Candidate Selection Using Visual Symmetric Key Cryptographic Approach in Online Election Process

  • Authors

    • Krishna prakasha
    • Vasundhara Acharya
    2018-12-19
    https://doi.org/10.14419/ijet.v7i4.41.24524
  • Authentication, Image Shares, Public Key Infrastructure, Security, Visual Cryptography.
  • In the candidate selection process in polling, security is an important aspect. To protect the confidential information from unsuspecting victims for identity theft and other fraudulent activities, the authentication of images using visual cryptography is implemented in the proposed research work. An intelligent approach for polling and selecting a leader is proposed using cryptographic techniques. The process involves two phases namely management phase and client phase with some public key infrastructure techniques. The management phase will authenticate the user and generates one share of the image and it is a claimant process. The client phase is a verifier process where after authentication, the user gets another half. The elector needs to merge both the halves to succeed.

     

     
  • References

    1. [1] Monoth and A. P. Babui, “Recursive visual cryptography using random basis column pixel expansion,†Proceedings of IEEE International Conference on Information Technology, (2007), pp: 41–43.

      [2] C. Hu and W. G. Tzeng, “Cheating prevention in visual cryptography,†in IEEE Transaction on Image Processing, vol. 16, no 1 (2007), pp:36-45.

      [3] B. Borchert, “Segment based visual cryptography,†in WSI Press, Germany, 2007.

      [4] D. J. W-Q Yan and M. S. Kanakanahalli, “Visual cryptography for print and scan applications,†Proceedings of IEEE International Symposium on Circuits and Systems, (2004), pp: 572– 575.

      [5] F. Liu, C. Wu, and X. Lin, “Step construction of visual cryptography schemes,†IEEE transactions on information forensics and security, Vol. 5, No. 1 (2010), pp: 27–38.

      [6] L. J. Anbarasi, M. J. Vincent, and G. A. Mala, “A novel visual secret sharing scheme for multiple secrets via error diffusion in halftone visual cryptography,†Proceedings of , 2011 International Conference on. IEEE, (2011), pp:129–133.

      [7] M. S. Reddy and S. M. Mohan, “Visual Cryptography Scheme for Secret Image Retrieval,†International Journal of Computer Science and Network Security (IJCSNS), Vol. 14, No. 6 (2014), pp: 41–46.

      [8] P. R. R. Neelima Guntupalli and S. cheekaty, “An introduction to different types of visual cryptography schemes,†International Journal of Science and Advanced Technology, Vol. 1, No. 7 (2011), pp: 198–205.

      [9] D. M. A. Pallavi V Chavan and D. A. R. Mahajan, “An intelligent sys- tem for secured authentication using hierarchical visual cryptography- review,†Proceedings of Int. Joint Colloquium on Emerging Technologies in Computer Electrical and Mechanical, (2011), pp:11-13.

      [10] M. Naor and A. Shamir, “Visual cryptography,†Proceedings of EUROCRYPT, (1994), pp.:1–12.

      [11] W. Dang, M. He, D. Wang, and X. Li, “K out of K Extended Visual Cryptography Scheme based on Xorâ€, International Journal of Computer and Communication Engineering, Vol. 4, No. 6 (2015), pp: 439-453.

  • Downloads

  • How to Cite

    prakasha, K., & Acharya, V. (2018). Candidate Selection Using Visual Symmetric Key Cryptographic Approach in Online Election Process. International Journal of Engineering & Technology, 7(4.41), 185-187. https://doi.org/10.14419/ijet.v7i4.41.24524