Multi-factor Authentication Using Recursive XOR-Based Visual Cryptography in Online Voting System

Author(s):  
P. Sanyasi Naidu ◽  
Reena Kharat
Cryptography ◽  
2020 ◽  
pp. 391-414
Author(s):  
Lauretha Rura ◽  
Biju Issac ◽  
Manas Kumar Haldar

Though there are online voting systems available, the authors propose a new and secure steganography based E2E (end-to-end) verifiable online voting system, to tackle the problems in voting process. This research implements a novel approach to online voting by combining visual cryptography with image steganography to enhance system security without degrading system usability and performance. The voting system will also include password hashed-based scheme and threshold decryption scheme. The software is developed on web-based Java EE with the integration of MySQL database server and Glassfish as its application server. The authors assume that the election server used and the election authorities are trustworthy. A questionnaire survey of 30 representative participants was done to collect data to measure the user acceptance of the software developed through usability testing and user acceptance testing.


2016 ◽  
Vol 12 (3) ◽  
pp. 71-93 ◽  
Author(s):  
Lauretha Rura ◽  
Biju Issac ◽  
Manas Kumar Haldar

Though there are online voting systems available, the authors propose a new and secure steganography based E2E (end-to-end) verifiable online voting system, to tackle the problems in voting process. This research implements a novel approach to online voting by combining visual cryptography with image steganography to enhance system security without degrading system usability and performance. The voting system will also include password hashed-based scheme and threshold decryption scheme. The software is developed on web-based Java EE with the integration of MySQL database server and Glassfish as its application server. The authors assume that the election server used and the election authorities are trustworthy. A questionnaire survey of 30 representative participants was done to collect data to measure the user acceptance of the software developed through usability testing and user acceptance testing.


2020 ◽  
Vol 8 (1) ◽  
pp. 543-552
Author(s):  
Meher Gayatri Devi Tiwari ◽  
◽  
Kakelli Anil Kumar ◽  

2021 ◽  
Vol 18 (15) ◽  
Author(s):  
Meher Gayatri Devi TIWARI ◽  
Anil Kumar KAKELLI

The development of a secure online voting system using visual cryptography is highly essential for present voting systems. Based on the current requirements and design aspects of an existing online voting system, emerging technologies are required in online voting schemes, and these are examined in this work. The emerging cryptographic techniques which are suitable for secure online voting systems are analyzed. Techniques like password hashed-based schemes, visual cryptography, and threshold decryption cryptosystem are highlighted for secure online voting systems. Visual cryptography (VC) is a technique where visual information can be encrypted on the user side, with the information decrypted on the admin side, which can be helpful in allowing participation in voting systems securely and ensuring fast vote counting and monitoring of the voting process to achieve high accuracy while being scam-free. The proposed secure online voting system using visual cryptography is efficiently developed using Python and achieves better performance on minimum software and hardware configuration systems.


2021 ◽  
pp. 217-244
Author(s):  
Mehak Wadhwani ◽  
Nisha Mansoori ◽  
Shivangi Tanwar ◽  
Aanchal Handa ◽  
Bhavesh N. Gohil
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document