Abstract
The democratic government is a system run by the people for the people. All eligible citizens of the country are involved in choosing their candidate and government through voting. People will be motivated to vote if they believe in the correctness of the underlying system. Authentication and confidentiality are the main issues in the online voting system. Proposed authentication system allows only authentic voter to vote. Non-transferable biometric credentials are used so that fake voter can’t vote in lieu of legitimate voter. We have used two biometric factors fingerprint and photograph. XOR-based recursive visual cryptography is used for maintaining the confidentiality of voter’s database.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Al-Anie, H.K., Alia, M.A., Hnaif, A.A.: E-voting protocol based on public key cryptography. Int. J. Netw. Secur. Appl. (IJNSA) 3(4), 87–98 (2011)
Abdulzahra, H., Ahmad, R., Noor, N.M.: Combining cryptography and steganography for data hiding in images. Appl. Comput. Sci. 128–135 (2014). ISBN: 978-960-474- 368-1
Abd-alrazzq, H.K., Ibrahim, M.S., Dawood, O.A.: Secure internet voting system based on public key Kerberos. IJCSI Int. J. Comput. Sci. Issues 9(2), 428–435 (2012). No 3
Johnson, N.F., Jajodia, S.: Exploring steganography: seeing the unseen. IEEE Comput. Mag. 31(2), 26–34 (1998)
Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
Khasawneh, M., Malkawi, M., Al-Jarrah, O., Hayajneh, T.S., Ebaid, M.S.: A biometric-secure e-voting system for election processes. In: Proceeding of the 5th International Symposium on Mechatronics and its Applications (ISMA08), Amman, Jordan, 27–29 May 2008
Paul, N., Evans, D., Rubin, A., Wallach, D.: Authentication for Remote Voting. Workshop on Human-Computer Interaction and Security Systems, Ft. Lauderdale, FL, 6 April 2003
Tuyls, P., Hollmann, H.D.L., Lint, J.H., Tolhuizen, L.: A polarisation based visual crypto system and its secret sharing schemes. Available at the IACR Cryptology ePrint Archive. http://eprint.iacr.org/2002/194/
Tuyls, P., Kevenaar, T.A.M., Schrijen, G.-J., Staring, T., van Dijk, M.: Visual crypto displays enabling secure communications. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 271–284. Springer, Heidelberg (2004)
Saini, S., Dhar, J.: An eavesdropping proof secure online voting model. In: 2008 International Conference on Computer Science and Software Engineering. IEEE (2008)
Vermani, S., Sardana, N.: Innovative way of internet voting: secure on-line vote (SOLV). IJCSI Int. J. Comput. Sci. Issues 9(6), 73–78 (2012). No 3
Katiyar, S., Meka, K.R., Barbhuiya, F.A., Nandi, S.: Online voting system powered by biometric security using steganography. In: 2011 Second International Conference on Emerging Applications of Information Technology. IEEE (2011)
Sridharan, S.: Implementation of authenticated and secure online voting system. In: 4th ICCCNT 2013. IEEE, 4–6 July 2013
Monoth, T., Babu, A.P.: Recursive visual cryptography using random basis column pixel expansion. In: ICIT 2007, pp. 41–43. IEEE (2007)
Wayner, P.: Disappearing Cryptography. AP Professional Books, Boston (1996)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sanyasi Naidu, P., Kharat, R. (2016). Multi-factor Authentication Using Recursive XOR-Based Visual Cryptography in Online Voting System. In: Mueller, P., Thampi, S., Alam Bhuiyan, M., Ko, R., Doss, R., Alcaraz Calero, J. (eds) Security in Computing and Communications. SSCC 2016. Communications in Computer and Information Science, vol 625. Springer, Singapore. https://doi.org/10.1007/978-981-10-2738-3_5
Download citation
DOI: https://doi.org/10.1007/978-981-10-2738-3_5
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-2737-6
Online ISBN: 978-981-10-2738-3
eBook Packages: Computer ScienceComputer Science (R0)