Efficient Multi-signature and QR Code Integration for Document Authentication (1)
Efficient Multi-signature and QR Code Integration for Document Authentication (1)
390
1
Department of Electrical Engineering, Politeknik Elektronika Negeri Surabaya, Surabaya, 60111, Indonesia
* Corresponding author’s Email: [email protected]
Abstract: The previous global pandemic has shifted many of these proposed needs to remote interactions, including
document authentication. The solution for remote document authentication is the use of digital signatures. However,
in reality, most implementations are inefficient and even weaken already secure methods. This study presents a novel
efficient digital signature method based on a multi-signature method that incorporates the edwards-curve digital
signature algorithm (EdDSA) algorithm, a quick-response (QR) code, and the cryptographically secure pseudorandom
number generator (CSPRNG) for key generation. This study assessed the performance efficiency of this method by
running it on a large number of executions in terms of generation, signature generation, and signature generation time
for three signers and a verifier. The results show that this proposed method outperforms all the existing methods that
this study compared across all parameters. In key generation performance assessments, this proposed method stands
out by employing CSPRNG that already been proven for its efficiency and security for cryptographic use. The usage
of the multi-signature method in the EdDSA algorithm has made this proposed method superior in signature generation
and signature verification performance assessment. On paper, EdDSA is the latest algorithm that has surpassed its
predecessors regarding security and efficiency. By using the multi-signature method, this study further improves the
signature generation and signature verification efficiency as signatures only need to be generated and verified once to
represent all signers. With the performance assessment done on this proposed device, this proposed method has an
average improvement of 76.27% across all parameters against the existing method. Additionally, using QR codes in
the method facilitates real-life signature verification by simplifying the scanning process for verifiers. This work
provides a secure and efficient solution to document file authentication.
International Journal of Intelligent Engineering and Systems, Vol.17, No.2, 2024 DOI: 10.22266/ijies2024.0430.32
Received: December 7, 2023. Revised: January 23, 2024. 391
The essence of a digital signature lies in the same value as the digest in the digital signature, it
cryptographic algorithms used. These algorithms means the document has not been modified and can
safeguard the authenticity and integrity of the signed be considered authentic. The public key used also
documents. To accomplish this, the document is allows verification of whether the signature on the
encoded in a distinct and difficult-to-alter format document is indeed from an official entity because
(hash) using intricate mathematical operations [4]. the public key is a unique code for each individual
To better understand how digital signatures work, and is always paired with the privately held private
an understanding of cryptographic techniques is key [11].
necessary. Simply put, cryptography, which derives RSA, one of the first algorithms used in digital
its name from the Greek for "secret writing," is a signature systems, was introduced in 1977 [12]. The
method for generating secret messages. This RSA algorithm is based on the mathematical problem
technique ensures that messages or information can of logarithms, creating a one-way function that is
be securely transmitted without being understood by easy to calculate the result of an input but difficult to
third parties [5]. There are four main goals of reverse (compute the input value). DSA, which was
cryptography [6]: 1) Confidentiality: ensuring data introduced in 1993, also uses discrete logarithm
remains safe and private from unauthorized access; problems in its method but uses a different
2) Integrity: ensuring data is safe from modification mathematical approach. ECC, an algorithm
by unauthorized parties; 3) Authentication: ensuring renowned for its security and efficiency, was
that the sender or origin of data information is from introduced more recently. ECC is based on the
an official source; 4) Non-repudiation: ensuring that elliptic curve discrete logarithm (ECDLP), allowing
the sender of data information cannot deny their the use of smaller key sizes while maintaining
involvement in the transmission. security equivalent to its predecessors.
In a general sense, cryptography can be In real-world conditions, a document often needs
categorized into two distinct types: asymmetric to be signed by several entities before it is declared
cryptography and symmetric cryptography [7]. valid. In digital signatures, such a method is referred
Symmetric cryptography uses the same key for both to as a multi-party signature. Unlike common
encryption and decryption processes. Therefore, the methods where one entity generates one signature, a
sender and receiver of secret data must have the same multi-party signature creates one digital signature
information about the key used. In its implementation, from several entities [13]. There have been many
the channel used to share key information must be studies attempting to create secure and efficient
secure. Examples of symmetric cryptography include multi-signatures. For example, the latest study by
data encryption standard (DES), Blowfish, and Shankar et al. [14] proposed a method where
advanced encryption standard (AES). On the other biometric credentials such as Identity (ID) numbers
hand, asymmetric cryptography uses different keys and fingerprints are hashed to generate a private key.
for the encryption and decryption processes. These Then, the private keys of each user are used to
keys are the private key and the public key. The generate a master private key used to form a digital
private key is kept secret, while the public key is signature with the EdDSA, a family of ECC.
openly shared. digital signature algorithm (DSA), However, this method poses security vulnerabilities.
Rivest-Shamir-Adleman (RSA), and elliptic curve Because of the additional non-random information to
cryptography (ECC) are examples of asymmetric generate the private key, third parties can more easily
cryptography [8]. attack the system. This key generation method is also
Digital signatures themselves are part of considered inefficient due to unnecessary pre-
asymmetric cryptography. As explained earlier, processing.
asymmetric cryptography employs two keys. Since This proposed method aims to tackle this issue by
the digital signature aims for authentication, the using the dedicated random key generation process
private key of the signer is used to create the digital by using the CSPRNG algorithm so that the quality
signature [9]. The public key of the signer is then of randomness cannot be distinguished from pure
used for verification. The hash function also plays a random [15]. Because of this, the security issue can
crucial role in the digital signature. The hash function be fixed, so the attacker cannot predict how the
creates a digest of the document before signing to private key is generated. Using CSPRNG as key
ensure the document's integrity [10]. The document's generation also addresses the efficiency issue by
digest is checked during the verification process. The eliminating unnecessary preprocessing with existing
digest embedded in the digital signature is obtained methods. Additionally, this study proposes to
by decrypting it using the public key of the signer. If implement QR codes in the method to further
the document's digest during verification has the
International Journal of Intelligent Engineering and Systems, Vol.17, No.2, 2024 DOI: 10.22266/ijies2024.0430.32
Received: December 7, 2023. Revised: January 23, 2024. 392
which is difficult to invert. The general form of an overall security and efficiency. Bisheh-Niasar et al.
elliptic curve over GF(p) is defined as follows Eq. [26] proposed an optimized implementation of
(3): EdDSA. The researcher showcased significant
improvements in execution time and performance
𝑦 2 ≡ 𝑥 3 + 𝑎𝑥 + 𝑏(𝑚𝑜𝑑 𝑝) (3) while maintaining security levels comparable to
advanced encryption standard (AES)-128. The usage
In this case, 𝑝 is a prime number, and the elements in of EdDSA covers the security issue in ECDSA. The
𝐺𝐹(𝑝) are {0, 1, 2, … , 𝑝 − 1}. This property is known method employed a hash function for the key
as the elliptic curve discrete logarithm problem, generation which is the standard method. However, it
creating a one-way function that is both difficult to lacks multi-signature support which has the same
solve and efficient to implement. Therefore, ECC is limitations as the previous methods. The method also
rapidly replacing previous public key algorithms in does not specify the implementation of QR codes
communication networks and systems, including in within it system. G. Shankar et al. [14] propose an
the context of digital signatures. improved multi-signature scheme for ensuring the
authenticity of digital documents. The method
2.4 Multi-signature employed EdDSA for the cryptography algorithm
and includes support for multi-signature features. For
Multi-signature or multi-sig is a protocol in the key generation, the method used the user's
digital signature cryptography that allows multiple biometric credentials, derived from a hash of the
signers to produce one master signature that XOR operation on an Aadhaar number (ID number),
represents their validation of a data or message [23] fingerprint, and a random number to generate the
Verification is done by combining all signers' public private key defined as follows Eq. (4)
keys that have been given publicly. This approach
increases the security and efficiency of using digital 𝑘𝑝𝑟𝑖𝑣 = 𝐻𝑎𝑠ℎ(𝐹𝑝𝑟𝑖𝑛𝑡 ⨁𝐼𝐷⨁𝑅𝑁𝐺) (4)
signatures [24]. To crack a multi-sig, an attacker must
know the private keys of all authorized parties who
However, this method of key generation is not usual
signed the data, a very difficult task. The efficiency
which leads to efficiency and security issues. XOR-
of multi-sig is seen in the verification process. In
ing a biometric number with a random number may
traditional digital signatures, the verifier has to check
not be an optimal approach for key generation, as
all existing signatures with their respective owners.
directly utilizing the random number would suffice.
However, in the multi-sig method, the verifier only
Moreover, incorporating non-random information
needs to check one signature using the master public
into key generation might introduce vulnerabilities,
key.
potentially aiding attackers in key cracking.
2.5 Comparison to existing method Additionally, the paper does not specify support for
QR code implementation, which could be a valuable
Based on the fundamentals above, several papers aspect of document verification and user-friendly
have implemented the digital signature method using interactions.
various attributes. Wellem et al. [25], utilized the Our proposed method introduces several
standard elliptic curve digital signature algorithm improvements over the existing methods. Firstly, we
(ECDSA). single signature method and QR code to proposed to utilize the robust EdDSA digital
address the vulnerability of paper-based academic signature algorithm, known for its superiority over
documents by proposing a document authentication ECDSA [27], addressing security concerns and
system. The QR code embedded in printed improving efficiency. Secondly, our method
documents contains a digital signature, allowing for eliminates the insignificant pre-process in key
subsequent authentication through either document generation by employing CSPRNG for the key
upload or QR code scanning. However, this research generation process that is dedicated to the
has limited features that lead to security and cryptographic field, mitigating security issues present
efficiency issues. The ECDSA usage is already in previous methods and optimizing efficiency.
known to be vulnerable to side-channel analysis Thirdly, we introduce multi-signature support,
attacks. The research does not specify which key adding a layer to security and also the efficiency.
generation technique they use in the method. The Lastly, we propose the integration of QR code
inferior key generator method will lead to support to simplify the user experience during
vulnerability. Furthermore, the lack of support for signature verification. Table 1 provides a brief
multi-signature features will impact the method’s overview of previous research and its comparison
with our method.
International Journal of Intelligent Engineering and Systems, Vol.17, No.2, 2024 DOI: 10.22266/ijies2024.0430.32
Received: December 7, 2023. Revised: January 23, 2024. 394
International Journal of Intelligent Engineering and Systems, Vol.17, No.2, 2024 DOI: 10.22266/ijies2024.0430.32
Received: December 7, 2023. Revised: January 23, 2024. 395
obtain the public key. The key pair is then stored by considered invalid, indicating that the signature or
each signer. These key pairs correspond to each other document may have been forged.
and operations performed with one key can only be
efficiently reversed by the other key. The example of 4. Evaluation and results
32 bytes private key generated from CSPRNG and its
In this section, this study evaluates the
public key pair from EdDSA in base64 format are
performance and security of the proposed method.
given as follows Eq. (6).
This evaluation aims to measure the efficiency and
security of the proposed method in comparison with
𝑘𝑝𝑟𝑖𝑣 = "𝑣𝑗𝑆𝐺𝑓𝑁𝐻𝑌9𝑛𝑄/𝐹𝑛𝑥𝑡𝑔𝑎𝑋𝑣𝑜/𝑤𝑦9
existing methods.
+ 𝐾𝑟𝑎𝑤𝑆00𝐶𝑏𝐼𝑙𝑑𝑝/ℎ𝑧4 = "
𝑘𝑝𝑢𝑏 = "5𝐴1𝐷𝑂4𝑅𝑜𝑡𝑌𝑘𝑋8𝑓𝑐𝑎0𝑘55𝑗𝑈𝐹 4.1 Device
𝑓𝑤𝐻𝑤𝑒𝑑𝐹4𝑢𝑅𝐿𝑔𝑑𝑏𝐷54𝑃7𝑤 = " (6)
The performance test was run on a hardware
In the signature generation phase, the objective is device with the specification Intel® Core™ i5-
to generate a digital signature of the document. The 8250U Processor, 8 GB RAM, NVIDIA® GeForce®
private keys of all signers are combined using the MX150 graphics card, and Windows 11 Home 64-Bit
AND operator to get a master private key that operating system (OS). The detailed specifications
represents all signers. This process is defined as can be found in Table 2 below.
follows Eq. (7).
4.2 Performance assessment
𝑚𝑎𝑠𝑡𝑒𝑟 𝑘𝑝𝑟𝑖𝑣 = 𝑘1𝑝𝑟𝑖𝑣 ∧ 𝑘2𝑝𝑟𝑖𝑣 ∧ 𝑘3𝑝𝑟𝑖𝑣 (7) This subsection aims to evaluate how well the
proposed method performs on a real-time application
The digest is calculated by hashing the document. by running the method on multiple execution counts
This digest value is passed to the EdDSA algorithm for 3 signers and a verifier. The findings provide an
along with the master private key to generate a digital understanding of the performance of the method on a
signature. To ease the process of future verification, larger scale in a practical implementation. The
the digital signature is encoded into a QR code format parameters observed in this study include key
and embedded into the signed document. generation, signature generation, and signature
Finally, at the signature verification stage, the generation time.
verifier will check the validity of the signature. The We conducted a performance assessment on our
resulting digest of the hashed document will be device with specifications outlined in Table 2.
compared with the digest of the digital signature. The Various methods were implemented to evaluate their
digest of the digital signature can be obtained by efficiency based on distinct cryptographic attributes,
decrypting the digital signature using the master such as the encryption algorithm used, key generation
public key from the combined public keys of all techniques, and the support for multi-signatures. The
signers. Master public key is obtained with Eq. (8). detailed differences between the various method can
be seen in Table 1.
𝑚𝑎𝑠𝑡𝑒𝑟 𝑘𝑝𝑢𝑏 = 𝑘1𝑝𝑢𝑏 ∧ 𝑘2𝑝𝑢𝑏 ∧ 𝑘3𝑝𝑢𝑏 (8) For comparison, this study compared the
proposed method with the methods proposed by
Verification is considered successful if both digests Wellem et al. [25], which uses the standard ECDSA
have the same value. Otherwise, the signature is single signature method, Bisheh-Niasar et al. [26],
with the EdDSA single signature method, and G.
Table 2. Device specifications Shankar et al. [14], with the EdDSA double signature
Specifications Details method but using Aadhar numbers, fingerprints, and
Model Acer Aspire E5-476G random numbers for the key generation process.
Processor Intel® Core™ i5-8250U In the assessment of key generation performance,
this study analyzes how efficient each method is in
RAM 8 GB DDR4 2400 MHz
generating key pairs, which is one of the fundamental
NVIDIA® GeForce®
Graphics
MX150
aspects in the cryptographic process. As can be seen
in Table 3 and Fig. 2 (a), the proposed method, which
Storage 128 GB M.2 SSD
uses CSPRNG for key generation, has the fastest
OS Windows 11 Home 64-Bit
execution time compared to the previous methods.
Programming Overall, for all execution counts, the
Python 3.9.7
language
International Journal of Intelligent Engineering and Systems, Vol.17, No.2, 2024 DOI: 10.22266/ijies2024.0430.32
Received: December 7, 2023. Revised: January 23, 2024. 397
proposed method has an average of 91.79% better only need to generate one master signature
than the latest method [14] for key generation time. representing all three signers, while single-signature
On paper, EdDSA is already more efficient than methods have to generate three signatures for each
ECDSA. The method [14] has a longer execution signer. For all execution counts, the proposed
time because there is preprocessing that is not methods have an average of 95.71% and 92.25%
conventional for key generation, even though they better than [25] and [26], respectively. Both the
use the EdDSA algorithm. The proposed method uses proposed method and [14] have similar performance
CSPRNG which is proven to be very efficient and as they both use the same multi-signature EdDSA
secure for cryptographic processes. method.
For signature generation performance assessment, The final stage of the digital signature method
this study analyzes how efficiently each method process is testing the performance of signature
generates digital signatures. The proposed method, verification. This test analyzes how efficient each
which uses multi-signature EdDSA, has the fastest method is in verifying the pre-generated signatures.
execution time compared to the previous methods, as Table 3 and Fig. 2 (c) show similar results to the
shown in Table 3 and Fig. 2 (b). Again, EdDSA signature generation assessment, where the multiple
outperforms ECDSA in both single-signature and signature method surpasses the single signature
multi-signature methods. All multi-signature method in terms of efficiency. The multi-signature
methods outperform single-signature methods as they
International Journal of Intelligent Engineering and Systems, Vol.17, No.2, 2024 DOI: 10.22266/ijies2024.0430.32
Received: December 7, 2023. Revised: January 23, 2024. 398
1.4
1.2
Time (Second)
1
0.8
0.6
0.4
0.2
0
1 2 3 4 5
Execution Count
ECDSA single-sig [29] EdDSA single-sig [26] EdDSA multi-sig [13] Proposed method
(a)
1.4
1.2
Time (Second)
1
0.8
0.6
0.4
0.2
0
10 50 100 200 500
Execution Count
ECDSA single-sig [29] EdDSA single-sig [26] EdDSA multi-sig [13] Proposed method
(b)
5
4
Time (Second)
3
2
1
0
10 50 100 200 500
Execution Count
ECDSA single-sig [29] EdDSA single-sig [26] EdDSA multi-sig [13] Proposed method
(c)
8
Time (Second)
0
1 2 3 4 5
Execution Count
ECDSA single-sig [29] EdDSA single-sig [26] EdDSA multi-sig [13] Proposed method
(d)
Figure. 2 Performance comparison: (a) key generation, (b) signature generation, (c) signature verification, and (d) overall
performance
International Journal of Intelligent Engineering and Systems, Vol.17, No.2, 2024 DOI: 10.22266/ijies2024.0430.32
Received: December 7, 2023. Revised: January 23, 2024. 399
method only needs to verify one primary signature this study recommends the implementation of QR
that represents the signatures of all signers, while the codes in its method to facilitate the signature
single-signature method needs to verify all three verification process in real-world situations. With the
signatures. The proposed method overcomes all QR code, the signature can be easily read by the
previous methods with an average improvement of verifier through scanning the QR code. This study
98.72% and 67.16% compared to [25] and [26], evaluates the proposed method by performing an
respectively. [14] achieved similar results to this efficiency performance assessment through various
study as it used the same multi-signature EdDSA executions for 3 signers and a verifier. The observed
method used in this study. parameters include key generation, signature
In all three basic processes of digital signature, generation, and signature generation time. The
the proposed method that implements CSPRNG key proposed method can outperform all existing
generation in EdDSA multi-signature signature methods. Against the latest method [14], the
method, surpasses all existing methods in terms of proposed method shows an average improvement of
performance. This clearly shows that the use of 76.27% for all parameters in the performance
CSPRNG is the best choice for key generation as this assessment. This study makes a significant
algorithm is already efficient on paper and has been contribution to the field of document file
established for cryptographic use, in this case used in authentication by presenting an efficient and secure
digital signature methods. Multi-signature methods method.
outperform single signature methods in signature
generation and signature verification because they Nomenclature
only need one master signature to represent all
signers. Therefore, they only need to create and verify • 𝐾𝑝𝑟 : private key
signatures once. It should be noted that this study • 𝐾𝑝𝑏 : public key
previously conducted a performance assessment • 𝑚: the message that will be signed
against the DSA method and a commonly used • 𝐻(. ): hash function to generate digest
algorithm, namely RSA. However, the results were • digest: unique fixed-size representation of data
astronomically inefficient compared to the proposed • 𝐶(. ): encryption function
method. Therefore, this study decided not to include • 𝑆𝑚 : digital signature of the message
them in this proposed analysis, given that in Figure 2 • 𝑚𝑠𝑖𝑔𝑛𝑒𝑑 : signed message, combination of
it is difficult to distinguish between the two methods. message and digital signature
For the overall performance, the proposed method • 𝐷(. ): decryption function
achieved an average of 97.42% and 44.26% against
• 𝐷𝑆𝑚 : decrypted digital signature
[25] and [26], respectively. Meanwhile, against the
latest method [14], the proposed method shows an • 𝑘: random number used as a seed
improvement of 76.27%. This indicates that the • 𝑠𝑒𝑒𝑑: initial value
proposed method offers better efficiency compared to • 𝑎: the left half of the seed
the existing methods, especially in terms of lower • 𝑏: the right half of the seed
execution time on all steps in the digital signature • 𝑑: private key
method. • 𝐺: base point on the elliptic curve
• 𝑄: public key,
5. Conclusion • 𝑀: the message that will be signed
This study proposes an efficient double signature • 𝐻𝑎𝑠ℎ(. ): a hash function
method with QR code integration for document • 𝑟 : the result of hashing the concatenation of
authentication using an EdDSA-based algorithm. private key and message
This proposed method uses CSPRNG for • 𝑅: a point on the elliptic curve
unpredictable, robust, and efficient key generation. • ℎ : the result of hashing the concatenation of
EdDSA was chosen as the digital signature algorithm message, public key, and point R
as it is one of the latest algorithms that offers a high- • 𝑠: digital signature component
security level and superior efficiency compared to • 𝑛: the order of the elliptic curve
previous algorithms. The application of the multi- • 𝑝1: point 1 on elliptic curve
signature method in this study improves the overall • 𝑝2: point 2 on elliptic curve
efficiency, as it integrates all the signer's private and • 𝐺𝐹(. ): Galois Field
public keys. This allows signature generation and
signature verification to be done only once. Finally,
International Journal of Intelligent Engineering and Systems, Vol.17, No.2, 2024 DOI: 10.22266/ijies2024.0430.32
Received: December 7, 2023. Revised: January 23, 2024. 400
International Journal of Intelligent Engineering and Systems, Vol.17, No.2, 2024 DOI: 10.22266/ijies2024.0430.32
Received: December 7, 2023. Revised: January 23, 2024. 401
Symposium on Circuits and Systems (ISCAS), pp. Signatures”, In: Proc. of 2023 International
1–5, 2021. Electronics Symposium (IES), pp. 238–243,
[19] M. R. Anwar, D. Apriani, and I. R. Adianita, 2023.
“Hash Algorithm In Verification Of Certificate [30] P. Kietzmann, T. C. Schmidt, and M. Wählisch,
Data Integrity And Security”, Aptisi “A Guideline on Pseudorandom Number
Transactions on Technopreneurship (ATT), Vol. Generation (PRNG) in the IoT”, ACM Comput
3, No. 2, pp. 65–72, 2021. Surv, Vol. 54, No. 6, pp. 1–38, 2022.
[20] N. J. G. Saho, E. C. Ezin, B. Watson, E. Badouel, [31] E. Uçak, “Teaching Materials Developed Using
and O. Niang, “Comparative Study on the QR Code Technology in Science Classes”,
Performance of Elliptic Curve Cryptography International Journal of Progressive Education,
Algorithms with Cryptography through RSA Vol. 15, No. 4, pp. 215–228, 2019.
Algorithm”, Colloque Africain sur la Recherche
en Informatique et en Mathématiques Apliquées,
2020.
[21] A. H. Darrel and Menezes, “Elliptic Curve
Cryptography”, Encyclopedia of Cryptography,
Security and Privacy, pp. 1–2, 2019.
[22] L. Nayak and V. Jayalakshmi, “A Study of
Securing Healthcare Big Data using DNA
Encoding based ECC”, In: Proc. of 6th
International Conference on Inventive
Computation Technologies (ICICT), pp. 348–
352, 2021.
[23] G. Maxwell, A. Poelstra, Y. Seurin, and P.
Wuille, “Simple Schnorr multi-signatures with
applications to Bitcoin”, Des Codes Cryptogr,
Vol. 87, No. 9, pp. 2139–2164, 2019.
[24] Y. Xiao, P. Zhang, and Y. Liu, “Secure and
Efficient Multi-Signature Schemes for Fabric:
An Enterprise Blockchain Platform”, IEEE
Transactions on Information Forensics and
Security, Vol. 16, pp. 1782–1794, 2021.
[25] T. Wellem, Y. Nataliani, and A. Iriani,
“Academic Document Authentication using
Elliptic Curve Digital Signature Algorithm and
QR Code”, JOIV : International Journal on
Informatics Visualization, Vol. 6, No. 3, p. 667,
2022.
[26] M. B. Niasar, R. Azarderakhsh, and M. M.
Kermani, “Cryptographic Accelerators for
Digital Signature Based on Ed25519”, IEEE
Trans. Very Large Scale Integr VLSI Syst, Vol.
29, No. 7, pp. 1297–1305, 2021.
[27] G. J and S. Koppu, “An empirical study to
demonstrate that EdDSA can be used as a
performance improvement alternative to
ECDSA in Blockchain and IoT”, Informatica,
Vol. 46, No. 2, 2022.
[28] A. H. Darrel and Menezes, “Elliptic Curve
Signature Schemes”, Encyclopedia of
Cryptography, Security and Privacy, pp. 1–3,
2019.
[29] W. D. Walidaniy, M. Yuliana, and H. A.
Darwito, “Enhancing Document Authenticity
with QR Codes and ECC-Based Digital
International Journal of Intelligent Engineering and Systems, Vol.17, No.2, 2024 DOI: 10.22266/ijies2024.0430.32