Online voting verification with cryptography and steganography approaches

Lauretha Rura*, Biju Issac, Manas Kumar Haldar

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Citations (Scopus)

Abstract

Good electronic voting system is developed to cater to the user's demand to have an efficient, reliable and secure system. Online voting system should not be a black box to the users. It should be able to assure them that their vote is casted, collected and counted respectively without enabling vote coercion or vote buying. In this paper, we are proposing a combination of both cryptography and steganography approach in online voting's vote verification design.

Original languageEnglish
Title of host publicationProceedings of 2011 International Conference on Computer Science and Network Technology, ICCSNT 2011
PublisherIEEE
Pages125-129
Number of pages5
Volume1
ISBN (Electronic)978-1-4577-1587-7
ISBN (Print)978-1-4577-1586-0
DOIs
Publication statusPublished - 12 Apr 2012
Externally publishedYes
Event2011 International Conference on Computer Science and Network Technology, ICCSNT 2011 - Harbin, China
Duration: 24 Dec 201126 Dec 2011

Conference

Conference2011 International Conference on Computer Science and Network Technology, ICCSNT 2011
Country/TerritoryChina
CityHarbin
Period24/12/1126/12/11

Keywords

  • cryptography
  • electronic voting
  • End-to-end
  • image steganography
  • verification

Fingerprint

Dive into the research topics of 'Online voting verification with cryptography and steganography approaches'. Together they form a unique fingerprint.

Cite this