8 research outputs found

    Vulnerability Studies of E2E Voting Systems:Lecture Notes in Electrical Engineering

    Get PDF
    In the recent years, the existence of end-to-end voter-verifiable (E2E) voting system had increased significantly. Some of the prospective ones have been used in a medium to large scale elections. We have also developed one (eVote). In this paper we review their capabilities to provide an individual and universally verifiable voting system, incoercibility and receipt-freeness to ensure election integrity. We compare some properties along with its resistance against malicious attacks

    Implementation and Evaluation of Steganography based Online Voting

    Get PDF
    Though there are online voting systems available, the authors propose a new and secure steganography based E2E (end-to-end) verifiable online voting system, to tackle the problems in voting process. This research implements a novel approach to online voting by combining visual cryptography with image steganography to enhance system security without degrading system usability and performance. The voting system will also include password hashed-based scheme and threshold decryption scheme. The software is developed on web-based Java EE with the integration of MySQL database server and Glassfish as its application server. The authors assume that the election server used and the election authorities are trustworthy. A questionnaire survey of 30 representative participants was done to collect data to measure the user acceptance of the software developed through usability testing and user acceptance testing

    Online Voting System based on Image Steganography and Visual Cryptography

    Get PDF
    This paper discusses the implementation of an onlinevoting system based on image steganography and visualcryptography. The system was implemented inJava EE on a web-based interface, with MySQL databaseserver and Glassfish application server as thebackend. After considering the requirements of an onlinevoting system, current technologies on electronicvoting schemes in published literature were examined.Next, the cryptographic and steganography techniquesbest suited for the requirements of the voting systemwere chosen, and the software was implemented. Wehave incorporated in our system techniques like thepassword hashed based scheme, visual cryptography,F5 image steganography and threshold decryptioncryptosystem. The analysis, design and implementationphase of the software development of the votingsystem is discussed in detail. We have also used aquestionnaire survey and did the user acceptance testingof the system

    A secure electronic voting software application based on image steganography and cryptography

    No full text
    Various electronic voting systems have been introduced as substitutes for traditional voting systems as electronic voting systems reduces the manual labor in collection, checking, transportation and counting of votes. However, with the growth of information technology, electronic voting systems are susceptible to malicious attacks (or threats) which undermine the integrity of the voting process. Simple encryption methods are not sufficient to protect the secrecy of election data. Encrypted data can cause suspicion, making it subject to malicious attacks. This research implements a novel approach by combining cryptography schemes with image steganography techniques. Besides improving security, steganography makes the data transmission over the network during the election become less suspicious too. After looking into the requirements of an electronic voting system, current electronic voting schemes available in published literature are examined. Next, the cryptographic and steganography techniques best suited for the requirements of our voting system are chosen and the software was implemented. They are namely Password Hashed-based Scheme, Visual Cryptography, F5 Image Steganography and Threshold Decryption Cryptosystem. Besides improving security, the research also aims to improve the quality of the voting process through user friendly interface design, reduction or elimination of additional hardware such as printers and scanners, improving the speed of the election process and end to end voter verifiability that includes a vote receipt. The last of these would increase the voter’s confidence in electronic voting.The electronic voting system developed is based on Web-based Java EE Technology and MySQL database using the Iterative Waterfall model as the Software Development Life Cycle approach. Java EE was chosen to develop the software because of its wide range of Application Programming Interface (API) that enhanced the software development by automating many of the business and security processes of implementation. A simple quantitative analysis has been also done for data analysis after software implementation by conducting usability testing. Here, the voter’s response and opinions of the system as a whole were observed. The studies, experiments and analysis done in this research resulted in an enhanced version of remote E2E system that provides a reliable and secure system with more flexibility and better performance compared to some reported E2E Voting Systems. Though implemented as a working prototype, the system can be implemented to support small to medium scale elections

    Analysis of image steganography techniques in secure online voting

    No full text
    As the demand of more secure yet efficient image steganography tools has increased, different steganography approaches have been proposed. In this paper some of those approaches are examined in order to identify the appropriate image steganography technique to be implemented in an electronic voting system. Different set of criteria has been set into place to analyze and evaluate the strengths and weaknesses of the presented steganography approaches

    Lituanus : Lithuanian quarterly journal of arts and sciences

    No full text
    Good electronic voting system is developed to cater to the user's demand to have an efficient, reliable and secure system. Online voting system should not be a black box to the users. It should be able to assure them that their vote is casted, collected and counted respectively without enabling vote coercion or vote buying. In this paper, we are proposing a combination of both cryptography and steganography approach in online voting's vote verification design

    Analysis of image steganography techniques in secure online voting

    No full text
    As the demand of more secure yet efficient image steganography tools has increased, different steganography approaches have been proposed. In this paper some of those approaches are examined in order to identify the appropriate image steganography technique to be implemented in an electronic voting system. Different set of criteria has been set into place to analyze and evaluate the strengths and weaknesses of the presented steganography approaches

    Sportwissenschaft : the German journal of sports science

    No full text
    As information technology evolves over time, the need for a better, faster, more convenient and secure electronic voting is relevant since the traditional election procedures cannot satisfy all of voter's demands. To increase the number of voters and to offer an enhanced procedure in an election, many researchers have been introducing novel and advanced approaches to secure electronic voting systems. This paper proposes a secure electronic voting system that provides enhanced security by implementing cryptography and steganography in Java. As a preliminary investigation, two steganography techniques are considered and their performances are compared for different image file formats
    corecore