Proceedings ArticleDOI
(2,2) Visual Cryptography Based Biometric Authentication Mechanism for Online Elections
Sneha Annappanavar,Pallavi Chavan +1 more
- pp 1-6
TLDR
This paper proposes the very first step towards new way of voting that is voter authentication using fingerprint matching which can be considered as one of the key steps towards voter authentication along with visual cryptography.Abstract:
Voting is a process of choosing leader who we trust and will work for our benefit. The process of choosing the leader is currently through EVM having the facts to be considered like Voter Authentication, Security of vote casted and Vote anonymity along with Vote verification. The very first thing which requires to improve is moving from EVM voting to Secure Electronic Voting where digitization plays an important role in providing the access to vote from anywhere which meets the current need for keeping us updated with technology and serving the citizens with the advanced Technology. Keeping Electronic voting in mind here we propose the very first step towards new way of voting that is voter authentication. Using visual cryptography schemes, we can here implement the voter authentication mechanism using fingerprint matching. Fingerprint matching is one of the biometric which can be considered as one of the key steps towards voter authentication along with visual cryptography.read more
References
More filters
Book ChapterDOI
Secret-sharing schemes: a survey
TL;DR: This survey describes the most important constructions of secret-sharing schemes and explains the connections between secret- sharing schemes and monotone formulae and monOTone span programs, and presents the known lower bounds on the share size.
Proceedings ArticleDOI
A Novel Visual Cryptography Scheme
Debasish Jena,Sanjay Kumar Jena +1 more
TL;DR: This work proposes a Data hiding in halftone images using conjugate ordered dithering (DHCOD) algorithm which is a modified version of Data hide in halften images using Conjugate error diffusion technique (D HCED).
Journal ArticleDOI
A review on performance,security and various biometric template protection schemes for biometric authentication systems
Arpita Sarkar,Binod Kumar Singh +1 more
TL;DR: This review paper reflects the limitations of various biometric template protection methods being used in present times and highlights the scope of future work.
Journal ArticleDOI
Bio-AKA: An efficient fingerprint based two factor user authentication and key agreement scheme
TL;DR: The scheme proposed in the paper can protect user’s anonymity without the use of password and allow mutual authentication with key agreement and can be an ideal candidate for real life applications that requires remote user authentication.
Book ChapterDOI
Developing Visual Cryptography for Authentication on Smartphones
TL;DR: This paper develops VCS for continuous-tone images (gray-scale images and color images) that can enhance the image quality of VCS, so that feasible authentication schemes for smartphones will be achieved by using this continuous- Tone VCS.