Abstract
In the democratic country, all eligible citizens of the country are involved in decision making through voting. Right to vote allows voters to choose their candidate and government. In order to increase the number of voting, there is a need to design a secure e-voting system. The important part of the online voting system is authentication of an individual as a legitimate voter. Our system provides secure authentication based on non-transferable personal credentials like biometric features. Visual cryptography is used to provide confidentiality to the biometric database. Hash of the PIN is embedded into image shares using cryptography and steganography. The proposed system provides biometric and password authentications at a time.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Al-Anie, H.K., Alia, M.A., Hnaif, A.A.: e-Voting protocol based on public kry cryptography. Int. J. Netw. Secur. Appl. (IJNSA) 3(4), 87–98 (2011)
Abdulzahra, H., Ahmad, R., Noor, N.M.: Combining cryptography and steganography for data hiding in images. In: Applied Computational Science, pp. 128-135 (2014). ISBN: 978-960-474- 368-1
Abd-alrazzq, H.K., Ibrahim, M.S., Dawood, O.A.: Secure internet voting system based on public key kerberos. IJCSI Int. J. Comput. Sci. Issues 9(2), 428–435 (2012). No 3
Johnson, N.F., Jajodia, S.: Exploring steganography: seeing the unseen. IEEE Comput. Mag., 26–34 (1998)
Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
Khasawneh, M., Malkawi, M., Al-Jarrah, O., Hayajneh, T.S., Ebaid, M.S.: A biometric-secure e-Voting system for election processes. In: Proceeding of the 5th International Symposium on Mechatronics and its Applications (ISMA08), Amman, Jordan, 27–29 May 2008
Paul, N., Evans, D., Rubin, A., Wallach, D.: Authentication for remote voting. workshop on human-computer interaction and security systems, Ft. Lauderdale, FL, 6 April 2003
Dastanian, R., Shahhoseini, H.S.: Multi secret sharing scheme for encrypting two secret images into two shares. In: International Conference on Information and Electronics Engineering, vol. 6. IACSIT Press, Singapore (2011)
Saini, S., Dhar, J.: An eavesdropping proof secure online voting model. In: 2008 International Conference on Computer Science and Software Engineering. IEEE (2008)
Vermani, S., Sardana, N.: Innovative way of internet voting: secure on-line vote (SOLV). IJCSI Int. J. Comput. Sci. Issues 9(6), 73–78 (2012). No 3
Katiyar, S., Meka, K.R., Barbhuiya, F.A., Nandi, S.: Online voting system powered by biometric security using steganography. In: 2011 Second International Conference on Emerging Applications of Information Technology. IEEE (2011)
Sridharan, S.: Implementation of authenticated and secure online voting system. In: 4th ICCCNT 2013. IEEE, 4–6 July 2013
Wayner, P.: Disappearing Cryptography. AP Professional Books, Boston (1996)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sanyasi Naidu, P., Kharat, R. (2016). Secure Authentication in Online Voting System Using Multiple Image Secret Sharing. In: Mueller, P., Thampi, S., Alam Bhuiyan, M., Ko, R., Doss, R., Alcaraz Calero, J. (eds) Security in Computing and Communications. SSCC 2016. Communications in Computer and Information Science, vol 625. Springer, Singapore. https://doi.org/10.1007/978-981-10-2738-3_29
Download citation
DOI: https://doi.org/10.1007/978-981-10-2738-3_29
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-2737-6
Online ISBN: 978-981-10-2738-3
eBook Packages: Computer ScienceComputer Science (R0)