Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/472956
Title: A Secure Framework Based on Blockchain Methodologies to Identify Authentications in Decentralized Document Verification Systems
Researcher: Priya, N
Guide(s): Ponnavaikko, M
Keywords: Computer Science
Computer Science Artificial Intelligence
Engineering and Technology
University: Error Bharath Institute of Higher Education and Research
Completed Date: 2023
Abstract: Document verification is a process of evaluating the documents of end users or participants of the network and verifying the authentication in the most trustable way. The verification process was done manually in the olden days. Because of the development of technology, each document is converted into digital documents and faces issues like duplication, loss of records, data theft, and forgery of documents. These digital documents have been verified initially with their own identity. Identity authentication is very much essential to confirm the uniqueness of every individual. Many document verification systems exist globally, utilizing more security layers for verification methods. But they lacked in a few factors like privacy, transparency, high cost, and latency. Each verification method is controlled by a centralized authority. Schemes towards economically improving security with transparency and reduced processing time are required in decentralized systems adopted for storing and sharing documents. The relevant study focused here refers to pursuing a blockchain mechanism presented via three possible modules of implementation. This research focuses on improving security with transparency and reducing processing costs and time in a decentralized system. A blockchain mechanism is used for its decentralized nature that would be applied in storing and sharing records. The research is classified into three modules. The first module is concerned with verifying the possibility of anomaly detection using deep-learning (DL) algorithms, considering the academic record as an exemplar of input details. In this, academic records are taken as the input data. Relevant malicious activities (such as forging and/or document alterations) are detected via the Tensor Flow approach, wherein the processing time is saved in its hash values. Further, regarding any image details considered, the deeplearning algorithms with backpropagation suites are adopted to verify possible anomalies. Observed changes in hash values are indicators of
Pagination: 
URI: http://hdl.handle.net/10603/472956
Appears in Departments:Department of Computer Science and Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File196.22 kBAdobe PDFView/Open
02_prelim pages.pdf1.22 MBAdobe PDFView/Open
03_content.pdf280.7 kBAdobe PDFView/Open
04_abstract.pdf219.8 kBAdobe PDFView/Open
05_chapter 1.pdf520.4 kBAdobe PDFView/Open
06_chapter 2.pdf318.05 kBAdobe PDFView/Open
07_chapter 3.pdf432.14 kBAdobe PDFView/Open
08_chapter 4.pdf512.48 kBAdobe PDFView/Open
09_chapter 5.pdf645.92 kBAdobe PDFView/Open
10_chapter 6.pdf1.11 MBAdobe PDFView/Open
11_chapter 7.pdf501.38 kBAdobe PDFView/Open
12_bibliography.pdf645.04 kBAdobe PDFView/Open
80_recommendation.pdf696.7 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: