Sustainable electronic document security: a comprehensive framework integrating encryption, digital signature and watermarking algorithms

Protecting electronic documents, especially those containing sensitive data, is a major challenge in an open web. The data security industry has long struggled to manage the security of e-books, data shows that information security issues can cause significant economic losses after three years Although cryptographic methods have been proposed as a solution in of these challenges Focusing on speed and efficiency The shortcomings of traditional encryption methods have been thoroughly examined Although a number of network management techniques assure retention privacy and integrity though, when it comes to encryption. Digital signature algorithms, although effective in detecting unauthorized changes and limiting the scope for copyright protection, do not ensure the confidentiality of shared electronic documents When addressing research gaps addressing this issue, the paper proposes a security framework for electronic documents that combines three important security mechanisms: encryption, digital signatures, and watermark algorithms Dhishu By matching their strengths, constraints are overcome. The combination of encryption and digital signatures is explored as a promising approach to protecting electronic documents, ensuring authenticity and confidentiality Importantly, the need to explore security mechanisms such as digital is highlighted emphasis on handwriting, encryption, and watermarking systems in depth.


Introduction
The falsification of important electronic files has grown to be an trouble in contemporary instances because of the records generation area's rapid growth and smooth availability of lower priced and complicated workplace supplies in the marketplace.As a result, there's a growing call for authentication and verification procedures for various important files, consisting of those utilized in banking, government, and other transactions, in addition to certificates and other academic credentials [1].In recent years, virtual watermarking era has grown fast, which involves embedding invisible or hidden digital signatures into facts without compromising the facts's authenticity.Digital watermarking can tell if the specific data is secured, keep track of how it is altered, and spot fake data.To enhance the security of data further in addition to digital watermarking, encryption techniques can be applied to preserve the data integrity.However, several difficult and tiresome procedures have made document verification incredibly difficult and time-consuming, which inspired us to carry out this study.When just one kind of encryption is used, such as AES, DES, or RSA, based on customer demand, existing systems often fail.We need a solution that may have extra security since the main problem with this system is that each encryption is done using encryption keys, and if these keys are leaked in any way, the whole data is destroyed [2].Consequently, this research suggests hybrid cryptography, which combines four novel algorithms with existing encryption systems.The overall methodology is explained as follows.When a sender 'A' uploads a document digitally, a digital signature is generated for the document using the SHA-256 integrated digital signature algorithm.In parallel, data is encrypted by the proposed hybrid encryption technique Enhanced DES + RSA algorithm.Watermarking of encrypted data is performed by Dynamic Wavelet Transform-based Document Watermarking scheme.The digital signature is embedded into the watermarked document to obtain a digitally signed E-document.This protected data is sent to the cloud database for storage.When the recipient sends a request for an electronic document to the user.When the legitimate recipient downloads the data, it is verified for its integrity after extracting the digital signature and encrypted data.If the recipient authenticates the data, the data is then decrypted using the keys provided for the recipient.After decryption, the recipient reads the original data.This strategy improves record security.We also evaluate the proposed method using different metrics and compare them with the traditional approaches to prove the system's efficacy [3][4][5].Organizations demand information systems that make it easier to handle the documents generated as part of their operations on a digital platform.The introduction of electronic document management systems was assisted by the advancement of information and communication technology, which made it easier to move documents to digital platforms.To achieve organizational success, it is now essential that information technology and information system applications must be employed in organizations.Systems for managing electronic documents (E-docs) are already widespread in various enterprises [6].The digitization of documents utilizing computer systems and technology is made possible by an electronic document management system (EDMS) to satisfy business demands.This makes it simple for many organizations employing an extensive EDMS to handle all information generated both internally and externally.Therefore, this approach still performs better than institutions that provide services using conventional ways of information management in terms of production/service and efficiency.Institutions use EDMS to store documents securely and enhance operational procedures.Many advantages of EDMS include increased production/service and efficiency, fewer mistakes, higher service quality, and lower communication costs.However, even if EDMS has numerous advantages for its consumers, it has also made implementing the new technical framework crucial.Every institution must successfully install an EDMS since these programs expedite business operations and simplify users' lives [7].The research community has been interested in the possible advantages of electronic documents, such as the administration of personal or organizational information, online client access, and easier exchange of organizational data, as shown in Figure 1.The research focuses on addressing the falsification of electronic documents and proposes a hybrid cryptography solution, incorporating digital signatures, hybrid encryption, and watermarking.
The present day have a look at, at the same time as introducing progressive answers to deal with the falsification of digital documents, possesses certain weaknesses that warrant attention for a more complete evaluation.One amazing problem is the ability absence of real-global validation or implementation.The observe's findings may lack sensible confirmation, making it challenging to evaluate the feasibility and effectiveness of the proposed methodologies in real situations.Real-global validation is crucial to making sure that the proposed answers align with the complexities and challenges encountered in practical applications.
Additionally, the look at assumes stable cloud garage without supplying a detailed exploration of potential vulnerabilities or risks related to cloud systems.Cloud safety concerns, which includes the possibilities of statistics breaches or unauthorized access, must be very well examined to beautify the examine's robustness and relevance to present day protection challenges.The complexity added through the hybrid cryptography method, which mixes more than one algorithms, may be taken into consideration another weak point.While the combination of diverse cryptographic strategies enhances safety, it could concurrently introduce complexities in terms of implementation, protection, and capability overall performance problems [7].The safety of the proposed device heavily is based on effective key control.If key control isn't always dealt with securely, it can emerge as a ability weakness, because the compromise of encryption keys may lead to the exposure of touchy facts.The examine should gain from a more particular exploration of key management strategies to mitigate related dangers successfully [8].While watermarking is in short cited as a means to make sure records integrity, the study won't offer an in-depth analysis of the robustness of the selected watermarking scheme.A thorough exam of the effectiveness of watermarking in resisting numerous attacks is important for a comprehensive knowhow of its role within the proposed safety features.The examine highlights the advantages of Electronic Document Management Systems (EDMS) however may also generalize those blessings with out addressing potential challenges or versions in implementation across one-of-a-kind businesses or industries.A greater nuanced dialogue at the particular concern and challenges related to the adoption of EDMS could enhance the study's applicability and relevance to various contexts.Moreover, the proposed safety features may additionally introduce complexity for quit-users.The observe should benefit from a greater explicit attention of personfriendly interfaces or seamless integration into existing workflows to ensure ideal consumer adoption and limit potential usability demanding situations.Scalability concerns aren't explicitly discussed inside the observe.As the quantity of electronic documents will increase, capability scalability troubles, both in phrases of computational sources and processing time, need to be taken into consideration to make sure the proposed system stays effective and efficient underneath various workloads.Finally, the study assumes a legitimate recipient for document retrieval with out delving into situations involving unauthorized access tries or ensuring secure authentication mechanisms.An exploration of those aspects is critical to cope with ability vulnerabilities associated with unauthorized access or illegitimate use of the proposed security measures.Ethical issues, which include user privateness and records possession, are not very well discussed in the study.A greater comprehensive exploration of ethical implications related to the proposed security features might contribute to a well-rounded expertise of the look at's effect on users and stakeholders.The technique consists of steps for report uploading, digital signature technology, encryption, watermarking, and storage.The gadget is evaluated the usage of metrics and as compared with traditional procedures.Additionally, the have a look at emphasizes the importance of electronic report control structures (EDMS) in businesses for green records managing.Table 1 shows the Summary of Research Focus and Methodology.

Issue Addressed
Falsification of crucial electronic documents due to easy availability of office supplies and fast expansion of the information technology sector.Rising demand for authentication and verification in various sectors.

Technological Solutions
Digital watermarking for invisible signatures, authentication, and detection of alterations.Introduction of encryption techniques for enhanced data security.

Challenges
Document verification complexity and time-consuming procedures with single encryption methods (AES, DES, RSA).Vulnerability to key leaks.

Proposed Solution
Hybrid cryptography combining four novel algorithms with existing encryption systems for extra security.Integration of SHA-256 digital signature, Enhanced DES + RSA hybrid encryption, and Dynamic Wavelet Transform-based Document Watermarking.

Methodology Overview
Digital signature generation using SHA-256 for document authenticity.<br> -Hybrid encryption (Enhanced DES + RSA) for data encryption.<br> -Watermarking of encrypted data using Dynamic Wavelet Transform.<br> -Integration of digital signature into watermarked document for protection.<br> -Storage in the cloud database.<br> -Recipient verification, decryption, and original data retrieval.

System Evaluation
Use of metrics and comparison with traditional approaches to demonstrate system efficacy.

Organizational Context
Integration of electronic document management systems (EDMS) in organizations for efficient handling of digital documents.

Advantages of EDMS
Secure document storage, increased production/service efficiency, fewer mistakes, higher service quality, and lower communication costs.

Research Interest
Exploration of advantages of electronic documents for personal and organizational information management, online client access, and efficient exchange of organizational data.Electronic documents are transmitted and accessed through the network.This digital advantage is risky since adjustments or modifications are only sometimes visible to the data owner [9].E-documents in public channels are susceptible to malicious assaults, raising issues with information security, as depicted in Figure 2. Attacks against E-documents can take many different forms, such as replay attacks (transmission of valid data is maliciously delayed or repeated), man-in-the-middle attacks (where an attacker intervenes in a conversation between two users, giving the impression that normal information exchange is taking place), and impersonation attacks (where an attacker poses as a legitimate sender to mislead the recipient into clicking on a malicious link, compromise attacks (accessing or modifying the original data context, and Masquerade attack(gaining unauthorized access to information by using fake identity).These cyber-security attacks raise concerns about the accuracy of electronic documents.The privacy and security of electronic documents are difficult to maintain in the modern digital age.Substantial attention in information security has focused on confidentiality, data availability, and integrity [10].Research on strategies to ensure the reliability of electronic documents is being carried out in various professional sectors.Digitally signing electronic documents is now one of the most customarily provided alternatives.Encryption and digital signatures are more and more used to show the integrity and validity of electronic files.It can be feasible to apply this approach to guarantee the accuracy of digital records.Figure 2 indicates the Insecure transmission of Electronic documents between two customers Figure 2. Insecure transmission of Electronic documents between customers

Research method
In the unexpectedly evolving landscape of virtual verbal exchange and statistics alternate, electronic documents play a pivotal position, encompassing a spectrum of touchy statistics starting from corporate information to nonpublic facts.However, the pervasive connectivity of open network environments introduces a persistent assignment: the safeguarding of these electronic documents against capability safety breaches.The information safety industry has lengthy grappled with devising powerful strategies to make certain the confidentiality, integrity, and authenticity of e-documents.As established by way of statistical analyses, the repercussions of information safety problems emerge as more and more stated over time, resulting in tremendous economic losses.To cope with these challenges, cryptographic techniques have emerged as a fundamental solution.Yet, traditional encryption structures, while imparting a layer of security, aren't with out their barriers.The computational overhead incurred with the aid of the want for severa keys and complicated mathematical calculations has caused worries concerning encryption speed and ordinary performance.This paper delves into the intricacies of digital report security, losing light at the drawbacks of conventional cryptography strategies.Specifically, it addresses concerns related to safety effectiveness and computational expenses, highlighting the need for modern methods to make stronger the safety of e-documents.While sure community control strategies provide assurances in phrases of confidentiality and integrity, they frequently fall short in providing a complete answer.Digital signature algorithms, any other cornerstone in facts safety, excel in figuring out unauthorized adjustments and proscribing get admission to for copyright protection.However, they do not inherently make certain the secrecy of digital files that are shared among customers.Recognizing these challenges, this paper explores a novel streetthe mixing of encryption, virtual signatures, and watermarking algorithmsto forge a comprehensive framework for the security of digital files.When a sender 'A' uploads a record digitally, a digital signature is generated using the SHA-256 integrated digital signature algorithm [11].In parallel, records is encrypted by using the proposed hybrid encryption approach Enhanced DES RSA algorithm.Watermarking of encrypted information is completed by using Dynamic Wavelet Transform-based Document Watermarking scheme.The virtual signature is embedded into the watermarked record to reap a digitally signed E-record.This blanketed facts is dispatched to the cloud database for storage.When the recipient sends a request for an digital reproduction to the user.When the valid recipient downloads the statistics, it's miles demonstrated for its integrity after extracting the digital signature and encrypted information.If the recipient authenticates the information, the facts is then decrypted the usage of the keys supplied for the recipient.After decryption, the recipient reads the original statistics.Figure three suggests the recommended protection architecture for safeguarding on-line electronic files [12].

SHA-256 integrated digital signature algorithm (SHA-256+DSA)
In establishing a robust digital signature framework for electronic documents, we implement the SHA-256 Integrated Digital Signature Algorithm (SHA-256+DSA).This table elucidates the step-by-step methodology behind the creation and verification of digital signatures, aiming to ensure the integrity, authenticity, and confidentiality of uploaded documents on our online platform.The initial step includes assigning a unique virtual signature to each document uploaded via users.This virtual signature acts as an digital seal, presenting affirmation that the record's information stays unaltered for the reason that time of signing [13].Notably, the one of a kind nature of digital signatures makes them in particular precious for criminal functions, putting them apart from other digital signature techniques [14].The essence of this technique lies inside the use of keys: a private key and a public key.Certifying government, recognized as truthful entities, play a critical role in generating and dispensing these signatures, making sure their credibility through cryptographic techniques [15].The personal key, held completely with the aid of the signer, plays a pivotal function in creating the digital signature, emphasizing the significance of safeguarding its confidentiality [16].Recipients of digitally signed messages make use of the general public key to confirm the authenticity of the acquired message.While the personal and public keys are intrinsically connected, planned measures are taken to ensure their dissimilarity, stopping the publicity of the personal key from the public key [17].In this context, senders need to percentage their public keys with recipients to enable the verification of message authenticity [18].Recognizing the project posed by means of traditional virtual signature techniques, wherein signatures can become excessively lengthy, the methodology addresses this problem via employing cryptographic hash capabilities [19].Specifically, the SHA-256 hash feature is hired to generate a set-length message digest, facilitating green coping with of big electronic files [20].For signing, the sender initiates the system by deciding on a pseudorandom number, making sure it is inside the period constraints of the text.The selected hash function, in this example, SHA-256, procedures the arbitrary-period text of the document, ensuing in a fixed-size message digest [21].Subsequently, the sender transmits the digital file along with the generated virtual signature (D(m; n)) to the supposed receiver [21].This complete methodology encapsulates the SHA-256 Integrated Digital Signature Algorithm, providing a stable and green way of safeguarding electronic files inside our on line platform.The resulting table information every step, imparting a clear and concise evaluation of the complicated process concerned in securing digital signatures for e-files.The standard framework for generating virtual signatures the use of SHA-256 DSA is visually represented in Table 2.

Table 2. SHA-256+DSA digital signature algorithm methodology overview
Step Description 1 Digital Signature Assignment: Each file uploaded by way of the consumer into the online platform is assigned a digital signature.The purpose of the virtual signature is to confirm that the information has no longer been altered since it was signed.Digital signatures, distinct from different digital signatures, are in particular valuable for criminal functions because of their specific process and consequences. 2 Keys Used in the Process: The digital signature process entails the use of two keys: a non-public key and a public key.These keys are required for both signing and verifying the signature.Certifying authorities, sincere entities, produce and distribute the signatures.Private keys, belonging exclusively to the signer, are vital for producing digital signatures.Each person should have their own private key for protection motives.Public keys, handy to everyone receiving signed messages, are used to confirm the authenticity of the message. 3 Private Key Usage: The signer's personal key's utilized to create the virtual signature, that is appended to the message.The confidentiality of customers' private keys is vital for the overall security of the virtual signature gadget, and users must take precautions to save you robbery.

4
Public Key Usage: Recipients of signed messages use the public key to affirm the message's authenticity.While private and public keys are linked, intentional measures are taken to make certain there may be no discernible similarity between them, stopping the private key from being deduced from the general public key.Senders provide recipients with their public key to permit verification of message authenticity.

5
Addressing Signature Length Issues: Traditional virtual signature techniques may additionally bring about signatures as prolonged as or longer than the messages they authenticate, posing a venture for large messages.To address this trouble, cryptographic hash functions, especially SHA-256, are employed to create a hard and fast-length message digest, making sure green managing of massive files.

6
Hash Function Utilization: For signing, the sender selects a pseudorandom quantity much less than the period of the text.A hash characteristic, in this case, SHA-256, is carried out to the record's arbitrary-period text, generating a setsize message digest of 256 bits.This hash price becomes an necessary a part of the digital signature advent process.

7
Transmission to Receiver: After generating the virtual signature, the sender transmits the E-record together with the virtual signature (D(m; n)) to the receiver for authentication.The framework for producing virtual signatures the usage of SHA-256 DSA is visualized in Figure three.
In the furnished technique for the SHA-256 Integrated Digital Signature Algorithm (SHA256 DSA), numerous parameters and equations are vital to understanding the process of making and verifying virtual signatures.
Here's an in-intensity rationalization of the parameters and their associated equations: Digital Signature (D): • Equation: (; ) • Explanation: The virtual signature is denoted by using D and is a characteristic of the document (m) and a pseudorandom number (n).This feature encapsulates the essence of the document's content and the randomness added by using the pseudorandom variety at some stage in the signing procedure.Private Key (PrivateKey): • Equation: PrivateKey • Explanation: The non-public key's an essential issue within the introduction of digital signatures.It is used inside the signing technique to encrypt the hash of the document, presenting a completely unique and secure identifier for the signer.Public Key (PublicKey): • Equation: PublicKey • Explanation: The public secret is related to the signer and is used by recipients to verify the authenticity of digitally signed messages.While it is connected to the personal key, there's no discernible similarity among them, making sure the safety of the signer's personal statistics.Hash Function (Hash): • Equation: ℎ() =  − 256() • Explanation: The hash function is applied to the record (m) using SHA-256, resulting in a set-size message digest.SHA-256 is a cryptographic hash feature that maps records of arbitrary length to a set-size output, in this case, 256 bits.This digest serves as a compact representation of the document's content.

• Pseudorandom Number (n):
• Equation:  < length of the text • Explanation: The pseudorandom range is chosen via the sender all through the signing system.It is vital that this variety is much less than the duration of the textual content in the document, introducing an detail of unpredictability and enhancing the safety of the digital signature.
These parameters and equations collectively shape the muse of the SHA-256 DSA method, providing a systematic and secure technique to developing and verifying virtual signatures for digital documents.The careful integration of cryptographic functions, private and public keys, and pseudorandom elements guarantees the reliability and security of the digital signature system.On receiving the E-file and signature, the recipient verifies it for integrity and authentication.The receiver compares the computed virtual signature with the received virtual signature to assess the integrity of the acquired E-document.If the introduced virtual signature is equal to the obtained virtual signature, the receiver accepts the document.The receiver does not get the paper if the computed virtual signature isn't always equal to the obtained virtual signature.

E-document encryption by hybrid RSA + Enhanced DES
We have implemented a hybrid RSA + Enhanced DES approach to enhance the encryption of E-documents and ensure the security of the document context [22].This approach involves a double encryption process, where the E-document undergoes encryption in two stages.In the first stage, the RSA encryption algorithm is employed to encrypt the E-document.Subsequently, in the second stage, an enhanced DES algorithm further encrypts the already encrypted E-document.S-box replacement is an integral part of the standard DES, featuring eight S-boxes with corresponding replacements.Typically, DES utilizes a mapping table where each of the eight S-boxes maps to a distinct set of values [23].In our enhanced DES, while we still employ eight S-boxes per round, each round uses only two of the eight mapping tables used by DES.This modification enhances the efficiency of the encryption process.The first stage of the process involves RSA-based E-document encryption, wherein two larger prime numbers are carefully chosen to ensure their distinctiveness.The modulus value is then determined by the product of these two selected prime numbers.The resultant encrypted E-document, produced by the DES algorithm, proceeds to the second stage of encryption.In the second stage, Enhanced DES-based E-document encryption takes place.The keys required for this stage are generated using the DES key generator [24].Initially, the input data bits within the encrypted E-document undergo transposition to modify their order, enhancing the difficulty of deciphering the encrypted text.The transposed information is then divided into two groups of 32 bits each, denoted as L and R. The improved DES algorithm conducts an additional 16 iterations through cyclic iteration.The output of the encryption function is derived through a series of operations, including an XOR operation with a sub-key, a P-box replacement, and an S-box replacement [25].
The Compression replacement, synonymous with S-box transformation, takes a 48-bit input and produces a 32bit output.Following 16 rounds of the enhanced DES algorithm, a double-encrypted E-document is obtained, providing an added layer of security to the original document.

Dynamic wavelet transform-based document watermarking scheme for encrypted E-documents
Following the encryption of an E-record, the following stage includes watermarking, specifically employing a Dynamic Wavelet Transform-primarily based Document Watermarking scheme.In this method, the encrypted E-document undergoes transformation into the wavelet domain via the discrete wavelet transformation [26].To decide the watermark location in the original encrypted report, a pseudo-random number is applied.This random number functions as the indicator for the location of the sub-watermarking band.The randomness is fine-tuned by adjusting the random number through multiplication by the sub-size band, aligning it with the band's dimensions [27].A critical step in this watermarking scheme involves calculating the mean value of the specified pixel in the document image concerning the nearby symbols.The methodology's intricacies are outlined in Algorithm 1, providing a comprehensive explanation of the proposed process [28][29][30][31].The watermark generated for the encrypted E-document is embedded into an encrypted document to form a watermarked E-document.After watermarking, a digital signature is embedded into a watermarked E-document to obtain a digitally signed E-document.The framework for digital watermarking is shown in Figure 4.

Results and discussion
Digital image watermarking is a pivotal technique involving the embedding of watermark data into multimedia outputs, ensuring integration, authenticity, and resistance to manipulation.Cover files of an ideal size, 256 pixels wide by 256 pixels high, contribute to the effectiveness of watermarking techniques.Non-blind watermarking techniques, owing to the availability of the original cover image during prove more reliable.The process of subtly modifying data to incorporate metadata characterizes watermarking.DES encryption, utilizing a shared private key between the sender and recipient.The primary watermark undergoes RSA encryption .The DES block cipher algorithm, employing 48-bit keys, transforms plain text into cipher text.Figure 10 displays the extracted cover image through DES decryption.Additionally, the result extracted watermark image using RSA decryption.Digital watermarking involves adding a digital code (watermark) to digital material, such as an image or audio file.The embedded data, known as a watermark, is determined by security requirements.Extraction of a digital watermark image using Structural Index Similarity (SSIM) and Peak Signal-to-Noise Ratio (PSNR) reveals the following comparative analysis in Table 3.The outcomes of the proposed watermarking and encryption methodology, assessed through multiple parameters, demonstrate its effectiveness in ensuring image integrity, security, and resilience against potential attacks.

Robustness against attacks
Result: Enhanced robustness achieved through the unique strategy of embedding the watermark twice for improved database copyright protection. .This watermarking method, designed for content material-primarily based authentication, proves its efficacy in accurately finding and retrieving altered quantities.Testing findings display the evolved technique's capacity to exactly pinpoint tampered components and restore them with first rate high-quality.Moreover, the method demonstrates its functionality to discriminate between valid processing sports and malicious attacks.Future research are poised to leverage powerful human visual gadget fashions to enhance transparency overall performance, with a focus on in-intensity investigations into tamper localization and self-recovery mechanisms.This complete technique positions the proposed method not best as a way to modern protection challenges however also as a catalyst for improvements in electronic record protection in the virtual and networked technology.
curation.Ravi Sekhar played a key role in the investigation, ensuring the accuracy of the results.Mashary N. Alrasheedy contributed to resources acquisition and data curation.Yitong Niu and Azmi Shawkat Abdulbaqi provided valuable insights for the original draft preparation and participated in the writing editing process.Ahmed Dheyaa Radhi focused on visualization aspects and played a supervisory role throughout the project.Muhammed Tharwat contributed significantly to the project's administration, overseeing various aspects of implementation.Jamal Fadhil Tawfeq participated in the review and editing of the manuscript, ensuring its coherence and quality.Hassan Muwafaq Gheni played a crucial role in project supervision, overseeing the research process.All authors have thoroughly reviewed and agreed to the final version of the manuscript before publication.

Figure 1 .
Figure 1.Exchange of Electronic Document between two users

Figure 3 .
Figure 3. Framework of SHA-256 DSA based totally digital signature era for E-documents

Figure 4 .
Figure 4. Framework of digital watermarking

Figure 5 .
Figure 5. Performance evaluation chart for proposed method