Vous êtes sur la page 1sur 13

Authentication for Online Voting System using Steganography ,Cryptography and Biometric Security

Click to edit Master subtitle style

6/13/12

Contents
Introduction Project Scope
Steganography and Cryptography Unifying Model Authentication flow Creation of Cover Image Creation of Secret Message ISC embedding process ISC extracting process Conclusion
6/13/12

INTRODUCTION
In a voting system the system should meet the

following criteria:
Anonymity Tamper-resistant Human factors

The system targets the authentication

requirement of a voting system.


6/13/12

Project Scope provide with secret key Voter should register first & voter will
(password).
Authentication will be provided with combination of Steganography,

Cryptography & Biometric security.

Voter will be uniquely identified using biometric (finger print) security.

Security will be provided to the vote also.

6/13/12

Steganography and Cryptography


Steganography is the art and science of communicating in a way which

hides the existence of the communication

Cryptography is the science that changes plain text or words into

cipher text. This is a form of a code, which keeps data secure from nosy hackers.

6/13/12

Unifying Model

6/13/12

Authentication flow
Steps to be performed for logging into a voter account :

Creation of cover image

Creation of secret image Embedding process Extracting process

6/13/12

Cover Image Creation


The base image is a default image for the system, same for all.

Cover image is a simple inscription of personal identication number

over the base image.

6/13/12

Creation of Secret Message


The time-stamp (e.g. Date) delivers the security from replay attacks, so that the same stego-image can not be used again in future.

6/13/12

ISC embedding process

6/13/12

ISC extracting process

6/13/12

Once a particular voter is authenticated by the system, a secure channel

will be established using https and then he/she will be able to cast the vote.

The vote will remain secret in every sense, i.e. , it will not be reected

anywhere in the database that which user has voted for whom.

Finally, the account will be closed and that user will not be able to log

back in by any means again.

This completes the voting process.

The authentication mechanism makes use of both, biometric measures

as well as secret key.


6/13/12

Conclusion
The strength of our system resides in the

new concept of key image. We are also able to change the cover coefficients randomly. steganalytic tools of searching for a predictable set of modications.

This strategy does not give any chance to

6/13/12

Vous aimerez peut-être aussi