Please use this identifier to cite or link to this item:
http://ir.futminna.edu.ng:8080/jspui/handle/123456789/8658
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Olaniyi, Olayemi Mikail | - |
dc.contributor.author | Arulogun, Oladiran Tayo | - |
dc.contributor.author | Omidiora, Elijah Olusola | - |
dc.contributor.author | Okediran, O. O. | - |
dc.date.accessioned | 2021-07-12T08:16:34Z | - |
dc.date.available | 2021-07-12T08:16:34Z | - |
dc.date.issued | 2015 | - |
dc.identifier.citation | Olaniyi, O. M. O.T Arulogun, E.O. Omidiora, & Okediran O.O (2015), “Implementing Generic Security Requirements in E-Voting Using Modified Stegano-Cryptographic Approach”, International Journal Of Information and Computer Security (IJICS),Switzerland, 7(1):64-90 | en_US |
dc.identifier.uri | http://www.inderscienceonline.com/doi/abs/10.1504/IJICS.2015.069214 | - |
dc.identifier.uri | http://repository.futminna.edu.ng:8080/jspui/handle/123456789/8658 | - |
dc.description | Implementing generic security requirements in e-voting using modified stegano-cryptographic approach | en_US |
dc.description.abstract | Various information hiding techniques based on steganography, cryptography, and watermarking have been formulated in literatures to secure e-democratic decision making. The existing stegano-cryptographic models for secure e-voting are vulnerable to attacks and thus, can be manipulated by an eavesdropper. In this paper, we present an imperceptible stegano-cryptographic model for securing generic security requirements of e-voting systems. The purpose is to model a secure e-electronic voting capable of delivering credible, fair and transparent future e-democratic decision making in developing countries like Nigeria. The model was implemented on our framework for secure e-voting using Java programming language and Oracle database management system. The results of the study after qualitative performance evaluation of the model affirm that the model could serve as a platform for delivery of e-democratic decision making of high electoral integrity and political trustworthiness in developing countries with significant digital divides. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Inderscience Publishers | en_US |
dc.subject | e-voting | en_US |
dc.subject | stego image | en_US |
dc.subject | authentication; confidentiality; integrity; verifiability; wavelet; RSA; ECC; security; requirements; credible; fair; | en_US |
dc.subject | fair | en_US |
dc.subject | authentication | en_US |
dc.subject | integrity | en_US |
dc.subject | Watermarking | en_US |
dc.subject | crystography | en_US |
dc.title | Implementing generic security requirements in e-voting using modified stegano-cryptographic approach | en_US |
dc.type | Article | en_US |
Appears in Collections: | Computer Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Olaniyi et al 2015c.pdf | Implementing generic security requirements in e-voting using modified stegano-cryptographic approach | 2.82 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.