Bio-Crystographic Technique for Secure Electronic Voting System

  • Olayemi Mikail Olaniyi Dept of Computer Engineering, Federal University of Technology,Minna
  • Oladiran Tayo Arulogun Ladoke Akintola University of Technology,Ogbomoso
  • Ayodele kazeem Kawonise Federal Polytechnic Ede,Osun State Nigeria
  • Taye Ajimati Dept of Computer Engineering, Federal University of Technology,Minna
Keywords: Confidentiality, Crystography, Electronic voting, Gabor Filter, Security, Steganography

Abstract

Democracy involves a system of governance where citizens are at liberty to actively participate in the nation’s decision-making process by means of election. However, elections in most developing countries characteristically involve rigging in form of ballot snatching, falsification of votes and votes’ manipulation during and after electoral processes. This can mar populace confidence in the entire electioneering process of democratic governance. This paper presents bio-crystographic technique for ensuring credibility during pre-electoral and post-electoral stages of an electioneering process. This integrated technique include: Gabor filter image enhancement scheme for biometric fingerprint trait for authenticating and validating valid voters and Lifting Wavelet Transform (LWT) based video Steganographic algorithm for ballot confidentiality, SHA 512/256 Hashing techniques for ballot integrity. Performance evaluation of these schemes resulted to an average peak signal to noise ratio of 66db. Also, the authentication scheme gives a false acceptance rate of 0.0001% and a false rejection rate of 0.1%. The results showed that the developed integrated schemes can effectively handle confidentiality, integrity and authentication issues in electronic voting systems in digitally divided electoral ecosystem.

Downloads

Download data is not yet available.

References

Abdulhamid, S. M., Adebayo, O. S., Ugiomoh, D. O., & AbdulMalik. M. D. (2013). The design and development of real-time e-voting system in Nigeria with emphasis on security and result veracity. International Journal of Computer Network and Information Security, 5(5): 9-18.

Abdulsalam, Y. S, Olaniyi O. M., & Ahmed A. (2017). Securing electronic health systems using enhanced transform domain image watermarking technique. Computing, Information Systems, Development Informatics & Allied Research Journal, 8(2): 103-118.

Aminu, F. E., Abdulmalik, A., & Zubairu, H. A. (2016). A framework for pre and post vote cast audit to enhanced electronic voting. International Conference on Information and Communication Technology and Its Applications, 28 – 30, Minna, Nigeria.

Aranuwa, F.O. & Oriola, O. (2012). Improved electoral fraud prevention mechanism for efficient.electronic voting. African Journal of Computing & ICT, 5(6): 70-77.

Dobraunig, C., Eichlseder, M., & Mendel, F. (2012). Analysis of SHA-512 / 224 and SHA-512 / 256. In: Iwata T., Cheon, J. (eds) Advances in Cryptology – ASIACRYPT 2015. Lecture Notes in Computer Science, 9453. Springer, Berlin, Heidelberg.

Enokela, J. A., & Osuagwu, C. C. (2011). An algorithm for the conduct of multiple simultaneous multi-party elections using a microcontroller. Pacific Journal of Science and Technology, 12(2): 253-259.

Gabriel, J. A., Alese, K. B., Adetumbi, A. O., & Adewale, O. S. (2013). Post-quantum crystography: a combination post-quantum cryptography and steganography. Proceedings of the IEEE 8th International Conference for Internet Technology and Secured Transactions, USA, 449-552.

Ibeh. N. (2015). Premium Times. Retrieved from http://www.premiumtimesng.com/news/top-news/179447-3-cardreaders-fail-to-accredit-jonathan.html (March, 2015)

Kumar, S., & Singh, M. (2012). Security enhancement of e-voting system, Global Journal of Computer Science and Technology, 12(5):1-7.

Mihir, H. R. (2012). Crystography-combination of cryptography and steganography with rapidly changing keys. International Journal of Emerging Technology and Advanced Engineering, 2(10): 329-332

Oke, B., Olaniyi, O. M., Aboaba, A. A., & Arulogun, O. T. (2017). Developing multifactor authentication technique for secure electronic voting system. In Misra, S. Matthews, V. O. & Adewumi, A. (Ed.), IEEE International Conference on Computing, Networking and Informatics, 48-53, Ota: Covenant University, Canaanland, Ota, Ogun State, Nigeria.

Okediran, O. O., & Ganiyu, A. A. (2015). Framework of electronic voting in Nigeria. International Journal of Computer Applications, 129(3):12-16

Olaniyi, O. M., Arulogun, O. T., Omidiora, E. O., & Adeoye O. (2013). Design of secure electronic voting system using multifactor authentication and cryptographic hash functions, International Journal of Computer and Information Technology, 2(6):1122-1130.

Olaniyi, O. M., Arulogun, O. T., Omidiora, E. O., & Okediran, O. O. (2014). Performance evaluation of modified stegano-cryptographic model for secured e-voting. International Journal of Multidisciplinary in Cryptology and Information Security, 3(1): 1-8.

Olaniyi, O. M., Arulogun, O. T., Omidiora, E. O., & Okediran, O. O. (2013). A Survey of cryptographic and stegano-cryptographic models for secure electronic voting system. Covenant Journal of Informatics & Communication Technology, 1(2): 54–78.

Olaniyi, O. M., Arulogun, O. T., Omotosho, A., & Onuh, O. V. (2017). Securing clinic tele-diagnostic system using enhanced tiny encrypted radio frequency identification and image steganographic technique, International Journal of Telemedicine and Clinical Practice, 2(3): 242–266.

Olaniyi, O. M., Folorunso, T. A., Abdullahi, A. M., & Abdulsalam. A. A. (2015). Design and development of secure electronic voting system using radio frequency identification and enhanced least significant bit audio steganographic technique, IOSR Journal of Computer Engineering,17(6): 86-97.

Olaniyi, O. M., Folorunso, T. A., Ahmed, A., & Joseph, O., (2016). Design of secure electronic voting system using fingerprint biometrics and crypto-watermarking approach. International Journal of Information Engineering and Electronic Business, 5, 9-17.

Osho, L, Abdullahi, M. B., & Osho, O. (2016). Framework for an e-voting system applicable in developing economies. International Journal of Information Engineering and Electronic Business, 8(6): 9-21.

Osho, O., Yisa, V. L., & Jebutu, O. J. (2015). E-voting in Nigeria: a survey of voters perception of security and other trust factors,in cyberspace (CYBER-Abuja), 2015 International Conference, 202–211.

Rura, L., Biju, I., & Haldar, M. K. (2017). Online voting system based on image steganography and visual cryptography. Journal of Computing and Information Technology, 25(1): 47-61.

Published
2018-12-20
How to Cite
Olaniyi, O. M., Arulogun, O. T., Kawonise, A. kazeem, & Ajimati, T. (2018). Bio-Crystographic Technique for Secure Electronic Voting System. Advances in Electrical and Telecommunication Engineering (AETE) ISSN: 2636-7416, 1(2), 55-64. Retrieved from https://sciengtexopen.org/index.php/aete/article/view/21
Section
Articles