S / Kumar | Secure Online Voting Using Biometric Authentication and Public Key Encryption | Buch | 978-1-032-55931-5 | sack.de

Buch, Englisch, 216 Seiten, Format (B × H): 156 mm x 234 mm

S / Kumar

Secure Online Voting Using Biometric Authentication and Public Key Encryption


1. Auflage 2025
ISBN: 978-1-032-55931-5
Verlag: Taylor & Francis Ltd

Buch, Englisch, 216 Seiten, Format (B × H): 156 mm x 234 mm

ISBN: 978-1-032-55931-5
Verlag: Taylor & Francis Ltd


In an age of rapid technological advancements and digital transformation, the intersection of voting systems and biometric authentication stands as one of the most pressing areas for innovation and security. The transition from traditional paper ballots to electronic voting has been a subject of intense debate for years, with concerns over privacy, accuracy, and security often taking center stage. As we strive to make voting systems more accessible, efficient, and secure, the integration of biometric authentication offers a promising solution to some of these challenges.
This book provides a comprehensive exploration of the technologies, methodologies, and potential applications of biometric systems in internet voting. From understanding the different types of biometric data to examining the advantages and challenges of implementing such systems on a global scale, it lays out both the theoretical and practical aspects of building a secure online voting infrastructure. The exploration of cryptographic solutions and the legal and ethical implications of biometric data collection also form a critical part of the narrative.
Internet voting enables citizens to vote from anywhere with internet access, thereby overcome geographical barriers and encourage greater participation in the democratic process. With the added layer of biometric authentication, we can ensure that the process remains secure, transparent, and tamper-proof, creating a more trustworthy voting system for future generations.
However, as with any new technology, the adoption of internet voting with biometrics comes with its set of challenges. Privacy concerns, data protection regulations, the risk of cyberattacks, and the digital divide all require careful consideration and a thoughtful approach to ensure the success of such systems. This book addresses these concerns headon, providing a balanced view of the promises and pitfalls of this transformative technology.
As we venture into this brave new world of digital democracy, the insights offered in this book are invaluable for policymakers, technology developers, security experts, and anyone interested in the future of democratic participation. It is my hope that this work will spark meaningful discussions and inspire further research to refine and improve the systems that will shape the future of voting.
In conclusion, Internet Voting Using Biometric Authentication represents a significant step toward ensuring a more secure, efficient, and inclusive voting process. This book not only illuminates the technical possibilities but also explores the broader implications of this technology, offering a roadmap for the future of democratic elections in the digital age.

S / Kumar Secure Online Voting Using Biometric Authentication and Public Key Encryption jetzt bestellen!

Zielgruppe


Academic, Postgraduate, Professional Reference, and Undergraduate Advanced


Autoren/Hrsg.


Weitere Infos & Material


1. Introduction

1.1 Background
1.2 Internet Voting
2. Internet Voting in Different Countries
2.1 Internet Voting in Estonia
2.2 Norwegian E-Voting System
2.3 Swiss Post E-Voting Protocol
2.4 Comparison of Estonian, Swiss, and Norwegian Internet Voting
2.5 Conclusion
3. Internet Voting System with Modified Voting and Verification Protocol
3.1 Estonian Internet Voting and Verification Protocol.
3.2 Security Analysis of Estonian Internet Voting Protocol
3.3 Modified Internet Voting and Verification Protocol
3.4 Security Analysis of Modified Voting Protocol and Verification Protocol
3.5 Conclusion
4. Internet Voting Using QR Code and Biometric Authentication
4.1 Security Analysis of Internet Voting System
4.2 Issues of Internet Voting System
4.3 Internet Voting System using QR Code and Biometric Authentication
4.4 Result Analysis
4.5 Security Analysis of the Internet Voting System Using Biometric Authentication
4.6 Conclusion
5. Secure Mobile Internet System Using QR Code and Biometric Authentication
5.1 Introduction
5.2 Existing Methodologies
5.3 Secure Mobile Internet System Using QR Code and Biometric Authentication
5.4 Experimental Implementation
5.5 Security Analysis of AES and Wavelet-Based AES Encryption
5.6 Security Analysis of Mobile Internet Voting System
5.7 Conclusion
6. Security Enhancement of Symmetric Hashed Fingerprint Template
6.1 Introduction
6.2 Existing Methodologies
6.3 Calculation of TPR, TNR and Accuracy
6.4 Modified Symmetric Hash Function to Secure Fingerprint Template
6.5 Security Analysis
6.6 Performance analysis
6.7 Conclusion
7. Performance Enhancement of Symmetric Hashed Fingerprint Template
7.1 Introduction
7.2 Existing Methodologies
7.3 Fingerprint Minutiae Matching Algorithm with Dynamic Threshold Values
7.4 Result Analysis
7.5 Security Analysis
7.6 Conclusion
8. Iris Template Protection Using Double Bloom Filter Based Feature Transformation
8.1 Introduction
8.2 Existing Methodologies
8.3 Experimental Analysis of Morton Filter and Bloom Filter
8.4 Motivations and Contributions
8.5 Double Bloom Filter-Based Feature Transformation
8.6 Experimental Analysis of Double Bloom Filter Transformation
8.7 Security Analysis
8.8 Findings and Discussions
8.9 Conclusion
9. Secure Mobile Internet Banking System using QR code and Biometric Authentication
9.1 Introduction
9.2 Literature Review
9.3 Methodology
9.4 Implementation
9.5 Performance Analysis of Anomaly Detection with Precision-Recall Curves
9.6 Security Analysis
9.7 Discussion
9.9 Conclusion
10. Conclusion


Dr. Ajish S is working as an Assistant Professor in College of Engineering Perumon. He has more than 16 years of teaching experience. He has completed his Ph.D. in the field of Internet Voting under the guidance of Dr. K S Anil Kumar. He has completed his M-Tech in Computer Science with specialization in Information Security from College of Engineering Trivandrum. He has published more than 10 research papers (SCI and Scopus Indexed) in the field of Computer Science and Engineering.

Dr. K S Anil Kumar is the Registrar of University of Kerala. He has more than 25 years of academic and administration experience. He has completed his Ph.D. in the field of Intrusion Detection Interference System from university of Kerala. He has published 6 books and 26 research publications in conference and journals.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.