scispace - formally typeset
Proceedings ArticleDOI

(2,2) Visual Cryptography Based Biometric Authentication Mechanism for Online Elections

Sneha Annappanavar, +1 more
- pp 1-6
TLDR
This paper proposes the very first step towards new way of voting that is voter authentication using fingerprint matching which can be considered as one of the key steps towards voter authentication along with visual cryptography.
Abstract
Voting is a process of choosing leader who we trust and will work for our benefit. The process of choosing the leader is currently through EVM having the facts to be considered like Voter Authentication, Security of vote casted and Vote anonymity along with Vote verification. The very first thing which requires to improve is moving from EVM voting to Secure Electronic Voting where digitization plays an important role in providing the access to vote from anywhere which meets the current need for keeping us updated with technology and serving the citizens with the advanced Technology. Keeping Electronic voting in mind here we propose the very first step towards new way of voting that is voter authentication. Using visual cryptography schemes, we can here implement the voter authentication mechanism using fingerprint matching. Fingerprint matching is one of the biometric which can be considered as one of the key steps towards voter authentication along with visual cryptography.

read more

Content maybe subject to copyright    Report

References
More filters
Book ChapterDOI

Secret-sharing schemes: a survey

TL;DR: This survey describes the most important constructions of secret-sharing schemes and explains the connections between secret- sharing schemes and monotone formulae and monOTone span programs, and presents the known lower bounds on the share size.
Proceedings ArticleDOI

A Novel Visual Cryptography Scheme

TL;DR: This work proposes a Data hiding in halftone images using conjugate ordered dithering (DHCOD) algorithm which is a modified version of Data hide in halften images using Conjugate error diffusion technique (D HCED).
Journal ArticleDOI

A review on performance,security and various biometric template protection schemes for biometric authentication systems

TL;DR: This review paper reflects the limitations of various biometric template protection methods being used in present times and highlights the scope of future work.
Journal ArticleDOI

Bio-AKA: An efficient fingerprint based two factor user authentication and key agreement scheme

TL;DR: The scheme proposed in the paper can protect user’s anonymity without the use of password and allow mutual authentication with key agreement and can be an ideal candidate for real life applications that requires remote user authentication.
Book ChapterDOI

Developing Visual Cryptography for Authentication on Smartphones

TL;DR: This paper develops VCS for continuous-tone images (gray-scale images and color images) that can enhance the image quality of VCS, so that feasible authentication schemes for smartphones will be achieved by using this continuous- Tone VCS.