Prevention of Phishing Attacks on Online Voting System Using Visual Cryptography

Authors

  • Akshada Tingare  Department of Computer Engineering, Dr. D. Y. Patil School of Engineering, Lohegaon, Pune, Maharashtra, India
  • Pragati Shilote  Department of Computer Engineering, Dr. D. Y. Patil School of Engineering, Lohegaon, Pune, Maharashtra, India
  • Mohoni Raykar  Department of Computer Engineering, Dr. D. Y. Patil School of Engineering, Lohegaon, Pune, Maharashtra, India
  • Priyanka Pathare  Department of Computer Engineering, Dr. D. Y. Patil School of Engineering, Lohegaon, Pune, Maharashtra, India
  • Prof. Vandana Chavan  Assistant Professor, Department of Computer Engineering, Dr. D. Y. Patil School of Engineering, Lohegaon, Pune, Maharashtra, India

Keywords:

Authentication, Visual Cryptography, Image captcha phishing, Phishing, Open CV Library Algorithm, Online Voting

Abstract

The aim of Voting System using Visual Cryptography is to provide facility to cast for critical and confidential decisions of internal corporate. It provides the flexibility of casting vote from any remote place. The confidentiality of the election is maintained by applying the appropriate security measures so that the voter can vote for any participating candidate but only if he logs into the system by entering the correct password which is generated by merging the two shares using Visual Cryptography scheme. The administrator is responsible for sending the shares, 1st share to voter email id before election and 2nd share will be available in the Voting System for his login during election. The voters get the secret password to cast his vote by the combination of share 1 and share 2 using Voting Cryptography. Phishing is an attempt by an individual or group which aims to get personal confidential information from unsuspecting victims. Internet voting focuses on security, privacy, and secrecy issues, as well as challenges for stakeholder involvement and observation of the process.

References

  1. NetworkSecurity, https://en.wikipedia.org/wiki/ Network_security, accessed on May 2015.
  2. JoeyPaquet, http://users.encs.concordia.ca/~paqu et/wiki/index.php?title=Capability_ maturity_model, accessed on May 2015.
  3. Villafiorita A, Weldermariam K, Tiella R, “Development, Formal verification and evaluation of an e-voting system with VVPAT”, IEEE Transactions on Information Forensics and Security, 2009, p.no. 651- 661.
  4. Abdalla Al-Ameen and Samani Talab, “The Technical Feasibility and Security of E-Voting”, The International Arab Journal of Information Technology, Vol.10, No.4, July 2013, p.no.397-404.
  5. https://securelist.com/analysis/quarterly-spam- reports/69932/spam-andphishing-in-the-first- quarter-of-2015/, Phishing attack, accessed on 12.09.2015.
  6. M. Mounika Reddy and B.Madhura Vani, “A Novel Anti phishing Framework based on Visual Cryptography”, International Journal of Advanced Research in Computer and Communication Engineering, Vol.2, Issue 9, Sep 2013, P.No.3434- 3436.
  7. Mayur Patil, Vijay Pimplodkar, Anuja R.Zade, Vinit Vibhute, Ratnakar Ghadge, “A Survey on Voting system techniques”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, Issue. 1, Jan 2013, p.no. 114-117.
  8. Shyong Jian Shyu, Ming Chiang Chen, “Minimizing Pixel expansion in Visual cryptographic scheme for General Access Structures”, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 25, No. 9, Sep 2015.
  9. Liang H., & Xue Y., “Understanding security behaviours in personal computer usage: A threat avoidance perspective”, Association for Information Systems, 11(7), pp. 394–413, 2010
  10. Ollmann G. The Phishing Guide Understanding & Preventing Phishing Attacks, NGS Software Insight Security Research.
  11. Anti-Phishing Working Group, Global Phishing Survey: Trends and Domain name use in 1H2009, 2009Anti-Phishing Working group .http://www.antiphishing.org/.
  12. Yuancheng Lia et al., “A semi-supervised learning approach for detection of phishing web pages”, Optik, (124), pp. 6027– 6033,2013 .
  13. Nalin Asanka Gamagedara Arachchilage, Steve Love, Security awareness of computer users: A phishing threat avoidance Perspective, Computers in Human Behavior (38), 2014.

Downloads

Published

2021-06-30

Issue

Section

Research Articles

How to Cite

[1]
Akshada Tingare, Pragati Shilote, Mohoni Raykar, Priyanka Pathare, Prof. Vandana Chavan, " Prevention of Phishing Attacks on Online Voting System Using Visual Cryptography" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 8, Issue 3, pp.186-194, May-June-2021.