Emerging Trends in Computer Science and Information Technology (ETCSIT2012) |
Foundation of Computer Science USA |
ETCSIT - Number 5 |
April 2012 |
Authors: Shobha Lokhande, Dipali Sawant, Nazaneen Sayyad, D. D. Pukale, Mamata Yengul |
63ee833c-0034-4dbd-a192-782a24de5c02 |
Shobha Lokhande, Dipali Sawant, Nazaneen Sayyad, D. D. Pukale, Mamata Yengul . E-Voting through Biometrics and Cryptography- Steganography Technique with conjunction of GSM Modem. Emerging Trends in Computer Science and Information Technology (ETCSIT2012). ETCSIT, 5 (April 2012), 38-42.
Biometric as well as Password security to voter accounts is provided using Cryptography and Stenography. For implementing this, cover image is used for Stenography and key is used for Cryptography. The basic concept is to merge the secret key with the cover image on the basis of key image which results a stego image, which looks quite similar to the cover image but not detectable by human eye. The key image is a Biometric measure, such as a fingerprint image. As the hackers have to find both secret key and the template so proper use of Cryptography provides security to the system. The main purpose of system is to provide proper authentication of voter for voting system.