0% found this document useful (0 votes)
2 views14 pages

Progress Seminar1 (1)-1

The document outlines a seminar on 'DocChain,' a web system designed to automate the extraction and verification of government-issued IDs from documents using blockchain technology. It aims to enhance document authenticity, confidentiality, and integrity while addressing issues related to manual verification errors and data privacy compliance. The project includes multiple phases, from requirement analysis to deployment, utilizing various technologies such as JavaScript, Tesseract OCR, and Ethereum.

Uploaded by

Dragon Bhaiya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views14 pages

Progress Seminar1 (1)-1

The document outlines a seminar on 'DocChain,' a web system designed to automate the extraction and verification of government-issued IDs from documents using blockchain technology. It aims to enhance document authenticity, confidentiality, and integrity while addressing issues related to manual verification errors and data privacy compliance. The project includes multiple phases, from requirement analysis to deployment, utilizing various technologies such as JavaScript, Tesseract OCR, and Ethereum.

Uploaded by

Dragon Bhaiya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14

Shri Ramdeobaba College of Engineering & Management, Nagpur

Department of Computer Science & Engineering(Cyber Security)

Session 2024-2025

SEMINAR
ON
DocChain

Presented By:
Guided By:
Group No. 2
Rashmi Welekar
Introduction
• A Web system that extract government-
issued IDs from documents
• Verify their authenticity using
government databases
• Share verified documents using
Blockchain
• Confidentiality, Integrity, and
Authenticity
• Data privacy regulations and handling
large volumes of documents and user
traffic
Motivation
• Time-consuming and prone to
errors or fraud.
• Manual document verification is
labor-intensive and costly for
organizations.
• Errors and delays lead to
inefficiencies and customer
dissatisfaction.
• Online services , KYCs require
government issued documents.
• Fake uploads
Literature Survey
• Manual ID verification errors (Identity Verification
Review, 2020): Manual verification processes can be prone to
human error and bias, leading to incorrect identifications
• Identity theft/data breaches (Digital Identity
Verification, 2019): Fraudsters can create fake documents
that closely resemble authentic ones
• Non-compliance with data privacy regulations (GDPR
Compliance Report, 2020): Non-compliance with data
privacy regulations, such as GDPR and CCPA, can result in
severe penalties and reputational damage
• Limited automated ID extraction (ID Extraction Review,
2020): Automated ID extraction is limited, and traditional
verification methods struggle to scale effectively
• Insufficient government database integration
(Government Database Integration, 2020): Government
Objectives
• Automate Government ID extraction

• Verify Document authenticity

• Secure document sharing

• Ensure data confidentiality


Technologies Used
• JavaScript
• Tesseract OCR
• Ethereum L2, Solidity
• React JS, Java
• MySQL, MongoDB, AWS/Azure
• TLS/SSL, Jenkins/GitHub, API
Expected Outcome
• A web system that detects and
alerts users when government-
issued PII is present in uploaded
documents
• Authenticate the PII with present
government database.
• Supports data protection
compliance, risk mitigation,
enhanced security, and
legal/regulatory compliance.
• Keeping it decentralized with
minimum gas fees which also
ensures enhanced security
Flowchart
Summary
• Document Extraction & Verification: A web system to
extract government-issued IDs from documents and
verify their authenticity using government databases
• Blockchain-based Secure sharing: Utilizes blockchain
technology to securely share verified documents,
ensuring confidentiality, integrity, and authenticity.
• PII protection
• Fraud Prevention
Timeline
Phase 1: Requirement Analysis and Environment Setup
-Review project specifications and clarify requirements.
-Set up the development environment, tools, and blockchain testnet.

Phase 2: Collection and analysis


-Collect and analyse sample documents to identify patterns of PII
-Research L2 blockchain platforms for secure document sharing

Phase 3: PII Detection Development


-Implement initial testing of PII from documents to ensure accuracy
and reliability.
-Create Scripts to visualize PII within documents.

Phase 4: Blockchain Integration


-Implement document-sharing functionality on the chosen L2
Phase 5: Development of Smart contracts
-Begin development of smart contracts for document validation and access control.

Phase 6: Anomaly Detection and Performance Optimization


-Analyze the impact of detected PII on document security and compliance.
− Optimize the PII detection system and document-sharing protocol for scalability
and efficiency.

Phase 7: System Integration and Comprehensive Testing


-Fully integrate the PII detection with blockchain and document sharing system.
-Conduct comprehensive testing, including unit, integration and performance tests.

Phase 8: Deployment
-Finalize smart contracts and test their functionality within the system.
-Simulate real-world document-sharing scenarios to evaluate system performance and
accuracy.
References:
Benet, J. (2014). IPFS - Content Addressed, Versioned, P2P File System. IPFS
Whitepaper

Polygon Technology. (2023). Polygon Whitepaper.

Zyskind, G., Nathan, O., & Pentland, A. (2015). "Decentralizing Privacy: Using
Blockchain to Protect Personal Data." In 2015 IEEE Security and Privacy
Workshops (pp. 180-184). IEEE. DOI: 10.1109/SPW.2015.27

Li, W., & Kang, W. (2019). "A Decentralized Data Storage System Combining
Blockchain and IPFS." In 2019 IEEE International Conference on Consumer
Electronics-Taiwan (pp. 1-2). IEEE. DOI: 10.1109/ICCE-TW46550.2019.8992027

J. Jayachitra, Dr. S. Matilda, A. Gayathiri, “Certificate validation


using blockchain,” in 2020
7th International Conference on Smart Structures and Systems
(ICSSS), Villupuram, 2020.
Thank You

You might also like