Performance Assessment Of An Imperceptible And Robust Secured E-Voting Model
Olaniyi Olayemi M, Arulogun Oladiran T, Omidiora Elijah O, Okediran Oladotun O
Index Terms: Steganography, Information Systems Security, E-voting, Information hiding, Authentication, Confidentiality, Integrity, Verifiability, Cryptography
Abstract: In this paper, we present the performance assessment of an imperceptible and robust secured stegano-cryptographic model of electronic voting. The Performance analysis was achieved based on the degree to which the model meets the generic and functional requirements of secured e-voting system: authentication, integrity, confidentiality and verifiability as well as other functional security requirements of a secured voting using five-point psychometric analysis. The result of the quantitative evaluation of the model assert that the model possessed capacity to guarantee and validate voter’s for who they said they are, guarantees the integrity of elections, ensures privacy of the voters, guarantees the confidentiality of the vote and provide mechanism for fraud detection after the electioneering process in developing country where digital divide is significant.
. Alok K and Atul K (2011),”A Novel Approach for Secure Mobile-Voting using Biometrics in Conjunction with Elliptic Curve Crypto-Stegano Scheme” , International Journal of Technology And Engineering System(IJTES), Vol2.No1, pp8-11.
. Amer A and El-gendy H, ”Towards a Fraud prevention e-voting system”, International Journal of Advanced Computer Science and Applications,Vol.4 No.4,pp147-149,2013.
. Chaum D,(2004) ”Secret Ballot receipts:True voter verifiable elections”, IEEE Security and Privacy, Vol.2(1), pp38-47
. Chang C and Lee J (2006), “An Anonymous Voting mechanism based on the key exchange Protocol”, Elsevier Computer and Security Journal, Volume 25(4),pp 307-314.
. Cronbach, L.J. (1951), “Coefficient alpha and the internal structure of tests”, Psychometrika, Vol. 22 (3),pp 297-334
. Folorunso O, Ogunseye O. S,Okesola and Olaniyan (2010),Visualizing E-Voting results, Journal of Theoretical and Applied Information Technology,16(1),pp57-69
. Gunjal b.l and Mali s. n. (2012), “Secure e-voting System with Biometric and Wavelet based watermarking technique in ycgcb color space”, proceedings of iet international conference on information science and control engineering 2012 (icisce 2012), pp1-6
. Hinton, P., Brownlow, C., McMurvay, I., and Cozens, B. (2004). “SPSS explained” , East Sussex, England: Routledge Inc.
. John, N. S, Ayo, C K, Ndujuiba C, & Okereke C. E. 2013, Design and Implementation of a Unified e-ID Card for Secure Electronic Voting System (MUSES)” , International Journal of Computer and Information Technology (IJCIT), Vol.2 No 6,pp 1131-1135.
. Katiyar S, Meka K R, Barbuiya F A, and Nandi S (2011), “Online Voting System Powered by Biometric Security Using Steganography”, Proceedings of The Second International Conference on Emerging Applications of Information Technology, IEEE Computer Society, pp 288-291.
. Lee Y, Kim S and Won D(2008),”How to Trust DRE voting Machines Preserving Voter Privacy ”,IEEE International Conference on E-Business Engineering (ICEBE),pp302-307  Longe O.B, Roberts A.B.C, Onifade O.F.W, Kaka O and Isiaka R.M (2008a), “Framework for the development of a Hybrid Chaotic Image Scheme for Multimedia Data Encryption”, Third International Conference on ICT Applications, Application of ICT to Teaching, Research, and Administration (AICTTRA 2008), Volume III, pp150-154,21st -25th September 2011,ObafemiAwolowoUniversity,Ile-Ife, Osun State, Nigeria.
. Longe O.B, Boateng R, Dada E.G, Olaniyan and Olaseni O (2010), “Stegacrypt: A Reduced Least Significant Bit Insertion Rate Carrier for Transmitting Embedded Information”, The Journal of Computer Science and its Application: An International Journal of the Nigeria Computer Society (NCS),Vol.17 No1, pp1-12.
. Longe, O.B.(2011), “On the use of Image-based Spam Mails as Carriers for Covert Data Transmission”, Computing and Information Systems Journal, Vol. 15. Issue 1, pp1-5.
. Meng B (2009), “A Secure Internet Voting Protocol Based on Non Interactive Deniable Authentication Protocol and Proof protocol that two Cipher Texts areEncryption of the Same Text”, Journal Of Networks, Vol. 4(5), pp 370-377.
. Moayed, M.J., A. Abdul Ghani and R. Mahmod, "A survey on Cryptography Algorithms in Security of Voting System Approaches", International Conference on Computational Sciences and Its Applications(ICCSA), 2008, pp. 190 - 200
. Muhalim M A, Subariah I, Mazleena S and Mohd R k(2003), “Information Hiding Using Steganography”,Faculty of Computer System and Information System, Department of Computer Science Available at http://eprints.utm.my/4339/1/71847.pdf
. Olaniyi, O.M, O.T Arulogun, E.O. Omidiora, & Okediran O.O, “Performance Evaluation of modified Stegano-Cryptographic model for Secured E-Voting”, 2014, International Journal of Multidisciplinary in Cryptology and Information Security(IJMCIS),Vol.3 No.1,pp 1 -8.
. Olaniyi, O.M, O.T Arulogun, E.O. Omidiora, & Okediran O.O, “A Survey of Cryptographic and Stegano-Cryptographic Models for Secure Electronic Voting System”, 2013, Covenant Journal of Informatics and Communication Technology (CJICT),Vol. 1 No 2, pp 54-78.
. Olaniyi, O.M, O.T Arulogun, E.O. Omidiora, & Adeoye O Design of Secure Electronic Voting System Using Multifactor Authentication and Cryptographic Hash Functions” , 2013, International Journal of Computer and Information Technology (IJCIT),Vol.2 No 6,pp 1122- Olaniyi, O.M, O.T Arulogun, E.O, Omidiora, A Omotoso, Ogungbemi O.B. (2012), ” Design of A Secured Model For Electronic Voting System Using Stegano-Cryptographic Approach ”, Proceedings of the 7th International Conference on ICT Applications, Application of ICT to Teaching, Research, and Administration (AICTTRA 2012), National Defense College Abuja, pp 84-89.
. Rura L, Isaac B, and Haldar M K, (2011), “Secure Electronic Voting System Based on Image Steganography”, Proceedings of IEEE Conference on Open systems (ICOS2011), pp 80-85
. Si H and Li C(2005), “Maintaining Information Security in E-Government through Steganology” ,Available at URL: www.igi-global.com/chapter/encyclopedia-digital-government/11652.pdf
. Wang, X, Feng, D,Lai, X, and Yu H(2004). “Collisions for Hash Functions MD4, MD5,HAVAL-128 and RIPEMD”, Cryptology ePrint Archive, Report 2004/199.http://eprint.iacr.org/2004/199.pdf
. Yang M, Trifas M, FranciaG, Chen L(2009), ” Cryptographic and Steganographic approaches to Ensure Multimedia Information Security and Privacy”, International Journal of Information Security and Privacy, Vol.3(3), pp 37-54.