Secure Online Voting Using Biometric Authentication and Public Key Encryption
This book discusses a secure internet voting protocol that addresses the vulnerabilities of internet voting systems to malware attacks. The proposed protocol utilizes a combination of QR codes, OTPs, and biometric authentication to ensure the integrity of the voting process. Biometric authentication is implemented through the use of fingerprint scans, which can be encrypted and processed either at the mobile device or on the server. To improve the efficiency of the encryption process, a wavelet-based AES algorithm is used. Additionally, a modified symmetric hash method is introduced to improve the security of the hashed fingerprint templates. This method involves the use of randomly selected hash functions and a secret key as a multiplication parameter to increase irreversibility and unlinkability. The proposed protocol is also equipped with a dynamic threshold matching method to address the potential loss of accuracy in the fingerprint matching process. Overall, the goal of this book is to present a secure and efficient internet voting protocol that is resistant to malware attacks.
1147299673
Secure Online Voting Using Biometric Authentication and Public Key Encryption
This book discusses a secure internet voting protocol that addresses the vulnerabilities of internet voting systems to malware attacks. The proposed protocol utilizes a combination of QR codes, OTPs, and biometric authentication to ensure the integrity of the voting process. Biometric authentication is implemented through the use of fingerprint scans, which can be encrypted and processed either at the mobile device or on the server. To improve the efficiency of the encryption process, a wavelet-based AES algorithm is used. Additionally, a modified symmetric hash method is introduced to improve the security of the hashed fingerprint templates. This method involves the use of randomly selected hash functions and a secret key as a multiplication parameter to increase irreversibility and unlinkability. The proposed protocol is also equipped with a dynamic threshold matching method to address the potential loss of accuracy in the fingerprint matching process. Overall, the goal of this book is to present a secure and efficient internet voting protocol that is resistant to malware attacks.
150.0 Pre Order
Secure Online Voting Using Biometric Authentication and Public Key Encryption

Secure Online Voting Using Biometric Authentication and Public Key Encryption

Secure Online Voting Using Biometric Authentication and Public Key Encryption

Secure Online Voting Using Biometric Authentication and Public Key Encryption

Hardcover

$150.00 
  • SHIP THIS ITEM
    Available for Pre-Order. This item will be released on October 24, 2025

Related collections and offers


Overview

This book discusses a secure internet voting protocol that addresses the vulnerabilities of internet voting systems to malware attacks. The proposed protocol utilizes a combination of QR codes, OTPs, and biometric authentication to ensure the integrity of the voting process. Biometric authentication is implemented through the use of fingerprint scans, which can be encrypted and processed either at the mobile device or on the server. To improve the efficiency of the encryption process, a wavelet-based AES algorithm is used. Additionally, a modified symmetric hash method is introduced to improve the security of the hashed fingerprint templates. This method involves the use of randomly selected hash functions and a secret key as a multiplication parameter to increase irreversibility and unlinkability. The proposed protocol is also equipped with a dynamic threshold matching method to address the potential loss of accuracy in the fingerprint matching process. Overall, the goal of this book is to present a secure and efficient internet voting protocol that is resistant to malware attacks.

Product Details

ISBN-13: 9781032559315
Publisher: CRC Press
Publication date: 10/24/2025
Pages: 216
Product dimensions: 6.12(w) x 9.19(h) x (d)

About the Author

Dr. Ajish S is working as an Assistant Professor in College of Engineering Perumon. He has more than 16 years of teaching experience. He has completed his Ph.D. in the field of Internet Voting under the guidance of Dr. K S Anil Kumar. He has completed his M-Tech in Computer Science with specialization in Information Security from College of Engineering Trivandrum. He has published more than 10 research papers (SCI and Scopus Indexed) in the field of Computer Science and Engineering. Dr. K S Anil Kumar is the Registrar of University of Kerala. He has more than 25 years of academic and administration experience. He has completed his Ph.D. in the field of Intrusion Detection Interference System from university of Kerala. He has published 6 books and 26 research publications in conference and journals.

Table of Contents

1. Introduction 1.1 Background 1.2 Internet Voting 2. Internet Voting in Different Countries 2.1 Internet Voting in Estonia 2.2 Norwegian E-Voting System 2.3 Swiss Post E-Voting Protocol 2.4 Comparison of Estonian, Swiss, and Norwegian Internet Voting 2.5 Conclusion 3. Internet Voting System with Modified Voting and Verification Protocol 3.1 Estonian Internet Voting and Verification Protocol. 3.2 Security Analysis of Estonian Internet Voting Protocol 3.3 Modified Internet Voting and Verification Protocol 3.4 Security Analysis of Modified Voting Protocol and Verification Protocol 3.5 Conclusion 4. Internet Voting Using QR Code and Biometric Authentication 4.1 Security Analysis of Internet Voting System 4.2 Issues of Internet Voting System 4.3 Internet Voting System using QR Code and Biometric Authentication 4.4 Result Analysis 4.5 Security Analysis of the Internet Voting System Using Biometric Authentication 4.6 Conclusion 5. Secure Mobile Internet System Using QR Code and Biometric Authentication 5.1 Introduction 5.2 Existing Methodologies 5.3 Secure Mobile Internet System Using QR Code and Biometric Authentication 5.4 Experimental Implementation 5.5 Security Analysis of AES and Wavelet-Based AES Encryption 5.6 Security Analysis of Mobile Internet Voting System 5.7 Conclusion 6. Security Enhancement of Symmetric Hashed Fingerprint Template 6.1 Introduction 6.2 Existing Methodologies 6.3 Calculation of TPR, TNR and Accuracy 6.4 Modified Symmetric Hash Function to Secure Fingerprint Template 6.5 Security Analysis 6.6 Performance analysis 6.7 Conclusion 7. Performance Enhancement of Symmetric Hashed Fingerprint Template 7.1 Introduction 7.2 Existing Methodologies 7.3 Fingerprint Minutiae Matching Algorithm with Dynamic Threshold Values 7.4 Result Analysis 7.5 Security Analysis 7.6 Conclusion 8. Iris Template Protection Using Double Bloom Filter Based Feature Transformation 8.1 Introduction 8.2 Existing Methodologies 8.3 Experimental Analysis of Morton Filter and Bloom Filter 8.4 Motivations and Contributions 8.5 Double Bloom Filter-Based Feature Transformation 8.6 Experimental Analysis of Double Bloom Filter Transformation 8.7 Security Analysis 8.8 Findings and Discussions 8.9 Conclusion 9. Secure Mobile Internet Banking System using QR code and Biometric Authentication 9.1 Introduction 9.2 Literature Review 9.3 Methodology 9.4 Implementation 9.5 Performance Analysis of Anomaly Detection with Precision-Recall Curves 9.6 Security Analysis 9.7 Discussion 9.9 Conclusion 10. Conclusion
From the B&N Reads Blog

Customer Reviews