scispace - formally typeset
Proceedings ArticleDOI

Avoiding Phishing Attack on Online Votig System Using Visual Cryptography

TLDR
An online voting system for Maharashtra Carrom Association where members can cast their vote with their computers, and laptops, and to maintain the security the method is using CAPTCHA code and Image Share technology.
Abstract
The main aim of using visual cryptography in voting system is to give provision for casting vote for internal decisions in an organization. It is flexible enough to cast vote from remote places. Election is a total confidential process and is held with maximum secrecy. Hence, we have proposed an online voting system for Maharashtra Carrom Association where members can cast their vote with their computers, and laptops. To maintain the security we are using CAPTCHA code and Image Share technology. The proposed method offers anonymity of voter identity, while keeping the votes private, and the election transparent and secure.

read more

Citations
More filters
Journal ArticleDOI

Avoiding Phishing Attacks in Online Voting System

TL;DR: This work wanted to build a system where the whole encryption and decryption of the ballots is transparent and nevertheless safe to ensure that the user utilizes a secure voting system.
Journal ArticleDOI

Preventing Phishing Attack on Voting System Using Visual Cryptography

TL;DR: In this paper , the authors discuss proposed phishing prevention methods and compare different proposed methods and compares different methods of voting system authentication. But, they do not discuss the security of the voting system itself.
Journal ArticleDOI

An efficient image cryptography mechanism based on the hybridization of standard encryption algorithms

TL;DR: The combination of RC4 and Blowfish algorithms with chaos mapping (RC4BC) has been presented for the image encryption and the results show that it is efficient in terms of MSE and PSNR values.
Journal ArticleDOI

An analytical survey on the role of image cryptography and related computational methods

TL;DR: A survey and analysis have been presented on the role of image cryptography and related computational methods in case of image data security and the areas of applicability and the gaps in the previous methods.
References
More filters
Journal Article

The Technical Feasibility and Security of E-Voting

TL;DR: An Electronic voting (E-voting) system is a voting system in which the election data is recorded, stored and processed primarily as digital information.
Related Papers (5)