2016
DOI: 10.5815/ijieeb.2016.05.02
|View full text |Cite
|
Sign up to set email alerts
|

Design of Secure Electronic Voting System Using Fingerprint Biometrics and CryptoWatermarking Approach

Abstract: The conventional voting scheme employs paper-based ballot to verify votes. This voting scheme is insecure due to the attributed shortcomings including ballot stuffing, ballot snatching and voter's impersonation. In this paper, we present the design and development of secure e-voting to ensure a free, fair and credible election where the preference of electorate counts. This proposed system solves the authentication, integrity and confidentiality security issues of e-voting in kiosk and poll site evoting scenar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
2
2

Relationship

0
10

Authors

Journals

citations
Cited by 15 publications
(11 citation statements)
references
References 5 publications
0
11
0
Order By: Relevance
“…Reference [20] developed an electronic voting system using fingerprint biometrics and crypto-watermarking approach. Researchers were motivated by the problems of unlawful voting and election results alteration.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Reference [20] developed an electronic voting system using fingerprint biometrics and crypto-watermarking approach. Researchers were motivated by the problems of unlawful voting and election results alteration.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Security remains a major issue of concern for every e-voting system. Therefore, a secured evoting system that uses fingerprint and crypto-watermarking was proposed [34]. Voters' authentication was carried using their fingerprints.…”
Section: Existing Solutions To Challenges Faced By Nigerian Evotinmentioning
confidence: 99%
“…Reference [10] used cryptographic wavelet watermarking technique to accomplish the confidentiality requirements of the electronic voting system. However, the technique exposed the sensitive message to attacks as fraudsters could easily guess the existence of the sensitive message.…”
Section: Related Workmentioning
confidence: 99%