Ensuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. This paper describes the e-voting system by integrating the biometric authentication, advanced encryption, and watermarking techniques towards meeting such challenges. The system employs the fingerprint authentication by utilizing the Scale-Invariant Feature Transform (SIFT) for verifying the identity of the voter to ensure genuineness and non-repudiation of the service. The vote will be encrypted with the AES-GCM technique to be employed in securing the voting process, thus ensuring both data privacy and integrity. Hybrid Blind Watermarking employs the technique of Discrete Wavelet Transform (DWT) and Discrete Cosine Transform (DCT) for embedding the encrypted vote into the colored watermark cover image. Increased robustness against attacks with maintained vote confidentiality is achieved through this approach. The experimental results proved its imperceptibility to reach a Peak Signal-to-Noise Ratio (PSNR) of 40.7 and Normalized Correlation (NC) of 1. Thus, the proposed system enhances the theoretical foundation of secure e-voting and provides an implementation strategy for a reliable and tamper-proof voting system.
Elastic magnetic M1 electron scattering form factor has been calculated for the ground state J,T=1/2-,1/2 of 13C. The single-particle model is used with harmonic oscillator wave function. The core-polarization effects are calculated in the first-order perturbation theory including excitations up to 5ħω, using the modified surface delta interaction (MSDI) as a residual interaction. No parameters are introduced in this work. The data are reasonably explained up to q~2.5fm-1 .
KE Sharquie, AA Noaimi, SA Galib, Journal of Cosmetics, Dermatological Sciences and Applications, 2013 - Cited by 4
Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreThe efficiency of attapulgite liners as anti-seepage for crude oil is examined. Consideration is given to the potential use of raw attapulgite and mixture attapulgite with prairie hay and coconut husk as liners to prevent crude oil seepage. Attapulgite clay used in this study was brought from Injana formation /Western Desert of Iraq. Two types of Crude oil brought from Iraqi oil fields were used in experiments; heavy crude oil from East-Baghdad oil field and light crude oil from Nassiriya oil field. Initially the basic properties of attapulgite and crude oils were determined. The attapulgite clay was subjected to mineralogical, chemical and scanning electron microscope analyses. Raw Attapulgite 150µm, 75µm, and 53µm were tested
... Show MoreThe present study aimed to evaluate the levels of total immunoglobulin E and percentage count of eosinophil in some of allergic disease. Blood sample collected from 210 patients (110 female, 100 male) with allergic disease (allergic asthma, allergic rhinitis, and urticaria) their age between 10-70 years and 50 healthy control their age between 23-52 years. A highly significant (P<0.01) increase in the mean serum total IgE in patients with asthma (503.54 ± 63.49 IU/ml), Allergic rhinitis (442.77 ± 95.76 IU/ml) and urticaria (489.53 ± 69.68 IU/ml) as a compared with healthy controls (23.67 ± 5.81 IU/ml).There was a significant difference in percentage count of eosinophil in patients groups allergic asthma 4.37 ± 0.52% ,allergic rhinitis
... Show MoreBlockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well a
... Show MoreHomomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security. We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly. We make an effort to prove
... Show More