“…Many models have been suggested and used but, unfortunately, a lot of vulnerabilities have been found in a comparative analysis of the most widely used e-voting approaches in [7]. Based on these vulnerabilities, a model was suggested in [8] that addresses them, but one of the most important issues still remains -secure data transfer from the storage server that keeps all the votes, to the counting server that should count them anonymously. Modern systems rely on physical copies of data and are transferred manually, which is a major security issue and, thus, the usage of steganography methods is explored for that step.…”