SECURE ONLINE VOTING SYSTEM USING VISUAL CRYPTOGRAPHY: A COMPARATIVE ANALYSIS
- SCOPE, Vellore Institute of Technology, Vellore, TN, India - 632014
- Associate Professor, SCOPE, Vellore Institute of Technology, Vellore, TN, India - 632014
- Abstract
- Keywords
- References
- Cite This Article as
- Corresponding Author
Visual cryptography (VC) is a technique in cryptography where visual information such as text, pictures videos, etc. can be encrypted in a prominent way that the decryption information is shown as a visual image. Electronic voting or e-voting is a process of voting that is done by the means of internet or electronic way as it becomes easy to caste, count and monitor the votes in an accurate, professional and also a scam free manner. Hereby this paper is a compared study of e-voting and VC. I came across a few interesting techniques that were involved and hence would be framing a survey and a review upon all the ongoing techniques. Further we can be using a fresh technique to implement the process. Techniques like cryptography, steganography and many other objectives are the most important ones that are put together for an important search and a survey.
- Alsuhibany, S. A. (2019). Developing a Visual Cryptography Tool for Arabic Text. IEEE Access, 7, 76573?76579. https://doi.org/10.1109/ACCESS.2019.2920858
- Archana, P. S., & Ambily, O. (2016). Visual cryptography in internet voting for extended security. International Journal of Engineering Research and General Science, 4(2), 365?368.
- Challener, I. D. C. (1985). United States patent. Geothermics, 14(4), 595?599. https://doi.org/10.1016/0375-6505(85)90011-2
- Fisher, K., Carback, R., & Sherman, A. T. (2006). Punchscan : Introduction and System Definition of a High-Integrity Election System. Direct.
- Hutchison, D., & Mitchell, J. C. (1973). Lecture Notes in Computer Science. Lecture Notes in Computer Science (Vol. 9). https://doi.org/10.1016/0020-7101(78)90038-7
- Jadhav, P., Pawar, M., Ahire, P., Kumar, V., & Kulkarni, P. J. B. (2015). Online Polling System Using Extended Visual Cryptography, 4(6), 12340?12344.
- Jaya, Malik, S., Aggarwal, A., & Sardana, A. (2011). Novel authentication system using visual cryptography. Proceedings of the 2011 World Congress on Information and Communication Technologies, WICT 2011, 1181?1186. https://doi.org/10.1109/WICT.2011.6141416
- Kamdi, A., Kamble, M., Tayade, V., & Rajeev, N. (2017). A NOVEL APPROACH FOR ONLINE VOTING SYSTEM USING, (4), 63?66.
- Kate, N., & Katti, J. V. (2017). Security of Remote voting system based on visual cryptography and SHA. Proceedings - 2nd International Conference on Computing, Communication, Control and Automation, ICCUBEA 2016. https://doi.org/10.1109/ICCUBEA.2016.7860071
- Kohno, T., Stubblefield, A., Rubin, A. D., & Wallach, D. S. (2004). Analysis of an electronic voting system. Proceedings - IEEE Symposium on Security and Privacy, 2004(May), 27?40. https://doi.org/10.1109/SECPRI.2004.1301313
- Krimmer, R., & Volkamer, M. (2014). EVOTE2014.
- Mikail, O., Oladiran Tayo, A., Elijah Olusayo, O., & Oladotun Olusola, O. (2013). A Survey of Cryptographic and Stegano-Cryptographic Models for Secure Electronic Voting System. Covenant Journal of Informatics and Communication Technology (CJICT), 1(2), 54?78.
- Mursi, M., Assassa, G., Tavakoly, A., & Atani, R. E. (2013). On the Development of Electronic Voting: A Survey. International Journal of Computer Applications, 61(16), 1?11. Retrieved from http://www.bu.edu.eg/portal/uploads/staff_publications_abstracts/feng/Mechanical Engineering/Ghazy mohamed rateb Assassa.pdf
- Naidu, P. S., Kharat, R., Tekade, R., Mendhe, P., & Magade, V. (2017). E-V oting system U sing visual cryptography & secure multi-party computation. Proceedings - 2nd International Conference on Computing, Communication, Control and Automation, ICCUBEA 2016, 1?4. https://doi.org/10.1109/ICCUBEA.2016.7860062
- Nelli, R. R., Mehra, R., Madri, P., S, M., & J, R. (2017). Anti-Phishing I-Voting System using Visual Cryptography. Ijarcce, 6(5), 113?119. https://doi.org/10.17148/ijarcce.2017.6522
- Patidar, P. K., Kushwah, R., & Chaudhari, T. (2017). and Face Detection- A Survey, 5(Ix), 633?635.
- Rahul, H., Ghorpade, P., Shivaji, V., Renuka, P., Choudhari, A., & M, P. P. J. A. (2016). Internet Voting System using Visual Cryptography, 4(02), 2022?2024.
- Rajendra, A. B., & Sheshadri, H. S. (2013). Visual cryptography in internet voting system. 2013 3rd International Conference on Innovative Computing Technology, INTECH 2013, 60?64. https://doi.org/10.1109/INTECH.2013.6653684
- Raviraja Holla, M., & Suma, D. (2019). Pipelined parallel rotational visual cryptography (PPRVC). Proceedings of the 2019 IEEE International Conference on Communication and Signal Processing, ICCSP 2019, 109?113. https://doi.org/10.1109/ICCSP.2019.8697957
- Rura, L., Issac, B., & Haldar, M. K. (2017). Online voting system based on image steganography and visual cryptography. Journal of Computing and Information Technology, 25(1), 47?61. https://doi.org/10.20532/cit.2017.1003224
- Rura, L., Issac, B., & Haldar, M. K. (2011). Online voting verification with cryptography and steganography approaches. Proceedings of 2011 International Conference on Computer Science and Network Technology, ICCSNT 2011, 1, 125?129. https://doi.org/10.1109/ICCSNT.2011.6181923
- Rura, L., Issac, B., & Haldar, M. K. (2016). Implementation and evaluation of steganography based online voting system. International Journal of Electronic Government Research, 12(3), 71?93. https://doi.org/10.4018/IJEGR.2016070105
- Science, C., & Engineering, S. (2012). Remote Voting System for Corporate Companies using Visual Cryptography, 2(6), 250?254.
[Meher Gayatri Devi Tiwari and Kakelli Anil Kumar (2020); SECURE ONLINE VOTING SYSTEM USING VISUAL CRYPTOGRAPHY: A COMPARATIVE ANALYSIS Int. J. of Adv. Res. 8 (Jan). 543-552] (ISSN 2320-5407). www.journalijar.com