ProgramsView all programs
From the news
- Chancellor Amma Addresses the Parliament of World’s Religions
- Amrita Students Qualify for the European Mars Rover Challenge
Publication Type : Conference Paper
Publisher : 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication, ASID 2009
Source : 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication, ASID 2009, Hong Kong (2009)
ISBN : 9781424438839
Keywords : Asymmetric cryptography, Authentication, Automated verification, Bar codes, Critical fields, Cryptography, Document authentication, Human errors, Innovation, Network security, New approaches, OCR, Paper sheeting, pdf417, Technology options
Campus : Bengaluru
School : School of Engineering
Department : Electrical and Electronics
Year : 2009
Abstract : Today's mark sheets/transcripts issued by the universities/institutions are neither standardised nor secure. In this paper a new method of generating mark sheets under a standardised framework with inbuilt protection has been suggested. This new approach employs 2D Barcode for machine reading capability, Reverse Asymmetric Cryptography to authenticate all the critical fields, OCR for automated verification of the correctness of each and every entry in the mark-sheet. The innovation introduced is in use of all the above technology options optimally to realize a line verification capability of the contents, with practically no limit in the size of the contents to be verified, with full retrieval capability of the full data and automated verification without a on-line look-up to the database and eliminating human error at the verification end.
Cite this Research Publication : S. Balsubramanian, R. Iye, P., and Dr. S. Ravishankar, “Mark sheet verification”, in 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication, ASID 2009, Hong Kong, 2009.