Académique Documents
Professionnel Documents
Culture Documents
6/13/12
Contents
Introduction Project Scope
Steganography and Cryptography Unifying Model Authentication flow Creation of Cover Image Creation of Secret Message ISC embedding process ISC extracting process Conclusion
6/13/12
INTRODUCTION
In a voting system the system should meet the
following criteria:
Anonymity Tamper-resistant Human factors
Project Scope provide with secret key Voter should register first & voter will
(password).
Authentication will be provided with combination of Steganography,
6/13/12
cipher text. This is a form of a code, which keeps data secure from nosy hackers.
6/13/12
Unifying Model
6/13/12
Authentication flow
Steps to be performed for logging into a voter account :
6/13/12
6/13/12
6/13/12
6/13/12
6/13/12
will be established using https and then he/she will be able to cast the vote.
The vote will remain secret in every sense, i.e. , it will not be reected
anywhere in the database that which user has voted for whom.
Finally, the account will be closed and that user will not be able to log
Conclusion
The strength of our system resides in the
new concept of key image. We are also able to change the cover coefficients randomly. steganalytic tools of searching for a predictable set of modications.
6/13/12