This paper is published in Volume-5, Issue-4, 2019
Information Technology
Omkar Prakash Dalvi
Veermata Jijabai Technological Institute, Mumbai, Maharashtra, India
Pub. Date
12 July, 2019
Paper ID
Optical Character Recognition (OCR), Rivest-Shamir-Adleman (RSA), Security


Omkar Prakash Dalvi. Securing image document using RSA, International Journal of Advance Research, Ideas and Innovations in Technology,

Omkar Prakash Dalvi (2019). Securing image document using RSA. International Journal of Advance Research, Ideas and Innovations in Technology, 5(4)

Omkar Prakash Dalvi. "Securing image document using RSA." International Journal of Advance Research, Ideas and Innovations in Technology 5.4 (2019).


Abstract: It is difficult to store and secure all information or data in paper format which also creates a problem for a proper search, storing and durability of information. Increase in new smart technologies and ease of living has developed various ways to share small and vital information digitally with the use of various applications and devices. But as the ways of sharing information and technologies are increasing, the risk of misusing the information is also increasing. Protection and security of information is a necessary feature of such applications, software or devices which handle such information. In the case of images, the security systems still lack to provide security. As the increase in digitization, the documents such as identity proof, educational qualification, and various certificates are uploaded online on various government or private website and mobile applications to verify proper identification or eligibility of documents related to that person. Such uploads of documents or proofs are done in image format. But sharing of this information may lead to a serious loss or misuse of that information. This paper deals with securing image with the use of OCR and RSA algorithm for securing the information The image would be converted into text file and the generated text file would be encrypted and send through the network to the destination and again reverse or decryption process will be followed on the other side and text file will be again generated to its image form.
Paper PDF