Online voting verification with cryptography and steganography approaches

Hdl Handle:
http://hdl.handle.net/10149/249876
Title:
Online voting verification with cryptography and steganography approaches
Book Title:
Proceedings of IEEE International Conference on Computer Science and Network Technology 2011 (ICCSNT 2011)
Authors:
Rura, L. (Lauretha); Issac, B. (Biju); Haldar, M. K. (Manas)
Affiliation:
Swinburne University of Technology
Citation:
Rura, L., Issac, B. and Haldar M. K. (2011) 'Analysis of image steganography techniques in secure online voting', Proceedings of IEEE International Conference on Computer Science and Network Technology 2011 (ICCSNT 2011), pp.120-124.
Publisher:
IEEE
Conference:
IEEE International Conference on Computer Science and Network Technology 2011 (ICCSNT 2011), Harbin, China, 24-26 December 2011.
Issue Date:
2011
URI:
http://hdl.handle.net/10149/249876
DOI:
10.1109/ICCSNT.2011.6181923
Additional Links:
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6181923
Abstract:
Good electronic voting system is developed to cater to the user's demand to have an efficient, reliable and secure system. Online voting system should not be a black box to the users. It should be able to assure them that their vote is casted, collected and counted respectively without enabling vote coercion or vote buying. In this paper, we are proposing a combination of both cryptography and steganography approach in online voting's vote verification design.
Type:
Meetings and Proceedings
Language:
en
Keywords:
end-to-end; cryptography; electronic voting; image steganography; verification
ISBN:
9781457715846
Citation Count:
0 [Scopus, 23/10/2012]

Full metadata record

DC FieldValue Language
dc.contributor.authorRura, L. (Lauretha)en_GB
dc.contributor.authorIssac, B. (Biju)en_GB
dc.contributor.authorHaldar, M. K. (Manas)en_GB
dc.date.accessioned2012-10-23T11:14:56Z-
dc.date.available2012-10-23T11:14:56Z-
dc.date.issued2011-
dc.identifier.isbn9781457715846-
dc.identifier.doi10.1109/ICCSNT.2011.6181923-
dc.identifier.urihttp://hdl.handle.net/10149/249876-
dc.description.abstractGood electronic voting system is developed to cater to the user's demand to have an efficient, reliable and secure system. Online voting system should not be a black box to the users. It should be able to assure them that their vote is casted, collected and counted respectively without enabling vote coercion or vote buying. In this paper, we are proposing a combination of both cryptography and steganography approach in online voting's vote verification design.en_GB
dc.language.isoenen
dc.publisherIEEEen_GB
dc.relation.urlhttp://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6181923en_GB
dc.subjectend-to-enden_GB
dc.subjectcryptographyen_GB
dc.subjectelectronic votingen_GB
dc.subjectimage steganographyen_GB
dc.subjectverificationen_GB
dc.titleOnline voting verification with cryptography and steganography approachesen
dc.typeMeetings and Proceedingsen
dc.contributor.departmentSwinburne University of Technologyen_GB
dc.title.bookProceedings of IEEE International Conference on Computer Science and Network Technology 2011 (ICCSNT 2011)en_GB
dc.identifier.conferenceIEEE International Conference on Computer Science and Network Technology 2011 (ICCSNT 2011), Harbin, China, 24-26 December 2011.en_GB
ref.citationcount0 [Scopus, 23/10/2012]en_GB
or.citation.harvardRura, L., Issac, B. and Haldar M. K. (2011) 'Analysis of image steganography techniques in secure online voting', Proceedings of IEEE International Conference on Computer Science and Network Technology 2011 (ICCSNT 2011), pp.120-124.en_GB
All Items in TeesRep are protected by copyright, with all rights reserved, unless otherwise indicated.