09-02-2013, 12:23 PM
Highly Secure Online Voting System with Multi Security using Biometric and Steganography
Biometric and Steganography.pdf (Size: 575.01 KB / Downloads: 111)
ABSTRACT
In this paper an online voting system is proposed with secure user authentication by providing biometric as well as password security to voter accounts. The basic idea is to merge the secret key with the cover image on the basis of core image. The result of this process produces a stego image which looks quite similar to the cover image. The core image is a biometric measure, such as a fingerprint image. The stego image is extracted at the server side to perform the voter authentication function. This system greatly reduces the risks as the hackers have to find both the secret key and template which makes the election procedure to be secure and robust against a variety of fraudulent behaviors.
INTRODUCTION
It has always been an arduous task for the election commission to conduct free and fair polls in our country, the largest democracy in the world. Crores of rupees have been spent on this to make sure that the elections are riot free. The most important aspect of the democracy is the ability of the people to choose their ruler by vote. Integrity of the election process will determine the integrity of democracy itself. So the election system must be secure and robust against a variety of fraudulent behaviors, should be transparent and comprehensible that voters and candidates can accept the results of an election. A voting system must be usable by the entire voting population, regardless of age, infirmity or disability.
Electronic Voting Machines ("EVM") are being used in Indian General and State Elections to implement electronic voting in place of ballot papers and boxes which were used earlier in conventional voting system. It may be vulnerable to fraudulent activities like impersonation of voters, booth capturing and so on.
RELATED WORK
Subba Rao et al., [1] proposed a steganography technique that is based on randomizing the sequence of cipher bits. Advantage of this technique is there is no one-to-one mapping between a given cipher text and an image.
Constantinos Patsakis and Evangelos Fountas [2] proposed Fibonacci LSB Data Hiding Technique to more integer bases. In this work, a new embedding method, which generalizes the idea of Fibonacci decomposition, enabling more data to be embedded in an image with good statistical properties was presented.
Namita Tiwari and Dr.Madhu Shandilya [3] evaluated the LSB based Methods of Image Steganography on GIF File Format. This paper focused on hiding the message in the least significant bits of the colors of the pixels of a GIF image.
Hanan Mahmoud Hanan et al., [4] proposed a Novel Technique for Steganography in Fingerprints Images. This paper describes the design and implementations of a project concerning the hiding of messages in images specifically fingerprint images. The policy of this project is to keep the confidential messages hidden inside the drawing of the fingerprints.
Sanjay Saini and Dr. Joydip Dhar [5] proposed an eavesdropping proof secure online voting model. In this paper an online voting framework was formulated which ensures that the voter is able to vote in a public environment without his vote being eavesdropped on by a neighbor.
PROPOSED METHODOLOGY
Using the proposed system voting can be done through internet with the concept of Steganography and biometrics. User PIN and the secret key are transmitted to the server securely using Steganography. Steganography is the idea of hiding private or sensitive data within something that appears to be nothing out of the normal. If a person views the digital object, he or she will have no idea that there is any hidden information, and therefore the person will not attempt to decrypt the information. The general model of Steganography says if you want to send some secret message then choose a cover image, find its redundant bits and replace these bits with data bits of the message. The message can be easily extracted by doing some operations on the other end.
Least significant bit insertion is a common approach to embed information in a cover file. This process overwrites the LSB of a pixel value with a message bit. If we choose a 24-bit image as cover, we can easily store 3 bits in each pixel. Human eye will not be able to find the difference in any case. Unfortunately, this process of LSB modification changes the statistical properties of the cover image, so eavesdroppers can detect the distortions in the resulting stego image. This is quite viable that we can’t embed anybody’s personal information in this manner. So, what we can do is that, we can encrypt the message before embedding, or we can perform steganography providing strong encryption at the same time.