1.0 INTRODUCTIONData is a collection of facts and statistical data that can be used for reference, analysis and as knowledge [1]. Data was stored in the digital and analog world. Even today in the analog world people store data using paper documents such as newspapers, books, printed documents and much more. But the world is becoming increasingly paperless, and storing data in digital format is becoming more and more popular. However, printed documents representing information such as birth certificates, education transcripts and certificates, land titles, official letters, wills, contracts and much more are still relevant. The data or information must be protected from attacks or unauthorized access. There are many techniques used to protect digital data and one of the widely used available techniques is encryption. There are also steganography techniques that have been used to hide data in objects such as images, audio, video, and even text. Data in the analog world is susceptible to attacks. Threats to printed documents such as counterfeiting and forgery are common threats to the security of printed documents [2] [3]. Printed documents are often counterfeited, altered or falsified to deceive the intended subjects into thinking that the documents are real in order to benefit from them, such as cases that happened in the United States where two criminals were mistakenly released due to court orders counterfeit [2] and illegal immigrants from India able to seek work in Malaysia using counterfeit social visit passes [3]. This document is organized as follows; Section 2.0 describes current security issues in printed documents, Section 3.0 focuses on work related to security of printed documents, Section 4.0 discusses the proposed conceptual solution, and Section...... middle of the paper... ...Journal of Wisdom Based Computing. vol. 1(3), 68-76.[20] Laine, M., & Nevalainen, O. S. (2006). A STANDALONE OCR SYSTEM FOR MOBILE CAMERAS. The 17th Annual IEEE International Symposium on Personal, Indoor, and Mobile Radio Communications. 11-14 September. Helsinki, Finland: IEEE, 1-5.[21] Preneel, B. (2003). Analysis and design of cryptographic hash functions. Doctor of Philosophy. Katholieke Universiteit Leuven, Belgium.[22] Gilbert, H., & Handschuh, H. (2004). Security Analysis of SHA-256 and Sisters.10th Annual International Workshop, SAC 2003. August 14-15. Ottawa, Canada, 175-193.[23] Yoshida, H., & Biryukov, A. (2006). Analysis of a SHA-256 variant. In Preneel, B. and Tavares, S. (eds.) Selected Areas in Cryptography (pp.245-260). Berlin-Heidelberg: Springer.[24] Forouzan, B. A. (2008). Cryptography and network security (International EditionA).
tags