Digital Repository

Digital Document Forgery Detection System

Show simple item record

dc.contributor.author Sanduni, Hasanga Uyanhewage
dc.date.accessioned 2020-05-17T17:44:01Z
dc.date.available 2020-05-17T17:44:01Z
dc.date.issued 2019
dc.identifier.citation Sanduni, Hasanga Uyanhewage (2019) Digital Document Forgery Detection System. BSc. Dissertation Informatics Institute of Technology. en_US
dc.identifier.other 2014522
dc.identifier.uri http://dlib.iit.ac.lk/xmlui/handle/123456789/341
dc.description.abstract Digital forgeries of documents occur in most confidential document systems. One of them is the electronic procurement system, which involves fraud at every step of the process. Most procurement systems in Sri Lanka do the process manually even though there are ways to submit the tender response document online. Main reason not to use online systems is that bidding organizations don't trust electronic systems. The proposed system provides a secure and trustful solution for current electronic procurement systems. The solution will report and notify the authorized individuals if any fraud activity has been occurred in the tender response document submitted. This helps to get any litigation before the winning bid is selected. Because of the inability to find fraud in current electronic systems, the winning bid goes to the wrong bidder. The problem is that the other people who are involved in the process don't know if any fraud activity happens to the documents, so nobody ever gets to know about the scenarios like this. The proposed solution uses steganography along with fuzzy hashing to detect forgeries that occur in the system in real time. It will detect where the forgery occurs in the document and point out the forged content to the user. More importantly, the solution works with most types of content in documents: Texts, images, tables and forgeries of searchable graphs can be identified from the solution. Using selected test approaches, functional and structural (non-functional) software was performed. The evaluated results demonstrate system accuracy at a satisfied level. A critical evaluation process was performed based on different evaluation criteria involving different evaluator groups. The results of the evaluation process identify the strengths, weaknesses and enhancements of the project. en_US
dc.subject Steganography en_US
dc.subject Fuzzy Hash en_US
dc.subject Data Hiding en_US
dc.subject Document Forgery en_US
dc.title Digital Document Forgery Detection System en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search


Advanced Search

Browse

My Account