  <?xml version="1.0"?>
<journal>
 <journal_metadata>
  <full_title>Fusion: Practice and Applications</full_title>
  <abbrev_title>FPA</abbrev_title>
  <issn media_type="print">2692-4048</issn>
  <issn media_type="electronic">2770-0070</issn>
  <doi_data>
   <doi>10.54216/FPA</doi>
   <resource>https://www.americaspg.com/journals/show/2264</resource>
  </doi_data>
 </journal_metadata>
 <journal_issue>
  <publication_date media_type="print">
   <year>2018</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2018</year>
  </publication_date>
 </journal_issue>
 <journal_article publication_type="full_text">
  <titles>
   <title>Integrated Digital Signature Based Watermarking Technology for Securing Online Electronic Documents</title>
  </titles>
  <contributors>
   <organization sequence="first" contributor_role="author">Department of Medical Instrumentation Technical Engineering ,Technical College of Engineering, ‏ Al-Bayan University, Baghdad, Iraq</organization>
   <person_name sequence="first" contributor_role="author">
    <given_name>Sinan Q.</given_name>
    <surname>Salih</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Symbiosis Institute of Technology (SIT) Pune Campus, Symbiosis International (Deemed University) (SIU), Pune, 412115, Maharashtra, India.</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Ravi</given_name>
    <surname>..</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Department of Medical Instrumentation Technical Engineering, Medical Technical College, Al-Farahidi University, Baghdad, Iraq</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Jamal Fadhil</given_name>
    <surname>..</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">College of computer and information technology, American university in the emirates.</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Amer</given_name>
    <surname>..</surname>
   </person_name>
   <organization sequence="first" contributor_role="author"> Symbiosis Institute of Technology (SIT) Pune Campus, Symbiosis International (Deemed University) (SIU), Pune, 412115, Maharashtra, India.</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Pritesh</given_name>
    <surname>..</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">College of Pharmacy, University of Al-Ameed, Karbala PO Box 198, Iraq</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Ahmed Dheyaa</given_name>
    <surname>Radhi</surname>
   </person_name>
  </contributors>
  <jats:abstract xml:lang="en">
   <jats:p>Even though the transmission and processing speeds of electronic documents have been vastly enhanced, electronic document information may be revealed, counterfeited, tampered with, or otherwise compromised. To maintain corporate success in the marketplace, network security should be essential to the protection of electronic documents. As a result, there is a rising demand for authentication and verification procedures for a variety of important documents, including those used in banking, government, and other transactions as well as certificates and other academic credentials. In recent years, there has been a fast growth of digital watermarking technology, which involves embedding invisible or hidden digital signatures into data without compromising the data's authenticity. Hence, in this paper, we utilize the watermarking technology in the encrypted data using dynamic wavelet transform algorithm to make a document more protected. Now the protected data is sent to cloud database for storage. Integrated digital signature algorithm (SHA-256 + DSA) is proposed in this research to generate digital signature for each document. When recipients download the data, the data is verified for its integrity after extracting the digital signature and encrypted data. This strategy improves record security. We also compare the suggested technique to standard practices and assess its performance based on a variety of indicators to demonstrate its effectiveness.   </jats:p>
  </jats:abstract>
  <publication_date media_type="print">
   <year>2024</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2024</year>
  </publication_date>
  <pages>
   <first_page>120</first_page>
   <last_page>128</last_page>
  </pages>
  <doi_data>
   <doi>10.54216/FPA.140111</doi>
   <resource>https://www.americaspg.com/articleinfo/3/show/2264</resource>
  </doi_data>
 </journal_article>
</journal>
