Secure Online Voting Using Biometric Authentication and Public Key Encryption

In an age of rapid technological advancements and digital transformation, the intersection of voting systems and biometric authentication stands as one of the most pressing areas for innovation and security. The transition from traditional paper ballots to electronic voting has been a subject of intense debate for years, with concerns over privacy, accuracy, and security often taking center stage. As we strive to make voting systems more accessible, efficient, and secure, the integration of biometric authentication offers a promising solution to some of these challenges.
This book provides a comprehensive exploration of the technologies, methodologies, and potential applications of biometric systems in internet voting. From understanding the different types of biometric data to examining the advantages and challenges of implementing such systems on a global scale, it lays out both the theoretical and practical aspects of building a secure online voting infrastructure. The exploration of cryptographic solutions and the legal and ethical implications of biometric data collection also form a critical part of the narrative.
Internet voting enables citizens to vote from anywhere with internet access, thereby overcome geographical barriers and encourage greater participation in the democratic process. With the added layer of biometric authentication, we can ensure that the process remains secure, transparent, and tamper-proof, creating a more trustworthy voting system for future generations.
However, as with any new technology, the adoption of internet voting with biometrics comes with its set of challenges. Privacy concerns, data protection regulations, the risk of cyberattacks, and the digital divide all require careful consideration and a thoughtful approach to ensure the success of such systems. This book addresses these concerns headon, providing a balanced view of the promises and pitfalls of this transformative technology.
As we venture into this brave new world of digital democracy, the insights offered in this book are invaluable for policymakers, technology developers, security experts, and anyone interested in the future of democratic participation. It is my hope that this work will spark meaningful discussions and inspire further research to refine and improve the systems that will shape the future of voting.
In conclusion, Internet Voting Using Biometric Authentication represents a significant step toward ensuring a more secure, efficient, and inclusive voting process. This book not only illuminates the technical possibilities but also explores the broader implications of this technology, offering a roadmap for the future of democratic elections in the digital age.

1147299673
Secure Online Voting Using Biometric Authentication and Public Key Encryption

In an age of rapid technological advancements and digital transformation, the intersection of voting systems and biometric authentication stands as one of the most pressing areas for innovation and security. The transition from traditional paper ballots to electronic voting has been a subject of intense debate for years, with concerns over privacy, accuracy, and security often taking center stage. As we strive to make voting systems more accessible, efficient, and secure, the integration of biometric authentication offers a promising solution to some of these challenges.
This book provides a comprehensive exploration of the technologies, methodologies, and potential applications of biometric systems in internet voting. From understanding the different types of biometric data to examining the advantages and challenges of implementing such systems on a global scale, it lays out both the theoretical and practical aspects of building a secure online voting infrastructure. The exploration of cryptographic solutions and the legal and ethical implications of biometric data collection also form a critical part of the narrative.
Internet voting enables citizens to vote from anywhere with internet access, thereby overcome geographical barriers and encourage greater participation in the democratic process. With the added layer of biometric authentication, we can ensure that the process remains secure, transparent, and tamper-proof, creating a more trustworthy voting system for future generations.
However, as with any new technology, the adoption of internet voting with biometrics comes with its set of challenges. Privacy concerns, data protection regulations, the risk of cyberattacks, and the digital divide all require careful consideration and a thoughtful approach to ensure the success of such systems. This book addresses these concerns headon, providing a balanced view of the promises and pitfalls of this transformative technology.
As we venture into this brave new world of digital democracy, the insights offered in this book are invaluable for policymakers, technology developers, security experts, and anyone interested in the future of democratic participation. It is my hope that this work will spark meaningful discussions and inspire further research to refine and improve the systems that will shape the future of voting.
In conclusion, Internet Voting Using Biometric Authentication represents a significant step toward ensuring a more secure, efficient, and inclusive voting process. This book not only illuminates the technical possibilities but also explores the broader implications of this technology, offering a roadmap for the future of democratic elections in the digital age.

69.99 Pre Order
Secure Online Voting Using Biometric Authentication and Public Key Encryption

Secure Online Voting Using Biometric Authentication and Public Key Encryption

Secure Online Voting Using Biometric Authentication and Public Key Encryption

Secure Online Voting Using Biometric Authentication and Public Key Encryption

eBook

$69.99 
Available for Pre-Order. This item will be released on October 24, 2025

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

In an age of rapid technological advancements and digital transformation, the intersection of voting systems and biometric authentication stands as one of the most pressing areas for innovation and security. The transition from traditional paper ballots to electronic voting has been a subject of intense debate for years, with concerns over privacy, accuracy, and security often taking center stage. As we strive to make voting systems more accessible, efficient, and secure, the integration of biometric authentication offers a promising solution to some of these challenges.
This book provides a comprehensive exploration of the technologies, methodologies, and potential applications of biometric systems in internet voting. From understanding the different types of biometric data to examining the advantages and challenges of implementing such systems on a global scale, it lays out both the theoretical and practical aspects of building a secure online voting infrastructure. The exploration of cryptographic solutions and the legal and ethical implications of biometric data collection also form a critical part of the narrative.
Internet voting enables citizens to vote from anywhere with internet access, thereby overcome geographical barriers and encourage greater participation in the democratic process. With the added layer of biometric authentication, we can ensure that the process remains secure, transparent, and tamper-proof, creating a more trustworthy voting system for future generations.
However, as with any new technology, the adoption of internet voting with biometrics comes with its set of challenges. Privacy concerns, data protection regulations, the risk of cyberattacks, and the digital divide all require careful consideration and a thoughtful approach to ensure the success of such systems. This book addresses these concerns headon, providing a balanced view of the promises and pitfalls of this transformative technology.
As we venture into this brave new world of digital democracy, the insights offered in this book are invaluable for policymakers, technology developers, security experts, and anyone interested in the future of democratic participation. It is my hope that this work will spark meaningful discussions and inspire further research to refine and improve the systems that will shape the future of voting.
In conclusion, Internet Voting Using Biometric Authentication represents a significant step toward ensuring a more secure, efficient, and inclusive voting process. This book not only illuminates the technical possibilities but also explores the broader implications of this technology, offering a roadmap for the future of democratic elections in the digital age.


Product Details

ISBN-13: 9781040426104
Publisher: CRC Press
Publication date: 10/24/2025
Sold by: Barnes & Noble
Format: eBook
Pages: 216

About the Author

Dr. Ajish S is working as an Assistant Professor in College of Engineering Perumon. He has more than 16 years of teaching experience. He has completed his Ph.D. in the field of Internet Voting under the guidance of Dr. K S Anil Kumar. He has completed his M-Tech in Computer Science with specialization in Information Security from College of Engineering Trivandrum. He has published more than 10 research papers (SCI and Scopus Indexed) in the field of Computer Science and Engineering.

Dr. K S Anil Kumar is the Registrar of University of Kerala. He has more than 25 years of academic and administration experience. He has completed his Ph.D. in the field of Intrusion Detection Interference System from university of Kerala. He has published 6 books and 26 research publications in conference and journals.

Table of Contents

1. Introduction
1.1 Background
1.2 Internet Voting
2. Internet Voting in Different Countries
2.1 Internet Voting in Estonia
2.2 Norwegian E-Voting System
2.3 Swiss Post E-Voting Protocol
2.4 Comparison of Estonian, Swiss, and Norwegian Internet Voting
2.5 Conclusion
3. Internet Voting System with Modified Voting and Verification Protocol
3.1 Estonian Internet Voting and Verification Protocol.
3.2 Security Analysis of Estonian Internet Voting Protocol
3.3 Modified Internet Voting and Verification Protocol
3.4 Security Analysis of Modified Voting Protocol and Verification Protocol
3.5 Conclusion
4. Internet Voting Using QR Code and Biometric Authentication
4.1 Security Analysis of Internet Voting System
4.2 Issues of Internet Voting System
4.3 Internet Voting System using QR Code and Biometric Authentication
4.4 Result Analysis
4.5 Security Analysis of the Internet Voting System Using Biometric Authentication
4.6 Conclusion
5. Secure Mobile Internet System Using QR Code and Biometric Authentication
5.1 Introduction
5.2 Existing Methodologies
5.3 Secure Mobile Internet System Using QR Code and Biometric Authentication
5.4 Experimental Implementation
5.5 Security Analysis of AES and Wavelet-Based AES Encryption
5.6 Security Analysis of Mobile Internet Voting System
5.7 Conclusion
6. Security Enhancement of Symmetric Hashed Fingerprint Template
6.1 Introduction
6.2 Existing Methodologies
6.3 Calculation of TPR, TNR and Accuracy
6.4 Modified Symmetric Hash Function to Secure Fingerprint Template
6.5 Security Analysis
6.6 Performance analysis
6.7 Conclusion
7. Performance Enhancement of Symmetric Hashed Fingerprint Template
7.1 Introduction
7.2 Existing Methodologies
7.3 Fingerprint Minutiae Matching Algorithm with Dynamic Threshold Values
7.4 Result Analysis
7.5 Security Analysis
7.6 Conclusion
8. Iris Template Protection Using Double Bloom Filter Based Feature Transformation
8.1 Introduction
8.2 Existing Methodologies
8.3 Experimental Analysis of Morton Filter and Bloom Filter
8.4 Motivations and Contributions
8.5 Double Bloom Filter-Based Feature Transformation
8.6 Experimental Analysis of Double Bloom Filter Transformation
8.7 Security Analysis
8.8 Findings and Discussions
8.9 Conclusion
9. Secure Mobile Internet Banking System using QR code and Biometric Authentication
9.1 Introduction
9.2 Literature Review
9.3 Methodology
9.4 Implementation
9.5 Performance Analysis of Anomaly Detection with Precision-Recall Curves
9.6 Security Analysis
9.7 Discussion
9.9 Conclusion
10. Conclusion

From the B&N Reads Blog

Customer Reviews