Downloads: 134 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper | Computer Science & Engineering | India | Volume 5 Issue 5, May 2016
Stegano-Cryptographic Technique for Online Polling System
Abstract: Election establishes democracy in the country. This process should be ensured to maintain integrity and confidentiality of the votes casted. Jamshedpur is a busy Industrial city where each and every person is on work. Now a days only few people go for voting because of their tight schedule. Everyone has to go to voting center, They have to stand in a long queue, many may be tired because of their tight schedule. Some people do not get even leave for voting from their work places. So we have developed online voting system Visual cryptography aims in automating the voting process so that the user can vote from his/ her home, office or anywhere without any geographical restriction. Visual cryptography and steganography is used to ensure secrecy of ballots. Visual Cryptography is a special type of encryption technique which is used to hide the information and data in images. In this technique the decryption process is done without any complex cryptographic computation. The encrypted data is decrypted using Human Visual System (HVS). The encryption technique requires a cryptographic computation to divide the image into a number of shares. Decryption can be done by someone without the knowledge of cryptography and does not require any decryption algorithm. Here we are dividing original image into two shares which are stored in separate database. Whenever these two shares are stacked with each other we get the original image. Once we get the original image it can be used as password. This system is very useful and safe for online remote voting. If this technology will be implemented in the busy city like Jamshedpur, it will save time, money, many more citizens can vote and voting process will be confidential and secret, it can not be intruded by the protesters. Steganography, Cryptography, Anti-Phishing
Keywords: Steganography, Cryptography, Anti-Phishing
Edition: Volume 5 Issue 5, May 2016,
Pages: 278 - 281
Similar Articles with Keyword 'Steganography'
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 5, May 2022
Pages: 885 - 888Image Based Steganography
Bheeshma Rao J | Ujwal Sai Satya Jorige | Sai Praneetha Katragadda | Pradeep Kumar .V
Downloads: 101
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1526 - 1530