Skip to main content

Document/ Certificate Protection System

Document/ Certificate Protection System


Abstract:

The Minor project titled   “Document/ Certificate Protection System" is a system which is used to secure the government issued documents or certificate .Almost all Indian government issued documents are in physical form across the country. This means every time a resident needs to share the document with an agency to avail any service, an attested photocopy either in physical form or on scanned form is shared.

Use of document hard copies creates huge overhead in terms of manual verification, paper storage, manual audits, etc. incurring high cost and inconvenience. This creates problem for various agencies to verify the authenticity of these documents, thus, creating loopholes for usage of fake documents/certificates.  These documents can be misused by anyone as strong identity is not attached with the document. This system is digital locker which provides digital empowerment for residents. It minimize the use of physical documents. System helps authenticity of the e-documents and eliminates usage of fake documents. This system provides more security to documents. It reduces administrative overhead of Govt. departments and agencies and make it easy for the residents to receive services. Documents can be accessed by multiple users at anytime and anywhere. 


ARCHITECTURE / FRAMEWORK

METHODOGY / ALGORITHM 

 RIJNDAEL DES CIPHER ALGORITHM 

The U.S. National Bureau of Standards created a complicated encryption standard called DES 
(Data Encryption Standard) which offered unlimited ways to encrypt data. This encryption standard was replaced by Rijndael encryption. The name Rijndael is composed of the names John Daemon and Vincent Rijmen, two Belgian cryptology experts and authors of this method. Rijndael uses a key for encryption that has a size of 128, 192 or 256 bits, which provides high protection against brute force attacks. In addition, this encryption method also works three times faster in software than DES. This method can be used for securely exchanging keys as well as transferring data with a size of 128 or 256 bits.

MODULES SPECIFICATION 

There are four modules used in this system. They are following:- 
• Upload module. 
• Extract module. 
• Encryption module 
• Decryption module


                        UML DIAGRAM


 USECASE DIAGRAM 

SEQUENCE DIAGRAM

COLLABORATION DIAGRAM

 
ACTIVITY DIAGRAM 

--SUMMARY--


This will reduce the paper-work and workload of the verification team as all the documents will be available at a single place and that too secured.DigiLocker, national Digital Locker System launched by Govt. of India which provides 1GB of free space in the locker to  securely store resident documents, is somewhat similar to this idea of project. But it has certain drawbacks like, citizen cannot login unless he has Aadhar card. Other issue is that DigiLocker does not allow storing all the documents; it has options only for certain type of documents. Also citizens themselves upload the documents which may or may not be genuine. But our project not only allows storing the documents online, but also we guarantee their authenticity and security. The purpose of this project is just to secure the government issued documents or certificates.

                                Project By 
                                     Vikash Patel
             


Comments

Popular posts from this blog

Performing Analysis of Meteorological Data

  Analysis of Meteorological data In this blog, we are going to analyze the data from the Weather data-set of Finland, a country in Northern Europe. You can find the data-set on Kaggle ( https://www.kaggle.com/muthuj7/weather-dataset ). We are going to use the numpy, pandas, and the matplotlib libraries of Python. Following is the Hypothesis of the Analysis:  “Has the Apparent temperature and humidity compared monthly across 10 years of the data indicate an increase due to Global warming.” Let us start by importing the required libraries and our data-set: Libraries required for analysis Importing our data-set Here is a small preview of how our data-set looks: First 5 entries of our data-set Now we  n eed to drop the unwanted data, convert the data into our need, and resample our data : Here is how the data looks after resampling: First 5 entries of resampled data-set Now let us plot our data in a line graph As we can see, both the peaks and the troughs are almost the same...

Recognizing Handwritten Digits with scikit-learn

  Recognizing Handwritten Digits with scikit-learn In today’s blog, we are going to analyze the digits data-set of the Sci-Kit learn library. We will train a Support Vector Machine, and then we will be predicting the values of a few unknown Handwritten digits. Let us start by importing our libraries. Our data-set is stored in digits. Following is an example of a digit in our dataset. It consists of 64 pixels (8X8). The 1792nd element in our data-set Let us train our SVM with  t he first 1790 images in our data-set. After that, we will use the remaining Data-set as our test data and check our training machine's accuracy. Both predicted, and target values are the same. As we can see, we have achieved 100% accuracy. Let us now define a function that will find the accuracy of our SVM and train our model with varying data-set. We will start with 3 elements in our training data and work our way up to 1790 data and store our models' accuracy in a dictionary. The values dictionary hol...