Verkauf durch Sack Fachmedien

S / Kumar

Secure Online Voting Using Biometric Authentication and Public Key Encryption

Medium: Buch
ISBN: 978-1-032-55931-5
Verlag: Taylor & Francis Ltd
Erscheinungstermin: 24.10.2025
vorbestellbar, Erscheinungstermin ca. Oktober 2025

In an age of rapid technological advancements and digital transformation, the intersection of voting systems and biometric authentication stands as one of the most pressing areas for innovation and security. The transition from traditional paper ballots to electronic voting has been a subject of intense debate for years, with concerns over privacy, accuracy, and security often taking center stage. As we strive to make voting systems more accessible, efficient, and secure, the integration of biometric authentication offers a promising solution to some of these challenges.
This book provides a comprehensive exploration of the technologies, methodologies, and potential applications of biometric systems in internet voting. From understanding the different types of biometric data to examining the advantages and challenges of implementing such systems on a global scale, it lays out both the theoretical and practical aspects of building a secure online voting infrastructure. The exploration of cryptographic solutions and the legal and ethical implications of biometric data collection also form a critical part of the narrative.
Internet voting enables citizens to vote from anywhere with internet access, thereby overcome geographical barriers and encourage greater participation in the democratic process. With the added layer of biometric authentication, we can ensure that the process remains secure, transparent, and tamper-proof, creating a more trustworthy voting system for future generations.
However, as with any new technology, the adoption of internet voting with biometrics comes with its set of challenges. Privacy concerns, data protection regulations, the risk of cyberattacks, and the digital divide all require careful consideration and a thoughtful approach to ensure the success of such systems. This book addresses these concerns headon, providing a balanced view of the promises and pitfalls of this transformative technology.
As we venture into this brave new world of digital democracy, the insights offered in this book are invaluable for policymakers, technology developers, security experts, and anyone interested in the future of democratic participation. It is my hope that this work will spark meaningful discussions and inspire further research to refine and improve the systems that will shape the future of voting.
In conclusion, Internet Voting Using Biometric Authentication represents a significant step toward ensuring a more secure, efficient, and inclusive voting process. This book not only illuminates the technical possibilities but also explores the broader implications of this technology, offering a roadmap for the future of democratic elections in the digital age.


Produkteigenschaften


  • Artikelnummer: 9781032559315
  • Medium: Buch
  • ISBN: 978-1-032-55931-5
  • Verlag: Taylor & Francis Ltd
  • Erscheinungstermin: 24.10.2025
  • Sprache(n): Englisch
  • Auflage: 1. Auflage 2025
  • Produktform: Gebunden
  • Seiten: 216
  • Format (B x H): 156 x 234 mm
  • Ausgabetyp: Kein, Unbekannt

Themen


Autoren/Hrsg.

Autoren

1. Introduction

1.1 Background
1.2 Internet Voting
2. Internet Voting in Different Countries
2.1 Internet Voting in Estonia
2.2 Norwegian E-Voting System
2.3 Swiss Post E-Voting Protocol
2.4 Comparison of Estonian, Swiss, and Norwegian Internet Voting
2.5 Conclusion
3. Internet Voting System with Modified Voting and Verification Protocol
3.1 Estonian Internet Voting and Verification Protocol.
3.2 Security Analysis of Estonian Internet Voting Protocol
3.3 Modified Internet Voting and Verification Protocol
3.4 Security Analysis of Modified Voting Protocol and Verification Protocol
3.5 Conclusion
4. Internet Voting Using QR Code and Biometric Authentication
4.1 Security Analysis of Internet Voting System
4.2 Issues of Internet Voting System
4.3 Internet Voting System using QR Code and Biometric Authentication
4.4 Result Analysis
4.5 Security Analysis of the Internet Voting System Using Biometric Authentication
4.6 Conclusion
5. Secure Mobile Internet System Using QR Code and Biometric Authentication
5.1 Introduction
5.2 Existing Methodologies
5.3 Secure Mobile Internet System Using QR Code and Biometric Authentication
5.4 Experimental Implementation
5.5 Security Analysis of AES and Wavelet-Based AES Encryption
5.6 Security Analysis of Mobile Internet Voting System
5.7 Conclusion
6. Security Enhancement of Symmetric Hashed Fingerprint Template
6.1 Introduction
6.2 Existing Methodologies
6.3 Calculation of TPR, TNR and Accuracy
6.4 Modified Symmetric Hash Function to Secure Fingerprint Template
6.5 Security Analysis
6.6 Performance analysis
6.7 Conclusion
7. Performance Enhancement of Symmetric Hashed Fingerprint Template
7.1 Introduction
7.2 Existing Methodologies
7.3 Fingerprint Minutiae Matching Algorithm with Dynamic Threshold Values
7.4 Result Analysis
7.5 Security Analysis
7.6 Conclusion
8. Iris Template Protection Using Double Bloom Filter Based Feature Transformation
8.1 Introduction
8.2 Existing Methodologies
8.3 Experimental Analysis of Morton Filter and Bloom Filter
8.4 Motivations and Contributions
8.5 Double Bloom Filter-Based Feature Transformation
8.6 Experimental Analysis of Double Bloom Filter Transformation
8.7 Security Analysis
8.8 Findings and Discussions
8.9 Conclusion
9. Secure Mobile Internet Banking System using QR code and Biometric Authentication
9.1 Introduction
9.2 Literature Review
9.3 Methodology
9.4 Implementation
9.5 Performance Analysis of Anomaly Detection with Precision-Recall Curves
9.6 Security Analysis
9.7 Discussion
9.9 Conclusion
10. Conclusion