Digital Signature

Authors(2) :-Pooja , Mamta Yadav

The Information Technology Act 2000 (IT Act) dictates digital signatures as a means of authentication and security of electronic documents. Digital signature is an electronic token that creates binding between an entity and a data record. They serve the purpose of validation and authentication of electronic documents .Validation refers to the process of certifying the contents of the document, while authentication refers to the process of certifying the sender of the document. It can be said that a digital signature is an electronic version of a handwritten signature. The signing process is implemented with the help of public key cryptography; the signatory uses her private key to create a digital signature for a document. It is used to ensure that the original content of the message or document that has been sent is unchanged. Its varied nature has provided easy, faster, accurate and convenient mechanism for creating, storing, transmission and retrieval of data without involving traditional paper based formalities. This has increased the use of digital technology in day to day life which has led the world to go online that in turn has increased techno-dependency. Increasingly the business dealings, communication, official data and commercial transactions are being carried out in cyberspace. There has been transformation of world from paper based to digital based work. In the last few years, there has been a rapidly growing demand for a working digital signature framework for both public and public sector. The study revolves around the maximum information on digital signature, the future of Information Technology.

Authors and Affiliations

M.Tech Scholar CSE, M.D.U Rohtak,YCET Narnaul, Mahendergarh, Haryana, India
Mamta Yadav
Assistant Professor, CSE, M.D.U Rohtak,YCET Narnaul, Mahendergarh, Haryana, India

  1. F.E.S.,Dunbar, 2002. Digital Signature SchemeVariation, presented in University of Waterloo.
  2. A., Menezes, P., Van., Oorschot, and S. Vanstone,CRC Press, 1996. Handbook of Applied Cryptography.
  3. Z.,Liu, Y.,Hu, X.,Zhang, H.,Ma, 2010. Provably securemulti-proxy signature scheme with revocation in the standardmodel. Elsevier journal of computer Communications.
  4. J.,Zhang, C.,Liu, Y.,Yang, 2009. An efficient secureproxy verifiably encrypted signature scheme. Elsevier Journalof Networks and Computer Applications.
  5. F.,Li & M.,Khurram Khan, 2010. A biometric identitybasedsigncryption scheme. Elsevier Future Generation Computer Systems.
  6. L.,Buttyán, L.,Dóra, F.,Martinelli, M.,Petrocchi,2010. Fast certificate-based authentication scheme in multioperatormaintained wireless mesh networks. ElsevierComputer CommunicationsTransform", in Proc. 7th IEEE International Symposium on Signal Processing and InformationTechnology (ISSPIT'07), December 2007, Egypt.
  7. R.A. Santosa and P. Bao, "Audio-to-image wavelet transform based audio steganography," Proc. of47th Int. Symposium ELMAR, June 2005, pp. 209- 212.
  8. Xuping Huang, Ryota Kawashima, Norihisa Segawa, Yoshihiko Abe. "The Real-Time Steganography Based on Audio-to-Audio Data Bit Stream",Technical report of IEICE, ISEC, vol.106 pp.15-22, September 2006.
  9. Aoki, Naofumi. "A Band Widening Technique for VoIP Speech Using Steganography Technology", Report of IEICE, SP,106(333), pp.31-36, 2006.
  10. Xuping Huang, Ryota Kawashima, Norihisa Segawa, Yoshihiko Abe International Conference on Intelligent "Information Hiding and Multimedia Signal Processing" © 2008 IEEE.
  11. A. Delforouz, Mohammad Pooyan, "Adaptive Digital Audio Steganography Based on Integer wavelet transform ", IEEE Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2007, 26-28 Nov 2007, pp 283-286.
  12. R. A. Santosa, P. Bao," Audio-to-Image Wavelet Transform based Audio Steganography", 47th International Symposium ELMAR-2005 , 08-10 June 2005, Zadar, Croatia, pp 209-212.
  13. S. Shirali-Shahreza, M. T. Manzuri-Shalmani, "Adaptive Wavelet Domain Audio Steganography with High Capacity and Low Error Rate", IEEE International Conference on Information and Emerging Technologies, 2007, 06-07 July 2007 pp 1-5.
  14. Yincheng Qi, Jianwen Fu, and Jinsha Yuan, "Wavelet domain audio steganalysis based on statistical moments of histogram", Journal of System Simulation, Vol 20, No. 7, pp. 1912-1914, April 2008.
  15. Yin-cheng qi, liang ye, chong liu "Wavelet domain audio steganalysis for multiplicative embedding model" Proceedings of the 2009 International Conference on Wavelet Analysis and Pattern Recognition, Baoding, 12-15 July 2009.
  16. V. Vapnik, "Statistical Learning Theory", John Wiley, 2008.

Publication Details

Published in : Volume 3 | Issue 6 | July-August 2018
Date of Publication : 2018-07-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 71-75
Manuscript Number : CSEIT18364
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Pooja , Mamta Yadav , "Digital Signature ", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 6, pp.71-75, July-August-2018.
Journal URL :

Article Preview