Secure Online Voting System using Visual Cryptography
Keywords:Visual Cryptography, E-voting, Security, Techniques, Performance
The development of a secure online voting system using visual cryptography is highly essential for present voting systems. Based on the current requirements and design aspects of an existing online voting system, emerging technologies are required in online voting schemes, and these are examined in this work. The emerging cryptographic techniques which are suitable for secure online voting systems are analyzed. Techniques like password hashed-based schemes, visual cryptography, and threshold decryption cryptosystem are highlighted for secure online voting systems. Visual cryptography (VC) is a technique where visual information can be encrypted on the user side, with the information decrypted on the admin side, which can be helpful in allowing participation in voting systems securely and ensuring fast vote counting and monitoring of the voting process to achieve high accuracy while being scam-free. The proposed secure online voting system using visual cryptography is efficiently developed using Python and achieves better performance on minimum software and hardware configuration systems.
SA Alsuhibany. Developing a visual cryptography tool for Arabic text. IEEE Access 2019; 7, 76573-9.
PS Archana and O Ambily. Visual cryptography in internet voting for extended security. Int. J. Eng. Res. Gen. Sci. 2016; 4, 365-8.
AG Bhosale and VS Patil. A (2, 2) visual cryptography technique with improved contrast. Inform. Secur. J. Global Perspective 2020; 29, 199-208.
T Chakraborty, S Ghosh, T Ghosh, C Mizan and S Karmakar. (3, 3) Visual cryptography for online certificate authentication. Int. J. Eng. Adv. Tech. 2020; 9, 152-6.
IDC Challener. United States patent. Geothermics 1985; 14, 595-9.
NM Chayal and NP Patel. Review of machine learning and data mining methods to predict different cyberattacks. In: K Kotecha, V Piuri, H Shah and R Patel (Eds.). Data science and intelligent applications. Lecture notes on data engineering and communications technologies. Springer, Singapore, 2021, p. 43-51.
PL Chiu and KH Lee. Threshold visual cryptography schemes with tagged shares. IEEE Access 2020; 8, 111330-46.
K Fisher, R Carback and AT Sherman. Punchscan: Introduction and system definition of a high-integrity election system. In: Proceedings of the 6th Workshop on Privacy Enhancing Technologies, Cambridge, UK. 2006.
Y Guo, X Jia, Q Chu and D Wang. A novel XOR-based threshold visual cryptography with adjustable pixel expansion. Appl. Sci. 2020; 10, 1321.
K Gurunathan and SP Rajagopalan. A stegano - visual cryptography technique for multimedia security. Multimed. Tool. Appl. 2020; 79, 3893-911.
D Hutchison and JC Mitchell. Lecture notes in computer science. Vol. 15-L-systems: Edited by G. Goos and J. Hartmanis. Springer Verlag, Berlin, 1976. vi + 338 pp. Lecture Notes Comput. Sci. 1978; 9, 242.
DR Ibrahim, JS The and R Abdullah. Multifactor authentication system based on color visual cryptography, facial recognition, and dragonfly optimization. Inform. Secur. J. Global Perspective 2021; 30, 149-59.
P Jadhav, M Pawar, P Ahire, V Kumar and PJB Kulkarni. Online polling system using extended visual cryptography. Int. J. Eng. Comput. Sci. 2015; 4, 12340-4.
B Jagadeesh and KLSP Reddy. Image security using digital image watermarking and visual cryptography techniques. Int. J. Innovat. Tech. Explor. Eng. 2020; 9, 2386-91.
Jaya, S Malik, A Aggarwal and A Sardana. Novel authentication system using visual cryptography. In: Proceedings of the 2011 World Congress on Information and Communication Technologies, Mumbai, India. 2011, p. 1181-6.
S Jiao, J Feng, Y Gao, T Lei and X Yuan. Visual cryptography in single-pixel imaging. Optic. Express 2019; 28, 7301-13.
GR Kadambi, PB Kumar and V Palade. Lecture Notes in Electrical Engineering 649 Emerging Trends in Photonics, Signal Processing and Communication Engineering Proceedings of ICPSPCT 2018. Springer, Singapore, 2020.
A Kamdi, M Kamble, V Tayade, J Dharne and RN Verma. A novel approach for online voting system using visual cryptography and face detection. Int. J. Adv. Electron. Comput. Sci. 2017; 4, 63-6.
N Kate and JV Katti. Security of remote voting system based on visual cryptography and SHA. In: Proceedings of the 2nd International Conference on Computing, Communication, Control and Automation, Pune, India. 2016.
T Kohno, A Stubblefield, AD Rubin and DS Wallach. Analysis of an electronic voting system. In: Proceedings of the IEEE Symposium on Security and Privacy, Berkeley, California. 2004, p. 27-40.
R Krimmer and M Volkamer. EVOTE2014. In: Proceedings of the 6th International Conference on Electronic Voting, Bregenz, Austria. 2014.
P Li, J Ma and Q Ma. (t, k, n) XOR-based visual cryptography scheme with essential shadows. J. Vis. Comm. Image Represent. 2020; 72, 102911.
P Li, J Ma, L Yin and Q Ma. A construction method of (2, 3) visual cryptography scheme. IEEE Access 2020; 8, 32840-9.
P Li, L Yin and J Ma. Visual cryptography scheme with essential participants. Mathematics 2020; 8, 838.
A Makwe and AS Rathore. An empirical study of neural network hyperparameters. In: V Bhateja, SL Peng, SC Satapathy and YD Zhang (Eds.). Advances in intelligent systems and computing. Springer, Singapore, 2021.
SH Masood and S Riza. Trends in selective laser sintering in biomedical engineering. Int. J. Emerg. Trends Eng. Res. 2020; 8, 54-9.
M Melkemi and K Hammoudi. Voronoi-based image representation applied to binary visual cryptography. Signal Process. Image Comm. 2020; 87, 115913.
OO Mikail, OT Arulogun, EO Omidiora and O Okediran. A survey of cryptographic and stegano-cryptographic models for secure electronic voting system. Covenant J. Inform. Comm. Tech. 2013; 1, 54-78.
MFM Mursi, GMR Assassa, A Abdelhafez and KAM Samra. On the development of electronic voting: A survey. Int. J. Comput. Appl. 2013; 61, 1-11.
PS Naidu, R Kharat, R Tekade, P Mendhe and V Magade. E-voting system using visual cryptography & secure multi-party computation. In: Proceedings of the 2nd International Conference on Computing, Communication, Control and Automation, Pune, India. 2016.
RR Nelli, R Mehra, P Madri, S Monica and J Rajeshwari. Anti-phishing I-voting system using visual cryptography. Int. J. Adv. Res. Comput. Comm. Eng. 2017; 6, 113-9.
PK Patidar, R Kushwah and T Chaudhari. Online voting system using visual cryptography and face detection: A survey. Int. J. Res. Appl. Sci. Eng. Tech. 2017; 5, 633-5.
SD Purohit, DS Jat, RC Poonia, S Kumar and S Hiranwal. In: Proceedings of the International Conference on Communication and Computational Technologies. Springer, Singapore, 2021.
HR Pralhad, GV Shivaji, PR Anil, CS Pritamchand and AM Jagtap. Internet voting system using visual cryptography. Int. J. Sci. Res. Develop. 2016; 4, 2022-4.
AB Rajendra and HS Sheshadri. Visual cryptography in internet voting system. In: Proceedings of the 3rd International Conference on Innovative Computing Technology, London, United Kingdom. 2013, p. 60-4.
RM Holla and D Suma. Pipelined parallel rotational visual cryptography (PPRVC). In: Proceedings of the International Conference on Communication and Signal Processing, Chennai, India. 2019, p. 109-13.
L Rura, B Issac and MK Haldar. Implementation and evaluation of steganography based online voting system. Int. J. Electron. Govern. Res. 2016; 12, 71-93.
L Rura, B Issac and MK Haldar. Online voting verification with cryptography and steganography approaches. In: Proceedings of International Conference on Computer Science and Network Technology, Harbin, China. 2011, p. 125-9.
L Rura, B Issac and MK Haldar. Online voting system based on image steganography and visual cryptography. J. Comput. Inform. Tech. 2017; 25, 47-61.
MN Anusha and BK Srinivas. Remote voting system for corporate companies using visual cryptography. Int. J. Adv. Res. Comput. Sci. Software Eng. 2012; 2, 250-4.
GS Mary and SM Kumar. Secure grayscale image communication using significant visual cryptography scheme in real time applications. Multimed. Tool. Appl. 2020; 79, 10363-82.
SK Singh, M Yadav, A Chaudhary and U Singhal. Verifiable color progressive visual cryptography with cheating detection. In: Proceedings of the International Conference on Communication and Computational Technologies Algorithms for Intelligent Systems. Springer, Singapore, 2021, p. 535-45.
J Tripathi, A Saini, Kishan, Nikhil and Shazad. Enhanced visual cryptography: An augmented model for image security. Proc. Comput. Sci. 2020; 167, 323-33.
X Wu and CN Yang. Probabilistic color visual cryptography schemes for black and white secret images. J. Vis. Comm. Image Represent. 2020; 70, 102793.
X Yan, F Liu, WQ Yan and Y Lu. Applying visual cryptography to enhance text captchas. Mathematics 2020; 8, 332.
T Zhao and Y Chi. Hierarchical visual cryptography for multisecret images based on a modified phase retrieval algorithm. Multimed. Tool. Appl. 2020; 79, 12165-81.
How to Cite
Copyright (c) 2021 Walailak University
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.