Authentication for Online Voting Using Steganography and Biometrics 

Abstract

In this paper an online voting authentication technique is proposed which provides biometric as well as password security to voter accounts. Voters are first identified by their facial image by using PCA. Second step is the fingerprint recognition. Third one is steganographic method. The basic idea of strganographic method is to merge the secret key and pin number with the cover image which produces a stego image which looks same as the cover image. The cover image is a biometric measure, such as a fingerprint image. The secret key and pin number is extracted from the stego image at the server side to perform the voter authentication function. This system greatly reduces the risks as the hackers have to find the secret key, pin number, fingerprint and facial image, which makes the election procedure to be secure against a variety of fraudulent behaviors. SHA 256 used for hashing is replaced with MD5 in order to improve the speed  

Authors and Affiliations

Linu Paul , Anilkumar M. N

Keywords

Related Articles

Association Rule Mining using Apriori Algorithm: A Survey 

— Association rule mining is the most important technique in the field of data mining. Association rule mining finding frequent patterns, associations, correlations, or causal structures among sets of items or obje...

Calculation of Transient Overvoltages by using EMTP software in a 2-Phase 132KV GIS  

VFTO of a 132 kV gas insulated substation have been calculation by using EMTP 2.4 version software. This paper is focused on simulation options of the transient connection GISoverhead line in simulation software. Howe...

lant Recognition through Leaf Features Mapping 

There are thousands of plants around us and they are useful in many ways, but in day today life we are so busy that we can’t even recognize few important ones e.g. everyone loves mango, lemon is a well known fruits...

Gabor Filter, PCA and SVM Based Breast Tissue Analysis and Classification  

Early signs of breast cancer are revealed in Mammographic images. This experiment focuses towards the identification of relevant, representative and more important, discriminate image features for analysis of medic...

Preserving Privacy Using Data Perturbation in Data Stream

Data stream can be conceived as a continuous and changing sequence of data that continuously arrive at a system to store or process. Examples of data streams include computer network traffic, phone conversations, web sea...

Download PDF file
  • EP ID EP87791
  • DOI -
  • Views 123
  • Downloads 0

How To Cite

Linu Paul, Anilkumar M. N (2012). Authentication for Online Voting Using Steganography and Biometrics . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 1(10), 26-32. https://europub.co.uk/articles/-A-87791