Secure Online Voting System Using Visual Cryptography: A Comparative Analysis (original) (raw)
Related papers
Online Voting : Using Visual Cryptography
Internet Voting System (IVS) Using Visual Cryptography (VC) aims at providing a facility to cast vote for critical and confidential internal corporate decisions. It has the flexibility to allow casting of vote from any remote place, even when key stakeholders of election process are not available at workplace. This is enabled by leveraging and implementing the features provided by the VC in IVS. The election is held in full confidentiality by applying appropriate security measures to allow the voter to vote for any participating candidate only if he logs into the system by entering the correct password which is generated by merging the two shares (Black & White dotted Images)using VC scheme. Election officer sends share 1 to voter e-mail id before election and share 2 will be available in the voting system for his login during election. Voter will get the secret password to cast his vote by combining share 1 and share 2 using VC .Visual Cryptography (VC) is a secret sharing scheme in which an image is converted into shares. The information about the original image (Voter Password) will be revealed only after stacking sufficient number of shares. Even if the hacker gets one share of the password, it is impossible to get the other share of the password, as it will be sent to the E-Mail Id of the voter. Thus IVS provides two way securities to the voting system, which is very much in need.
A Review on Highly Secure Online Voting System using Cryptography
mantech publications, 2023
These days hardly anyone goes to the polls because of their tight schedule. There are numerous reasons, and some may need to go to the polls, we may need to wait in long lines, many may be drained due to their tight schedules. So we have created a webbased voting system. But this system has some drawbacks. Phishing attackers legally obtain passwords from clients and they go to critical sites with the correct secret passwords. Consider a web-based voting system for corporate organizations, voting once a year to elect a president, secretary, or critical manager. In the current system, every voter has to gather at one place on the Election Day and cast their vote. In this method, we are using another scheme which is known as visual cryptography. In this plan, we are using visual data for security. Here we are dividing the unique picture into two into four which are placed in separate databases. At whatever point these two offers are intertwined with each other, we get the original picture. When we get the original picture, it is used as a secret password. This system is very helpful and acceptable for online remote voting. This system is an electronic application so that the web can evaluate it through any valid personal space on the planet.
Visual Cryptography in Internet Voting System using Face Detection and Recognition ( FDR )
2016
With the help of Visual Cryptography (VC), it allows the voter to cast his vote from remote location even if the voter is absent in the voting place. It allows the voter to cast his vote securely and full confidentiality. System allows permission to the voter which is participated in the election only when he entered correct password which is generated using visual cryptography after stacking of two shares. System/Admin sends share 1 to voters email id before election and share 2 will be present during election for his login. From observing these two shares hackers can’t get any information. For this system we use 2 out of 2 visual cryptography scheme. It generates two shares even if the hackers get any one of the shares ,it is not possible to get the information about the second share which is send to the email id of the voter. Thus it provides two way security for efficiently use of internet voting system. For more security purpose Face Detection and Recognition system (FDR) is in...
Secure Online Voting System Proposed By Biometrics And Steganography
International Journal of Emerging Technology and Advanced Engineering, 2013
Now days it is very important to provide security to any kind of data and it becomes more sensitive when we require this for voting system and mostly which is online one. In this paper we route a technique to provide security to an online voting system not only by Steganography concept but also combing Cryptography with this. Steganography and Cryptography is used together to provide security to user account. So for this images and keys get used in combination first time. Here for steagnography main object is image and for cryptography it is keys. To reduce the risk factor of such system proper use of cryptography is needed. So it strongly minimizes risks in these systems. This is because the hacker needs to find not only the template but also the secret keys and it is not possible. Main idea behind this is to combined secret key with the cover image on the basis of key image. As a result such system produces a new image known as stego image. This kind of image is much more same as cover image. But human eyes are not able to detect such kind of image. This system mainly provide a authentication scheme for online voting system . Keywords— E-Voting, Steganography, Biometric.
IJERT-A Review of Online Voting System Security based on Cryptography
International Journal of Engineering Research and Technology (IJERT), 2021
https://www.ijert.org/a-review-of-online-voting-system-security-based-on-cryptography https://www.ijert.org/research/a-review-of-online-voting-system-security-based-on-cryptography-IJERTCONV9IS08031.pdf Due to their tight schedule nobody is going to the polls these days. There are numerous causes, some need to go to the polls, many of us may have to wait for long periods because of their strict schedules. So we created a voting system on the Internet. But there are some disadvantages to this system. Attackers legally receive customer passwords and use secret passwords to major sites. Consider a corporate voting system based on the web, electing a president or secretary or key managers of the organization once a year. This survey presents a secure verifiable online voting system, which allows voters to vote secretly in the public system to benefit from early voting and it will very useful in pandemic like Covid-19. The proposed system is intended to universally support the election process by using the unique identification and biometric features of the elector. A digital witness is provided to a voter by the system to check if the voting is recorded as it intends and to check whether all the registered votes are recorded. Under the well-known elliptic curve of the Daffie-Hellman hypotheses, the privacy of the proposed system is achieved. In the current system, every elector must collect and cast his or her vote at one point on election day. We will use an alternative system called cryptography in this method. Here we split the unique image into two, four, placed in separate databases. We get the original picture at any point these two offers are interwoven. It is used as a secret password when we get the original image. This system is very useful and suitable for remote voting online. This system is an electronic system so it is possible to assess it on the web via any valid personal space on the planet.
Implementation and Evaluation of Steganography Based Online Voting System
International Journal of Electronic Government Research, 2016
Though there are online voting systems available, the authors propose a new and secure steganography based E2E (end-to-end) verifiable online voting system, to tackle the problems in voting process. This research implements a novel approach to online voting by combining visual cryptography with image steganography to enhance system security without degrading system usability and performance. The voting system will also include password hashed-based scheme and threshold decryption scheme. The software is developed on web-based Java EE with the integration of MySQL database server and Glassfish as its application server. The authors assume that the election server used and the election authorities are trustworthy. A questionnaire survey of 30 representative participants was done to collect data to measure the user acceptance of the software developed through usability testing and user acceptance testing.
Secure Online Voting System Proposed
Now days it is very important to provide security to any kind of data and it becomes more sensitive when we require this for voting system and mostly which is online one. In this paper we route a technique to provide security to an online voting system not only by Steganography concept but also combing Cryptography with this. Steganography and Cryptography is used together to provide security to user account. So for this images and keys get used in combination first time. Here for steagnography main object is image and for cryptography it is keys.
Prevention of Phishing Attack in Online Voting System by using Visual Cryptography
International journal of engineering research and technology, 2019
As per the survey conducted only few people go for voting because of their tight schedule. There are many reasons, few may be everyone has to go to voting center, they have to stand in a long queue, they will be tired because of their tight schedule. So we have proposed an online voting system that make use of internet, the possibility of cheating/threats has been increasing day by day. One such problem is phishing attack which can create problems in authentication. So, we have implemented secured online voting system using Visual Cryptography (VC) aims at providing a facility to cast vote for critical and confidential internal corporate decisions. Keywords—Authentication, cryptography, image captcha, phishing, integer linear program, online voting.
IJERT-Prevention of Phishing Attack in Online Voting System by using Visual Cryptography
International Journal of Engineering Research and Technology (IJERT), 2019
https://www.ijert.org/Prevention-of-Phishing-Attack-in-Online-Voting-System-by-using-Visual-Cryptography https://www.ijert.org/research/Prevention-of-Phishing-Attack-in-Online-Voting-System-by-using-Visual-Cryptography-IJERTCONV7IS08008.pdf As per the survey conducted only few people go for voting because of their tight schedule. There are many reasons, few may be everyone has to go to voting center, they have to stand in a long queue, they will be tired because of their tight schedule. So we have proposed an online voting system that make use of internet, the possibility of cheating/threats has been increasing day by day. One such problem is phishing attack which can create problems in authentication. So, we have implemented secured online voting system using Visual Cryptography (VC) aims at providing a facility to cast vote for critical and confidential internal corporate decisions.
IRJET- ONLINE VOTING SYSTEM BASED ON VISUAL CRYPTOGRAPHY AND BIOMETRIC
IRJET, 2021
With growing internet usage, exploitation activity has also increased over the years' diverse online attacks have been extended and among them the most notable attack is phishing. Phishing is being undertaken by an individual or a social event to get singular restricted information like passwords, Master card information from confusing setbacks for discount fraud, monetary advantage, and other phony activities. But not only phishing is an activity we're trying to resolve but also the violation that is been observed is that the person who is authorized to vote lays hold of and instead other rambles the votes. In this paper, we have proposed the right that a voter gets without violating his/her rights and the candidates. Another procedure named" A Novel Anti-phishing structure reliant on visual cryptography" deals with the issue of phishing. Here an image-based confirmation using Visual Cryptography and another way of providing security is through Bio-metric finger sensor. The use of visual cryptography is researched to shield the security of an image manual human test by rotting the first picture manual human test into two successful images which can also be referred to as sheets that are taken care of in secluded information collection laborers (one with voter furthermore, one with laborer) which are covered until the two images are combined to get the real images(password) which are referred to as CAPTCHA. The mystery is permits access. And the final aim of implementing Bio-metric technology is achieving duplication and phishing of the voting register thus preventing multiple voter voting.