<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Archiving and Interchange DTD v2.3 20070202//EN" "archivearticle.dtd">
<article xml:lang="EN" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="methods-article">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Bohr. Scit.</journal-id>
<journal-title>BOHR International Journal of Smart Computing and Information Technology</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Bohr. Scit.</abbrev-journal-title>
<issn pub-type="epub">2583-2026</issn>
<publisher>
<publisher-name>BOHR</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="doi">10.54646/bijscit.2021.19</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Methods</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>An improved public key infrastructure-based digital signature authentication service for higher key storage system</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author" corresp="yes">
<name><surname>Gopi</surname> <given-names>B.</given-names></name>
<xref ref-type="corresp" rid="c001"><sup>&#x002A;</sup></xref>
</contrib>
<contrib contrib-type="author">
<name><surname>Sutharsan</surname> <given-names>M.</given-names></name>
</contrib>
</contrib-group>
<aff><institution>Department of ECE, Muthayammal Engineering College</institution>, <addr-line>Namakkal</addr-line>, <country>India</country></aff>
<author-notes>
<corresp id="c001">&#x002A;Correspondence: B. Gopi, <email>profgopib@gmail.com</email></corresp>
</author-notes>
<pub-date pub-type="epub">
<day>11</day>
<month>10</month>
<year>2021</year>
</pub-date>
<volume>2</volume>
<issue>1</issue>
<fpage>53</fpage>
<lpage>58</lpage>
<history>
<date date-type="received">
<day>15</day>
<month>08</month>
<year>2021</year>
</date>
<date date-type="accepted">
<day>02</day>
<month>09</month>
<year>2021</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#x00A9; 2021 Gopi and Sutharsan.</copyright-statement>
<copyright-year>2021</copyright-year>
<copyright-holder>Gopi and Sutharsan</copyright-holder>
<license xlink:href="https://creativecommons.org/licenses/by-nc-nd/4.0/"><p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</p></license>
</permissions>
<abstract>
<p>In general, we quickly forget about boxes with paper archives, and there is not even a single sheet of paper on the desktop. If a paper document is sent to the institution through regular mail, the artifact is immediately scanned and digitized. In fact, it turned out to be quite the opposite. The more a company uses computers for digital workflows, the more it documents and prints. Above all, every document must be authenticated. A document without a signature is only a draft or an information note. To get the signature, the documents are printed and then often scanned, and the original documents are kept on file. It is now clear that the (paperless) workflow cannot be implemented without electronic digital signatures. In this study, an improved public key infrastructure-based Digital Signature Authentication Service is proposed for higher key storage system. In this method, the CAs included in the list provide certificate-based digital identifiers and time stamping services that comply with global regulations, such as the eIDAS standard. Electronic digital signatures are already supported for most popular office document formats. Timestamps are supported, including multi-person document signatures.</p>
</abstract>
<kwd-group>
<kwd>digitized</kwd>
<kwd>digital</kwd>
<kwd>authenticated</kwd>
<kwd>signature</kwd>
<kwd>information</kwd>
<kwd>paperless</kwd>
<kwd>Public-key</kwd>
<kwd>certificate</kwd>
</kwd-group>
<counts>
<fig-count count="6"/>
<table-count count="0"/>
<equation-count count="0"/>
<ref-count count="52"/>
<page-count count="6"/>
<word-count count="3962"/>
</counts>
</article-meta>
</front>
<body>
<sec id="S1" sec-type="intro">
<title>Introduction</title>
<p>The Digital Signature Service (DSS) is a scalable application programming interface (API)-enabled platform for rapidly deploying digital signatures (<xref ref-type="bibr" rid="B1">1</xref>, <xref ref-type="bibr" rid="B2">2</xref>). For your own DSS service, you need to set up more than just sign-on workflows and user management (<xref ref-type="bibr" rid="B3">3</xref>). Signing certificates are required to verify the identity of the author of each document (<xref ref-type="bibr" rid="B4">4</xref>). These include cryptographic components such as key management, a FIPS level 2 or higher key storage system (HKSS) (such as hardware tokens or hardware security module [HSM]), an OCSP or CRL service, and a timestamp service (<xref ref-type="bibr" rid="B5">5</xref>&#x2013;<xref ref-type="bibr" rid="B7">7</xref>). Integrating these components, especially for direct integration with the HSM, whether in the cloud or on premise, requires significant effort from IT and security departments, good cryptography knowledge, and the availability of necessary resources (<xref ref-type="bibr" rid="B8">8</xref>&#x2013;<xref ref-type="bibr" rid="B10">10</xref>). When evaluating digital signature solutions, it is important to consider these hidden costs, investments, limitations, and overheads. Individually, if the DSS service is critical to the organization, it should operate with high levels of uptime and provide high performance (<xref ref-type="bibr" rid="B11">11</xref>, <xref ref-type="bibr" rid="B12">12</xref>). That means you should design your solution with a certain amount of redundancy &#x2013; with margin for the future (<xref ref-type="bibr" rid="B13">13</xref>). Consider that business is characterized by growth. Infrastructure must be scalable (<xref ref-type="bibr" rid="B14">14</xref>).</p>
<list list-type="simple">
<list-item>
<label>&#x2022;</label>
<p>Paperless workflow: Saves time, money, and resources (<xref ref-type="bibr" rid="B15">15</xref>).</p>
</list-item>
<list-item>
<label>&#x2022;</label>
<p>Effective business processes: Electronic signing makes every transaction a smooth process (<xref ref-type="bibr" rid="B16">16</xref>).</p>
</list-item>
<list-item>
<label>&#x2022;</label>
<p>Mobile capabilities: It becomes easier to communicate with the company and customers (<xref ref-type="bibr" rid="B17">17</xref>).</p>
</list-item>
</list>
<p>Ultimately, each organization must decide which DSS option best suits their project requirements (<xref ref-type="bibr" rid="B18">18</xref>). It takes into account the requirements of regulatory bodies, the size of the organization, and other factors, often unique to each case (<xref ref-type="bibr" rid="B19">19</xref>, <xref ref-type="bibr" rid="B20">20</xref>). An electronic signature (ES), a digital document signed by ES, is equivalent to a paper document with a handwritten autograph (<xref ref-type="bibr" rid="B21">21</xref>, <xref ref-type="bibr" rid="B22">22</xref>). A &#x201C;cloud&#x201D; ES has all the characteristics of a regular one; it is not stored on a flash drive or computer, but on the Internet &#x2013; on a special, secure server, in the &#x201C;cloud&#x201D; (<xref ref-type="bibr" rid="B23">23</xref>, <xref ref-type="bibr" rid="B24">24</xref>). The signing and encryption of the document also take place there; therefore, such an ES does not require the installation of special software on the computer (<xref ref-type="bibr" rid="B25">25</xref>&#x2013;<xref ref-type="bibr" rid="B27">27</xref>). One of the advantages of the &#x201C;cloud&#x201D; signature is the ability to sign documents (including reports) and send them from any device anywhere in the world (<xref ref-type="bibr" rid="B28">28</xref>).</p>
<p>An ES &#x201C;in the cloud&#x201D; is something many of us use every day without even realizing it (<xref ref-type="bibr" rid="B29">29</xref>). The most notable example is the authentication mechanism in mobile and Internet banks, after entering the password, a one-time pin code is sent to you via SMS (<xref ref-type="bibr" rid="B30">30</xref>). Such two-level authentication, in essence, can already be an ES (<xref ref-type="bibr" rid="B31">31</xref>). With the help of ES, companies can submit reports to tax and other regulatory authorities (<xref ref-type="bibr" rid="B32">32</xref>), submit and recall that they conduct electronic document management. Digital signature is also widely used in public procurement (<xref ref-type="bibr" rid="B33">33</xref>). The technology of &#x201C;cloud&#x201D; ES, which appeared several years ago, makes this tool accessible to businesses (<xref ref-type="bibr" rid="B34">34</xref>). This is confirmed by tens of thousands of customers. One has to imagine a situation where a forwarding driver gets on a plane not with a wad of paper but with a tablet (<xref ref-type="bibr" rid="B35">35</xref>). At the point of shipment, he signs a bill of lading with the customer (<xref ref-type="bibr" rid="B36">36</xref>). But the &#x201C;cloud&#x201D; ES brings the main advantage when the delivery document differs from the quantity of goods actually sent (resorting to breakage during transport) (<xref ref-type="bibr" rid="B37">37</xref>).</p>
</sec>
<sec id="S2">
<title>Related works</title>
<p>ES performs the same function as a stamped signature. It ensures the authenticity of the document and contains the private and public keys (<xref ref-type="bibr" rid="B38">38</xref>). The document is signed using a private key, which is usually stored on a special medium &#x2013; a token. You can buy a service from many companies that provide such services, except for the availability of a standard set of documents; no special requirements are required (<xref ref-type="bibr" rid="B39">39</xref>). &#x201C;Cloud&#x201D; ES is a regular ES, but with a difference: the private key is stored on the servers of the certificate authority, and the signing of documents is carried out there (<xref ref-type="bibr" rid="B40">40</xref>). The signer&#x2019;s identity is usually verified by sending an SMS to a mobile phone. The technology is based on a special ES server located in the &#x201C;Cloud&#x201D; (<xref ref-type="bibr" rid="B41">41</xref>). For example, if a user needs to send a report to the tax office, his accounting system communicates with the ES server and sends him a document to sign (<xref ref-type="bibr" rid="B42">42</xref>). The ES server is obliged to request permission from the user &#x2013; this can be done by sending a transaction confirmation code to his mobile phone, similar to Internet banking (<xref ref-type="bibr" rid="B43">43</xref>). By entering the confirmation code in the system, the user authorizes access to the ES key, and a signature is created for the document (<xref ref-type="bibr" rid="B44">44</xref>). All ES keys are stored in encrypted form on a special device that meets the most stringent security requirements (<xref ref-type="bibr" rid="B45">45</xref>). The operator of the ES server shall take all measures to minimize the risk of unauthorized access to the keys (<xref ref-type="bibr" rid="B46">46</xref>).</p>
<p>To use a &#x201C;classic&#x201D; ES, you need to purchase a token and special software. This is a significant expense, especially for start-up entrepreneurs (<xref ref-type="bibr" rid="B47">47</xref>). This software needs to be installed and configured if you are going to use the signature on multiple workstations &#x2013; separately for each location (<xref ref-type="bibr" rid="B48">48</xref>). A &#x201C;cloud&#x201D; ES does not require the purchase of software or pre-configuration and cannot be lost or forgotten. Unlike traditional technologies, &#x201C;Cloud&#x201D; ES is available to users on any operating system and platform, including mobile devices (<xref ref-type="bibr" rid="B49">49</xref>). &#x201C;Cloud&#x201D; ES is popular among small companies or individual entrepreneurs who actively use services such as &#x201C;online accounting and online document management&#x201D; (<xref ref-type="bibr" rid="B50">50</xref>). In large companies that do not use &#x201C;clouds,&#x201D; using such a signature may be more expensive and difficult than using a conventional ES (<xref ref-type="bibr" rid="B51">51</xref>). This is a complex installation of information security tools (MDZ, antivirus, etc.) on the computer and client OS in order to reduce the possibility of computer infection by malware (<xref ref-type="bibr" rid="B52">52</xref>).</p>
</sec>
<sec id="S3">
<title>Proposed model</title>
<p>Public key infrastructure provides integrity and verifies the authorship of each document. Timestamps certify the time a document was signed, which is essential for time-bound transactions, rejection, and data retention for audit. Of course, the entire document management system with digital signatures must comply with the requirements of the country of jurisdiction and the countries where partners and customers work. Uniform standards for electronic document management and digital signature infrastructure are gradually being developed. A class of applications provide a complete windowed user interface for performing client-side crypto operations. As a rule, some CIPF is used as a crypto-core. This is shown in <xref ref-type="fig" rid="F1">Figure 1</xref>.</p>
<fig id="F1" position="float">
<label>FIGURE 1</label>
<caption><p>User interface for performing client-side crypto operations.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="bijscit-2021-19-g001.tif"/>
</fig>
<list list-type="simple">
<list-item>
<label>&#x2022;</label>
<p>Including file signature verification, chaining and revocation list verification, OCSP, and timestamp verification.</p>
</list-item>
<list-item>
<label>&#x2022;</label>
<p>File encryption including multiple responders.</p>
</list-item>
<list-item>
<label>&#x2022;</label>
<p>User certificate search and selection.</p>
</list-item>
<list-item>
<label>&#x2022;</label>
<p>Maintaining a database of responder certificates, integrating with a directory service (using LDAP protocol) to search for responder certificates.</p>
</list-item>
<list-item>
<label>&#x2022;</label>
<p>Key pair generation and certificate request generation.</p>
</list-item>
<list-item>
<label>&#x2022;</label>
<p>Import/export of certificates (root, user, and responders).</p>
</list-item>
</list>
<p>The providers of document management solutions or applications want to integrate digital signatures or stamps. Another option is to offer them as a premium option to customers as guaranteed document protection against fraud.</p>
<p>A flexible model is supported here: digital signatures can be added as an additional or optional layer. Now, the businesses looking to integrate digital signatures or stamps are into their workflows. The system integrators are implementing the digital signatures in existing or new document management systems. The problem of creating a trusted environment for performing cryptooperations, especially EDS, is a separate big topic. This article does not plan to consider it in detail, but conceptually, developers go along the following lines.</p>
<list list-type="simple">
<list-item>
<label>&#x2022;</label>
<p>A separate device where the data for signature are displayed and the signature is performed after user confirmation (trust).</p>
</list-item>
<list-item>
<label>&#x2022;</label>
<p>Boot a separate trusted OS in USB-Live mode.</p>
</list-item>
<list-item>
<label>&#x2022;</label>
<p>Parallel operation of client OS and reliable environment on different cores of a computer.</p>
</list-item>
</list>
<p>All these documents are now sent in a long journey of communication between the accounting departments on the supplier&#x2019;s and the buyer&#x2019;s side. Although the problem of inconsistencies can be solved at the point of export, the fact of the change will be confirmed by a &#x201C;Cloud&#x201D; signature. This is shown in <xref ref-type="fig" rid="F2">Figure 2</xref>.</p>
<fig id="F2" position="float">
<label>FIGURE 2</label>
<caption><p>Proposed model.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="bijscit-2021-19-g002.tif"/>
</fig>
<p>Currently, there are completely new developments using block chain technology, that is, smart contracts. &#x201C;Distribution, the basic principle of the technology, provides complete protection against compromise and unauthorized access to any document or signature, because each such block element (signature, document, archive, etc.) is located in a strong chain of numbered blocks. Protected by a very complex cryptographic code. Making changes to a block already in circulation Not possible; a smart contract is an electronic mechanism that describes a set of conditions that will fulfill certain events.&#x201D; His work is based on the development and use of so-called low-trust protocols, where the protocol algorithm uses only software tools, and the human factor is excluded as much as possible from the decision-making chain &#x2013; here A person acts exclusively.</p>
</sec>
<sec id="S4">
<title>Results and discussion</title>
<p>The proposed HKSS was compared with the existing e-diploma system model (EDSM), block chain-based Lamport Merkle digital signature (BLMDS), antivirus security systems (ASS), and structural digital signature (SDS).</p>
<sec id="S4.SS1">
<title>Integration of applets</title>
<p>One of the options for using CIPF in the browser is their integration into Java applets. In some cases, CIPF and cryptographic libraries do not require installation and are native libraries. In this case, it can be integrated directly &#x201C;inside&#x201D; the applet and call CIPF functions through the Java Native Interface mechanism. With this scheme, when a Java applet is loaded in the browser for the first time, the library is installed in the user&#x2019;s profile, and its separate installation is not required. Another option is to write a Java applet that calls a pre-installed CIPF on the system (CSP, JCP, etc.). This is shown in <xref ref-type="fig" rid="F3">Figure 3</xref>.</p>
<fig id="F3" position="float">
<label>FIGURE 3</label>
<caption><p>Comparison of applets integration.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="bijscit-2021-19-g003.tif"/>
</fig>
</sec>
<sec id="S4.SS2">
<title>Development language management</title>
<p>PHP is one of the most widely used web development languages. The PHP cryptographic subsystem is built on Open SSL, which supports Russian cryptographic algorithms. At the same time, there is no support for Russian crypto algorithms in PHP. Some Russian CIPF manufacturers started to develop patches for PHP that would allow the use of Russian cryptography, but this work was not completed. This is shown in <xref ref-type="fig" rid="F4">Figure 4</xref>.</p>
<fig id="F4" position="float">
<label>FIGURE 4</label>
<caption><p>Comparison of development language management.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="bijscit-2021-19-g004.tif"/>
</fig>
</sec>
<sec id="S4.SS3">
<title>Information systems management</title>
<p>Currently, many developers of PHP-based information systems use a direct call to the Open SSL command line utility to perform crypto operations. The attractive solution was implemented as part of the WEB project. In the server component of the solution, GOST R 34.10-2001 signature verification is implemented directly in PHP using mathematical primitives from the native library. This is shown in <xref ref-type="fig" rid="F5">Figure 5</xref>.</p>
<fig id="F5" position="float">
<label>FIGURE 5</label>
<caption><p>Comparison of information systems management.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="bijscit-2021-19-g005.tif"/>
</fig>
</sec>
<sec id="S4.SS4">
<title>In-house encryption management</title>
<p>Configuration and support require in-house encryption expertise. They go separately, require separate calls from built-in applications and internal development resources, and may require additional equipment purchase and configuration. This is shown in <xref ref-type="fig" rid="F6">Figure 6</xref>.</p>
<fig id="F6" position="float">
<label>FIGURE 6</label>
<caption><p>Comparison of in-house encryption management.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="bijscit-2021-19-g006.tif"/>
</fig>
<p>Client responsibility for key management and storage is critical. Not all solutions support both types of identities. A cloud service greatly simplifies the deployment of a document management system with support for digital signatures. All operations go through the API. Binary compatibility of CIPF, such as Crypto Packet with Open SSL, makes it possible to provide legitimacy to this solution.</p>
</sec>
</sec>
<sec id="S5" sec-type="conclusion">
<title>Conclusion</title>
<p>Cloud services vary in price and functionality. But they all guarantee flexibility, scalability, and high availability. Although the services are paid, companies are freed from the need to invest in the development of their own solutions, including the purchase of expensive cryptographic equipment. A cloud-based digital signature service may be required. In theory, these are companies of any size that develop or implement custom-built applications and want to integrate digital signatures or use an already integrated application. For example, when sending money, it is impossible to execute a contract without obtaining the number of ES specified in the contract. Talking about the spread of the practice of using &#x201C;Cloud&#x201D; ES and the possibilities of developing technologies, there is a problem. Today, it is connected with the fact that the problems of using such ES are not well spelled out in the regulations. So, companies will soon stop being afraid of &#x201C;cloud&#x201D; technologies and use such ES in their work even more. Expect to start using it in earnest.</p>
</sec>
</body>
<back>
<ref-list>
<title>References</title>
<ref id="B1"><label>1.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Finandhita</surname> <given-names>A</given-names></name> <name><surname>Afrianto</surname> <given-names>I</given-names></name></person-group>. <article-title>Development of e-diploma system model with digital signature authentication.</article-title> <source><italic>Proceedings of the IOP Conference series: Materials science and engineering.</italic></source> (<volume>Vol. 407</volume>), <publisher-loc>Bristol</publisher-loc>: <publisher-name>IOP Publishing</publisher-name> (<year>2018</year>). 12109 p.</citation></ref>
<ref id="B2"><label>2.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Gopi</surname> <given-names>B</given-names></name> <name><surname>Logeshwaran</surname> <given-names>J</given-names></name> <name><surname>Kiruthiga</surname> <given-names>T</given-names></name></person-group>. <article-title>An innovation in the development of a mobile radio model for a dual-band transceiver in wireless cellular communication.</article-title> <source><italic>BOHR Int J Comput Intell Commun Netw.</italic></source> (<year>2022</year>) <volume>1</volume>:<fpage>20</fpage>&#x2013;<lpage>5</lpage>.</citation></ref>
<ref id="B3"><label>3.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Alzubi</surname> <given-names>JA</given-names></name></person-group>. <article-title>Blockchain-based Lamport Merkle digital signature: authentication tool in IoT healthcare.</article-title> <source><italic>Comput Commun.</italic></source> (<year>2021</year>) <volume>170</volume>:<fpage>200</fpage>&#x2013;<lpage>8</lpage>.</citation></ref>
<ref id="B4"><label>4.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ramesh</surname> <given-names>G</given-names></name> <name><surname>Logeshwaran</surname> <given-names>J</given-names></name> <name><surname>Aravindarajan</surname> <given-names>V</given-names></name></person-group>. <article-title>The performance evolution of antivirus security systems in ultra dense cloud server using intelligent deep learning.</article-title> <source><italic>BOHR Int J Comput Intell Commun Netw.</italic></source> (<year>2022</year>) <volume>1</volume>:<fpage>15</fpage>&#x2013;<lpage>9</lpage>.</citation></ref>
<ref id="B5"><label>5.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Lu</surname> <given-names>CS</given-names></name> <name><surname>Liao</surname> <given-names>HYM</given-names></name></person-group>. <article-title>Structural digital signature for image authentication: An incidental distortion resistant scheme.</article-title> <source><italic>Proceedings of the 2000 ACM workshops on multimedia.</italic></source> <publisher-loc>New York, NY</publisher-loc>: <publisher-name>Association for Computing Machinery</publisher-name> (<year>2000</year>). p. <fpage>115</fpage>&#x2013;<lpage>8</lpage>.</citation></ref>
<ref id="B6"><label>6.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Logeshwaran</surname> <given-names>J</given-names></name></person-group>. <article-title>The control and communication management for ultra dense cloud system using fast Fourier algorithm.</article-title> <source><italic>ICTACT J Data Sci Mach Learn.</italic></source> (<year>2022</year>) <volume>3</volume>:<fpage>281</fpage>&#x2013;<lpage>4</lpage>.</citation></ref>
<ref id="B7"><label>7.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Warasart</surname> <given-names>M</given-names></name> <name><surname>Kuacharoen</surname> <given-names>P</given-names></name></person-group>. <article-title>Based document authentication using digital signature and QR code.</article-title> <source><italic>Proceedings of the 4th International conference on computer engineering and technology (ICCET 2012).</italic></source> <publisher-loc>New York, NY</publisher-loc>: <publisher-name>ASME Press</publisher-name> (<year>2012</year>).</citation></ref>
<ref id="B8"><label>8.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Gopi</surname> <given-names>B</given-names></name> <name><surname>Ramesh</surname> <given-names>G</given-names></name> <name><surname>Logeshwaran</surname> <given-names>J</given-names></name></person-group>. <article-title>The fuzzy logical controller based energy storage and conservation model to achieve maximum energy efficiency in modern 5G communication.</article-title> <source><italic>ICTACT J Commun Technol.</italic></source> (<year>2022</year>) <volume>13</volume>:<fpage>2774</fpage>&#x2013;<lpage>9</lpage>.</citation></ref>
<ref id="B9"><label>9.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Dhagat</surname> <given-names>R</given-names></name> <name><surname>Joshi</surname> <given-names>P</given-names></name></person-group>. <article-title>New approach of user authentication using digital signature.</article-title> <source><italic>Proceedings of the 2016 Symposium on colossal data analysis and networking (CDAN).</italic></source> <publisher-loc>Piscataway, NJ</publisher-loc>: <publisher-name>IEEE</publisher-name> (<year>2016</year>). p. <fpage>1</fpage>&#x2013;<lpage>3</lpage>.</citation></ref>
<ref id="B10"><label>10.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ramesh</surname> <given-names>G</given-names></name> <name><surname>Logeshwaran</surname> <given-names>J</given-names></name> <name><surname>Gowri</surname> <given-names>J</given-names></name> <name><surname>Mathew</surname> <given-names>A</given-names></name></person-group>. <article-title>The management and reduction of digital noise in video image processing by using transmission based noise elimination scheme.</article-title> <source><italic>ICTACT J Image Video Process.</italic></source> (<year>2022</year>) <volume>13</volume>:<fpage>2797</fpage>&#x2013;<lpage>801</lpage>.</citation></ref>
<ref id="B11"><label>11.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kazmirchuk</surname> <given-names>S</given-names></name> <name><surname>Anna</surname> <given-names>I</given-names></name> <name><surname>Sergii</surname> <given-names>I</given-names></name></person-group>. <article-title>Digital signature authentication scheme with message recovery based on the use of elliptic curves.</article-title> <source><italic>Proceedings of the International conference on computer science, engineering and education applications.</italic></source> <publisher-loc>Cham</publisher-loc>: <publisher-name>Springer</publisher-name> (<year>2019</year>). p. <fpage>279</fpage>&#x2013;<lpage>88</lpage>.</citation></ref>
<ref id="B12"><label>12.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Gopi</surname> <given-names>B</given-names></name> <name><surname>Ramesh</surname> <given-names>G</given-names></name> <name><surname>Logeshwaran</surname> <given-names>J</given-names></name></person-group>. <article-title>An innovation for energy release of nuclear fusion at short distance dielectrics in semiconductor model.</article-title> <source><italic>ICTACT J Microelectron.</italic></source> (<year>2022</year>) <volume>8</volume>:<fpage>1430</fpage>&#x2013;<lpage>5</lpage>.</citation></ref>
<ref id="B13"><label>13.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Lou</surname> <given-names>DC</given-names></name> <name><surname>Liu</surname> <given-names>JL</given-names></name></person-group>. <article-title>Fault resilient and compression tolerant digital signature for image authentication.</article-title> <source><italic>IEEE Trans Consum Electron.</italic></source> (<year>2000</year>) <volume>46</volume>:<fpage>31</fpage>&#x2013;<lpage>9</lpage>.</citation></ref>
<ref id="B14"><label>14.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Logeshwaran</surname> <given-names>J</given-names></name> <name><surname>Rex</surname> <given-names>MJ</given-names></name> <name><surname>Kiruthiga</surname> <given-names>T</given-names></name> <name><surname>Rajan</surname> <given-names>VA</given-names></name></person-group>. <article-title>FPSMM: Fuzzy probabilistic based semi morkov model among the sensor nodes for realtime applications.</article-title> <source><italic>Proceedings of the 2017 International conference on intelligent sustainable systems (ICISS).</italic></source> <publisher-loc>Piscataway, NJ</publisher-loc>: <publisher-name>IEEE</publisher-name> (<year>2017</year>). p. <fpage>442</fpage>&#x2013;<lpage>6</lpage>.</citation></ref>
<ref id="B15"><label>15.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Chen</surname> <given-names>T</given-names></name> <name><surname>Wang</surname> <given-names>J</given-names></name> <name><surname>Zhou</surname> <given-names>Y</given-names></name></person-group>. <article-title>Combined digital signature and digital watermark scheme for image authentication.</article-title> <source><italic>Proceedings of the 2001 International conferences on Info-Tech and Info-Net (Cat. No. 01EX479).</italic></source> (<volume>Vol. 5</volume>), <publisher-loc>Piscataway, NJ</publisher-loc>: <publisher-name>IEEE</publisher-name> (<year>2001</year>). p. <fpage>78</fpage>&#x2013;<lpage>82</lpage>.</citation></ref>
<ref id="B16"><label>16.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ramesh</surname> <given-names>G</given-names></name> <name><surname>Logeshwaran</surname> <given-names>J</given-names></name> <name><surname>Rajkumar</surname> <given-names>K</given-names></name></person-group>. <article-title>The smart construction for image preprocessing of mobile robotic systems using neuro fuzzy logical system approach.</article-title> <source><italic>Neuroquantology.</italic></source> (<year>2022</year>) <volume>20</volume>:<fpage>6354</fpage>&#x2013;<lpage>67</lpage>.</citation></ref>
<ref id="B17"><label>17.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Dittmann</surname> <given-names>J</given-names></name> <name><surname>Steinmetz</surname> <given-names>A</given-names></name> <name><surname>Steinmetz</surname> <given-names>R</given-names></name></person-group>. <article-title>Content-based digital signature for motion pictures authentication and content-fragile watermarking.</article-title> <source><italic>Proceedings of the IEEE International conference on multimedia computing and systems.</italic></source> (<volume>Vol. 2</volume>), <publisher-loc>Piscataway, NJ</publisher-loc>: <publisher-name>IEEE</publisher-name> (<year>1999</year>). p. <fpage>209</fpage>&#x2013;<lpage>13</lpage>.</citation></ref>
<ref id="B18"><label>18.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Raja</surname> <given-names>S</given-names></name> <name><surname>Logeshwaran</surname> <given-names>J</given-names></name> <name><surname>Venkatasubramanian</surname> <given-names>S</given-names></name> <name><surname>Jayalakshmi</surname> <given-names>M</given-names></name> <name><surname>Rajeswari</surname> <given-names>N</given-names></name> <name><surname>Olaiya</surname> <given-names>NG</given-names></name><etal/></person-group> <article-title>OCHSA: designing energy-efficient lifetime-aware leisure degree adaptive routing protocol with optimal cluster head selection for 5G communication network disaster management.</article-title> <source><italic>Sci Program.</italic></source> (<year>2022</year>) <volume>2022</volume>:<issue>5424356</issue>.</citation></ref>
<ref id="B19"><label>19.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Sagar Hossen</surname> <given-names>M</given-names></name> <name><surname>Tabassum</surname> <given-names>T</given-names></name> <name><surname>Islam</surname> <given-names>A</given-names></name> <name><surname>Karim</surname> <given-names>R</given-names></name> <name><surname>Rumi</surname> <given-names>LS</given-names></name> <name><surname>Kobita</surname> <given-names>AA</given-names></name></person-group>. <article-title>Digital signature authentication using asymmetric key cryptography with different byte number.</article-title> <source><italic>Proceedings of the ICECMSN 2020, evolutionary computing and mobile sustainable networks.</italic></source> <publisher-loc>Singapore</publisher-loc>: <publisher-name>Springer</publisher-name> (<year>2021</year>). p. <fpage>845</fpage>&#x2013;<lpage>51</lpage>.</citation></ref>
<ref id="B20"><label>20.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Logeshwaran</surname> <given-names>J</given-names></name> <name><surname>Shanmugasundaram</surname> <given-names>RN</given-names></name></person-group>. <article-title>Enhancements of resource management for device to device (D2D) communication: A review.</article-title> <source><italic>Proceedings of the 2019 Third international conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC).</italic></source> <publisher-loc>Piscataway, NJ</publisher-loc>: <publisher-name>IEEE</publisher-name> (<year>2019</year>). p. <fpage>51</fpage>&#x2013;<lpage>5</lpage>.</citation></ref>
<ref id="B21"><label>21.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Karim</surname> <given-names>R</given-names></name> <name><surname>Rumi</surname> <given-names>LS</given-names></name> <name><surname>Islam</surname> <given-names>A</given-names></name> <name><surname>Kobita</surname> <given-names>AA</given-names></name> <name><surname>Tabassum</surname> <given-names>T</given-names></name> <name><surname>Sagar Hossen</surname> <given-names>M</given-names></name></person-group>. <article-title>Digital signature authentication for a bank using asymmetric key cryptography algorithm and token based encryption.</article-title> <source><italic>Proceedings of the ICECMSN 2020, evolutionary computing and mobile sustainable networks.</italic></source> <publisher-loc>Singapore</publisher-loc>: <publisher-name>Springer</publisher-name> (<year>2021</year>). p. <fpage>853</fpage>&#x2013;<lpage>9</lpage>.</citation></ref>
<ref id="B22"><label>22.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Gopi</surname> <given-names>B</given-names></name> <name><surname>Logeshwaran</surname> <given-names>J</given-names></name> <name><surname>Gowri</surname> <given-names>J</given-names></name> <name><surname>Kiruthiga</surname> <given-names>T</given-names></name></person-group>. <article-title>The moment probability and impacts monitoring for electron cloud behavior of electronic computers by using quantum deep learning model.</article-title> <source><italic>Neuroquantology.</italic></source> (<year>2022</year>) <volume>20</volume>:<fpage>6088</fpage>&#x2013;<lpage>100</lpage>.</citation></ref>
<ref id="B23"><label>23.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Alam</surname> <given-names>S</given-names></name> <name><surname>Jamil</surname> <given-names>A</given-names></name> <name><surname>Saldhi</surname> <given-names>A</given-names></name> <name><surname>Ahmad</surname> <given-names>M</given-names></name></person-group>. <article-title>Digital image authentication and encryption using digital signature.</article-title> <source><italic>Proceedings of the 2015 International conference on advances in computer engineering and applications.</italic></source> <publisher-loc>Piscataway, NJ</publisher-loc>: <publisher-name>IEEE</publisher-name> (<year>2015</year>). p. <fpage>332</fpage>&#x2013;<lpage>6</lpage>.</citation></ref>
<ref id="B24"><label>24.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Logeshwaran</surname> <given-names>J</given-names></name></person-group>. <article-title>AICSA - an artificial intelligence cyber security algorithm for cooperative P2P file sharing in social networks.</article-title> <source><italic>ICTACT J Data Sci Mach Learn.</italic></source> (<year>2021</year>) <volume>3</volume>:<fpage>251</fpage>&#x2013;<lpage>3</lpage>.</citation></ref>
<ref id="B25"><label>25.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Alizai</surname> <given-names>ZA</given-names></name> <name><surname>Tareen</surname> <given-names>NF</given-names></name> <name><surname>Jadoon</surname> <given-names>I</given-names></name></person-group>. <article-title>Improved IoT device authentication scheme using device capability and digital signatures.</article-title> <source><italic>Proceedings of the 2018 International conference on applied and engineering mathematics (ICAEM).</italic></source> <publisher-loc>Piscataway, NJ</publisher-loc>: <publisher-name>IEEE</publisher-name> (<year>2018</year>). p. <fpage>1</fpage>&#x2013;<lpage>5</lpage>.</citation></ref>
<ref id="B26"><label>26.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Gopi</surname> <given-names>B</given-names></name> <name><surname>Logeshwaran</surname> <given-names>J</given-names></name> <name><surname>Gowri</surname> <given-names>J</given-names></name> <name><surname>Aravindarajan</surname> <given-names>V</given-names></name></person-group>. <article-title>The identification of quantum effects in electronic devices based on charge transfer magnetic field model.</article-title> <source><italic>Neuroquantology.</italic></source> (<year>2022</year>) <volume>20</volume>:<fpage>5999</fpage>&#x2013;<lpage>6010</lpage>.</citation></ref>
<ref id="B27"><label>27.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Choudhury</surname> <given-names>N</given-names></name> <name><surname>Matam</surname> <given-names>R</given-names></name> <name><surname>Mukherjee</surname> <given-names>M</given-names></name> <name><surname>Lloret</surname> <given-names>J</given-names></name></person-group>. <article-title>A performance-to-cost analysis of IEEE 802.15. 4 MAC with 802.15. 4e MAC modes.</article-title> <source><italic>IEEE Access.</italic></source> (<year>2020</year>) <volume>8</volume>:<fpage>41936</fpage>&#x2013;<lpage>50</lpage>.</citation></ref>
<ref id="B28"><label>28.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Logeshwaran</surname> <given-names>J</given-names></name> <name><surname>Adhikari</surname> <given-names>N</given-names></name> <name><surname>Joshi</surname> <given-names>SS</given-names></name> <name><surname>Saxena</surname> <given-names>P</given-names></name> <name><surname>Sharma</surname> <given-names>A</given-names></name></person-group>. <article-title>The deep DNA machine learning model to classify the tumor genome of patients with tumor sequencing.</article-title> <source><italic>Int J Health Sci.</italic></source> (<year>2022</year>) <volume>6</volume>:<fpage>9364</fpage>&#x2013;<lpage>75</lpage>.</citation></ref>
<ref id="B29"><label>29.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Moravejosharieh</surname> <given-names>A</given-names></name> <name><surname>Lloret</surname> <given-names>J</given-names></name></person-group>. <article-title>Performance evaluation of co-located IEEE 802.15. 4-based wireless body sensor networks.</article-title> <source><italic>Ann Telecommun.</italic></source> (<year>2016</year>) <volume>71</volume>:<fpage>425</fpage>&#x2013;<lpage>40</lpage>.</citation></ref>
<ref id="B30"><label>30.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Logeshwaran</surname> <given-names>J</given-names></name> <name><surname>Malik</surname> <given-names>JA</given-names></name> <name><surname>Adhikari</surname> <given-names>N</given-names></name> <name><surname>Joshi</surname> <given-names>SS</given-names></name> <name><surname>Bishnoi</surname> <given-names>P</given-names></name></person-group>. <article-title>IoT-TPMS: an innovation development of triangular patient monitoring system using medical internet of things.</article-title> <source><italic>Int J Health Sci.</italic></source> (<year>2022</year>) <volume>6</volume>:<fpage>9070</fpage>&#x2013;<lpage>84</lpage>.</citation></ref>
<ref id="B31"><label>31.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Choudhury</surname> <given-names>N</given-names></name> <name><surname>Matam</surname> <given-names>R</given-names></name> <name><surname>Mukherjee</surname> <given-names>M</given-names></name> <name><surname>Lloret</surname> <given-names>J</given-names></name></person-group>. <article-title>LBS: a beacon synchronization scheme with higher schedulability for IEEE 802.15. 4 cluster-tree-based IoT applications.</article-title> <source><italic>IEEE Internet Things J.</italic></source> (<year>2019</year>) <volume>6</volume>:<fpage>8883</fpage>&#x2013;<lpage>96</lpage>.</citation></ref>
<ref id="B32"><label>32.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ramesh</surname> <given-names>G</given-names></name> <name><surname>Aravindarajan</surname> <given-names>V</given-names></name> <name><surname>Logeshwaran</surname> <given-names>J</given-names></name> <name><surname>Kiruthiga</surname> <given-names>T</given-names></name> <name><surname>Vignesh</surname> <given-names>S</given-names></name></person-group>. <article-title>Estimation analysis of paralysis effects for human nervous system by using neuro fuzzy logic controller.</article-title> <source><italic>Neuroquantology.</italic></source> (<year>2022</year>) <volume>20</volume>: <fpage>3195</fpage>&#x2013;<lpage>206</lpage>.</citation></ref>
<ref id="B33"><label>33.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Choudhury</surname> <given-names>N</given-names></name> <name><surname>Matam</surname> <given-names>R</given-names></name> <name><surname>Mukherjee</surname> <given-names>M</given-names></name> <name><surname>Lloret</surname> <given-names>J</given-names></name> <name><surname>Kalaimannan</surname> <given-names>E</given-names></name></person-group>. <article-title>NCHR: a nonthreshold-based cluster-head rotation scheme for IEEE 802.15. 4 cluster-tree networks.</article-title> <source><italic>IEEE Internet Things J.</italic></source> (<year>2020</year>) <volume>8</volume>: <fpage>168</fpage>&#x2013;<lpage>78</lpage>.</citation></ref>
<ref id="B34"><label>34.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ramesh</surname> <given-names>G</given-names></name> <name><surname>Logeshwaran</surname> <given-names>J</given-names></name> <name><surname>Aravindarajan</surname> <given-names>V</given-names></name> <name><surname>Thachil</surname> <given-names>F</given-names></name></person-group>. <article-title>Eliminate the interference in 5G ultra-wide band communication antennas in cloud computing networks.</article-title> <source><italic>ICTACT J Microelectron.</italic></source> (<year>2022</year>) <volume>8</volume>: <fpage>1338</fpage>&#x2013;<lpage>44</lpage>.</citation></ref>
<ref id="B35"><label>35.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Yassin</surname> <given-names>AA</given-names></name> <name><surname>Jin</surname> <given-names>H</given-names></name> <name><surname>Ibrahim</surname> <given-names>A</given-names></name> <name><surname>Zou</surname> <given-names>D</given-names></name></person-group>. <article-title>Anonymous password authentication scheme by using digital signature and fingerprint in cloud computing.</article-title> <source><italic>Proceedings of the 2012 Second International conference on cloud and green computing.</italic></source> <publisher-loc>Piscataway, NJ</publisher-loc>: <publisher-name>IEEE</publisher-name> (<year>2012</year>). p. <fpage>282</fpage>&#x2013;<lpage>9</lpage>.</citation></ref>
<ref id="B36"><label>36.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Sekar</surname> <given-names>G</given-names></name> <name><surname>Sivakumar</surname> <given-names>C</given-names></name> <name><surname>Logeshwaran</surname> <given-names>J</given-names></name></person-group>. <article-title>NMLA: the smart detection of motor neuron disease and analyze the health impacts with neuro machine learning model.</article-title> <source><italic>Neuroquantology.</italic></source> (<year>2022</year>) <volume>20</volume>:<fpage>892</fpage>&#x2013;<lpage>9</lpage>.</citation></ref>
<ref id="B37"><label>37.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ferng</surname> <given-names>HW</given-names></name> <name><surname>Khoa</surname> <given-names>NM</given-names></name></person-group>. <article-title>On security of wireless sensor networks: a data authentication protocol using digital signature.</article-title> <source><italic>Wirel Netw.</italic></source> (<year>2017</year>) <volume>23</volume>:<fpage>1113</fpage>&#x2013;<lpage>31</lpage>.</citation></ref>
<ref id="B38"><label>38.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Logeshwaran</surname> <given-names>J</given-names></name> <name><surname>Karthick</surname> <given-names>S</given-names></name></person-group>. <article-title>A smart design of a multi-dimensional antenna to enhance the maximum signal clutch to the allowable standards in 5G communication networks.</article-title> <source><italic>ICTACT J Microelectron.</italic></source> (<year>2022</year>) <volume>8</volume>:<fpage>1269</fpage>&#x2013;<lpage>74</lpage>.</citation></ref>
<ref id="B39"><label>39.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Anderson</surname> <given-names>R</given-names></name> <name><surname>Bergadano</surname> <given-names>F</given-names></name> <name><surname>Crispo</surname> <given-names>B</given-names></name> <name><surname>Lee</surname> <given-names>JH</given-names></name> <name><surname>Manifavas</surname> <given-names>C</given-names></name> <name><surname>Needham</surname> <given-names>R</given-names></name></person-group>. <article-title>A new family of authentication protocols.</article-title> <source><italic>ACM SIGOPS Oper Syst Rev.</italic></source> (<year>1998</year>) <volume>32</volume>:<fpage>9</fpage>&#x2013;<lpage>20</lpage>.</citation></ref>
<ref id="B40"><label>40.</label><citation citation-type="journal"><person-group person-group-type="editor"><name><surname>Jasmine</surname> <given-names>J</given-names></name> <name><surname>Yuvaraj</surname> <given-names>N</given-names></name> <name><surname>Logeshwaran</surname> <given-names>J</given-names> </name></person-group> editors. <article-title>DSQLR-A distributed scheduling and QoS localized routing scheme for wireless sensor network.</article-title> <source><italic>Recent trends in information technology and communication for industry 4.0</italic></source>, <publisher-loc>Chennai</publisher-loc>: <publisher-name>RcHuB Publications</publisher-name> (<year>2022</year>). p. <fpage>47</fpage>&#x2013;<lpage>60</lpage>.</citation></ref>
<ref id="B41"><label>41.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Raja</surname> <given-names>S</given-names></name> <name><surname>Rajan</surname> <given-names>AJ</given-names></name></person-group>. <article-title>A decision-making model for selection of the suitable FDM machine using fuzzy TOPSIS.</article-title> <source><italic>Math Probl Eng.</italic></source> (<year>2022</year>) <volume>2022</volume>:<issue>15</issue>.</citation></ref>
<ref id="B42"><label>42.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ramkumar</surname> <given-names>M</given-names></name> <name><surname>Logeshwaran</surname> <given-names>J</given-names></name> <name><surname>Husna</surname> <given-names>T</given-names></name></person-group>. <article-title>CEA: certification based encryption algorithm for enhanced data protection in social networks.</article-title> <source><italic>Fundam Appl Math Soft Comput.</italic></source> (<year>2022</year>) <volume>1</volume>:<fpage>161</fpage>&#x2013;<lpage>70</lpage>.</citation></ref>
<ref id="B43"><label>43.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Venkatasubramanian</surname> <given-names>S</given-names></name> <name><surname>Raja</surname> <given-names>S</given-names></name> <name><surname>Sumanth</surname> <given-names>V</given-names></name> <name><surname>Dwivedi</surname> <given-names>JN</given-names></name> <name><surname>Sathiaparkavi</surname> <given-names>J</given-names></name> <name><surname>Modak</surname> <given-names>S</given-names></name><etal/></person-group> <article-title>Fault diagnosis using data fusion with ensemble deep learning technique in IIoT.</article-title> <source><italic>Math Probl Eng.</italic></source> (<year>2022</year>) <volume>2022</volume>:<fpage>1</fpage>&#x2013;<lpage>8</lpage>.</citation></ref>
<ref id="B44"><label>44.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Logeshwaran</surname> <given-names>J</given-names></name> <name><surname>Ramkumar</surname> <given-names>M</given-names></name> <name><surname>Kiruthiga</surname> <given-names>T</given-names></name> <name><surname>Sharan Pravin</surname> <given-names>R</given-names></name></person-group>. <article-title>SVPA - the segmentation based visual processing algorithm (SVPA) for illustration enhancements in digital video processing (DVP).</article-title> <source><italic>ICTACT J Image Video Process.</italic></source> (<year>2022</year>) <volume>12</volume>:<fpage>2669</fpage>&#x2013;<lpage>73</lpage>.</citation></ref>
<ref id="B45"><label>45.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Mehbodniya</surname> <given-names>A</given-names></name> <name><surname>Webber</surname> <given-names>JL</given-names></name> <name><surname>Neware</surname> <given-names>R</given-names></name> <name><surname>Arslan</surname> <given-names>F</given-names></name> <name><surname>Pamba</surname> <given-names>RV</given-names></name> <name><surname>Shabaz</surname> <given-names>M</given-names></name></person-group>. <article-title>Modified Lamport Merkle digital signature blockchain framework for authentication of internet of things healthcare data.</article-title> <source><italic>Expert Syst.</italic></source> (<year>2022</year>) <volume>39</volume>:<issue>e12978</issue>.</citation></ref>
<ref id="B46"><label>46.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Logeshwaran</surname> <given-names>J</given-names></name> <name><surname>Ramkumar</surname> <given-names>M</given-names></name> <name><surname>Kiruthiga</surname> <given-names>T</given-names></name> <name><surname>Sharanpravin</surname> <given-names>R</given-names></name></person-group>. <article-title>The role of integrated structured cabling system (ISCS) for reliable bandwidth optimization in high-speed communication network.</article-title> <source><italic>ICTACT J Commun Technol.</italic></source> (<year>2022</year>) <volume>13</volume>:<fpage>2635</fpage>&#x2013;<lpage>9</lpage>.</citation></ref>
<ref id="B47"><label>47.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Singh</surname> <given-names>M</given-names></name> <name><surname>Kaur</surname> <given-names>H</given-names></name> <name><surname>Kakkar</surname> <given-names>A</given-names></name></person-group>. <article-title>Digital signature verification scheme for image authentication.</article-title> <source><italic>Proceedings of the 2015 2nd International conference on recent advances in engineering &#x0026; computational sciences (RAECS).</italic></source> <publisher-loc>Piscataway, NJ</publisher-loc>: <publisher-name>IEEE</publisher-name> (<year>2015</year>). p. <fpage>1</fpage>&#x2013;<lpage>5</lpage>.</citation></ref>
<ref id="B48"><label>48.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Logeshwaran</surname> <given-names>J</given-names></name> <name><surname>Saravanakumar</surname> <given-names>K</given-names></name> <name><surname>Dineshkumar</surname> <given-names>S</given-names></name> <name><surname>Arunprasath</surname> <given-names>C</given-names></name></person-group>. <article-title>SBML algorithm for intelligent fuel filling (IFF) and smart vehicle identification system (SVIS).</article-title> <source><italic>Int J Adv Res Manag Archit Technol Eng.</italic></source> (<year>2016</year>) <volume>2</volume>:<fpage>149</fpage>&#x2013;<lpage>54</lpage>.</citation></ref>
<ref id="B49"><label>49.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Murty</surname> <given-names>MS</given-names></name> <name><surname>Veeraiah</surname> <given-names>D</given-names></name> <name><surname>Rao</surname> <given-names>AS</given-names></name></person-group>. <article-title>Digital signature and watermark methods for image authentication using cryptography analysis.</article-title> <source><italic>Signal Image Process.</italic></source> (<year>2011</year>) <volume>2</volume>:<fpage>170</fpage>&#x2013;<lpage>9</lpage>.</citation></ref>
<ref id="B50"><label>50.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Saravanakumar</surname> <given-names>K</given-names></name> <name><surname>Logeshwaran</surname> <given-names>J</given-names></name></person-group>. <article-title>Auto-Theft prevention system for underwater sensor using lab view.</article-title> <source><italic>Int J Innov Res Comput Commun Eng.</italic></source> (<year>2016</year>) <volume>4</volume>:<fpage>1750</fpage>&#x2013;<lpage>5</lpage>.</citation></ref>
<ref id="B51"><label>51.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ganeshkumar</surname> <given-names>K</given-names></name> <name><surname>Arivazhagan</surname> <given-names>D</given-names></name></person-group>. <article-title>Generating a digital signature based on new cryptographic scheme for user authentication and security.</article-title> <source><italic>Indian J Sci Technol.</italic></source> (<year>2014</year>) <volume>7</volume>:<fpage>1</fpage>&#x2013;<lpage>5</lpage>.</citation></ref>
<ref id="B52"><label>52.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Sutharasan</surname> <given-names>M</given-names></name> <name><surname>Logeshwaran</surname> <given-names>J</given-names></name></person-group>. <article-title>Design intelligence data gathering and incident response model for data security using honey pot system.</article-title> <source><italic>Int J Res Dev Technol.</italic></source> (<year>2016</year>) <volume>5</volume>:<fpage>310</fpage>&#x2013;<lpage>4</lpage>.</citation></ref>
</ref-list>
</back>
</article>
