Towards an Improved Stegano-Cryptographic Model for Secured Electronic Voting
ثبت نشده
چکیده
The widespread adoption of Information and Communication Technologies in governance over the years by electronic government has influenced democratic decision making through electronic voting (e-voting).E-voting provides increased participation of populace, reduced cost, decreased cases of invalid votes and support basis of democracy. However, e-voting systems are generally prone to security risks ranging from unauthorized casting of votes; Impersonation of voters by an attacker; Electronic ballot stuffing; Attack due to Denial of Service (DoS) and Distributed Denial of Service (DDOS) to the voting channel; Modification of vote and Deletion of valid votes. We present architecture for the development of an improved Stegano-Cryptographic model for electronic voting. The successful implementation and evaluation of the model will permit the government agency to know their degree of preparedness to organize free, fair and credible elections in future electronic democratic dispensation. KeywordsE-voting System, Steganography, Cryptography, Biometrics, Security.
منابع مشابه
Design of Secure Electronic Voting System Using Multifactor Authentication and Cryptographic Hash Functions
The primary goal of every voting system is to ensure that electorate vote counts therefore, electronic democratic governance that provides a transparent and trusted election is needed. The traditional method of voting involves the use of physical paper ballot to casts vote. This is susceptible to time wasting procedures, ballot snatching, lacks voter privacy and question the integrity of fair e...
متن کاملElectronic Voting by Means of Digital Terrestrial Television: The Infrastructure, Security Issues and a Real Test-Bed
Electronic voting has been largely studied in different forms and applications. Typical objectives of electronic voting are to enhance security and to grant easy accessibility. Security can be pursued by means of several strategies oriented to secrete the vote, to check the voter identity, to decouple the voter from his choice and to allow the ballot to be audited. On the other hand, accessibil...
متن کاملA Novel Approach for Secure Mobile-Voting using Biometrics in Conjunction with Elliptic Curve Crypto-Stegano Scheme
The significant improvement in the information and communication Technology (ICT) from last few decades increases various new needs. E-Governance system has also no exception. People are approaching to fulfill their dreams. In the case of M-voting the security is the major issue. Democracy Needs all and only the authorized voters can vote and each eligible voter can vote but not more than once....
متن کاملTowards secure online elections: models, primitives and open issues
Electronic voting may be a feasible option for several election environments, from closed-group elections to nation-wide elections. Especially with online voting, people will be able to cast their votes through a web browser, from their home or any other location where they can get Internet access. This paper reviews the generic cryptographic models that have been proposed in the academic liter...
متن کاملDifferential Power Analysis: A Serious Threat to FPGA Security
Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...
متن کامل