Stegano-Cryptographic Technique for Online Polling System
Journal: International Journal of Science and Research (IJSR) (Vol.5, No. 5)Publication Date: 2016-05-05
Authors : Monalisa Hati;
Page : 278-281
Keywords : Steganography; Cryptography; Anti-Phishing;
Abstract
Election establishes democracy in the country. This process should be ensured to maintain integrity and confidentiality of the votes casted. Jamshedpur is a busy Industrial city where each and every person is on work. Now a days only few people go for voting because of their tight schedule. Everyone has to go to voting center, They have to stand in a long queue, many may be tired because of their tight schedule. Some people do not get even leave for voting from their work places. So we have developed online voting system Visual cryptography aims in automating the voting process so that the user can vote from his/ her home, office or anywhere without any geographical restriction. Visual cryptography and steganography is used to ensure secrecy of ballots. Visual Cryptography is a special type of encryption technique which is used to hide the information and data in images. In this technique the decryption process is done without any complex cryptographic computation. The encrypted data is decrypted using Human Visual System (HVS). The encryption technique requires a cryptographic computation to divide the image into a number of shares. Decryption can be done by someone without the knowledge of cryptography and does not require any decryption algorithm. Here we are dividing original image into two shares which are stored in separate database. Whenever these two shares are stacked with each other we get the original image. Once we get the original image it can be used as password. This system is very useful and safe for online remote voting. If this technology will be implemented in the busy city like Jamshedpur, it will save time, money, many more citizens can vote and voting process will be confidential and secret, it can not be intruded by the protesters. Steganography, Cryptography, Anti-Phishing
Other Latest Articles
- E-Commerce: A Boon for Human Being in Recent Era
- Risk Factors of Hamstring Strain in Football Players
- Thermal Influence Occurring Deviations in the Parameters of the Laser Beam Propagating through Atmospheric Air
- Bacteriological and Physical Analysis of Dug Wells in South Darfur (Tolus town) for Indication of Pollution by Enterococus E. faecalis and Coliform
- Query Expansion Based on a Personalized Mobile Search Engine-A Review
Last modified: 2021-07-01 14:37:34