Download secure electronic voting system based on image steganography pdf

A secure image steganography technique using dct, jsteg and bayesian. Readymade source code for final year college student, project submission of be, bscit, bca, mca, mba, ignou, smu, doeacc. An electronic voting e voting system is a voting system in which the election process is notated, saved, stored and processed digitally, that makes the voting management task better than traditional paper based method. It is a completely new area of applying image steganography.

Secure online voting usingsteganographyand biometrics free download abstract the fundamental knowledge beyond electronic voting system is to confirm integrity and reliability of specific mechanisms for addressing issues of security, privacy and accountability, which results due to the rapid development of information technology field. The important part of the online voting system is authentication of an individual as a legitimate voter. Also, in 12, a system was developed to secure an electronic voting system using biometrics, cryptography and steganography. Analysis of image steganography techniques in secure.

A voting system can use the security of blockchain and the mail to provide a reliable voting system. As information technology evolves over time, the need for a better, faster, more convenient and secure electronic voting is relevant since the traditional elect. Basic idea behind this is to combine secret key with cover image on the basis of key image. The success rate of an electronic voting system in electronic decision making is dependent on security, authenticity and integrity of.

Analysis of image steganography techniques in secure online. The reasons why voters cant trust the e voting system are voters worried about the abuses in e voting system, and they can not make sure their ballot are. It plays a significant role in current trends for providing secure communication and guarantees accessibility of secret information by authorised parties only. To increase the number of voters and to offer an enhanced procedure in an election, many researchers have been introducing novel and advanced approaches to secure electronic voting systems. Typical features and functionalities of e voting systems internally, electronic voting systems have many functions, including encryption, randomization, communication and security systems. Secure online voting system using visual cryptography.

A registered voter receives a computer readable code in the mail and confirms identity and confirms correct ballot information in an election. When designing an online matching is a new process introduced in web based electronic voting system, it is essential to consider ways in voting system, it make the system more secure and which the voting tasks can be performed electronically practical. Web based voting allows the voter to vote from any location in state or out of state. Cover image is a simple inscription of personal identification number over the base image. The user is authenticated using fingerprint recognition software. This is known as blind steganalysis, which attempts to differentiate stego images from cover images without the knowledge of steganographic embedding. However, we find that in most existing approaches, the choice of embedding positions within a cover image mainly depends on a pseudorandom number generator without considering the relationship between the image content itself and the size of the secret message. Evoting using one time password and face detection and. Secure electronic voting system based on image steganography securing underwater wireless communication networks security in embedded systems self healing spacecraft selfhealing computers selfphasing antenna array sensorless variablespeed controller for wind power generator sensors on 3d digitization sensotronic brake control serial attached. Cryptography, information theory, and errorcorrectionimage encryption based on hybrid of optical and digital techniquesintegrated intelligent computing. Evoting through biometrics and cryptography steganography. Secure electronic voting system based on image steganography. The selected schemes are password hashed based scheme, visual cryptography 8 as adopted from secretballot receipts proposed by chaum 9 and threshold. Abstract this paper introduces an online voting system in which the election data is stored and processed.

The image steganography technique takes the advantage of limited power of human visual system hvs. As the demand of more secure yet efficient image steganography tools has increased, different steganography approaches have been proposed. The aim of this paper is to design a secure electronic voting system that is based upon the electoral. Proceedings of the ieee conference on open systems icosa11, sep 25a.

Brindha and vennila proposed a method of using the image steganography technique for hiding the fingerprint of a person inside his face image for smart card authentication. The system was implemented in java ee on a web based interface, with mysql database server and glassfish application server as the backend. Final year project download, steganography hide information. The base image is a default image for the system, same for all. Design and implementation of an electronic voting system. A secure electronic voting system based on image steganography. Postquantum crystography system for secure electronic voting. Heoretical b ackground steganography is the art and science of covert communication by embedding a message into an innocuous looking cover media such as text, image, and video. Pdf a secure electronic voting system based on image. Secure authentication in online voting system using. The stego images were tested using psnr peak signaltonoise ratio. In steganography, covert writing is established for two main. Face recognition as an authentication technique in electronic voting.

Providing accessibility to such a diverse population is an important engineering problem and one where, if other security is done well, electronic voting. Image steganography steganography is the art of hiding information in ways that prevent the detection of hidden messages 12. It is very important to provide security to voting system and mostly which is online one. Pdf new system of evoting using fingerprint seifedine. Once the vote is casted, it is encrypted using a public key cryptography algorithm and then is. Toward protocols for quantumensured privacy and secure. However, security remains the bottleneck of each system. Secure online voting using steganography and biometrics. Visual cryptography vc is a technique in cryptography where visual information such as text, pictures videos, etc. In7, a multi layer, secure web based e voting system was proposed using biometric and wavelet based image watermarking technique in ycgcb color space. Also explore the seminar topics paper on secure electronic voting system based on image steganography with abstract or synopsis, documentation on advantages and disadvantages, base paper presentation slides for ieee final year electronics and. This paper deals with the design and moreover, electronic voting systems can improve voter development of a web based voting system using fingerprint identification process by utilizing biometric recognition. This paper proposes a secure electronic voting system that provides enhanced security by implementing cryptography and steganography in java.

The voters image is captured and sends toward the face. Moreover, stego images with hash data and blockchain technology are used in updating and sharing medical covid19 data between hospitals. Jul 31, 2010 this system will be more secure than any other these techniques alone and also as compared to steganography and cryptography combined systems visual steganography is one of the most secure forms of steganography available today. Implementation and evaluation of steganography based online. Objective behind the development of this system is to simplify the process of organizing elections and make it easy for voters to vote remotely from their home computers or smart devices while taking into consideration better security, anonymity and providing. Performance evaluation of modified steganocryptographic. Electronic voting technology can include punched cards, optical scan voting systems and specialized voting kiosks including self contained direct recording. Securing online voting system using multimodal biometrics. Secure e voting system e voting application is a web based public voting system deployed to make election process easy to use and speed competent 6. Image steganography has been the focus of a significant. Image steganography steganography is the art of hiding information in ways that prevent the detection of.

Our system provides secure authentication based on nontransferable personal credentials like biometric features. Though there are online voting systems available, the authors propose a new and secure steganography based e2e endtoend verifiable. Facilitating and securing offline emedicine service through. A voting system must be comprehensible to and usable by the entire voting population, regardless of age, in.

Jul 03, 2014 spamtitan email security is an email spam filter for businesses, smbs, msps, and schools. Feb 15, 2021 explore secure electronic voting system based on image steganography with free download of seminar report and ppt in pdf and doc format. However, unlike traditional paperbased voting systems, an epolling system introduces several security risks such as privacy of vote, unlinkability of a voter. As a research objective, we want to improve the quality of election procedure in an electronic voting system that relates to security and usability aspects, by using visual cryptography and image steganography in the system architecture. Study on security of online voting system using biometrics. Online voting system based on image steganography and visual cryptography this paper discusses the implementation of an online voting system based on image steganography and visual cryptography. The system was compliant with the election legislation and principles and was at least as secure as regular voting. Sep 21, 2016 in order to increase the number of voting, there is a need to design a secure e voting system. Improved steganography scheme based on fractal set free download steganography is the art of hiding secret data inside digital multimedia such as image, audio, text and video. Scholar 2assistant professor abstract with the help of online voting system author can manage election easily and securely. A novel secure image steganography method based on chaos theory in spatial domain free download abstract this paper presents a novel approach of building a secure data hiding technique in digital images. To increase the number of voters and to offer an enhanced procedure in an election, many researchers have been introducing novel and.

Helps control mail flow, clean it, and protect against unwanted. This paper discusses the implementation of an online voting system based on image steganography and visual cryptography. Spamtitan email security blocks spam as well as phishing and dayzero attacks, viruses, malware, ransomware, and other email threats. Feb 15, 2021 smart antenna, super capacitor, vehicletogrid v2g, lunar reconnaissance orbiter miniature rf technology demonstration, secure electronic voting system based on image steganography, securing underwater wireless communication networks, security in embedded systems, third generation solid state drives, face recognition using neural network. Secure electronic voting application based on face.

This image will be finally modified into a stego image and sent over insecure channel. Securing online voting system using multimodal biometrics and. Facilitating and securing offline emedicine service. E voting application is a web based public voting system deployed to make election process easy to use and speed competent 6. Section ii introduces reader with basics of image steganography. Enhanced steganocryptographic model for secure electronic voting. In this paper we provide security to online voting system with secure user authentication by providing biometric as well as password security to voter accounts. An electronic voting e voting system is a voting system in which the election data is recorded, stored and processed primarily as digital information it is not an easy task due to the need of achieving electronic voting security requirements.

This voting software could deliver a secure, reliable, convenient, and efficient voting system. Online voting system based on image steganography and visual. Online voting system based on image steganography and. The main objective of steganography is to hide the existence of the embedded data. Securing online voting system using multimodal biometrics and steganography neha gandhi1 dr. Abstract in this paper a face detection and recognition system used as an authentication technique in online voting, which is same as electronic voting, is proposed. Also, several research papers proposed reliability and confidentiality in e voting systems by using.

However, the use of the least significant bit lsb replacement algorithm has made the policy weaker. The presence of encrypted information can also entice a potential attacker to launch an attack on the secure communication. Polytronics seminar report, ppt, pdf for ece students. In this paper some of those approaches are examined in order to identify the appropriate image steganography technique to be implemented in an electronic voting system. A secure electronic voting system pdf download available pin. The proposal could maintain the major principle of e voting.

Rura et al, 2011, suggested the implementation of a secure electronic voting system. It gathered the two key security issues to secure evoting systems. Full privacy preserving electronic voting scheme sciencedirect. A survey on image steganography techniques semantic scholar. The encrypted ballots were then hidden using lsb replacement algorithm to improve their integrity. To achieve higher level of security, two levels of. Encryption to encrypt the image using the key generated by the output of the cnn system the asymmetric encryption algorithm aes 1 has been used. A survey of cryptographic and steganocryptographic. Steganography is the technique of concealing particulars in data of any dig ital format in such a way that these hidden parts are known only by sender and. Secure electronic voting system based on image steganography, seminar reports ppt pdf doc presentation abstract as information technology evolves over time, the need for a better, faster, more convenient and secure electronic voting is relevant since the traditional election procedures cannot satisfy all of voters demands. Download image steganography secures data when sharing files with other users by embedding text or files of any types into images, featuring optional encryption.

Citeseerx document details isaac councill, lee giles, pradeep teregowda. Providing accessibility to such a diverse population is an important engineering problem and one where, if other security is done well, electronic voting could be. International journal of engineering research and general. Secure electronic voting using a hybrid cryptosystem and. Implementation and evaluation of steganography based. After considering the requirements of an online voting system, current technologies on electronic voting schemes in published literature were examined. Explore secure electronic voting system based on image steganography with free download of seminar report and ppt in pdf and doc format. Based on the psnr values obtained from tests, it showed that the stego images have quality images without compromising the original image. Steganography technique has improved the security of. In this paper, we provide security to online voting system with secure user. Rura et al, 2011, suggested the implementation of a secure electronic voting system with a combination of. Steganography technique is the science that includes communicating secret information in an appropriate digital multimedia cover objects such as audio, video and image files.

1649 498 1430 748 1168 1101 1536 1264 618 359 1385 296 936 132 1437 794 905 1630 1243 451 941 1255 1670