25-08-2017, 09:32 PM
ON ISSUING SECURE AND AUTHENTIC GOVERNMENTAL ELECTRONIC DOCUMENTS
ON ISSUING SECURE AND AUTHENTIC.doc (Size: 927.5 KB / Downloads: 33)
Abstract
E-governmental applications have to find a solution for efficient and effective mechanism for authenticating and signing official documents. We propose and implement a mechanism for issuing secure electronic authentic governmental documents using watermark technology. The proposed mechanism constructs a watermark from domain name and MAC address of the governmental institution of interest. The watermark is augmented into the governmental document that is available in the form of image. This new mechanism promises allows the usage of watermarking to guarantee the authenticity and integrity of official documents. It can discover the change in these documents and the place where this change occurred. Proven by our experimental results, the proposed mechanism is secure and robust as the watermark will be embedded in multiple places inside the document where sensitive data is located, this way we can significantly reduce the probability of successful fraud of electronic documents.
INTRODUCTION
By August 2012, UK citizens will be able to access government web-based services using their bank smartcards [22]. Such web-based services are expected to replace paper-based documents in many aspects. Providing authentic governmental documents is thus of vital necessity.
Computerized systems are now common place. Nowadays, Internet services make exchanging electronic documents in the form of images to be more easy and risky at the same time. This is because digital images can be tampered more easily than the non electronic documents. Consequently, the need for protecting digital image became more important these days.
TYPES OF WATERMARKING
Digital image watermarking can be classified into different types depending on its application. Next we will show the most popular types of digital watermarking according to its application [2].
Visible or localized watermarks: can be logos or overlay images in the field of image or video watermarking.
Invisible watermark: the added data can’t be perceived. Most of the current research focuses on this type of watermark than visible type. Invisible watermark increases the likelihood of prosecution after the theft has occurred. These watermarks should therefore not be detectable to attackers, otherwise they would try to remove it, and however they should be easily detectable by owners.
DIGITAL WATERMARKING PROPERTY
An image watermarking technique has to fulfill a number of characteristics such as: (i) robustness, (ii) tamper resistance, (iii) fidelity, (iv) computational cost, and (v) false positive rate. Next we explain each of these characteristics in a more detailed manner. In general, a good image watermarking technique is the one that adds watermarks that are difficult to notice, resistive to distortions, and resists malicious attacks [4].