Cover page and Table of Contents: PDF (size: 649KB)
Full Text (PDF, 649KB), PP.9-17
Views: 0 Downloads: 0
E-voting System, Fingerprint Biometric, Cryptography, Authentication, Integrity, Confidentiality, Watermarking
The conventional voting scheme employs paper-based ballot to verify votes. This voting scheme is insecure due to the attributed shortcomings including ballot stuffing, ballot snatching and voter’s impersonation. In this paper, we present the design and development of secure e-voting to ensure a free, fair and credible election where the preference of electorate counts. This proposed system solves the authentication, integrity and confidentiality security issues of e-voting in kiosk and poll site evoting scenarios using unimodal fingerprint biometrics and Advanced Encryption Standard based Wavelet based Crypto-watermarking Approach. The developed system solves: The possibility of blundering voter’s authentication, integrity and confidentiality of vote stored in the server. The results after qualitative evaluation of the system with anti-watermarking detectors revealed that the developed secure e-voting system could serve as a platform for the delivery of credible e-election in developing countries with significant digital divides.
Olayemi M. Olaniyi, Taliha A. Folorunso, Aliyu Ahmed, Olugbenga Joseph, "Design of Secure Electronic Voting System Using Fingerprint Biometrics and Crypto-Watermarking Approach", International Journal of Information Engineering and Electronic Business(IJIEEB), Vol.8, No.5, pp.9-17, 2016. DOI:10.5815/ijieeb.2016.05.02
Okediran O. O., Omidiora E. O. Olabiyisi S. O., Ganiyu R. A. and Alo O. O. (2011),” A Framework for a Multifaceted Electronic Voting System” , International Journal of Applied Science and Technology Vol. 1(4), pp 135 – 142.
Howard, M. (2001) E-Government across the globe: How will "e" change government? Government Finance Review, Vol. 17(4), pp. 6-9.
Olaniyi, O.M, O.T Arulogun, E.O, Omidiora, A Omotoso, Ogungbemi O.B. (2012), ” Design of A Secured Model For Electronic Voting System Using Stegano-Cryptographic Approach ”, Proceedings of the 7th International Conference on ICT Applications, Application of ICT to Teaching, Research, and Administration (AICTTRA 2012), National Defense College Abuja, pp 84-89
Kohno T., Stubblefield A., Rubin A. and Wallach D. S, (2004), “Analysis of an Electronic Voting System”, In Proceedings of IEEE Symposium on Security and Privacy, pp. 1-23.
Sanjay, K.., and Singh, M. (2013). "Design A Secure Electronic Voting System Using Fingerprint Technique" International Journal of Computer Science Issues Vol. 10(4), pp 192-199.
Linu P, and Anilkumar M. N. (2012), “Authentication for Online Voting Using Steganography and Biometrics”, International Journal of Advanced Research in Computer Engineering and Technology (IJARCET) Vol. 5(10), pp. 26-32.
Shafi’í, M, Adebayo, O. S, Damian, O., Mohammed,D. (2013). "The Design and Development of Real-Time E-Voting System in Nigeria with Emphasis on Security and Result Veracity, International Journal of Network and Computer Security. MECS (http://www.mecs-press.org/) Vol. 5, pp 9-18
D. Akinmosin D., G.G.O. Egbedokun G.G.O. and Ibitowa F.O (2011),”An Extended Multifactor Authentication in Mobile Financial Transaction Using User Authentication Module with Multilayered Encryption Algorithms”, African Journal of Computer and Information Technology ICT (Journal of IEEE Nigeria Computer Section),Vol. 4 (2), pp 17-24.
Gallegos G., Gomez R., and Sanchez G, (2010), "Electronic Voting using Identity Based Cryptography", Fourth International Conference on Digital Society, pp 31-36.
Enokela, J. A. (2010), “Security of Programs and Data for an Electronic Voting System”, Pacific Journal of Science and Technology, Vol. 11(2), pp. 283-287.
Gunjal B., and Mali S, (2013). “Secure e-voting system with Biometric and Wavelet Based Watermarking Technique in Ycgcb color space.” IEEE International Conference on Information Technology, pp 1-6
Sable, S. and Bombale U. L. (2014), "Cryptography Based Secured E-voting System Using ARM for Cell Phone and Internet Application", International Journal of Computer Engineering and Applications, Vol. 7 (1), pp. 1-6.
Prashanth P., and Swaroop S, (2012), "Requirements for an Electronic Voting System." Department of Computer Science The Johns Hopkins University, pp. 1-2.
Olaniyi, O.M, Folorunso, T. A.,Abdullahi I.M.,Joseph O (2015),” Performance Evaluation of an Enhanced Crypto-Watermarking Model for Secure Electronic Voting ”, Open Journal of Information Security and Applications (OJISA),USA, In press Available at: http://www.scipublish.com/journals/ISA/papers/1322
Mohanty S. M. and Bhargava, B. K. (2008). Invisible Watermarking Based on Creation and Robust Insertion-Extraction of Image Adaptive Watermarks. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP), Vol. 5(2). Pp1-22