Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/472956
Title: | A Secure Framework Based on Blockchain Methodologies to Identify Authentications in Decentralized Document Verification Systems |
Researcher: | Priya, N |
Guide(s): | Ponnavaikko, M |
Keywords: | Computer Science Computer Science Artificial Intelligence Engineering and Technology |
University: | Error Bharath Institute of Higher Education and Research |
Completed Date: | 2023 |
Abstract: | Document verification is a process of evaluating the documents of end users or participants of the network and verifying the authentication in the most trustable way. The verification process was done manually in the olden days. Because of the development of technology, each document is converted into digital documents and faces issues like duplication, loss of records, data theft, and forgery of documents. These digital documents have been verified initially with their own identity. Identity authentication is very much essential to confirm the uniqueness of every individual. Many document verification systems exist globally, utilizing more security layers for verification methods. But they lacked in a few factors like privacy, transparency, high cost, and latency. Each verification method is controlled by a centralized authority. Schemes towards economically improving security with transparency and reduced processing time are required in decentralized systems adopted for storing and sharing documents. The relevant study focused here refers to pursuing a blockchain mechanism presented via three possible modules of implementation. This research focuses on improving security with transparency and reducing processing costs and time in a decentralized system. A blockchain mechanism is used for its decentralized nature that would be applied in storing and sharing records. The research is classified into three modules. The first module is concerned with verifying the possibility of anomaly detection using deep-learning (DL) algorithms, considering the academic record as an exemplar of input details. In this, academic records are taken as the input data. Relevant malicious activities (such as forging and/or document alterations) are detected via the Tensor Flow approach, wherein the processing time is saved in its hash values. Further, regarding any image details considered, the deeplearning algorithms with backpropagation suites are adopted to verify possible anomalies. Observed changes in hash values are indicators of |
Pagination: | |
URI: | http://hdl.handle.net/10603/472956 |
Appears in Departments: | Department of Computer Science and Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 196.22 kB | Adobe PDF | View/Open |
02_prelim pages.pdf | 1.22 MB | Adobe PDF | View/Open | |
03_content.pdf | 280.7 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 219.8 kB | Adobe PDF | View/Open | |
05_chapter 1.pdf | 520.4 kB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 318.05 kB | Adobe PDF | View/Open | |
07_chapter 3.pdf | 432.14 kB | Adobe PDF | View/Open | |
08_chapter 4.pdf | 512.48 kB | Adobe PDF | View/Open | |
09_chapter 5.pdf | 645.92 kB | Adobe PDF | View/Open | |
10_chapter 6.pdf | 1.11 MB | Adobe PDF | View/Open | |
11_chapter 7.pdf | 501.38 kB | Adobe PDF | View/Open | |
12_bibliography.pdf | 645.04 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 696.7 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: