Ensuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. This paper describes the e-voting system by integrating the biometric authentication, advanced encryption, and watermarking techniques towards meeting such challenges. The system employs the fingerprint authentication by utilizing the Scale-Invariant Feature Transform (SIFT) for verifying the identity of the voter to ensure genuineness and non-repudiation of the service. The vote will be encrypted with the AES-GCM technique to be employed in securing the voting process, thus ensuring both data privacy and integrity. Hybrid Blind Watermarking employs the technique of Discrete Wavelet Transform (DWT) and Discrete Cosine Transform (DCT) for embedding the encrypted vote into the colored watermark cover image. Increased robustness against attacks with maintained vote confidentiality is achieved through this approach. The experimental results proved its imperceptibility to reach a Peak Signal-to-Noise Ratio (PSNR) of 40.7 and Normalized Correlation (NC) of 1. Thus, the proposed system enhances the theoretical foundation of secure e-voting and provides an implementation strategy for a reliable and tamper-proof voting system.
Abstract
Objective / Purpose: Online social relationships through the emergence of Web 2.0 applications have become a new trend for researchers to study the behavior of consumers to shop online, as well as social networking sites are technologies that opened up opportunities for new business models. Therefore, a new trend has emerged, called social trade technology. In order to understand the behavioral intentions of the beneficiaries to adopt the technology of social trade, the current research aims at developing an electronic readiness framework and UTAUT model to understand the beneficiary's adoption of social trade technology.
Design/ methodology/ Approach: To achieve the obje
... Show MoreAbstract
The study aims to examine the relationships between cognitive absorption and E-Learning readiness in the preparatory stage. The study sample consisted of (190) students who were chosen randomly. The Researcher has developed the cognitive absorption and E-Learning readiness scales. A correlational descriptive approach was adopted. The research revealed that there is a positive statistical relationship between cognitive absorption and eLearning readiness.
In this work the fabrication and characterization of poly(3-hexylthiophene) P3HT-metallic nanoparticles (Ag, Al). Pulsed Laser Ablation (PLA) technique was used to synthesis the nanoparticles in liquid. The Fourier Transformer Infrared (FTIR) for all samples indicate the chemical interaction between the polymer and the nanoparticles. Scanning Electron Microscopic (SEM) analysis showed the particle size for P3HT-AgNps samples between 44.50 nanometers as well the spherical structure. While for P3HT-AlNps samples was flakes shape. Energy Dispersive X-ray (EDX) spectra show the existing of amount of metallic nanoparticles.
Due to their attractive properties, silver nanowires (Ag-NWs) are newly used as nanoelectrodes in continuous wave (CW) THz photomixer. However, since these nanowires have small contact area, the nanowires fill factor in the photomixer active region is low, which leads to reduce the nanowires conductivity. In this work, we proposed to add graphene nanoantenna array as nanoelectrodes to the silver nanowires-based photomixer to improve the conductivity. In addition, the graphene nanoantenna array and the silver nanowires form new hybrid nanoelectrodes for the CW-THz photomixer leading to improve the device conversion efficiency by the plasmonic effect. Two types of graphene nanoantenna array are proposed in two separate photomixer conf
... Show MoreIn this communication, introduce the split Mersenne and Mersenne-Lucas hybrid quaternions, also obtaining generating functions and Binet formulas for these hybrid quaternions and investigating some properties among them.
Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show MoreObjective To investigate the accuracy of gingival crevicular fluid (GCF) E-cadherin and total antioxidant capacity (TAC) to discriminate periodontal health from disease. Subjects and Methods GCF samples were collected from participants with periodontal health (control), gingivitis, and periodontitis (n = 25 each group). The latter group was further subdivided according to stage (S) and grade. Periodontal parameters were recorded then levels of biomarkers were assayed using ELISA and antioxidant status by use of the Total Antioxidant Capacity Assay for E-cadherin and TAC, respectively. Results All periodontal parameters were significantly higher in periodontally diseased groups than controls. The GCF E-cadherin significantly increased
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show MoreInformation processing has an important application which is speech recognition. In this paper, a two hybrid techniques have been presented. The first one is a 3-level hybrid of Stationary Wavelet Transform (S) and Discrete Wavelet Transform (W) and the second one is a 3-level hybrid of Discrete Wavelet Transform (W) and Multi-wavelet Transforms (M). To choose the best 3-level hybrid in each technique, a comparison according to five factors has been implemented and the best results are WWS, WWW, and MWM. Speech recognition is performed on WWS, WWW, and MWM using Euclidean distance (Ecl) and Dynamic Time Warping (DTW). The match performance is (98%) using DTW in MWM, while in the WWS and WWW are (74%) and (78%) respectively, but when using (
... Show More