Title: Implementing generic security requirements in e-voting using modified stegano-cryptographic approach

Authors: Olayemi M. Olaniyi; Oladiran T. Arulogun; Oluwasayo E. Omidiora; Oladotun O. Okediran

Addresses: Department of Computer Engineering, Federal University of Technology, P. M. B. 65, Minna, Niger-state, Nigeria ' Department of Computer Science and Engineering, Ladoke Akintola University of Technology, P. M. B. 4000, Ogbomoso, Oyo State, Nigeria ' Department of Computer Science and Engineering, Ladoke Akintola University of Technology, P. M. B. 4000, Ogbomoso, Oyo State, Nigeria ' Department of Computer Science and Engineering, Ladoke Akintola University of Technology, P. M. B. 4000, Ogbomoso, Oyo State, Nigeria

Abstract: Various information hiding techniques based on steganography, cryptography, and watermarking have been formulated in literatures to secure e-democratic decision making. The existing stegano-cryptographic models for secure e-voting are vulnerable to attacks and thus, can be manipulated by an eavesdropper. In this paper, we present an imperceptible stegano-cryptographic model for securing generic security requirements of e-voting systems. The purpose is to model a secure e-electronic voting capable of delivering credible, fair and transparent future e-democratic decision making in developing countries like Nigeria. The model was implemented on our framework for secure e-voting using Java programming language and Oracle database management system. The results of the study after qualitative performance evaluation of the model affirm that the model could serve as a platform for delivery of e-democratic decision making of high electoral integrity and political trustworthiness in developing countries with significant digital divides.

Keywords: e-voting; electronic voting; stego images; authentication; confidentiality; electoral integrity; political trustworthiness; developing countries; digital divide; verifiability; wavelets; RSA; ECC; security requirements; credible; fair; e-elections; electronic elections; e-democracy; electronic democracy; information hiding; steganography; cryptography; voting security.

DOI: 10.1504/IJICS.2015.069214

International Journal of Information and Computer Security, 2015 Vol.7 No.1, pp.64 - 90

Received: 12 Feb 2014
Accepted: 18 Nov 2014

Published online: 05 May 2015 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article