Escolar Documentos
Profissional Documentos
Cultura Documentos
ABSTRACT
With the help of Visual Cryptography (VC), the main aims of Internet Voting System (IVS) is to provide a service to casting of vote
for confidential and critical decisions of internal corporate. For allowing the vote casting from remote place which is anywhere, it
has the flexibility even when at workplace election process key stakeholders are not available. The provided features by the VC in
IVS this is enabled by implementing and leveraging. By applying appropriate security measures the election is held in full
confidentiality for allowing to the voter to vote for any candidate which is participated if and only if he logs into the system after the
correct password is entered which is generated using VC scheme after merging the two shares (White and Black dotted Images).
Where, the share 1 is send by Election officer (Administrator) to e-mail id of voter before the election and in the voting system the
share 2 will be available during election for his login. For casting his vote the secret password will get the voter after combining
share 1 as well as share 2 with the help of VC. The scheme for secret sharing is VC in which the image converted into shares. By
any share observation, there can be revealed no information. Only after mountain sufficient number of shares, there will be
revealed the Voter Password. Various types are available there in VC which are 2 out of 2, k out of n, n out of n, etc. In this system,
for an efficiently authenticate to the voting system there has been used the IVS with 2-out-of-2 VC. There is not possible to retrieve
the passwords other share even if there gets the one share of the password to the hacker, as it will be sent to the voter E-Mail Id.
Thus to the system of voting there provides two way securities by IVS, which is required very much.
Keywords: Internet Voting System (IVS), Visual Cryptography (VC), Shares, Voter Password, Visual secret sharing.
1. Introduction
For electing the Secretary, President and other members of board of corporate companies the elections are conducted. There
are many candidates are working on different locations so that it is difficult for them to vote form their location. There were
cast 69% vote through the mail general election in Washington State in general election. With the help of VS, this IVS
provides them good solutions also provide the security.
A. Internet Voting System
When Remote Internet voting refer by the Internet voting, where from a PC of voters to the server software there
communicates the client software over the Internet. However, for implementing the voting over the Internet at least three
other ways are there which are Kiosk, poll-site and Remote, voting. There has its own particular requirement of security for
each of these three ways. In remote voting system, the third party has control over the operating environment and voting
client. By election officials there may be installed the voting client in Kiosk voting, but there is out of election officials
control the voting environment. In Pollsite voting, there have the control of election officials over the operating
environment and voting client. Although for remote Internet voting there was especially designed Visual cryptography
system, depending on the requirements of security for poll-site or kiosk voting, nothing prevents it from being deployed.
There is also ability to carry out the large scale as well as small scale procedure using Visual cryptography system. Voting
through the Remote Internet be as secure as voting by mail is not unreasonable to ask. There was noted by authors that,
there may not be applicable the attacks which are in wide range to kiosk or poll-site Internet voting although there opens
itself the remote Internet voting, it reduces at least the insider attacks threat and in the election officials allows to be placed
the less trust.
Page 1
B. Visual Cryptography
For encrypting the written materials the VC is very much used. By the human visual system directly the decoding is done.
A secret image S (voter password) is encoded into n shadow images called shares, where each participant in P receives one
share, for a set P of n participants, all the participants share has to be place one over another to retrieve the image back then
the image is got.
The aim of VC in IVS is providing the voters a services for casting their vote for the elections which are conducted. Where
the elections are conducted by with help of the features that are provided by VC that are implemented in IVS They can vote
from any place without them coming to the place. Because the voter can only vote for the candidate the election will go on
with good security measures only if by entering the correct password that is got by merging the two shares he logs into his
login. For an efficient authentication voting system IVS with 2-out-of-2 VC. There is not possible to retrieve the passwords
other share even if there gets the one share of the password to the hacker, as it will be sent to the voter E-Mail Id. Thus to
the system of voting there provides two way securities by IVS, which is required very much.
Page 2
3. Proposed System
User session and Admin session are two session are consist by this system. There will be displayed the home page with the
following links which is one for the user session and the other for the admin session as soon as we run this system. The
system working is as shown in the Fig 1.
Page 3
voter, who can then use it to cast the desired vote an opportunistic voter could sell the transparency. It is unlikely that vote
selling can be prevented without identity-based authentication in the voting process. The election officials generating the
transparencies do not collaborate with the third party sending out voting packets assumes in our design. By requiring an
open process this property could be guaranteed.
4. Conclusion
In this system, there conduct the elections for different posts such as the presidential election, manager election etc. The
elections can be conducted effectively and easily in a proper manner by using this system which is based on internet voting
with the help of visual cryptography even though in different parts of the country or the world the branches of the
companies are situated, because by using this system the voter can vote from the place where he is working. For conducting
the elections in Country Vacations, Clubs like Country Club etc., this system will be very useful. It will be useful for
parliament elections as well as public elections. There is very effective the proposed online voting system and for
organization and voters in many ways it will be useful and it will reduce the cost and time. There offers many benefits
through Internet-based voting system including increased voter as well as low cost participation. There must consider
human factors and security carefully by voting systems, and there provide the surety that they provide voters with reliable as
well as intuitive indications of the validity of the voting process. For providing the mutual authentication for and election
servers as well as voters the proposed system uses visual cryptography.
References
[1] Adi Shamir (1979), How to share a Secret, Communications of the ACM, pp .612-613.
[2] M. Naor and A. Shamir (1995), Visual Cryptography, Advances in Cryptology-Eurocrypt 94 Proceeding, LNCSvol.
950, Springer-Verlag, pp. 1-12.
[3] Scott Wolchok, Eric Wustrow, Dawn Isabel, and J. Alex Halderman, (2012) Attacking the Washington, D.C.Internet
Voting System, In Proc. 16th Conference on Financial Cryptography & Data Security,pp .1-18
[4] Hussein Khalid Abd-alrazzq1, Mohammad S. Ibrahim2 and Omar Abdurrahman Dawood (2012), Secure Internet
Voting System based on Public Key Kerberos, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 2,
No 3, pp. 428-434.
[5] Adhikari Avishek and Bimol Roy (2007) Applications of Partially Balanced Incomplete Block Designs in Developing
(2, n) Visual Cryptographic Schemes. IEICE Trans. Fundamentals, Vol.E90A, No.5 ,pp. 949-951
[6] Marek R. Ogiela, Urszula Ogiela(2009) Linguistic Cryptographic Threshold Schemes, International Journal of
Future Generation Communication and Networking.Vol.2, No.1,pp. 33-40
[7] Carlo Blundo, University of Salerno, Alfredo De Santis and Douglas R Stinson (1998), On the contrast in visual
cryptography scheme.pp. 1-28
[8] Thomas Monoth, Babu Anto P (2009), Achieving optimal Contrast in Visual Cryptography schemes without pixel
expansion. International Journal of Recent Trends in Engineering, Vol 1, No 1, pp. 468-471.
[9] A B Rajendra and H S Sheshadri (2012), Study on Visual Secret Sharing Schemes Using Biometric Authentication
Techniques, AJCST, Vol 1, pp.157-160.
[10] Anusha MN and Srinivas B K (2012), Remote Voting System for Corporate Companies using Visual Cryptography,
vol. 2, pp. 250251.
[11] Pallavi V Chavan, Mohammad Atique, and Anjali R Mahajan, (2011) An Intelligent System for Secured
Authentication using Hierarchical Visual Cryptography-Review, ACCE Int J. on Network Security, vol. 02, No. 04.pp.
7-9
[12] Rajendra Basavegowda, Sheshadri Seenappa(2013) Electronic Medical Report Security Using Visual Secret Sharing
Scheme, IEEE UKSim 15th International Conference on Computer Modeling and Simulation Proceedings, pp, 78-83
Page 4