Security of remote voting system based on Visual Cryptography and SHA

Author(s):  
Nilam Kate ◽  
J.V. Katti
Cryptography ◽  
2020 ◽  
pp. 391-414
Author(s):  
Lauretha Rura ◽  
Biju Issac ◽  
Manas Kumar Haldar

Though there are online voting systems available, the authors propose a new and secure steganography based E2E (end-to-end) verifiable online voting system, to tackle the problems in voting process. This research implements a novel approach to online voting by combining visual cryptography with image steganography to enhance system security without degrading system usability and performance. The voting system will also include password hashed-based scheme and threshold decryption scheme. The software is developed on web-based Java EE with the integration of MySQL database server and Glassfish as its application server. The authors assume that the election server used and the election authorities are trustworthy. A questionnaire survey of 30 representative participants was done to collect data to measure the user acceptance of the software developed through usability testing and user acceptance testing.


2016 ◽  
Vol 12 (3) ◽  
pp. 71-93 ◽  
Author(s):  
Lauretha Rura ◽  
Biju Issac ◽  
Manas Kumar Haldar

Though there are online voting systems available, the authors propose a new and secure steganography based E2E (end-to-end) verifiable online voting system, to tackle the problems in voting process. This research implements a novel approach to online voting by combining visual cryptography with image steganography to enhance system security without degrading system usability and performance. The voting system will also include password hashed-based scheme and threshold decryption scheme. The software is developed on web-based Java EE with the integration of MySQL database server and Glassfish as its application server. The authors assume that the election server used and the election authorities are trustworthy. A questionnaire survey of 30 representative participants was done to collect data to measure the user acceptance of the software developed through usability testing and user acceptance testing.


Author(s):  
Ashwini Solankar, Et. al.

Expanding advanced innovation has revolutionized the life of individuals. In this digital world many countries are trying to initiate an E-voting system in regular election process. Researchers are looking forward for the innovative ideas for secure and user friendly system. Block chain is one of the novel concepts that come with number of features to develop E-services. By embracing block chain in the circulation of databases on e-casting ballot frameworks, one can decrease the duping wellsprings of database control. This venture intends to execute casting a ballot result utilizing block chain calculation from each place of decision. In proposed system we have chosen Block chain for its decentralized framework and Here in security and data integrity is mainly achieved by making use of Visual Cryptography (VC) concept. This VC technique comes in when user casts vote on an E-voting portal.


2020 ◽  
Vol 8 (1) ◽  
pp. 543-552
Author(s):  
Meher Gayatri Devi Tiwari ◽  
◽  
Kakelli Anil Kumar ◽  

Sign in / Sign up

Export Citation Format

Share Document