Você está na página 1de 4

IPASJ International Journal of Computer Science (IIJCS)

Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm


Email: editoriijcs@ipasj.org
ISSN 2321-5992

A Publisher for Research Motivation ........

Volume 3, Issue 10, October 2015

Visual Cryptography in Internet Voting System


Prasad Pawar1, Teju Pansare2, Jyoti Shinde3, Sachin Shinde4, Prashant Suryavanshi5
1

Parikrama College of Engineering, Savitribai Phule Pune University,


Maharashtra, India

Parikrama College of Engineering, Savitribai Phule Pune University,


Maharashtra, India

Parikrama College of Engineering, Savitribai Phule Pune University,


Maharashtra, India

Parikrama College of Engineering, Savitribai Phule Pune University,


Maharashtra, India

Parikrama College of Engineering, Savitribai Phule Pune University,


Maharashtra, India

ABSTRACT
With the help of Visual Cryptography (VC), the main aims of Internet Voting System (IVS) is to provide a service to casting of vote
for confidential and critical decisions of internal corporate. For allowing the vote casting from remote place which is anywhere, it
has the flexibility even when at workplace election process key stakeholders are not available. The provided features by the VC in
IVS this is enabled by implementing and leveraging. By applying appropriate security measures the election is held in full
confidentiality for allowing to the voter to vote for any candidate which is participated if and only if he logs into the system after the
correct password is entered which is generated using VC scheme after merging the two shares (White and Black dotted Images).
Where, the share 1 is send by Election officer (Administrator) to e-mail id of voter before the election and in the voting system the
share 2 will be available during election for his login. For casting his vote the secret password will get the voter after combining
share 1 as well as share 2 with the help of VC. The scheme for secret sharing is VC in which the image converted into shares. By
any share observation, there can be revealed no information. Only after mountain sufficient number of shares, there will be
revealed the Voter Password. Various types are available there in VC which are 2 out of 2, k out of n, n out of n, etc. In this system,
for an efficiently authenticate to the voting system there has been used the IVS with 2-out-of-2 VC. There is not possible to retrieve
the passwords other share even if there gets the one share of the password to the hacker, as it will be sent to the voter E-Mail Id.
Thus to the system of voting there provides two way securities by IVS, which is required very much.
Keywords: Internet Voting System (IVS), Visual Cryptography (VC), Shares, Voter Password, Visual secret sharing.

1. Introduction
For electing the Secretary, President and other members of board of corporate companies the elections are conducted. There
are many candidates are working on different locations so that it is difficult for them to vote form their location. There were
cast 69% vote through the mail general election in Washington State in general election. With the help of VS, this IVS
provides them good solutions also provide the security.
A. Internet Voting System
When Remote Internet voting refer by the Internet voting, where from a PC of voters to the server software there
communicates the client software over the Internet. However, for implementing the voting over the Internet at least three
other ways are there which are Kiosk, poll-site and Remote, voting. There has its own particular requirement of security for
each of these three ways. In remote voting system, the third party has control over the operating environment and voting
client. By election officials there may be installed the voting client in Kiosk voting, but there is out of election officials
control the voting environment. In Pollsite voting, there have the control of election officials over the operating
environment and voting client. Although for remote Internet voting there was especially designed Visual cryptography
system, depending on the requirements of security for poll-site or kiosk voting, nothing prevents it from being deployed.
There is also ability to carry out the large scale as well as small scale procedure using Visual cryptography system. Voting
through the Remote Internet be as secure as voting by mail is not unreasonable to ask. There was noted by authors that,
there may not be applicable the attacks which are in wide range to kiosk or poll-site Internet voting although there opens
itself the remote Internet voting, it reduces at least the insider attacks threat and in the election officials allows to be placed
the less trust.

Volume 3 Issue 10 October 2015

Page 1

IPASJ International Journal of Computer Science (IIJCS)


A Publisher for Research Motivation ........

Volume 3, Issue 10, October 2015

Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm


Email: editoriijcs@ipasj.org
ISSN 2321-5992

B. Visual Cryptography
For encrypting the written materials the VC is very much used. By the human visual system directly the decoding is done.
A secret image S (voter password) is encoded into n shadow images called shares, where each participant in P receives one
share, for a set P of n participants, all the participants share has to be place one over another to retrieve the image back then
the image is got.
The aim of VC in IVS is providing the voters a services for casting their vote for the elections which are conducted. Where
the elections are conducted by with help of the features that are provided by VC that are implemented in IVS They can vote
from any place without them coming to the place. Because the voter can only vote for the candidate the election will go on
with good security measures only if by entering the correct password that is got by merging the two shares he logs into his
login. For an efficient authentication voting system IVS with 2-out-of-2 VC. There is not possible to retrieve the passwords
other share even if there gets the one share of the password to the hacker, as it will be sent to the voter E-Mail Id. Thus to
the system of voting there provides two way securities by IVS, which is required very much.

2. Internet voting system with visual cryptography


There are number of visual cryptography schemes in existence. A selection are described below
A. 2 out of 2 Visual Cryptography Scheme
The secret image is divided into two shares in this type of visual cryptography scheme. This kind of visual cryptography is
very simple. With IVS this schemes applications found that for authentication purpose that uses 2 out of 2 Visual secret
sharing schemes. These two shares are required to be stacked together to reveal the original image. Figure 1 represents the
division of white as well as black and pixel in this scheme.

Figure 1. The pixel pattern for 2-out-of-2 vc


B. n out of k Visual Cryptography
Dividing a secret image into k number of shares allowed by this scheme. Then from any n number of shares among k the
secret image can be revealed. The user needs to maintain many shares which may result into loss of shares is the major
problem associated with this scheme. There required more memory consumption because of the more number of shares.
C. k out of k Visual Cryptography
Here original secret is divided into k number of shares and all k shares are necessary for reconstruction of the secret.
Because managing k number of shares is difficult task and it also increases time complexity so that this scheme is not so
popular.
D. Traditional voting systems
Voters authenticate themselves by providing identification or an affirmation to a trusted poll worker with traditional poll
site voting, by being at a well-publicized physical location and having officials representing several different organizations
present a poll site authenticates itself to a voter. Today, through absentee ballots that offer little security remote voting in
governmental elections is done, and to tabulate it is are slow and expensive, and remote voting is becoming increasingly
accepted and popular.
In the proposed system, by applying appropriate security measures election is held in full confidentiality to allow the voter
to vote for any participating candidate only if by entering the correct password which is generated by merging the two
shares using VC scheme, he logs into the system. Where, before election the share 1 sends by Administrator (Election
officer) to voter e-mail id and for his login during election the share 2 will be available in the voting system. To cast his
vote by combining share 1 and share 2 using VC Voter will get the secret password.

Volume 3 Issue 10 October 2015

Page 2

IPASJ International Journal of Computer Science (IIJCS)


A Publisher for Research Motivation ........

Volume 3, Issue 10, October 2015

Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm


Email: editoriijcs@ipasj.org
ISSN 2321-5992

3. Proposed System
User session and Admin session are two session are consist by this system. There will be displayed the home page with the
following links which is one for the user session and the other for the admin session as soon as we run this system. The
system working is as shown in the Fig 1.

Fig .1. System Architecture


The following links has to the home page admin: Details of User, Details of Election, Details of Candidate, and Details of
Image, Set the Password, Report of Election, Change the Password and Sign Out to the system. The user details in a grid
like having the headings as user id, user name, date of birth, cell number, address, email id etc. display with page when the
admin clicks the user details link It consists of a button called Add User when admin wants to add a new user he has to
press this button. Once admin has filled the relevant details he has to press command button by name register. It will check
for user id validation & other validations if all the validations pass, a new user will be inserted in m_user table. When
cancel is given the user is not deleted. The table used in this module is m_user. When the admin clicks the election details
link a page is displayed with the election details in a grid like having the headings as election date, election name, election
remarks, start time & end time. It consists of a button called Add Election Details when admin wants to add a new
election detail he has to press this button. It will check for validations & if all the validations are correct, a new election
detail will be inserted in m_election_master table. When admin presses OK button the election is deleted & admin will get
the message. When cancel is given the user is not deleted. The table used in this module is m_election_master. When the
admin clicks the candidate details link a page is displayed with the candidate details having the headings as candidate
image, election details, edit & delete. In the election details column there are some more fields like name, post name, age &
remarks. It consists of a button called Add Candidate Details when admin wants to add a new candidate detail he has to
press this button. It will check for validations & if all the validations are correct, a new candidate will be inserted in
m_election_candidate table. When cancel is given the candidate is not deleted. The table used in this module is
m_election_candidate. When the admin clicks the image details link a page is displayed with the image details in a table
like having the fields as image, image details &delete button. Under image details we have the word & the file name. It also
consists of a button called Add Image Details when admin wants to add a new Image; he has to press this button. Another
link is the set password link when this is clicked a window is displayed with two command buttons called Set Password &
Reset Password. After the completion of this process set password the share 1 image will be sent to users email id &
Click reset password button to reset the password to all the users. When the images are less than the user & we try to set the
images to the users then it displays a message showing that total images less than users or password set to all the users.
Before an election, to eligible voters the election officials need to generate and mail image transparencies. They need a
random number to generate them. The election officials generate n random voter passwords, where n is the number of
eligible voters. Using the result of Visual Cryptography a transparency is generated for each voter. In addition to the image,
the transparency includes the password in a human-readable and type able format. For password is yet to be generated Note
that there is no mapping between voter identities and the transparency they receive, and the corresponding screen image.
the election officials send the generated transparencies and an address list of eligible voters to a third party who sends each
eligible voter a randomly selected transparency along with a voter information packet including voting instructions After
the generation of transparencies,. We rely on the integrity of the E-mail as does absentee ballots. Anyone intercepting a
transparency in the mail could cast an extra vote, but for e-mail tampering to deter this there are already well-established
severe penalties. As with traditional absentee ballots, from selling their votes there is nothing to prevent voters. For another

Volume 3 Issue 10 October 2015

Page 3

IPASJ International Journal of Computer Science (IIJCS)


A Publisher for Research Motivation ........

Volume 3, Issue 10, October 2015

Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm


Email: editoriijcs@ipasj.org
ISSN 2321-5992

voter, who can then use it to cast the desired vote an opportunistic voter could sell the transparency. It is unlikely that vote
selling can be prevented without identity-based authentication in the voting process. The election officials generating the
transparencies do not collaborate with the third party sending out voting packets assumes in our design. By requiring an
open process this property could be guaranteed.

4. Conclusion
In this system, there conduct the elections for different posts such as the presidential election, manager election etc. The
elections can be conducted effectively and easily in a proper manner by using this system which is based on internet voting
with the help of visual cryptography even though in different parts of the country or the world the branches of the
companies are situated, because by using this system the voter can vote from the place where he is working. For conducting
the elections in Country Vacations, Clubs like Country Club etc., this system will be very useful. It will be useful for
parliament elections as well as public elections. There is very effective the proposed online voting system and for
organization and voters in many ways it will be useful and it will reduce the cost and time. There offers many benefits
through Internet-based voting system including increased voter as well as low cost participation. There must consider
human factors and security carefully by voting systems, and there provide the surety that they provide voters with reliable as
well as intuitive indications of the validity of the voting process. For providing the mutual authentication for and election
servers as well as voters the proposed system uses visual cryptography.

References
[1] Adi Shamir (1979), How to share a Secret, Communications of the ACM, pp .612-613.
[2] M. Naor and A. Shamir (1995), Visual Cryptography, Advances in Cryptology-Eurocrypt 94 Proceeding, LNCSvol.
950, Springer-Verlag, pp. 1-12.
[3] Scott Wolchok, Eric Wustrow, Dawn Isabel, and J. Alex Halderman, (2012) Attacking the Washington, D.C.Internet
Voting System, In Proc. 16th Conference on Financial Cryptography & Data Security,pp .1-18
[4] Hussein Khalid Abd-alrazzq1, Mohammad S. Ibrahim2 and Omar Abdurrahman Dawood (2012), Secure Internet
Voting System based on Public Key Kerberos, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 2,
No 3, pp. 428-434.
[5] Adhikari Avishek and Bimol Roy (2007) Applications of Partially Balanced Incomplete Block Designs in Developing
(2, n) Visual Cryptographic Schemes. IEICE Trans. Fundamentals, Vol.E90A, No.5 ,pp. 949-951
[6] Marek R. Ogiela, Urszula Ogiela(2009) Linguistic Cryptographic Threshold Schemes, International Journal of
Future Generation Communication and Networking.Vol.2, No.1,pp. 33-40
[7] Carlo Blundo, University of Salerno, Alfredo De Santis and Douglas R Stinson (1998), On the contrast in visual
cryptography scheme.pp. 1-28
[8] Thomas Monoth, Babu Anto P (2009), Achieving optimal Contrast in Visual Cryptography schemes without pixel
expansion. International Journal of Recent Trends in Engineering, Vol 1, No 1, pp. 468-471.
[9] A B Rajendra and H S Sheshadri (2012), Study on Visual Secret Sharing Schemes Using Biometric Authentication
Techniques, AJCST, Vol 1, pp.157-160.
[10] Anusha MN and Srinivas B K (2012), Remote Voting System for Corporate Companies using Visual Cryptography,
vol. 2, pp. 250251.
[11] Pallavi V Chavan, Mohammad Atique, and Anjali R Mahajan, (2011) An Intelligent System for Secured
Authentication using Hierarchical Visual Cryptography-Review, ACCE Int J. on Network Security, vol. 02, No. 04.pp.
7-9
[12] Rajendra Basavegowda, Sheshadri Seenappa(2013) Electronic Medical Report Security Using Visual Secret Sharing
Scheme, IEEE UKSim 15th International Conference on Computer Modeling and Simulation Proceedings, pp, 78-83

Volume 3 Issue 10 October 2015

Page 4

Você também pode gostar