Proceedings of 2011 International Conference on Computer Science and Network Technology 2011
DOI: 10.1109/iccsnt.2011.6181923
|View full text |Cite
|
Sign up to set email alerts
|

Online voting verification with cryptography and steganography approaches

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
3
1
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…Table 2 explains the algorithm used to acquire the connection of server and client. As per the algorithm, after successful connection establishment between the server and client [38], the required information is gathered from a user through a few questionnaires, as per the protocol of user registration. Thereafter, a visual image will be sent to the user for the next level of the process, as mentioned in the next algorithm.…”
Section: Proposed Algorithmmentioning
confidence: 99%
“…Table 2 explains the algorithm used to acquire the connection of server and client. As per the algorithm, after successful connection establishment between the server and client [38], the required information is gathered from a user through a few questionnaires, as per the protocol of user registration. Thereafter, a visual image will be sent to the user for the next level of the process, as mentioned in the next algorithm.…”
Section: Proposed Algorithmmentioning
confidence: 99%
“…The system must create a compatible source image containing the ballot for visual cryptography encryption by passing a secret message derived from the decrypted stego-image. Because of the visual cryptography encryption, half of the shares need to be obtained by the voters [27] - [28].…”
Section: Implementation Of the Voting Systemmentioning
confidence: 99%