Prevention of Phishing Attacks in Voting System using Visual Cryptography

被引:0
|
作者
Nisha, S. [1 ]
Madheswari, A. Neela [1 ]
机构
[1] Mahendra Engn Coll, CSE Dept, Namakkal, India
关键词
authentication; cryptography; image captcha; phishing; integer linear program; online voting;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Voting system Using Visual Cryptography (VC) aims at providing a facility to cast vote for critical and confidential internal corporate decisions. It has the flexibility to allow casting of vote from any remote place. The election is held in full confidentiality by applying appropriate security measures to allow the voter to vote for any participating candidate only if he logs into the system by entering the correct password which is generated by merging the two shares using VC scheme. Administrator sends share 1 to voter e-mail id before election and share 2 will be available in the voting system for his login during election. Voter will get the secret password to cast his vote by combining share 1 and share 2 using VC. Phishing is an attempt by an individual or a group to get personal confidential information from unsuspecting victims. Fake websites which appear very similar to the original ones are being hosted to achieve this. Internet voting focuses on security, privacy, and secrecy issues, as well as challenges for stakeholder involvement and observation of the process. A new approach is proposed for voting system to prevent phishing attacks.
引用
收藏
页数:4
相关论文
共 50 条
  • [41] Detecting Spear Phishing Attacks Using Machine Learning
    Regulagadda, Ramakrishna
    Krishna, M. Sai
    Prasanth, G.
    Sumalatha, V
    Ramesh, Y. Sai
    INTERNATIONAL JOURNAL OF EARLY CHILDHOOD SPECIAL EDUCATION, 2022, 14 (05) : 1457 - 1459
  • [42] Phishing Attacks Detection by Using Artificial Neural Networks
    Nabet, Majeed Jasim
    George, Loay E.
    Iraqi Journal for Computer Science and Mathematics, 2023, 4 (03): : 159 - 166
  • [43] Using URL Shorteners to Compare Phishing and Malware Attacks
    Le Page, Sophie
    Jourdan, Guy-Vincent
    Bochmann, Gregor V.
    Flood, Jason
    Onut, Iosif-Viorel
    PROCEEDINGS OF THE 2018 APWG SYMPOSIUM ON ELECTRONIC CRIME RESEARCH (ECRIME), 2018, : 13 - 25
  • [44] Uncovering phishing attacks using principles of persuasion analysis
    Bustio-Martinez, Lazaro
    Herrera-Semenets, Vitali
    Garcia-Mendoza, Juan Luis
    Alvarez-Carmona, Miguel Angel
    Gonzalez-Ordiano, Jorge Angel
    Zuniga-Morales, Luis
    Quiroz-Ibarra, J. Emilio
    Santander-Molina, Pedro Antonio
    van den Berg, Jan
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2024, 230
  • [45] Preventing phishing attacks using text and image watermarking
    Hajiali, Mahdi
    Amirmazlaghani, Maryam
    Kordestani, Hossain
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (13):
  • [46] Security Amplification of the Computer-Aided Voting System Using Quantum Cryptography Protocols
    Karpinski, Mikolaj
    Gancarczyk, Tomasz
    Klos-Witkowska, Aleksandra
    Limar, Igor
    Vasiliu, Yevhen
    PROCEEDINGS OF THE 2017 9TH IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS (IDAACS), VOL 1, 2017, : 91 - 94
  • [47] Electronic Voting Systems Using Divided Image Cryptography
    Zhang, Shanjun
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2010, 13 (05): : 1793 - 1806
  • [48] MPMPA: A Mitigation and Prevention Model for Social Engineering Based Phishing attacks on Facebook
    Jamil, Abid
    Asif, Kashif
    Ghulam, Zikra
    Nazir, Muhammad Kashif
    Alam, Syed Mudassar
    Ashraf, Rehan
    2018 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2018, : 5040 - 5048
  • [49] On the reliability of a voting system under cyber attacks
    Li, Yijia
    Hu, Xiaoxiao
    Zhao, Peng
    Reliability Engineering and System Safety, 2021, 216
  • [50] On the reliability of a voting system under cyber attacks
    Li, Yijia
    Hu, Xiaoxiao
    Zhao, Peng
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 2021, 216