Visual Cryptography for E-Voting by Using Fingerprint Technique

Democracy and elections have more than 2,500 years of tradition. Technology has always influenced the form of elections and the complexity of ways. Performing a good security analysis in the design of the system is a necessary step in order to ensure a reasonable level of protection. In this paper,...

Full description

Bibliographic Details
Main Author: Ghayab, Hadi Ratham
Format: Thesis
Language:English
English
Published: 2010
Subjects:
Online Access:https://etd.uum.edu.my/2345/1/Hadi_Ratham_Ghayab.pdf
https://etd.uum.edu.my/2345/2/1.Hadi_Ratham_Ghayab.pdf
https://etd.uum.edu.my/2345/
http://lintas.uum.edu.my:8080/elmu/index.jsp?module=webopac-l&action=fullDisplayRetriever.jsp&szMaterialNo=0000764901
Abstract Abstract here
_version_ 1855353093297799168
author Ghayab, Hadi Ratham
author_facet Ghayab, Hadi Ratham
author_sort Ghayab, Hadi Ratham
description Democracy and elections have more than 2,500 years of tradition. Technology has always influenced the form of elections and the complexity of ways. Performing a good security analysis in the design of the system is a necessary step in order to ensure a reasonable level of protection. In this paper, we decided to use the fingerprint on the electronic voting system to increase the speed and accuracy in the proceedings of the electoral process, with the construction of a high-protection system based on fingerprint voters to give most reliable results, and tries to automation of the electoral system in Iraq, and gains the advantage of an e-voting system.
format Thesis
id oai:etd.uum.edu.my:2345
institution Universiti Utara Malaysia
language English
English
publishDate 2010
record_format EPrints
record_pdf Abstract
spelling oai:etd.uum.edu.my:23452013-07-24T12:15:33Z https://etd.uum.edu.my/2345/ Visual Cryptography for E-Voting by Using Fingerprint Technique Ghayab, Hadi Ratham QA76 Computer software Democracy and elections have more than 2,500 years of tradition. Technology has always influenced the form of elections and the complexity of ways. Performing a good security analysis in the design of the system is a necessary step in order to ensure a reasonable level of protection. In this paper, we decided to use the fingerprint on the electronic voting system to increase the speed and accuracy in the proceedings of the electoral process, with the construction of a high-protection system based on fingerprint voters to give most reliable results, and tries to automation of the electoral system in Iraq, and gains the advantage of an e-voting system. 2010-09 Thesis NonPeerReviewed application/pdf en https://etd.uum.edu.my/2345/1/Hadi_Ratham_Ghayab.pdf application/pdf en https://etd.uum.edu.my/2345/2/1.Hadi_Ratham_Ghayab.pdf Ghayab, Hadi Ratham (2010) Visual Cryptography for E-Voting by Using Fingerprint Technique. Masters thesis, Universiti Utara Malaysia. http://lintas.uum.edu.my:8080/elmu/index.jsp?module=webopac-l&action=fullDisplayRetriever.jsp&szMaterialNo=0000764901
spellingShingle QA76 Computer software
Ghayab, Hadi Ratham
Visual Cryptography for E-Voting by Using Fingerprint Technique
thesis_level Master
title Visual Cryptography for E-Voting by Using Fingerprint Technique
title_full Visual Cryptography for E-Voting by Using Fingerprint Technique
title_fullStr Visual Cryptography for E-Voting by Using Fingerprint Technique
title_full_unstemmed Visual Cryptography for E-Voting by Using Fingerprint Technique
title_short Visual Cryptography for E-Voting by Using Fingerprint Technique
title_sort visual cryptography for e voting by using fingerprint technique
topic QA76 Computer software
url https://etd.uum.edu.my/2345/1/Hadi_Ratham_Ghayab.pdf
https://etd.uum.edu.my/2345/2/1.Hadi_Ratham_Ghayab.pdf
https://etd.uum.edu.my/2345/
http://lintas.uum.edu.my:8080/elmu/index.jsp?module=webopac-l&action=fullDisplayRetriever.jsp&szMaterialNo=0000764901
work_keys_str_mv AT ghayabhadiratham visualcryptographyforevotingbyusingfingerprinttechnique