Downloads: 134 | Views: 290 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper | Computer Science & Engineering | India | Volume 5 Issue 5, May 2016 | Popularity: 6.5 / 10
Stegano-Cryptographic Technique for Online Polling System
Monalisa Hati
Abstract: Election establishes democracy in the country. This process should be ensured to maintain integrity and confidentiality of the votes casted. Jamshedpur is a busy Industrial city where each and every person is on work. Now a days only few people go for voting because of their tight schedule. Everyone has to go to voting center, They have to stand in a long queue, many may be tired because of their tight schedule. Some people do not get even leave for voting from their work places. So we have developed online voting system Visual cryptography aims in automating the voting process so that the user can vote from his/ her home, office or anywhere without any geographical restriction. Visual cryptography and steganography is used to ensure secrecy of ballots. Visual Cryptography is a special type of encryption technique which is used to hide the information and data in images. In this technique the decryption process is done without any complex cryptographic computation. The encrypted data is decrypted using Human Visual System (HVS). The encryption technique requires a cryptographic computation to divide the image into a number of shares. Decryption can be done by someone without the knowledge of cryptography and does not require any decryption algorithm. Here we are dividing original image into two shares which are stored in separate database. Whenever these two shares are stacked with each other we get the original image. Once we get the original image it can be used as password. This system is very useful and safe for online remote voting. If this technology will be implemented in the busy city like Jamshedpur, it will save time, money, many more citizens can vote and voting process will be confidential and secret, it can not be intruded by the protesters. Steganography, Cryptography, Anti-Phishing
Keywords: Steganography, Cryptography, Anti-Phishing
Edition: Volume 5 Issue 5, May 2016
Pages: 278 - 281
DOI: https://www.doi.org/10.21275/NOV163267
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 5, May 2022
Pages: 885 - 888Image Based Steganography
Bheeshma Rao J, Ujwal Sai Satya Jorige, Sai Praneetha Katragadda, Pradeep Kumar .V
Downloads: 0
Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023
Pages: 581 - 585Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security
R. Vidhya, R. Sathya
Downloads: 1
Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021
Pages: 475 - 485Light Weight WSN Authentication Protocol Suite
Rahul K Drolia
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024
Pages: 1362 - 1373Design and Implementation of a Novel Hybrid Quantum-Classical Processor for Enhanced Computation Speed
Mohammed Saleem Sultan, Mohammed Shahid Sultan