CFP last date
20 May 2024
Reseach Article

E-Voting through Biometrics and Cryptography- Steganography Technique with conjunction of GSM Modem

Published on April 2012 by Shobha Lokhande, Dipali Sawant, Nazaneen Sayyad, D. D. Pukale, Mamata Yengul
Emerging Trends in Computer Science and Information Technology (ETCSIT2012)
Foundation of Computer Science USA
ETCSIT - Number 5
April 2012
Authors: Shobha Lokhande, Dipali Sawant, Nazaneen Sayyad, D. D. Pukale, Mamata Yengul
63ee833c-0034-4dbd-a192-782a24de5c02

Shobha Lokhande, Dipali Sawant, Nazaneen Sayyad, D. D. Pukale, Mamata Yengul . E-Voting through Biometrics and Cryptography- Steganography Technique with conjunction of GSM Modem. Emerging Trends in Computer Science and Information Technology (ETCSIT2012). ETCSIT, 5 (April 2012), 38-42.

@article{
author = { Shobha Lokhande, Dipali Sawant, Nazaneen Sayyad, D. D. Pukale, Mamata Yengul },
title = { E-Voting through Biometrics and Cryptography- Steganography Technique with conjunction of GSM Modem },
journal = { Emerging Trends in Computer Science and Information Technology (ETCSIT2012) },
issue_date = { April 2012 },
volume = { ETCSIT },
number = { 5 },
month = { April },
year = { 2012 },
issn = 0975-8887,
pages = { 38-42 },
numpages = 5,
url = { /proceedings/etcsit/number5/5999-1041/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Emerging Trends in Computer Science and Information Technology (ETCSIT2012)
%A Shobha Lokhande
%A Dipali Sawant
%A Nazaneen Sayyad
%A D. D. Pukale
%A Mamata Yengul
%T E-Voting through Biometrics and Cryptography- Steganography Technique with conjunction of GSM Modem
%J Emerging Trends in Computer Science and Information Technology (ETCSIT2012)
%@ 0975-8887
%V ETCSIT
%N 5
%P 38-42
%D 2012
%I International Journal of Computer Applications
Abstract

Biometric as well as Password security to voter accounts is provided using Cryptography and Stenography. For implementing this, cover image is used for Stenography and key is used for Cryptography. The basic concept is to merge the secret key with the cover image on the basis of key image which results a stego image, which looks quite similar to the cover image but not detectable by human eye. The key image is a Biometric measure, such as a fingerprint image. As the hackers have to find both secret key and the template so proper use of Cryptography provides security to the system. The main purpose of system is to provide proper authentication of voter for voting system.

References
  1. Shivendra Katiyar, Kullai Reddy Meka, Ferdous A. Barbhuiya, Sukumar Nandi, "Online Voting System Powered By Biometric Security Using Steganography", 2011 Second International Conference on Emerging Applications of Information Technology
  2. William Stallings, "Cryptography and Network Security, Principles and Practices", Third Edition, pp. 67-68 and 317-375, Prentice Hall, 2003.
  3. Bruce Schneier, "Applied Cryptography", Second Edition: Protocols, Algorithms, and Source Code in C, John Wiley and Sons, 1996.
  4. Tadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, and Dan S. Wallach, "Analysis of an Electronic Voting System", Proc. IEEE Symposium on Security and Privacy (May, 2004), found at http://avirubin. com/vote/analysis/index. html
  5. Robert Krimmer (Ed. ) ,"Electronic Voting 2006" 2nd International Workshop Co-organized by Council of Europe, ESF TED, IFIP WG 8. 5 and E-Voting. CC.
Index Terms

Computer Science
Information Sciences

Keywords

Onlinevoting steganography Biometric Cryptography