Download secure electronic voting system based on image steganography pdf

Secure electronic voting application based on face. Sazetak this paper discusses the implementation of an online voting system based on image steganography and visual cryptography. Study on security of online voting system using biometrics. Based on the psnr values obtained from tests, it showed that the stego images have quality images without compromising the original image. It gathered the two key security issues to secure evoting systems. Toward protocols for quantumensured privacy and secure. Citeseerx document details isaac councill, lee giles, pradeep teregowda. Brindha and vennila proposed a method of using the image steganography technique for hiding the fingerprint of a person inside his face image for smart card authentication. Feb 15, 2021 smart antenna, super capacitor, vehicletogrid v2g, lunar reconnaissance orbiter miniature rf technology demonstration, secure electronic voting system based on image steganography, securing underwater wireless communication networks, security in embedded systems, third generation solid state drives, face recognition using neural network. Encryption to encrypt the image using the key generated by the output of the cnn system the asymmetric encryption algorithm aes 1 has been used. To increase the number of voters and to offer an enhanced procedure in an election, many researchers have been introducing novel and.

The aim of this paper is to design a secure electronic voting system that is based upon the electoral. Helps control mail flow, clean it, and protect against unwanted. Web based voting allows the voter to vote from any location in state or out of state. The important part of the online voting system is authentication of an individual as a legitimate voter. Explore secure electronic voting system based on image steganography with free download of seminar report and ppt in pdf and doc format. Implementation and evaluation of steganography based online. Facilitating and securing offline emedicine service through. The voters image is captured and sends toward the face. As a research objective, we want to improve the quality of election procedure in an electronic voting system that relates to security and usability aspects, by using visual cryptography and image steganography in the system architecture. Image steganography has been the focus of a significant. This paper deals with the design and moreover, electronic voting systems can improve voter development of a web based voting system using fingerprint identification process by utilizing biometric recognition. The stego images were tested using psnr peak signaltonoise ratio.

Final year project download, steganography hide information. A secure image steganography technique using dct, jsteg and bayesian. An electronic voting e voting system is a voting system in which the election process is notated, saved, stored and processed digitally, that makes the voting management task better than traditional paper based method. As information technology evolves over time, the need for a better, faster, more convenient and secure electronic voting is relevant since the traditional elect.

Jul 31, 2010 this system will be more secure than any other these techniques alone and also as compared to steganography and cryptography combined systems visual steganography is one of the most secure forms of steganography available today. Steganography technique has improved the security of. Also, in 12, a system was developed to secure an electronic voting system using biometrics, cryptography and steganography. Readymade source code for final year college student, project submission of be, bscit, bca, mca, mba, ignou, smu, doeacc. In this paper some of those approaches are examined in order to identify the appropriate image steganography technique to be implemented in an electronic voting system. A secure electronic voting system based on image steganography. Spamtitan email security blocks spam as well as phishing and dayzero attacks, viruses, malware, ransomware, and other email threats. Our system provides secure authentication based on nontransferable personal credentials like biometric features. Online voting system based on image steganography and visual cryptography this paper discusses the implementation of an online voting system based on image steganography and visual cryptography. Scholar 2assistant professor abstract with the help of online voting system author can manage election easily and securely. Online voting system based on image steganography and visual.

It is very important to provide security to voting system and mostly which is online one. Providing accessibility to such a diverse population is an important engineering problem and one where, if other security is done well, electronic voting. It plays a significant role in current trends for providing secure communication and guarantees accessibility of secret information by authorised parties only. Providing accessibility to such a diverse population is an important engineering problem and one where, if other security is done well, electronic voting could be. The main objective of steganography is to hide the existence of the embedded data. Pdf new system of evoting using fingerprint seifedine. Rura et al, 2011, suggested the implementation of a secure electronic voting system. Steganography is the technique of concealing particulars in data of any dig ital format in such a way that these hidden parts are known only by sender and. Performance evaluation of modified steganocryptographic.

However, unlike traditional paperbased voting systems, an epolling system introduces several security risks such as privacy of vote, unlinkability of a voter. Secure online voting usingsteganographyand biometrics free download abstract the fundamental knowledge beyond electronic voting system is to confirm integrity and reliability of specific mechanisms for addressing issues of security, privacy and accountability, which results due to the rapid development of information technology field. Objective behind the development of this system is to simplify the process of organizing elections and make it easy for voters to vote remotely from their home computers or smart devices while taking into consideration better security, anonymity and providing. International journal of engineering research and general. Full privacy preserving electronic voting scheme sciencedirect. This is known as blind steganalysis, which attempts to differentiate stego images from cover images without the knowledge of steganographic embedding. Evoting using one time password and face detection and. Next, the cryptographic and steganography techniques best suited for the requirements of the voting system were chosen, and the software was implemented. To achieve higher level of security, two levels of.

Basic idea behind this is to combine secret key with cover image on the basis of key image. Analysis of image steganography techniques in secure online. Design and implementation of an electronic voting system. When designing an online matching is a new process introduced in web based electronic voting system, it is essential to consider ways in voting system, it make the system more secure and which the voting tasks can be performed electronically practical. Image steganography steganography is the art of hiding information in ways that prevent the detection of. The base image is a default image for the system, same for all. This voting software could deliver a secure, reliable, convenient, and efficient voting system.

However, the use of the least significant bit lsb replacement algorithm has made the policy weaker. A voting system can use the security of blockchain and the mail to provide a reliable voting system. Secure electronic voting system based on image steganography, seminar reports ppt pdf doc presentation abstract as information technology evolves over time, the need for a better, faster, more convenient and secure electronic voting is relevant since the traditional election procedures cannot satisfy all of voters demands. As the demand of more secure yet efficient image steganography tools has increased, different steganography approaches have been proposed. The presence of encrypted information can also entice a potential attacker to launch an attack on the secure communication. Secure online voting system using visual cryptography. This image will be finally modified into a stego image and sent over insecure channel. Secure electronic voting using a hybrid cryptosystem and. Enhanced steganocryptographic model for secure electronic voting. A survey of cryptographic and steganocryptographic.

Once the vote is casted, it is encrypted using a public key cryptography algorithm and then is. A registered voter receives a computer readable code in the mail and confirms identity and confirms correct ballot information in an election. Typical features and functionalities of e voting systems internally, electronic voting systems have many functions, including encryption, randomization, communication and security systems. The system was implemented in java ee on a web based interface, with mysql database server and glassfish application server as the backend. Also explore the seminar topics paper on secure electronic voting system based on image steganography with abstract or synopsis, documentation on advantages and disadvantages, base paper presentation slides for ieee final year electronics and. Proceedings of the ieee conference on open systems icosa11, sep 25a. Secure online voting using steganography and biometrics.

Heoretical b ackground steganography is the art and science of covert communication by embedding a message into an innocuous looking cover media such as text, image, and video. The image steganography technique takes the advantage of limited power of human visual system hvs. The user is authenticated using fingerprint recognition software. Implementation and evaluation of steganography based. Evoting through biometrics and cryptography steganography. A voting system must be comprehensible to and usable by the entire voting population, regardless of age, in. Securing online voting system using multimodal biometrics. Secure electronic voting system based on image steganography securing underwater wireless communication networks security in embedded systems self healing spacecraft selfhealing computers selfphasing antenna array sensorless variablespeed controller for wind power generator sensors on 3d digitization sensotronic brake control serial attached. The proposal could maintain the major principle of e voting. Facilitating and securing offline emedicine service.

Cryptography, information theory, and errorcorrectionimage encryption based on hybrid of optical and digital techniquesintegrated intelligent computing. Jul 03, 2014 spamtitan email security is an email spam filter for businesses, smbs, msps, and schools. The system was compliant with the election legislation and principles and was at least as secure as regular voting. Image steganography steganography is the art of hiding information in ways that prevent the detection of hidden messages 12. A novel secure image steganography method based on chaos theory in spatial domain free download abstract this paper presents a novel approach of building a secure data hiding technique in digital images. Cover image is a simple inscription of personal identification number over the base image. Also, several research papers proposed reliability and confidentiality in e voting systems by using.

Secure authentication in online voting system using. Rura et al, 2011, suggested the implementation of a secure electronic voting system with a combination of. However, security remains the bottleneck of each system. The reasons why voters cant trust the e voting system are voters worried about the abuses in e voting system, and they can not make sure their ballot are. Download image steganography secures data when sharing files with other users by embedding text or files of any types into images, featuring optional encryption. To increase the number of voters and to offer an enhanced procedure in an election, many researchers have been introducing novel and advanced approaches to secure electronic voting systems. Sep 21, 2016 in order to increase the number of voting, there is a need to design a secure e voting system. Secure e voting system e voting application is a web based public voting system deployed to make election process easy to use and speed competent 6. After considering the requirements of an online voting system, current technologies on electronic voting schemes in published literature were examined. Securing online voting system using multimodal biometrics and.

Postquantum crystography system for secure electronic voting. Visual cryptography vc is a technique in cryptography where visual information such as text, pictures videos, etc. However, we find that in most existing approaches, the choice of embedding positions within a cover image mainly depends on a pseudorandom number generator without considering the relationship between the image content itself and the size of the secret message. Moreover, stego images with hash data and blockchain technology are used in updating and sharing medical covid19 data between hospitals. Polytronics seminar report, ppt, pdf for ece students. The success rate of an electronic voting system in electronic decision making is dependent on security, authenticity and integrity of. In7, a multi layer, secure web based e voting system was proposed using biometric and wavelet based image watermarking technique in ycgcb color space. The selected schemes are password hashed based scheme, visual cryptography 8 as adopted from secretballot receipts proposed by chaum 9 and threshold. Steganography technique is the science that includes communicating secret information in an appropriate digital multimedia cover objects such as audio, video and image files. Securing online voting system using multimodal biometrics and steganography neha gandhi1 dr.

Electronic voting technology can include punched cards, optical scan voting systems and specialized voting kiosks including self contained direct recording. Pdf a secure electronic voting system based on image. In this paper we provide security to online voting system with secure user authentication by providing biometric as well as password security to voter accounts. This paper discusses the implementation of an online voting system based on image steganography and visual cryptography. E voting application is a web based public voting system deployed to make election process easy to use and speed competent 6. Analysis of image steganography techniques in secure. An electronic voting e voting system is a voting system in which the election data is recorded, stored and processed primarily as digital information it is not an easy task due to the need of achieving electronic voting security requirements. This paper proposes a secure electronic voting system that provides enhanced security by implementing cryptography and steganography in java. Abstract in this paper a face detection and recognition system used as an authentication technique in online voting, which is same as electronic voting, is proposed. Section ii introduces reader with basics of image steganography.

Secure authentication in online voting system using multiple. Face recognition as an authentication technique in electronic voting. Abstract this paper introduces an online voting system in which the election data is stored and processed. Feb 15, 2021 explore secure electronic voting system based on image steganography with free download of seminar report and ppt in pdf and doc format. Secure electronic voting system based on image steganography.

The encrypted ballots were then hidden using lsb replacement algorithm to improve their integrity. Steganography is an important technique for information hiding in any digital object. Online voting system based on image steganography and. Though there are online voting systems available, the authors propose a new and secure steganography based e2e endtoend verifiable. In steganography, covert writing is established for two main. It is a completely new area of applying image steganography.

686 255 224 39 331 1214 945 174 302 19 729 789 708 1426 20 1405 52 1734 1276 1147 849 390 855 1188 762 1467 1552 239 907 1843 249 681 1835 1044 1135 427 724