Skip to main content

Secure Authentication in Online Voting System Using Multiple Image Secret Sharing

  • Conference paper
  • First Online:
Security in Computing and Communications (SSCC 2016)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 625))

Included in the following conference series:

Abstract

In the democratic country, all eligible citizens of the country are involved in decision making through voting. Right to vote allows voters to choose their candidate and government. In order to increase the number of voting, there is a need to design a secure e-voting system. The important part of the online voting system is authentication of an individual as a legitimate voter. Our system provides secure authentication based on non-transferable personal credentials like biometric features. Visual cryptography is used to provide confidentiality to the biometric database. Hash of the PIN is embedded into image shares using cryptography and steganography. The proposed system provides biometric and password authentications at a time.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Al-Anie, H.K., Alia, M.A., Hnaif, A.A.: e-Voting protocol based on public kry cryptography. Int. J. Netw. Secur. Appl. (IJNSA) 3(4), 87–98 (2011)

    Google Scholar 

  2. Abdulzahra, H., Ahmad, R., Noor, N.M.: Combining cryptography and steganography for data hiding in images. In: Applied Computational Science, pp. 128-135 (2014). ISBN: 978-960-474- 368-1

    Google Scholar 

  3. Abd-alrazzq, H.K., Ibrahim, M.S., Dawood, O.A.: Secure internet voting system based on public key kerberos. IJCSI Int. J. Comput. Sci. Issues 9(2), 428–435 (2012). No 3

    Google Scholar 

  4. Johnson, N.F., Jajodia, S.: Exploring steganography: seeing the unseen. IEEE Comput. Mag., 26–34 (1998)

    Google Scholar 

  5. Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  6. Khasawneh, M., Malkawi, M., Al-Jarrah, O., Hayajneh, T.S., Ebaid, M.S.: A biometric-secure e-Voting system for election processes. In: Proceeding of the 5th International Symposium on Mechatronics and its Applications (ISMA08), Amman, Jordan, 27–29 May 2008

    Google Scholar 

  7. Paul, N., Evans, D., Rubin, A., Wallach, D.: Authentication for remote voting. workshop on human-computer interaction and security systems, Ft. Lauderdale, FL, 6 April 2003

    Google Scholar 

  8. Dastanian, R., Shahhoseini, H.S.: Multi secret sharing scheme for encrypting two secret images into two shares. In: International Conference on Information and Electronics Engineering, vol. 6. IACSIT Press, Singapore (2011)

    Google Scholar 

  9. Saini, S., Dhar, J.: An eavesdropping proof secure online voting model. In: 2008 International Conference on Computer Science and Software Engineering. IEEE (2008)

    Google Scholar 

  10. Vermani, S., Sardana, N.: Innovative way of internet voting: secure on-line vote (SOLV). IJCSI Int. J. Comput. Sci. Issues 9(6), 73–78 (2012). No 3

    Google Scholar 

  11. Katiyar, S., Meka, K.R., Barbhuiya, F.A., Nandi, S.: Online voting system powered by biometric security using steganography. In: 2011 Second International Conference on Emerging Applications of Information Technology. IEEE (2011)

    Google Scholar 

  12. Sridharan, S.: Implementation of authenticated and secure online voting system. In: 4th ICCCNT 2013. IEEE, 4–6 July 2013

    Google Scholar 

  13. Wayner, P.: Disappearing Cryptography. AP Professional Books, Boston (1996)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Reena Kharat .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Sanyasi Naidu, P., Kharat, R. (2016). Secure Authentication in Online Voting System Using Multiple Image Secret Sharing. In: Mueller, P., Thampi, S., Alam Bhuiyan, M., Ko, R., Doss, R., Alcaraz Calero, J. (eds) Security in Computing and Communications. SSCC 2016. Communications in Computer and Information Science, vol 625. Springer, Singapore. https://doi.org/10.1007/978-981-10-2738-3_29

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-2738-3_29

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-2737-6

  • Online ISBN: 978-981-10-2738-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics