Please use this identifier to cite or link to this item: http://ir.futminna.edu.ng:8080/jspui/handle/123456789/8658
Full metadata record
DC FieldValueLanguage
dc.contributor.authorOlaniyi, Olayemi Mikail-
dc.contributor.authorArulogun, Oladiran Tayo-
dc.contributor.authorOmidiora, Elijah Olusola-
dc.contributor.authorOkediran, O. O.-
dc.date.accessioned2021-07-12T08:16:34Z-
dc.date.available2021-07-12T08:16:34Z-
dc.date.issued2015-
dc.identifier.citationOlaniyi, O. M. O.T Arulogun, E.O. Omidiora, & Okediran O.O (2015), “Implementing Generic Security Requirements in E-Voting Using Modified Stegano-Cryptographic Approach”, International Journal Of Information and Computer Security (IJICS),Switzerland, 7(1):64-90en_US
dc.identifier.urihttp://www.inderscienceonline.com/doi/abs/10.1504/IJICS.2015.069214-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/8658-
dc.descriptionImplementing generic security requirements in e-voting using modified stegano-cryptographic approachen_US
dc.description.abstractVarious information hiding techniques based on steganography, cryptography, and watermarking have been formulated in literatures to secure e-democratic decision making. The existing stegano-cryptographic models for secure e-voting are vulnerable to attacks and thus, can be manipulated by an eavesdropper. In this paper, we present an imperceptible stegano-cryptographic model for securing generic security requirements of e-voting systems. The purpose is to model a secure e-electronic voting capable of delivering credible, fair and transparent future e-democratic decision making in developing countries like Nigeria. The model was implemented on our framework for secure e-voting using Java programming language and Oracle database management system. The results of the study after qualitative performance evaluation of the model affirm that the model could serve as a platform for delivery of e-democratic decision making of high electoral integrity and political trustworthiness in developing countries with significant digital divides.en_US
dc.language.isoenen_US
dc.publisherInderscience Publishersen_US
dc.subjecte-votingen_US
dc.subjectstego imageen_US
dc.subjectauthentication; confidentiality; integrity; verifiability; wavelet; RSA; ECC; security; requirements; credible; fair;en_US
dc.subjectfairen_US
dc.subjectauthenticationen_US
dc.subjectintegrityen_US
dc.subjectWatermarkingen_US
dc.subjectcrystographyen_US
dc.titleImplementing generic security requirements in e-voting using modified stegano-cryptographic approachen_US
dc.typeArticleen_US
Appears in Collections:Computer Engineering

Files in This Item:
File Description SizeFormat 
Olaniyi et al 2015c.pdfImplementing generic security requirements in e-voting using modified stegano-cryptographic approach2.82 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.