Visual Cryptography in Internet Voting System
Journal: IPASJ International Journal of Computer Science (IIJCS) (Vol.3, No. 10)Publication Date: 2015-11-05
Authors : Prasad Pawar; Teju Pansare; Jyoti Shinde; Sachin Shinde; Prashant Suryavanshi;
Page : 1-4
Keywords : Internet Voting System (IVS); Visual Cryptography (VC); Shares; Voter Password; Visual secret sharing.;
Abstract
ABSTRACT With the help of Visual Cryptography (VC), the main aims of Internet Voting System (IVS) is to provide a service to casting of vote for confidential and critical decisions of internal corporate. For allowing the vote casting from remote place which is anywhere, it has the flexibility even when at workplace election process key stakeholders are not available. The provided features by the VC in IVS this is enabled by implementing and leveraging. By applying appropriate security measures the election is held in full confidentiality for allowing to the voter to vote for any candidate which is participated if and only if he logs into the system after the correct password is entered which is generated using VC scheme after merging the two shares (White and Black dotted Images). Where, the share 1 is send by Election officer (Administrator) to e-mail id of voter before the election and in the voting system the share 2 will be available during election for his login. For casting his vote the secret password will get the voter after combining share 1 as well as share 2 with the help of VC. The scheme for secret sharing is VC in which the image converted into shares. By any share observation, there can be revealed no information. Only after mountain sufficient number of shares, there will be revealed the Voter Password. Various types are available there in VC which are 2 out of 2, k out of n, n out of n, etc. In this system, for an efficiently authenticate to the voting system there has been used the IVS with 2-out-of-2 VC. There is not possible to retrieve the password’s other share even if there gets the one share of the password to the hacker, as it will be sent to the voter E-Mail Id. Thus to the system of voting there provides two way securities by IVS, which is required very much.
Other Latest Articles
- IMAGE ENHANCEMENT USING FAST CURVELET TRANSFORM AND THRESHOLD DECOMPOSITION DRIVEN MORPHOLOGICAL FILTER
- Multiple DG Placement For Voltage Profile Improvement And Loss Reduction Using IA And PSO Methods
- Power Flow Control of Micro Grid in Islanded Mode Operation
- Removal of Contaminant Gases from Biogas by Chemical Purification Processes
- Performance Analysis of CI Engine using NigerBio-Diesel Blends
Last modified: 2015-11-05 18:10:54