The embedding process hides a secret message within a cover media cover image, and the result of embedding process is stego image. With image steganography you can also encrypt the selected image for better protection. Palette based image steganography is basically another subtype of lsb steganography, in which the communicated data is encoded into least significant bits of the image palette rather than into those of the carrier. In this paper we have proposed a new technique of image steganography i. Once the vote is casted, it is encrypted using a public key cryptography algorithm and then is. Image steganography is the art of hiding messages in an image. Crystography, which is the combination of cryptography and steganography could be a fitting tool kit for enhancing the security of sensitive electionrelated information transmitted over public networks, thereby also ensuring free, fair and credible electionvoting. Explore bump technology with free download of seminar report and ppt in pdf and doc format. Here an image based and biometric authentication is used. Beautify, format, prettify and make it more readable.
Online voting system based on image steganography and visual cryptography 49 plementation of two distinct schemes. Steganography framework categories image steganography applications image domain methods lsb pi scc triplea maxbit statistics opap inverted pattern. Online payment system using steganography and visual. Postquantum crystography system for secure electronic. Online payment system using steganography and visual cryptography souvik roy1 and p. The aim of this paper is to design a secure electronic voting system that is based upon the electoral process for developing countries. In digital steganography, images are widely used cover source because there are number of bits presents in digital representation of an image. Biometrics and steganography based secure online voting system. Secure electronic voting system based on image steganography. A novel approach to evoting using multibit steganography. According to the concepts and knowledge pointed out from the previous research works, this work proposes image steganography based audio security system. We suggest that the best solutions are voting systems having a voterveri. Anbarasu 3 1, 2, 3department of information technology, jeppiaar engineering college, chennai. To increase the number of voters and to offer an enhanced procedure in an election, many researchers have been introducing novel and advanced approaches to secure electronic voting systems.
Postquantum crystography system for secure electronic voting in. Highest stateoftheart image steganographic approach focuses on concealing multiple secret. Compare this method to simply sending someone an encrypted piece of text. Image steganography allows you to embed text and files into images. Data security using cryptography and steganography techniques. Steganography, the secret image is embedded in the cover image and. Pdf as information technology evolves over time, the need for a better, faster, more convenient and secure electronic voting is. Pdf a secure electronic voting system based on image. In this paper we are proposing an online voting system using cryptography and steganography at the same time for providing high security for the voters. The main issue is that the secret message will not be unnoticed. Survey on secure online voting system semantic scholar. Biometrics and steganography based secure online voting system v. Online payment system using steganography and visual cryptography. Online voting system based on image steganography and.
Implementation and evaluation of steganography based. Seminar report tejas cryptography data compression scribd. We will call isc imagebased steganography and cryptography the algorithm which carries on such functions. A secure electronic voting system based on image steganography. As information technology evolves over time, the need for a better, faster, more. This paper proposes a secure electronic voting system that provides enhanced security by implementing cryptography and steganography in java. As a research objective, we want to improve the quality of election procedure in an electronic voting system. Steganalysis is the study of attacking such systems, analagous to cryptanalysis of cryptographic systems. Therefore, the need of designing a secure evoting system is very important.
Postquantum crystography system for secure electronic voting. The necessity to find a technique ensures the safety of election led to presents a novel approach to provide secure mobile voting based on biometrics in conjunction with elliptic curve cryptography and steganography. Online voting system based on image steganography and visual. Online voting system powered by biometric security using. In electronic voting, cryptography is a commonly used technique as. Section ii introduces reader with basics of image steganography. In image steganography pixel intensities are used to hide the data. Pdf online voting system based on image steganography. Electronic voting refers to any system where a voter casts his or her ballot using an electronic system, rather than a paper.
The user is authenticated using fingerprint recognition software. K secure electronic voting system based on image steganography. If an electronic voting system is designed properly, it can also provide a more secure system than the paperbased elec tion by providing precise data. The obvious downside to this method is its low data carrying capacity. Secure online payment system using steganography and visual cryptography sangita yadav1, priyanka parui2, dr. Make it minified, compressed by removing newlines, white spaces, comments and indentation. As information technology evolves over time, the need for a better, faster, more convenient and secure electronic voting is relevant since the traditional election. Computer science project topics and materials pdf and doc 2020 with source codes for immediate download. Anbarasu 3 1, 2, 3department of information technology, jeppiaar engineering college, chennai, india abstract in india elections are conducted almost exclusively using electronic voting machines evms developed. System cannot differentiate the normal image and the image with hidden data. Cover image creation this is a system generated image used for the purpose of steganography which will be finally. Steganography is the process of hiding a secret message within a larger one in such a way that someone can not know. Also, in 12, a system was developed to secure an electronic voting system using biometrics, cryptography and steganography.
Secure steganography for digital images meandering in the dark khan farhan rafat nust, rawalpindiislamabad. Biometrics and steganography based secure online voting. Steganography is the process of hiding a secret message within a larger one in such a way that someone can not know the presence or contents of the hidden message. Secure evoting system evoting application is a web based public voting system. Feb 20, 2020 explore secure electronic voting system based on image steganography with free download of seminar report and ppt in pdf and doc format. Also get the seminar topic paper on polytronics with abstract or synopsis, documentation on advantages and disadvantages, presentation slides for ieee final year electronics and telecommunication engineering or ece students for the year 2016 2017. Secure electronic voting system based on image steganography lauretha rura, biju issac and manas kumar haldar school of engineering, computing and science.
A multicandidate electronic voting scheme based on secure sum protocol. Online voting system based on image steganography and visual cryptography. For data hiding this technique is being widely used for so. The system was implemented in java ee on a web based interface, with mysql.
Xiao steganography is a free and best steganography tool that can be used to hide secret files in the image as well as audio files. Secure electronic voting using a hybrid cryptosystem and. Secret key based steganography zif system depends on secrecy of algorithm. Both components of information security are combined in a layer of data protection. Secure online voting using steganography and biometrics. The fundamental knowledge beyond electronic voting system is to confirm integrity and reliability of specific.
The vote casting and recording also secure using homomorphic encryption, blind. Full privacy preserving electronic voting scheme 93 5. Secure electronic voting system based on image steganography securing underwater wireless communication networks security in embedded systems self healing spacecraft selfhealing computers selfphasing antenna array sensorless variablespeed controller for wind power generator sensors on 3d digitization sensotronic brake control serial attached. Secure online payment system using steganography and visual. A secure electronic voting software application based on image steganography and cryptography is my own work and that all the sources i have used or quoted have been acknowledged by means of complete references. Image steganography free download abstract image steganography is mainly used for hiding an image or secret message in a cover image. The goal of steganography is to hide messages in such a way that no one apart from the intended recipient even knows that a message has been sent. Secure image steganography using cryptography and image transposition khan muhammad1, jamil ahmad2, muhammad sajjad3, muhammad zubair4 abstract information. Also explore the seminar topics paper on bump technology with abstract or synopsis, documentation on. Secure electronic voting application based on face recognition.
Secure e voting system e voting application is a web based public voting system deployed to make election process easy to use and speed competent 6. Propose a new secure online voting system by using biometric and steganographic authentication. An electronic voting evoting system is a voting system in which the election process is notated, saved, stored and processed digitally, that makes the voting. Barbhuiya, sukumar nandi department of computer science and engineering indian institute of technology guwahati, india 781039 s. Abstractsecurity privacy, confidentiality and integrity of preelectoral, electoral and post electoral phases of the electioneering process is fundamental to the success of electronic voting e. It has not already been accepted for any degree, and is also not being concurrently submitted for any other degree. Pdf online voting system based on image steganography and. The base image is a default image for the system, same for all. The most frequently used file formats are bmp for images and. Highest stateoftheart image steganographic approach focuses on concealing multiple secret images in a single 24bit cover image using lsb substitution based image steganography. Bump technology seminar report, ppt, pdf for ece students.
A secure electronic voting software application based on. Steganography in contemporary cyberattacks securelist. This research implements a novel approach to online voting by combining visual cryptography with image steganography to. As a research objective, we want to improve the quality of election procedure in an electronic voting system that relates to security and usability aspects, by using visual cryptography and image steganography in the system architecture.
About the size of a carryon bag, a finder unit is powered by a lithium battery and sends out lowpower microwaves. Though there are online voting systems available, the authors propose a new and secure steganography based e2e endtoend verifiable online voting system, to tackle. Steganography is applied on image edges with rsa algorithm for providing. Image steganography system is comprised two algorithms, one for embedding and one for extraction. Once recorded, an electronic vote is stored digitally and. Finding individuals for disaster and emergency response finder. Journal of computer research and development, 2006, 438. This image will be finally modified into a stego image and sent over insecure channel. No matter how strong the encryption method is, if someone is monitoring the communication, theyll find it highly. Evoting through biometrics and cryptography steganography. Get polytronics seminar report and ppt in pdf and doc. Full privacy preserving electronic voting scheme sciencedirect. High secure digital image steganography for the secrete communication free download abstract. Biometrics, elliptic curve cryptography, steganography.
Also get the seminar topic paper on polytronics with abstract or synopsis, documentation on advantages and disadvantages. The system was implemented in java ee on a webbased interface, with mysql. You wouldnt have to go to any other place in search of top quality and wellresearched complete free computer science project topics and materials pdf. Nov 23, 2016 a novel approach to evoting using multibit steganography. Cover image is a simple inscription of personal identification number over the base image. A secure electronic prescription system using steganography. A secure electronic voting software application based on image steganography and cryptography is my own work and that all the sources i have used or quoted have been acknowledged by means of. Online voting system powered by biometric security using steganography shivendra katiyar, kullai reddy meka, ferdous a. Also explore the seminar topics paper on secure electronic voting system based on image steganography with abstract or synopsis, documentation on advantages and disadvantages, base paper presentation slides for ieee final year electronics and. Feb 04, 2015 the developed system uses spread spectrum image steganography algorithm with advanced encryption standard aes key implementation to provide a secure means of delivering medical prescription to the parties involved. This is a great way to send a secret message to a friend without drawing attention to it.
Also explore the seminar topics paper on bump technology with abstract or synopsis, documentation on advantages and disadvantages, base paper presentation slides for ieee final year electronics and telecommunication engineering or ece students for the year 2015 2016. About the size of a carry on bag, a finder unit is powered by a lithium battery and sends out lowpower microwaves. The concept of voters information processing and storage. Most of the existing secure evoting systems are based on public key. This is not true as a correctly designed, keybased system will resist attackers that know the details of the algorithm but not the key. You wouldnt have to go to any other place in search of top quality and wellresearched complete free computer science project topics and materials pdf and doc. Secure electronic voting application based on face.
Therefore from time to time researchers have developed many techniques to fulfill secure transfer of data and steganography is one of them. This voting software could deliver a secure, reliable, convenient, and efficient voting system. This paper discusses the implementation of an online voting system based on image steganography and visual cryptography. Implementation and evaluation of steganography based online. Iris recognition cannot take place without your permission. Rura et al, 2011, suggested the implementation of a secure electronic voting system with a combination of.
1033 133 444 248 939 1282 362 1034 476 1174 197 1370 1402 1273 1421 245 128 217 1161 10 96 871 296 258 207 1140 250 550 981 464 577 991