Explore bump technology with free download of seminar report and ppt in pdf and doc format. Conference paper pdf available september 2011 with 3,248 reads. The fundamental knowledge beyond electronic voting system is to confirm integrity and reliability of specific mechanisms for addressing issues of security, privacy and accountability, which results due to the rapid development of information technology field over time and the traditional election. Biometrics and steganography based secure online voting system. Secure electronic voting system based on image steganography. In the online voting system, people can vote through the internet. For that purpose the proposed system uses voters fingerprint image as cover image and embed voters secret data into the image using steganography. Secure online voting using steganography and biometrics.
Crystography, which is the combination of cryptography and steganography could be a fitting tool kit for enhancing the security of sensitive electionrelated information. Secure electronic voting system based on image steganography lauretha rura, biju issac and manas kumar haldar school of engineering, computing and science. Both components of information security are combined in a layer of data protection. Implementation and evaluation of steganography based online voting system. Online voting system based on image steganography and visual cryptography this paper discusses the implementation of an online voting system based on image steganography and visual cryptography. A secure electronic voting system based on image steganography conference paper pdf available september 2011 with 3,240 reads how we measure reads. A secure electronic voting software application based on image steganography and cryptography is my own work and that all the sources i have used or quoted have been acknowledged by means of complete references. This research implements a novel approach to online voting by combining visual cryptography with image steganography to enhance system security without. Performance evaluation of modified steganocryptographic. Finger print is used to uniquely identify the user. A secure electronic voting software application based on image. This system is based on arduino controller with gsm and sensor networks. Within reason, any plain text, cipher text, other mages, or anything that can be embedded in a bit stream can be hidden in an image6.
Survey on secure online voting system smita khairnar. The steganography part is needed as we want to involve biometric. A secure approach for authenticated and secure online. Online voting system powered by biometric security using. Once the vote is casted, it is encrypted using a public key cryptography algorithm and then is. A secure approach for authenticated and secure online voting system by using homomorphic.
Digital steganography works by adding secret bits or replacing bits in files, such as photos or audio files, with secret data. Since the finger pattern of each human being is different, the voter can be easily authenticated. Later, the face of the person is verified with the face present in the database and validated using matlab. In this paper we are proposing an online voting system using cryptography and steganography at. In electronic voting, cryptography is a commonly used technique as. Survey on secure online voting system semantic scholar.
The system was implemented in java ee on a webbased interface, with mysql database server and glassfish application server as the backend. In this method the voter details are made to hide in the. Embed the info into an image using traditional image steganography tools then embed the image into the pdf. Facilitating and securing offline emedicine service. In order to prevent voter frauds, we use two levels of security. Maziero, a threeballotbased secure electronic voting system. In the first level of security, the face of the voter is captured by a web camera and sent to the database. Postquantum crystography system for secure electronic. Electronic voting is a type of voting using an electronic. The proposed system also detects whether the voter is correct person or not. The system allow the voter to vote through his fingerprint. Abstractsecurity privacy, confidentiality and integrity of preelectoral, electoral and post electoral phases of the electioneering process is fundamental to the success of electronic voting evoting systems. Implementation and evaluation of steganography based. Cryptography, f5 image steganography and threshold decryption.
Using the appropriate low level tools, create the text objects of your secret text then mark those objects as. Online voting system based on image steganography and visual cryptography article pdf available in journal of computing and information technology 251. An electronic voting evoting system is a voting system in which the election process is notated, saved, stored and processed digitally, that makes the voting management task better than traditional paper based method. In that procedure, emedicine process necessitates two components. Also explore the seminar topics paper on secure electronic voting system based on image steganography with abstract or synopsis, documentation on advantages and disadvantages, base paper presentation slides for ieee final year. Image steganography has come quite far in recent years with. A novel approach to evoting using multibit steganography. Recently used indian voting system is an electronic voting system, in that system voter availability is compulsory, is the. We have incorporated in our system techniques like the password hashed based scheme, visual cryptography. Next, the cryptographic and steganography techniques best suited for the requirements of the voting system were chosen, and the software was implemented. Steganography is the science of hiding and transmitting.
Indian voting system is an electronic voting system, in that system voter availability, is compulsory, is the drawback of electronic. Qr code based evoting system using an android smart phones mr. The system targets the authentication requirement of a voting system. Use finger print image and cover image generate stego image for authentication. The fact that its not widely used and is very hard to crack. Online voting system based on image steganography and visual. The steganography and biometric based online voting system. Qr code based evoting system using an android smart phones. The system was implemented in java ee on a web based interface, with mysql database server and glassfish application server as the backend. Pdf voting using face recognition and password based. This paper proposes a secure electronic voting system that provides enhanced security by implementing cryptography and steganography in java.
Pdf online voting system based on image steganography. Paper presented at the open systems icos, 2011 ieee conference on. The developed system uses spread spectrum image steganography algorithm with advanced encryption standard aes key implementation to provide a secure means of delivering medical prescription to the parties involved. Though there are online voting systems available, we propose a new and secure steganography based e2e endtoend verifiable online voting system, to tackle the problems in voting process. Also, in 12, a system was developed to secure an electronic voting system using biometrics, cryptography and steganography.
Pdf a secure electronic voting system based on image. Pdf this paper discusses the implementation of an online voting system based on image steganography and visual cryptography. Introduction integrity of the election process will determine the integrity of democracy itself. A survey of cryptographic and steganocryptographic models. Explore secure electronic voting system based on image steganography with free download of seminar report and ppt in pdf and doc format. Online payment system using steganography and visual. A message authentication image algorithm is proposed in 15 to protect against ebanking fraud. A secure electronic voting system based on image steganography. Biometrics, online voting, stego image, steganography. Fingerprint based voting project is a application where the user is recognized by his finger pattern. Secure electronic voting system based on image steganography securing underwater wireless communication networks security in embedded systems self healing spacecraft selfhealing computers selfphasing antenna array sensorless variablespeed controller for wind power generator sensors on 3d digitization sensotronic brake control serial attached. Classifying image steganography image steganography is characterized in 19 as spatial domain plane coordinate system, and transform frequency domain where former permits direct bit manipulation while for later a digital image is first transformed and then manipulated 20.
Iris recognition cannot take place without your permission. This paper discusses the implementation of an online voting system based on image steganography and visual cryptography. Introduction it is a web based that facilities the running of elections and. Secure electronic voting application based on face recognition and ciphering zinah j mohammed ameen computer engineering department, university of technology, baghdad, iraq research article journal of computer science applications and information technology open access abstract. Arduino based carsecurity system free download abstract the project entitled arduino based carsecurity system is a system which is designed to provide high security in vehicles. Modelling the system for the online process is easier and less expensive than for the offline process.
In a voting system, whether electronic or using traditional paper ballots, the system should meet the following criteria. It has not already been accepted for any degree, and is also not being concurrently submitted for any other degree. Also explore the seminar topics paper on bump technology with abstract or synopsis, documentation on advantages and disadvantages, base paper presentation slides for ieee final year electronics and telecommunication engineering or ece students for the year 2015 2016. After considering the requirements of an online voting system, current technologies on electronic voting schemes in published literature were examined. The algorithm uses image based steganographic and cryp tographic system proposed in 7. Bump technology seminar report, ppt, pdf for ece students. To increase the number of voters and to offer an enhanced procedure in an election, many researchers have been introducing novel and advanced approaches to secure electronic voting systems.
D highly secure online voting system with multi security using biometric and steganography, international journal of advanced scientific research and technology, vol. Set the text color to white and make sure you are not using a colored background. The procedure is based on a straight substituting the lsbs of the cover image. Pdf online voting system based on image steganography and. Online voting system based on image steganography and visual cryptography 49 plementation of two distinct schemes.
Securing online voting system using multimodal biometrics. Here comes the great use of steganography, if associated to the emedicine system. The user is authenticated using fingerprint recognition software. Using steganography to hide data in digital image or audio. A secure electronic voting software application based on.
Online voting system based on image steganography and. Also explore the seminar topics paper on secure electronic voting system based on image steganography with abstract or synopsis, documentation on advantages and disadvantages, base paper presentation slides for ieee final year electronics and. As information technology evolves over time, the need for a better, faster, more. Spatial domain based steganography include lsb based embedding and palette based embedding. Here an image based and biometric authentication is used. A biometrics in conjunction with visual cryptography is used as authentication system 16. Biometrics and steganography based secure online voting. As a preliminary investigation, two steganography techniques are considered and their performances are compared for different image file formats. Cover image creation this is a system generated image used. Though there are online voting systems available, the authors propose a new and secure steganography based e2e endtoend verifiable online voting system.
1057 766 1397 851 916 301 226 358 1317 703 12 1116 755 488 87 1076 1359 311 1266 464 878 661 740 1436 210 1325 996 866 523 1131 1232 1503 1498 977 799 423 992 959 774 290 559 575 532 1305 1216