International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 134 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 5, May 2016


Stegano-Cryptographic Technique for Online Polling System

Monalisa Hati [3]


Abstract: Election establishes democracy in the country. This process should be ensured to maintain integrity and confidentiality of the votes casted. Jamshedpur is a busy Industrial city where each and every person is on work. Now a days only few people go for voting because of their tight schedule. Everyone has to go to voting center, They have to stand in a long queue, many may be tired because of their tight schedule. Some people do not get even leave for voting from their work places. So we have developed online voting system Visual cryptography aims in automating the voting process so that the user can vote from his/ her home, office or anywhere without any geographical restriction. Visual cryptography and steganography is used to ensure secrecy of ballots. Visual Cryptography is a special type of encryption technique which is used to hide the information and data in images. In this technique the decryption process is done without any complex cryptographic computation. The encrypted data is decrypted using Human Visual System (HVS). The encryption technique requires a cryptographic computation to divide the image into a number of shares. Decryption can be done by someone without the knowledge of cryptography and does not require any decryption algorithm. Here we are dividing original image into two shares which are stored in separate database. Whenever these two shares are stacked with each other we get the original image. Once we get the original image it can be used as password. This system is very useful and safe for online remote voting. If this technology will be implemented in the busy city like Jamshedpur, it will save time, money, many more citizens can vote and voting process will be confidential and secret, it can not be intruded by the protesters. Steganography, Cryptography, Anti-Phishing


Keywords: Steganography, Cryptography, Anti-Phishing


Edition: Volume 5 Issue 5, May 2016,


Pages: 278 - 281


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Monalisa Hati, "Stegano-Cryptographic Technique for Online Polling System", International Journal of Science and Research (IJSR), Volume 5 Issue 5, May 2016, pp. 278-281, https://www.ijsr.net/get_abstract.php?paper_id=NOV163267

Similar Articles with Keyword 'Steganography'

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 5, May 2022

Pages: 885 - 888

Image Based Steganography

Bheeshma Rao J | Ujwal Sai Satya Jorige | Sai Praneetha Katragadda | Pradeep Kumar .V

Share this Article

Downloads: 101

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1526 - 1530

A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention

Anju Mohan [2]

Share this Article
Top