Academic literature on the topic 'Secure portable document'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Secure portable document.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Secure portable document"

1

Khadim, Umair, Muhammad Munwar Iqbal, and Muhammad Awais Azam. "A Secure Digital Text Watermarking Algorithm for Portable Document Format (PDF)." Mehran University Research Journal of Engineering and Technology 41, no. 1 (2022): 100–110. http://dx.doi.org/10.22581/muet1982.2201.10.

Full text
Abstract:
Nowadays, with the rapid development of advanced technologies, an illegal copy of digital documents can be easily generated. The Portable Document Format is the most common and widely used text document on the internet. The copyright protection of these documents is a challenging task. Advanced techniques have been proposed in the past but have not delivered the expected results. These techniques are either robust or imperceptible or have a high capacity, but do not maintain the balance between all parameters. Digital watermarking has been used over the past decade to detect forgery and tamper
APA, Harvard, Vancouver, ISO, and other styles
2

Huang, Kuo-Hsuan, Sung-Huai Hsieh, Yuan-Jen Chang, Feipei Lai, Sheau-Ling Hsieh, and Hsiu-Hui Lee. "Application of Portable CDA for Secure Clinical-document Exchange." Journal of Medical Systems 34, no. 4 (2009): 531–39. http://dx.doi.org/10.1007/s10916-009-9266-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bernard, Renaldy Suteja, Victor Imbar Radiant, and Christianti Johan Meliana. "e-Certificate system based on Portable Document Format and QR Code for Academic Activities." International Journal of Computer Science Issues 17, no. 6 (2020): 87–91. https://doi.org/10.5281/zenodo.4431081.

Full text
Abstract:
Many academic activities are held in an educational institution. This activity is to increase knowledge beyond what is obtained during classroom learning. Participation is always proven by the existence of a certificate. Issuance of certificates costs money for paper, printing and distribution. The emergence of the paperless era should be able to change the existence of certificates. Paperless can be done with the presence of digital documents that can be accessed independently (portable), easily and across platforms. Another issue is how this portable certificate document is also protected fr
APA, Harvard, Vancouver, ISO, and other styles
4

Chen, Hai Yan, and Wei Liu. "Research on the Security Technology of Mobile Communication Information." Applied Mechanics and Materials 687-691 (November 2014): 2736–39. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2736.

Full text
Abstract:
This article presents a new solution of mobile and portable electronically published content protection which using function area and algorithm to ensure the mobile storage media security and secure authentication protocols to protect communication between data in storage media and document server, on condition that no security system installed on the target computer, the theft of mobile storage media, and key stolen when user access to the documents etc. To facilitate the communication between inside and outside of enterprise, while at the same time guarantee the authorization of confidential
APA, Harvard, Vancouver, ISO, and other styles
5

Patil, Prof. A. V., Rahul Khade, Shivani Lande, Sanika Jadhav, and Pranjali Garud. "PDF Malware Detection: Toward Machine Learning Modeling with Explainability Analysis." International Journal of Ingenious Research, Invention and Development (IJIRID) 4, no. 1 (2025): 178–88. https://doi.org/10.5281/zenodo.15187998.

Full text
Abstract:
<em>The proliferation of Portable Document Format (PDF) files as a vector for malware distribution has raised significant security concerns. In response, this research proposes a desktop-based PDF malware detection system utilizing a Deep Neural Network (DNN) to classify PDF files as malicious or benign. The system integrates a modular architecture consisting of user authentication, feature extraction, machine learning, and prediction layers. It employs static analysis techniques to extract relevant features from PDF files, which are used to train and test the DNN model for classification. The
APA, Harvard, Vancouver, ISO, and other styles
6

Orukpe, P. E., T. O. Erhiaguna, and F. O. Agbontaen. "Computer Security and Privacy in Wireless Local Area Network in Nigeria." International Journal of Engineering Research in Africa 9 (May 2013): 23–33. http://dx.doi.org/10.4028/www.scientific.net/jera.9.23.

Full text
Abstract:
The advent of wireless computing and massive processing power available within portable devices provides organizations with an unprecedented ability to provide flexible computing services on-demand to enable business initiatives and this development has increased the demand for wireless network security, which if unaddressed enables the theft of data, lowers productivity, and causes quantifiable financial losses. Flaws arising from wireless protocol with networking design and implementation errors present challenges to the Wireless Fidelity (Wi-Fi) community of users. In this paper, we attempt
APA, Harvard, Vancouver, ISO, and other styles
7

Medvedev, Iurii, Farhad Shadmand, Leandro Cruz, and Nuno Gonçalves. "Towards Facial Biometrics for ID Document Validation in Mobile Devices." Applied Sciences 11, no. 13 (2021): 6134. http://dx.doi.org/10.3390/app11136134.

Full text
Abstract:
Various modern security systems follow a tendency to simplify the usage of the existing biometric recognition solutions and embed them into ubiquitous portable devices. In this work, we continue the investigation and development of our method for securing identification documents. The original facial biometric template, which is extracted from the trusted frontal face image, is stored on the identification document in a secured personalized machine-readable code. Such document is protected from face photo manipulation and may be validated with an offline mobile application. We apply automatic
APA, Harvard, Vancouver, ISO, and other styles
8

Taopan, Gever Imanuel, Meiton Boru, and Adriana Fanggidae. "Pengamanan Portable Document Format (PDF) Menggunakan Algoritma Kriptografi Kurva Eliptik." Jurnal Komputer dan Informatika 10, no. 1 (2022): 47–54. http://dx.doi.org/10.35508/jicon.v10i1.5296.

Full text
Abstract:
Penggunaan dokumen digital telah banyak digunakan pada berbagai kalangan, organisasi ataupun instansi. Salah satu dokumen digital yang sering digunakan adalah portable document format (PDF). Diperlukan sebuah algoritma yang diterapkan dalam perangkat lunak, sehingga dapat mengamankan dokumen tersebut dari pihak-pihak yang dapat merugikan. Salah satu algoritma yang dapat digunakan adalah elliptic curve cryptography (ECC). ECC mempunyai keunggulan pada tingkat keamanan sebuah data dengan kunci yang tidak terlalu panjang. Enkripsi dilakukan pada 16 Byte dari header PDF dengan menggunakan 7 parame
APA, Harvard, Vancouver, ISO, and other styles
9

Monika and Bansal Dipali. "Forensic Science Research Summary for Forgery Detection of Digital Images." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 3 (2020): 1608–18. https://doi.org/10.35940/ijeat.B2563.029320.

Full text
Abstract:
An important measure of proof collection, storage, and authentication in forensic sciences, which decide the safety and security of any system documents, which can be either portable document formats or scanned images. To gather evidence, or plan a forensic investigation digital images are secured with different modern methodologies. Digital image analysis includes image recovery and surveillance for image information improvement. The goal of forgery detection is to maximize the extraction of information from manipulated images, particularly noisy and post-processed images. Because digital ima
APA, Harvard, Vancouver, ISO, and other styles
10

Taufan Maynard Prananda Sancaka1 and Veronica Lusiana. "Penerapan Metode Playfair Cipher Dalam Aplikasi Enkripsi- Dekripsi File Teks." Elkom : Jurnal Elektronika dan Komputer 15, no. 2 (2022): 260–70. http://dx.doi.org/10.51903/elkom.v15i2.937.

Full text
Abstract:
Dokumen Teks adalah dokumen yang menyajikan informasi secara tertulis. Ada berbagai jenis dokumen teks, antara lain Plain Text ( .txt ), Microsoft Word Documents ( .docx ), Portable Document Format ( .pdf ) dan lain sebagainya. Dokumen teks ini sangat penting karena berisi data dan informasi dari pihak-pihak yang berkepentingan. Untuk meningkatkan keamanan dari kebocoran data atau informasi, diperlukan suatu teknik yang disebut Kriptografi. Kriptografi adalah ilmu yang mempelajari tentang keamanan pesan, sehingga membuat pesan tidak dapat dibaca oleh orang yang tidak berwenang. Oleh karena itu
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Secure portable document"

1

Viega, John, and Gary McGraw. Building Secure Software: How to Avoid Security Problems the Right Way, Portable Documents. Pearson Education, Limited, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Secure portable document"

1

Arshakyan Anahit. "Secure Data Hiding in PDF Files Using an Encrypted Secret Message." In NATO Science for Peace and Security Series - D: Information and Communication Security. IOS Press, 2016. https://doi.org/10.3233/978-1-61499-716-0-264.

Full text
Abstract:
A desktop application providing steganographic data hiding is proposed. The steganographic key secure exchange is realized through the Diffie-Hellman key exchange protocol, and Portable Document Format files are used as data containers taking into account their widespread use on the Internet. A permutation cipher for providing original data security has also been applied.
APA, Harvard, Vancouver, ISO, and other styles
2

Vlachos Michael and Stassinopoulos George. "Open, Flexible and Portable Secure Web-based Health Applications." In Studies in Health Technology and Informatics. IOS Press, 2003. https://doi.org/10.3233/978-1-60750-940-0-41.

Full text
Abstract:
This paper presents a totally generic client - server model for accessing legacy and new databases according to the three tier architecture principles It is based on an integrated environment that eases the dynamic creation and instantiation of secure web applications that access multiple database management systems. Emphasis is placed on the ability to query almost any type of relational database and queries can simultaneously address a multitude of data sources. The information is collected, assembled and presented to users depending on a possible set of user profiles. These profiles origina
APA, Harvard, Vancouver, ISO, and other styles
3

Maurya, Akash, Pooja Shetty, Ganesh Yadava, and Leena Ladge. "College Election System using Facial Authentication." In Artificial Intelligence and Communication Technologies. Soft Computing Research Society, 2022. http://dx.doi.org/10.52458/978-81-955020-5-9-48.

Full text
Abstract:
Voting is commonly related to politics and is often ended with exploitation. Manual voting may lead to malpractices sometimes, so there is a need to implement a secured online voting system. The voting system that we propose is a web portal which is designed using the MERN stack and the authentication of the voter is done using facial recognition. For this, the Eigen-face algorithm is used. The user will have to register and login into the portal. After that, the users will upload their respective documents which will be verified by the admin. For the voter’s assistance, the portal has several
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!