|Title: ||Online voting verification with cryptography and steganography approaches|
|Book Title: ||Proceedings of IEEE International Conference on Computer Science and Network Technology 2011 (ICCSNT 2011)|
|Affiliation: ||Swinburne University of Technology|
|Citation: ||Rura, L., Issac, B. and Haldar M. K. (2011) 'Analysis of image steganography techniques in secure online voting', Proceedings of IEEE International Conference on Computer Science and Network Technology 2011 (ICCSNT 2011), pp.120-124.|
|Conference: ||IEEE International Conference on Computer Science and Network Technology 2011 (ICCSNT 2011), Harbin, China, 24-26 December 2011.|
|Issue Date: ||2011 |
|Additional Links: ||http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6181923|
|Abstract: ||Good electronic voting system is developed to cater to the user's demand to have an efficient, reliable and secure system. Online voting system should not be a black box to the users. It should be able to assure them that their vote is casted, collected and counted respectively without enabling vote coercion or vote buying. In this paper, we are proposing a combination of both cryptography and steganography approach in online voting's vote verification design.|
|Type: ||Meetings and Proceedings|
|Citation Count: ||0 [Scopus, 23/10/2012]|
|Appears in Collections: ||Computer Science|
|Files in This Item:|
There are no files associated with this item.
All Items in TeesRep are protected by copyright, with all rights reserved, unless otherwise indicated.