Open Access Open Access  Restricted Access Subscription or Fee Access

A Pattern Recognition Approach to Secure Cipher Documents

M. Sindu, M. Lakshmi Karthikeyani


This paper addresses public key cryptography concept, which involves the use of asymmetric key algorithms instead of or in addition to symmetric key algorithms. Unlike symmetric key algorithms, it does not require a secure initial exchange of one or more secret keys to both sender and receiver. Use of these keys allows protection of the authenticity of a message by creating a digital signature of a message using the private key, which can be verified using the public key. We present an approach to authenticating photo-ID documents that relies on pattern recognition and public-key cryptography and has security advantages over physical mechanisms that currently safeguard cards, such as optical laminates and holograms.


Cryptography, Holograms, Pattern Recognition, Symmetric Key.

Full Text:



Hsiao-Ping Tsai, Member, IEEE, De-Nian Yang, And Ming- Syan Chen, Fellow,” Exploring Application-Level Semantics For Data Compression” Knowledge And Data Engineering,Vol.23,No.1,January 2011

Scaglione And S.D. Servetto, “On The Interdependence Of Routing And Data Compression In Multi-Hop Sensor Networks,” Proc. Eighth Ann. Int’l Conf. Mobile Computing And Networking, Pp. 140-147, 2002.

Yang And W. Wang, “Cluseq: Efficient And Effective Sequence Clustering,” Proc. 19th Int’l Conf. Data Eng., Pp. 101-112, Mar. 2003.

S. Baek, G. De Veciana, And X. Su, “Minimizing Energy Consumption In Large-Scale Sensor Networks Through Distributed Data Compression And Hierarchical Aggregation,” Ieee J. Selected Areas In Comm., Vol. 22, No. 6, Pp. 1130-1140, Aug. 2004.

L. Chen, M. Tamer O ¨ zsu, and V. Oria, “Robust and Fast Similarity Search for Moving Object Trajectories,” Proc. ACM SIGMOD, pp. 491-502, 2005.

J. Yick, B. Mukherjee, and D. Ghosal, “Analysis of a Prediction-Based Mobility Adaptive Tracking Algorithm,” Proc. Second Int’l Conf. Broadband Networks, pp. 753-760, Oct. 2005.

A.L.N. Fred and A.K. Jain, “Combining Multiple Clusterings Using Evidence Accumulation,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 27, no. 6, pp. 835-850, June 2005.

J.Yang And M. Hu, “Trajpattern: Mining Sequential Patterns From Imprecise Trajectories Of Mobile Objects,” Proc. 10th Int’l Conf. Extending Database Technology, Pp. 664-681, Mar. 2006.

M. Nanni and D. Pedreschi, “Time-Focused Clustering of Trajectories of Moving Objects,” J. Intelligent Information Systems,vol. 27, no. 3, pp. 267-289, 2006.

S.Santini and K. Romer, “An Adaptive Strategy for Quality-Based Data Reduction in Wireless Sensor Networks,” Proc. Third Int’lConf. Networked Sensing Systems, pp. 29-36, June 2006

M. Morzy, “Mining Frequent Trajectories Of Moving Objects For Location Prediction,” Proc. Fifth Int’l Conf. Machine Learning And Data Mining In Pattern Recognition, Pp. 667-680, July 2007.

H.P.Tsai, D.-N. Yang, W.-C. Peng, and M.-S. Chen, “Exploring Group Moving Pattern for an Energy-Constrained Object Tracking Sensor Network,” Proc. 11th Pacific-Asia Conf. Knowledge Discovery and Data Mining, May 2007..

M.Younis and K. Akkaya, “Strategies and Techniques for Node Placement in Wireless Sensor Networks: A Survey,” Ad Hoc Networks, vol. 6, no. 4, pp. 621-655, 2008.

F.Osterlind and A. Dunkels, “Approaching the Maximum 802.15.4 Multi-Hop Throughput,” Proc. Fifth Workshop Embedded Networked Sensors, 2008.

C. Roux and R.T.F. Bernard, “Home Range Size, Spatial Distribution and Habitat Use of Elephants in Two Enclosed Game Reserves in the Eastern Cape Province, South Africa,” African J.Ecology, vol. 47, no. 2, pp. 146-153, June 2009.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.