Remote Voting System Using Extended Visual Cryptography
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Information Technology | India | Volume 4 Issue 9, September 2015

Remote Voting System Using Extended Visual Cryptography

Tridib Chakraborty, Mizan Md Chowdhury

Establishing trust is one of the most important human-human and human-computer interactions. Authentication can be done using something we know (for example, a password), something we have (for example, a mechanical key), or something we are (a living, breathing human). These may be combined to provide stronger authentication. In this paper, we discuss some of the issues associated with Internet-based remote voting and argue that visual cryptography offers a promising way to provide both satisfactory authentication and secret ballot guarantees.

Keywords: Remote voting, Extended Visual Cryptography, Authentication

Edition: Volume 4 Issue 9, September 2015

Pages: 1458 - 1459

Share this Article

How to Cite this Article?

Tridib Chakraborty, Mizan Md Chowdhury, "Remote Voting System Using Extended Visual Cryptography", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB158341, Volume 4 Issue 9, September 2015, 1458 - 1459

67 PDF Views | 59 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Extended Visual Cryptography'

Research Paper, Information Technology, India, Volume 4 Issue 9, September 2015

Pages: 1458 - 1459

Remote Voting System Using Extended Visual Cryptography

Tridib Chakraborty, Mizan Md Chowdhury

Share this Article

Survey Paper, Information Technology, India, Volume 4 Issue 1, January 2015

Pages: 703 - 705

Survey on Visual Cryptography Schemes

Prajakta Nikam, Dr. Kishor Kinage

Share this Article

Similar Articles with Keyword 'Authentication'

Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1892 - 1895

Securing Data in Cloud Using Homomorphic Encryption

Honey Patel, Jasmin Jha

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 9, September 2015

Pages: 1458 - 1459

Remote Voting System Using Extended Visual Cryptography

Tridib Chakraborty, Mizan Md Chowdhury

Share this Article

Survey Paper, Information Technology, India, Volume 4 Issue 2, February 2015

Pages: 1307 - 1311

A Survey on Authentication Techniques and User Recognition

Vyanktesh Dorlikar, Anjali Chandavale

Share this Article

Research Paper, Information Technology, India, Volume 5 Issue 2, February 2016

Pages: 1470 - 1474

Role Based Encryption with Efficient Access Control in Cloud Storage

G. V. Bandewar, R. H. Borhade

Share this Article

Survey Paper, Information Technology, India, Volume 3 Issue 4, April 2014

Pages: 747 - 750

A Survey on Shoulder Surfing Resistant Text Based Graphical Password Schemes

Mokal P. H., Devikar R. N.

Share this Article
Top