Advertisement

Multi-factor Authentication Using Recursive XOR-Based Visual Cryptography in Online Voting System

  • P. Sanyasi Naidu
  • Reena KharatEmail author
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 625)

Abstract

The democratic government is a system run by the people for the people. All eligible citizens of the country are involved in choosing their candidate and government through voting. People will be motivated to vote if they believe in the correctness of the underlying system. Authentication and confidentiality are the main issues in the online voting system. Proposed authentication system allows only authentic voter to vote. Non-transferable biometric credentials are used so that fake voter can’t vote in lieu of legitimate voter. We have used two biometric factors fingerprint and photograph. XOR-based recursive visual cryptography is used for maintaining the confidentiality of voter’s database.

Keywords

Security Online voting Authentication Recursive XOR-based visual cryptography Biometrics 

References

  1. 1.
    Al-Anie, H.K., Alia, M.A., Hnaif, A.A.: E-voting protocol based on public key cryptography. Int. J. Netw. Secur. Appl. (IJNSA) 3(4), 87–98 (2011)Google Scholar
  2. 2.
    Abdulzahra, H., Ahmad, R., Noor, N.M.: Combining cryptography and steganography for data hiding in images. Appl. Comput. Sci. 128–135 (2014). ISBN: 978-960-474- 368-1Google Scholar
  3. 3.
    Abd-alrazzq, H.K., Ibrahim, M.S., Dawood, O.A.: Secure internet voting system based on public key Kerberos. IJCSI Int. J. Comput. Sci. Issues 9(2), 428–435 (2012). No 3Google Scholar
  4. 4.
    Johnson, N.F., Jajodia, S.: Exploring steganography: seeing the unseen. IEEE Comput. Mag. 31(2), 26–34 (1998)CrossRefGoogle Scholar
  5. 5.
    Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)CrossRefGoogle Scholar
  6. 6.
    Khasawneh, M., Malkawi, M., Al-Jarrah, O., Hayajneh, T.S., Ebaid, M.S.: A biometric-secure e-voting system for election processes. In: Proceeding of the 5th International Symposium on Mechatronics and its Applications (ISMA08), Amman, Jordan, 27–29 May 2008Google Scholar
  7. 7.
    Paul, N., Evans, D., Rubin, A., Wallach, D.: Authentication for Remote Voting. Workshop on Human-Computer Interaction and Security Systems, Ft. Lauderdale, FL, 6 April 2003Google Scholar
  8. 8.
    Tuyls, P., Hollmann, H.D.L., Lint, J.H., Tolhuizen, L.: A polarisation based visual crypto system and its secret sharing schemes. Available at the IACR Cryptology ePrint Archive. http://eprint.iacr.org/2002/194/
  9. 9.
    Tuyls, P., Kevenaar, T.A.M., Schrijen, G.-J., Staring, T., van Dijk, M.: Visual crypto displays enabling secure communications. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 271–284. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  10. 10.
    Saini, S., Dhar, J.: An eavesdropping proof secure online voting model. In: 2008 International Conference on Computer Science and Software Engineering. IEEE (2008)Google Scholar
  11. 11.
    Vermani, S., Sardana, N.: Innovative way of internet voting: secure on-line vote (SOLV). IJCSI Int. J. Comput. Sci. Issues 9(6), 73–78 (2012). No 3Google Scholar
  12. 12.
    Katiyar, S., Meka, K.R., Barbhuiya, F.A., Nandi, S.: Online voting system powered by biometric security using steganography. In: 2011 Second International Conference on Emerging Applications of Information Technology. IEEE (2011)Google Scholar
  13. 13.
    Sridharan, S.: Implementation of authenticated and secure online voting system. In: 4th ICCCNT 2013. IEEE, 4–6 July 2013Google Scholar
  14. 14.
    Monoth, T., Babu, A.P.: Recursive visual cryptography using random basis column pixel expansion. In: ICIT 2007, pp. 41–43. IEEE (2007)Google Scholar
  15. 15.
    Wayner, P.: Disappearing Cryptography. AP Professional Books, Boston (1996)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2016

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringGITAM UniversityVishakhapatnamIndia
  2. 2.Department of Computer EngineeringPimpri Chinchwad College of EngineeringPuneIndia

Personalised recommendations