The watermark is augmented into the governmental document that is available in the form of image. This new mechanism promises allows the usage of watermarking to guarantee the authenticity and integrity of official documents. It can discover the change in these documents and the place where this change occurred. Proven by our experimental results, the proposed mechanism is secure and robust as the watermark will be embedded in multiple places inside the document where sensitive data is located, this way we can significantly reduce the probability of successful fraud of electronic documents.

References
  1. Gregory Kipper, 2004 edition, "Investigator's Guide to Steganograph",2004
  2. Stefan Katzenbeisser Fabien A. P. Petitcolas,2000,"Information Hiding Techniques for Steganography and Digital Watermarking"
  3. Ingemar J. Cox, Matthew L. Miller, second edition,Digital Watermarking and Steganography,2008
  4. Cox, I. J. Miller, M. L. Bloom, J. A. , 2000,"Watermarking applications and their properties", Coding and Computing, 2000. Proceedings. International Conference, pp 6 – 10, 06 August 2002
  5. Frank Y. Shih 2010,"image processing and pattern recognition fundamental and techniques",chapter 12
  6. Vidyasagar M. Potdar, Song Han, Elizabeth Chang, International Conference on Industrial Informatics, "a survey of digital image watermarking techniques",pp709 - 716,2005
  7. Ehab F. Badran, Ahmed Ghobashy, and Khamis El-Shennawy," DCT-based digital image watermarking VIA image segmentation Techniques ", Information & Communications Technology, 2006. ICICT '06. ITI 4th International Conference on,pp1-1,2007
  8. Frank Y Shih, 2010,Transactions on Data Hiding,chapter 12
  9. Chunlin Song, Sud Sudirman, Madjid Merabti and David Llewellyn-Jones," Analysis of Digital Image Watermark Attacks",, Consumer Communications and Networking Conference (CCNC), 2010 7th IEEE,pp 1-5,2010
  10. S. Voloshynovskiy, S. Pereira, T. Pun, "Attacks on digital watermarks: classification, estimation based attacks, and benchmarks", Communications Magazine, IEEE,, Volume 39,Issue8, pp118 – 126, 2001
  11. Wei Lua,, Hongtao Lu,Fu-Lai Chung, "robust digital image watermarking based on subsampling", Applied Mathematics and Computation, Volume 181, Issue 2, PP 886-893, 2006
  12. Yonggang Fu,Ruimin Shen," Robust Image Watermarking Scheme Based on Subsampling", Information Technology and Applications, 2005. ICITA 2005. Third International Conference on, Volume 2,pp 361-365,2005
  13. Ying-Hualui, Jing Qin, Jun kong, Si-Huili, "A robust digital watermarking scheme based on optimal coefficients selector about sub image", Wavelet Analysis and Pattern Recognition, ICWAPR '07. International Conference on, Volume 4,pp 1865 – 1869, 2007
  14. Kasmani, S. A. , Naghsh-Nilchi, "A New Robust Digital Image Watermarking Technique Based on Joint DWT-DCT Transformation", Convergence and Hybrid Information Technology, 2008. ICCIT '08. Third International Conference on, Volume 2,PP 539 - 544,2008
  15. Changjiang Zhang, inshan Wang, Xiaodong Wang," Digital Image Watermarking Algorithm with Double Encryption by Arnold Transform and Logistic,"Networked Computing and Advanced Information Management, 2008. NCM '08. Fourth International Conference on,PP 329 – 334,2008
  16. Ping Wah Wong, Memon," Secret and public key image watermarking schemes for image authentication and ownership verification", Image Processing, IEEE Transactions on, Volume
  17. Michael Arnold, Martin Schmucker and Stephen D. Wolthusen,"Techniques and Applications of Digital Watermarking and Content Protection",2003
  18. Munesh Chandra, Shikha Pandey,"A DWT Domain Visible Watermarking Techniques for Digital Images", 2010 International Conference on Electronics and Information Engineering (ICEIE 2010),2010
  19. Sami Baba, Lala Krekor, Thawar Arif and Zyad Shaaban," Watermarking scheme for copyright of digital images", IJCSNS International Journal of Computer Science and Network Security, VOL. 9 No. 4, April 2009
  20. Chunlin Song, Sud Sudirman, Madjid Merabti and David Llewellyn-Jones,"Analysis of Digital Image Watermark Attacks", IEEE Communications Society subject matter experts for publication in the IEEE CCNC 2010 proceedings,2010
  21. Zhitian Zhou, Congyang Hu,Study on the E-government Security Risk Management, IJCSNS International Journal of Computer Science and Network Security, VOL. 8 No. 5, May 2008
  22. E-Government Bulletin, ISSUE 336, 01 June 2011, http://www. headstar. com/egb2011/336. html#top
Index Terms

Computer Science
Information Sciences

Keywords

E-Government Watermarking Electronic documents