Providing a Framework for Increasing Security in Digital Document Management Systems

Document Type : Original Scientific Paper

Authors

Department of Industrial Management, Central Tehran Branch, Islamic Azad University, Tehran, I. R. Iran

10.22052/mir.2022.242134.1280

Abstract

In the era of information technology and the expansion of global networks, digital document management systems play a crucial role in providing services. The use of digital instead of paper documents has become more common to reduce the administrative costs in small and large organizations. One of the most significant concerns of such systems, though, is the security of documents against alteration or distortion. There are various ways to increase the security of digital documents and this paper is aimed at providing a new framework of the combination of steganography and cryptography to increase the security of digital documents.

The proposed method first has been tested and reviewed with MATLAB 2018 software on standard images such as Lena, Baboon and Pepper. Then, it has been tested on digital documents of the Social Security Organization through the proposed conceptual model which utilizes a combination of unique image features to generate messages. The evaluation of results indicates the effectiveness of the proposed method and its applicability in digital document management systems.

Keywords


[1] M. Abdel hameed, M. Hasaballah, S. Aly and A. I. Awad, An adaptive image steganography method based on histogram of oriented gradient and PVD-LSB techniques, J. IEEE Access 7 (2019) 185189 − 185204.
[2] M. Abdur Razzaq, M. A. Baig, R. A. Shaikh and A. A. Memon, Digital image security: fusion of encryption, steganography and watermarking, J. Adv. Comput. Sci. Appl. 8 (5) (2017) 224 − 228.
[3] A. S. Ansari, M. S. Mohammadi and M. T. Parvez, A comparative study of recent steganography techniques for multiple image formats, IJCNIS 1 (2019) 11 − 25.
[4] Y. P. Astuti, D. R. I. M. Setiadi, E. H. Rachmawanto and C. A. Sari, Simple and secure image steganography using LSB and triple XOR operation on MSB, In: Int. Conf. Info. Commun. Tech. (ICOIACT), Yogyakarta, Indonesia (2018) 191 − 195.
[5] G. Azizi (in Persian), Electronic Document Management, Organization of Documents and National Library, I. R. Iran, 2011.
[6] N. Beagrie, Digital curation for science, digital libraries, and individuals, Int. J. Digit. Curation 1 (1) (2006) 3 − 16.
[7] D. P. Best, The future of information management, Records Manag. J. (2010) 61 − 71.
[8] H. Bhattacharjee and S. K. Bandyopadhyay, Frequency domain approach of image steganography, Int. J. Innovative Res. Info. Sec. 3 (2) (2016) 9 − 16.
[9] S. S. N. Bhuiyan, N. Abdul Malek, O. O. Khalifa and F. D. Abdul Rahman, An improved image steganography algorithm based on PVD, Indones. J. Electr. Eng. Comput. Sci. 10 (2) (2018) 569 − 577.
[10] K. Chang, C. Chang, P. S. Huang and T. Tu, A novel image steganographic method using Tri-way pixel-value differencing, J. Multimedia 3 (2) (2008) 37 − 44.
[11] S. Delenda and L. Noui, A new steganography algorithm using polar decomposition, Inf. Secur. J.: A Global Perspective 27 (3) (2018) 133 − 134.
[12] Gartner inc, [Online]. Available: https://www.gartner.com/en/information-technology/glossary/im-information-management,  Accessed 20 jan (2020).
[13] T. Haryanto, A. Pratama, H. Suhartanto, A. Murni, K. Kusmardi and J. Pidanic, Multipatch-GLCM for texture feature extraction on classification of the colon histopathology images using deep neural network with GPU acceleration, J. Comput. Sci. 16 (3) (2020) 280 − 294.
[14] M. Hussain, A. W. AbdulWahab, A. T. S. Ho, N. Javed and J. Ki-Hyun, A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement, Signal Processing: Image Commun. 50 (2017) 44 − 57.
[15] Z. Li and Y. He, Steganography with pixel value differencing and modulus function based on PSO, J. Info. Secur. Appl. 43 (2018) 48 − 49.
[16] A. S. Lorente and S. Berres, A secure steganographic algorithm based on frequency domain for the transmission of hidden information, Secur. Commun. Networks 2017 (2017) 5397082.
[17] J. D. F. Miñon, C. M. A. Lim, J. A. L. Morano, R. F. Fajutagana and B. S. Fabito, An intranet-based document management and monitoring system framework: A case for the National University Quality Management Office, 2016 IEEE Region 10 Conf. (TENCON) (2016) 2262 − 2267.
[18] ODLIS, [Online]. Available: https://www.abc-clio.com/ODLIS/odlis-d.aspx, Accessed 20 jan (2020).
[19] L. Robert and T. Shanmugapriya, A study on digital watermarking techniques Int. J. Recent Trends Eng. 1 (2) (2009) 223 − 225.
[20] D. S. H. Rosenthal, T. Robertson, T. Lipkis and V. Reich, Requirements for digital preservation systems: a bottomup approach, D-Lib Magazine 11 (11) (2005). Available: http://www.dlib.org/dlib/november05/rosenthal/11rosenthal.html
[21] A. Shaik and R. Amitharajan, Data security through data hiding in images: a review, J. Artif. Intell. 10 (1) (2017) 1 − 21.
[22] R. H. Sprague, Electronic document management: challenges and opportunities for information systems managers, MIS Quarterly 19 (1) (1995 ) 29−49.
[23] W. Stallings, Cryptography and Network Security Principles and Practice, 5th ed., Prentice Hall, New York, 2011.
[24] G. Singh, Supria: A study of encryption algorithms (RSA, DES, 3DES and AES) for information security, Int. J. Comput. Appl. 67 (19) (2013) 33 − 38.
[25] B. Thamaraichelvi and G. Yamuna, Gray Level Co-Occurrence Matrix features based classification of tumor in medical images, ARPN J. Eng. Appl. Sci. 11 (19) (2016) 11403 − 11414.
[26] J. Valkonen, Document Management for SmallMusiness, Master’s Thesis, Turku University of Applied Sciences, 2015.
[27] B. Zarrinkelki (in Persian), Government organisations and electronic documents, Treasures of Documents 20 (2) (78) (2011) 100 − 120.