Volume 14 , Issue 1 , PP: 120-128, 2024 | Cite this article as | XML | Html | PDF | Full Length Article
Sinan Q. Salih 1 * , Ravi Sekhar 2 , Jamal Fadhil Tawfeq 3 , Amer Ibrahim 4 , Pritesh Shah 5 , Ahmed Dheyaa Radhi 6
Doi: https://doi.org/10.54216/FPA.140111
Even though the transmission and processing speeds of electronic documents have been vastly enhanced, electronic document information may be revealed, counterfeited, tampered with, or otherwise compromised. To maintain corporate success in the marketplace, network security should be essential to the protection of electronic documents. As a result, there is a rising demand for authentication and verification procedures for a variety of important documents, including those used in banking, government, and other transactions as well as certificates and other academic credentials. In recent years, there has been a fast growth of digital watermarking technology, which involves embedding invisible or hidden digital signatures into data without compromising the data's authenticity. Hence, in this paper, we utilize the watermarking technology in the encrypted data using dynamic wavelet transform algorithm to make a document more protected. Now the protected data is sent to cloud database for storage. Integrated digital signature algorithm (SHA-256 + DSA) is proposed in this research to generate digital signature for each document. When recipients download the data, the data is verified for its integrity after extracting the digital signature and encrypted data. This strategy improves record security. We also compare the suggested technique to standard practices and assess its performance based on a variety of indicators to demonstrate its effectiveness.
Online electronic documents , watermarking technology , digital signature , dynamic wavelet transform algorithm , integrated digital signature algorithm (SHA-256+DSA)
[1] Rathore, M. S., Poongodi, M., Saurabh, P., Lilhore, U. K., Bourouis, S., Alhakami, W., ... & Hamdi, M. (2022). A novel trust-based security and privacy model for internet of vehicles using encryption and steganography. Computers and Electrical Engineering, 102, 108205.
[2] Hurrah, N. N., Parah, S. A., Loan, N. A., Sheikh, J. A., Elhoseny, M., & Muhammad, K. (2019). Dual watermarking framework for privacy protection and content authentication of multimedia. Future generation computer Systems, 94, 654-673.
[3] Kiu, M.S., Lai, K.W., Chia, F.C. and Wong, P.F., 2022. Blockchain integration into electronic document management (EDM) system in construction common data environment. Smart and Sustainable Built Environment.
[4] Ali, O., Shrestha, A., Soar, J., & Wamba, S. F. (2018). Cloud computing-enabled healthcare opportunities, issues, and applications: A systematic review. International Journal of Information Management, 43, 146-158.
[5] Dagher, G.G., Mohler, J., Milojkovic, M. and Marella, P.B., 2018. Ancile: Privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology. Sustainable cities and society, 39, pp.283-297.
[6] Melman, O. Evsutin, and A. Shelupanov, “An authorship protection technology for electronic documents based on image watermarking”, Technologies, 8(4), p.79, 2020.
[7] S. Sinurat, and E.R. Siagian, “Application of the Concept of Singular Value Decomposition forthe Making of Watermark in Documents”, Instal: Jurnal Komputer, 14(01), pp.24-30, 2022.
[8] C. Kumar, A.K. Singh, and P. Kumar, “Dual watermarking: An approach for securing digital documents”, Multimedia Tools and Applications, 79(11), pp.7339-7354, 2020.
[9] Krishnamoorthy, S., Dua, A., & Gupta, S. (2023). Role of emerging technologies in future IoT-driven Healthcare 4.0 technologies: A survey, current challenges and future directions. Journal of Ambient Intelligence and Humanized Computing, 14(1), 361-407.
[10] U. Khadam, M.M. Iqbal, M.A. Azam, S. Khalid, S. Rho, and N. Chilamkurti, “Digital watermarking technique for text document protection using data mining analysis”, IEEE Access, 7, pp.64955-64965, 2019.
[11] H. Wang, and Y. Song, “Secure cloud-based EHR system using attribute-based cryptosystem and blockchain”, Journal of medical systems, 42(8), pp.1-9, 2018.
[12] A.D. Dwivedi, G. Srivastava, S. Dhar, and R. Singh, “A decentralized privacy-preserving healthcare blockchain for IoT”, Sensors, 19(2), p.326, 2019.
[13] J.A. Alzubi, “Blockchain-based Lamport Merkle digital signature: authentication tool in IoT healthcare”, Computer Communications, 170, pp.200-208, 2021.
[14] H. Ghayvat, S. Pandya, P. Bhattacharya, M. Zuhair, M. Rashid, S. Hakak, and K. Dev, “CP-BDHCA: Blockchain-based Confidentiality-Privacy preserving Big Data scheme for healthcare clouds and applications”. IEEE Journal of Biomedical and Health Informatics, 26(5), pp.1937-1948, 2021.
[15] N.J.G. Saho, and E.C. Ezin, “December. Securing document by digital signature through RSA and elliptic curve cryptosystems”. In 2019 International Conference on Smart Applications, Communications and Networking (SmartNets) (pp. 1-6). IEEE, 2019.
[16] Salih YK, See OH, Yussof S, Iqbal A, Mohammad Salih SQ. A proactive fuzzy-guided link labeling algorithm based on MIH framework in heterogeneous wireless networks. Wirel Pers Commun. 2014;75(4):2495–511.
[17] Tao H, Salih SQ, Saggi MK, Dodangeh E, Voyant C, Al-Ansari N, et al. A Newly Developed Integrative Bio-Inspired Artificial Intelligence Model for Wind Speed Prediction. IEEE Access [Internet]. 2020;8:83347–58. Available from: https://ieeexplore.ieee.org/document/9078735/
[18] Ali AM, Ngadi MA, Sham R, Al Barazanchi II. Enhanced QoS Routing Protocol for an Unmanned Ground Vehicle, Based on the ACO Approach. Sensors (Basel). 2023;23(3).
[19] Ali AM, Ngadi MA, Al Barazanchi II, JosephNg PS. Intelligent Traffic Model for Unmanned Ground Vehicles Based on DSDV-AODV Protocol. Sensors (Basel). 2023;23(14):1–13.
[20] Al-Barazanchi I, Hashim W, Ahmed Alkahtani A, Rasheed Abdulshaheed H, Muwafaq Gheni H, Murthy A, et al. Remote Monitoring of COVID-19 Patients Using Multisensor Body Area Network Innovative System. Al-Sarem M, editor. Comput Intell Neurosci [Internet]. 2022 Sep 15;2022:1–14. Available from: https://www.hindawi.com/journals/cin/2022/9879259/