• DocumentCode
    2054746
  • Title

    Visual Cryptography in Internet Voting System

  • Author

    Rajendra, A.B. ; Sheshadri, H.S.

  • Author_Institution
    Vidyavardhaka Coll. of Eng., Mysore, India
  • fYear
    2013
  • fDate
    29-31 Aug. 2013
  • Firstpage
    60
  • Lastpage
    64
  • Abstract
    Internet Voting System (IVS) Using Visual Cryptography (VC) aims at providing a facility to cast vote for critical and confidential internal corporate decisions. It has the flexibility to allow casting of vote from any remote place, even when key stakeholders of election process are not available at workplace. This is enabled by leveraging and implementing the features provided by the VC in IVS. The election is held in full confidentiality by applying appropriate security measures to allow the voter to vote for any participating candidate only if he logs into the system by entering the correct password which is generated by merging the two shares (Black & White dotted Images)using VC scheme. Where, Administrator (Election officer) sends share 1 to voter e-mail id before election and share 2 will be available in the voting system for his login during election. Voter will get the secret password to cast his vote by combining share 1 and share 2 using VC. Visual Cryptography (VC) is a secret sharing scheme in which an image is converted into shares. No information can be revealed by observing any share (Black & White dotted Image). The information about the original image (Voter Password) will be revealed only after stacking sufficient number of shares. There are various schemes present in VC, 2 out of 2, k out of n, n out of n, etc. In the proposed method, IVS with 2-out-of-2 VC has been used for an efficient authentication voting system. Even if the hacker gets one share of the password, it is impossible to get the other share of the password, as it will be sent to the E-Mail Id of the voter. Thus IVS provides two way securities to the voting system, which is very much in need.
  • Keywords
    Internet; cryptography; government data processing; image processing; IVS; Internet voting system; VC scheme; authentication voting system; black & white dotted images; confidential internal corporate decisions; election process; image voter password; secret sharing scheme; visual cryptography; voter e-mail ID; Authentication; Cryptography; Electronic mail; Internet; Nominations and elections; Visualization; Internet Voting System (IVS); Shares; Visual Cryptography (VC); Visual secret sharing; Voter Password;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Innovative Computing Technology (INTECH), 2013 Third International Conference on
  • Conference_Location
    London
  • Print_ISBN
    978-1-4799-0047-3
  • Type

    conf

  • DOI
    10.1109/INTECH.2013.6653684
  • Filename
    6653684