2012 UKSim 14th International Conference on Computer Modelling and Simulation 2012
DOI: 10.1109/uksim.2012.81
|View full text |Cite
|
Sign up to set email alerts
|

Protection of Integrity and Ownership of PDF Documents Using Invisible Signature

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0
1

Year Published

2013
2013
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 15 publications
0
6
0
1
Order By: Relevance
“…Berdasarkan uraian pada pendahuluan dan paragraf sebelumnya maka peneliti menetapkan bahwa algortima yang cocok untuk kebutuhan ini adalah DSA. Berdasarkan beberapa penelitian terdahulu, algoritma ini mampu melakukan generating and identifying pada key dan dokumen yang dikirim ke penerima sehingga keabsahan dan integritas dokumen dapat terjaga (Nuraeni, Agustin and Muharam, 2018;Al Shaikhli et al, 2012;Lakshmanan and Madheswaran, 2012…”
Section: Metode Penelitianunclassified
“…Berdasarkan uraian pada pendahuluan dan paragraf sebelumnya maka peneliti menetapkan bahwa algortima yang cocok untuk kebutuhan ini adalah DSA. Berdasarkan beberapa penelitian terdahulu, algoritma ini mampu melakukan generating and identifying pada key dan dokumen yang dikirim ke penerima sehingga keabsahan dan integritas dokumen dapat terjaga (Nuraeni, Agustin and Muharam, 2018;Al Shaikhli et al, 2012;Lakshmanan and Madheswaran, 2012…”
Section: Metode Penelitianunclassified
“…The fragile watermark is embedded in the spatial domain using the least significant bit (LSB) method. The Hash key is generated by using SHA-256 hash function [8,9]. Fig.…”
Section: Embedding the Watermark Signalsmentioning
confidence: 99%
“…Several studies related to the technique of proving ownership of pdf files have been done before, including: digital signature insertion in the xref pdf section [7], the use of watermaking inserted at xref pdf [8]. In study [7], insertion is done by overwriting 3 bytes character 20 ASCII or space characters in each row of xref. Inserted digital signature data cannot be perceived and does not add to the size of the file as long as the xref capacity is still sufficient.…”
Section: Introductionmentioning
confidence: 99%
“…Inserted digital signature data cannot be perceived and does not add to the size of the file as long as the xref capacity is still sufficient. But in research [7], it still cannot handle data insertion that exceeds the capacity of xref. Whereas in research [8], digital signatures are inserted in each row of xref as much as 5 bytes which have previously been compressed using the RC4 algorithm.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation