Secure E-Voting System Utilizing Fingerprint Authentication, AES-GCM Encryption and Hybrid Blind Watermarking

Authors

  • Asia Abdullah University of Baghdad
  • Nada Hussein M. Ali University of Baghdad

DOI:

https://doi.org/10.37385/jaets.v6i2.6223

Keywords:

E-Voting, Fingerprint Authentication, Encryption, Blind Watermarking

Abstract

Ensuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. This paper describes the e-voting system by integrating the biometric authentication, advanced encryption, and watermarking techniques towards meeting such challenges. The system employs the fingerprint authentication by utilizing the Scale-Invariant Feature Transform (SIFT) for verifying the identity of the voter to ensure genuineness and non-repudiation of the service. The vote will be encrypted with the AES-GCM technique to be employed in securing the voting process, thus ensuring both data privacy and integrity. Hybrid Blind Watermarking employs the technique of Discrete Wavelet Transform (DWT) and Discrete Cosine Transform (DCT) for embedding the encrypted vote into the colored watermark cover image. Increased robustness against attacks with maintained vote confidentiality is achieved through this approach. The experimental results proved its imperceptibility to reach a Peak Signal-to-Noise Ratio (PSNR) of 40.7 and Normalized Correlation (NC) of 1. Thus, the proposed system enhances the theoretical foundation of secure e-voting and provides an implementation strategy for a reliable and tamper-proof voting system.

Downloads

Download data is not yet available.

References

Abdallah, A. A., & Farhan, A. K. (2022). A New Image Encryption Algorithm Based on Multi Chaotic System. Iraqi Journal of Science, 324–337. https://doi.org/10.24996/ijs.2022.63.1.31

Adeniyi, J. K., Ajagbe, S. A., Adeniyi, E. A., Mudali, P., Adigun, M. O., Adeniyi, T. T., & Ajibola, O. (2024). A biometrics-generated private/public key cryptography for a blockchain-based e-voting system. Egyptian Informatics Journal, 25, 100447. https://doi.org/10.1016/j.eij.2024.100447

Agarwal, S., Haider, A., Jamwal, A., Dev, P., & Chandel, R. (2020). Biometric Based Secured Remote Electronic Voting System. 2020 7th International Conference on Smart Structures and Systems (ICSSS), 1–5. https://doi.org/10.1109/ICSSS49621.2020.9202212

Agrawal, A., Sethi, K., & Bera, P. (2023a). Blockchain-Based Cardinal E-Voting System Using Biometrics, Watermarked QR Code and Partial Homomorphic Encryption (pp. 411–436). https://doi.org/10.1007/978-981-19-6414-5_23

Agrawal, A., Sethi, K., & Bera, P. (2023b). Blockchain-Based Cardinal E-Voting System Using Biometrics, Watermarked QR Code and Partial Homomorphic Encryption (pp. 411–436). https://doi.org/10.1007/978-981-19-6414-5_23

Alamri, H., Alshanbari, E., Alotaibi, S., & Alghamdi, M. (2022). Face Recognition and Gender Detection Using SIFT Feature Extraction, LBPH, and SVM. Engineering, Technology & Applied Science Research, 12(2), 8296–8299. doi: 10.48084/etasr.4735

Ali, H. H., & Shaker, S. H. (2023). Secured E-voting system based on iris identification. 030025. doi: 10.1063/5.0119826

Araghi, T. K., & Manaf, A. A. (2019). An enhanced hybrid image watermarking scheme for security of medical and non-medical images based on DWT and 2-D SVD. Future Generation Computer Systems, 101, 1223–1246. doi: 10.1016/j.future.2019.07.064

B. O. Ahubele and Linda U. Oghenekaro. (2022). Secured Electronic Voting System Using RSA Key Encapsulation Mechanism. European Journal of Electrical Engineering and Computer Science, 6(2).

Bao, B., & Wang, Y. (2024a). A robust blind color watermarking algorithm based on the Radon-DCT transform. Multimedia Tools and Applications, 83(24), 64663–64682. https://doi.org/10.1007/s11042-023-17875-5

Bao, B., & Wang, Y. (2024b). A robust blind color watermarking algorithm based on the Radon-DCT transform. Multimedia Tools and Applications, 83(24), 64663–64682. https://doi.org/10.1007/s11042-023-17875-5

Fares, K., Khaldi, A., Redouane, K., & Salah, E. (2021). DCT & DWT based watermarking scheme for medical information security. Biomedical Signal Processing and Control, 66, 102403. https://doi.org/10.1016/j.bspc.2020.102403

Garg, P., & Kishore, R. R. (2022). An efficient and secured blind image watermarking using ABC optimization in DWT and DCT domain. Multimedia Tools and Applications, 81(26), 36947–36964. https://doi.org/10.1007/s11042-021-11237-9

Han, B., & Li, J. (2016). A New Zero-Watermarking Algorithm Resisting Attacks Based on Differences Hashing. Cybernetics and Information Technologies, 16(2), 135–147. https://doi.org/10.1515/cait-2016-0026

Harba, E. S., Harba, H. S., Abdulmunem, I. A., & Hussein, S. S. (2021). Improving security of the crypto-stego approach using time sequence dictionary and spacing modification techniques. Iraqi Journal of Science, 62(5), 1721–1733. https://doi.org/10.24996/ijs.2021.62.5.35

Hossain Faruk, M. J., Alam, F., Islam, M., & Rahman, A. (2024). Transforming online voting: a novel system utilizing blockchain and biometric verification for enhanced security, privacy, and transparency. Cluster Computing, 27(4), 4015–4034. https://doi.org/10.1007/s10586-023-04261-x

Hussein, N., Ali, M., & Kadhum, R. N. (2022). Using steganography techniques for implicit authentication to enhance sensitive data hiding. Article in The Journal of Nonlinear Sciences and Applications, 13, 2008–6822. https://doi.org/10.22075/ijnaa.2022.6211

Jayakumari, B., Sheeba, S. L., Eapen, M., Anbarasi, J., Ravi, V., Suganya, A., & Jawahar, M. (2024). E-voting system using cloud-based hybrid blockchain technology. Journal of Safety Science and Resilience, 5(1), 102–109. https://doi.org/10.1016/j.jnlssr.2024.01.002

Lee, C.-F., Chang, C.-C., Wang, Z.-H., & Di, Y.-F. (2021). A High Robust and Blind Image Watermarking Using Arnold Transform Mapping in the DCT Domain of YCbCr Color Space. Taiwan Ubiquitous Information, 6(3).

Li, L., Mu, X., Li, S., & Peng, H. (2020). A Review of Face Recognition Technology. IEEE Access, 8, 139110–139120. https://doi.org/10.1109/ACCESS.2020.3011028

Li, Z., Zhang, H., Liu, X., Wang, C., & Wang, X. (2021). Blind and safety-enhanced dual watermarking algorithm with chaotic system encryption based on RHFM and DWT-DCT. Digital Signal Processing, 115, 103062. https://doi.org/10.1016/j.dsp.2021.103062

Liu, D., Su, Q., Yuan, Z., & Zhang, X. (2021). A color watermarking scheme in frequency domain based on quaternary coding. The Visual Computer, 37(8), 2355–2368. https://doi.org/10.1007/s00371-020-01991-6

Lowe, D. G. (2004). Distinctive Image Features from Scale-Invariant Keypoints. In International Journal of Computer Vision (Vol. 60, Issue 2).

Mahagaonkar, R. V, & Shiurkar, U. D. (2023). A two way secured high imperceptible digital color image watermarking. S?dhan?, 48(4), 220. https://doi.org/10.1007/s12046-023-02299-6

Mohammed, A. O., Hussein, H. I., Mstafa, R. J., & Abdulazeez, A. M. (2023a). A blind and robust color image watermarking scheme based on DCT and DWT domains. Multimedia Tools and Applications, 82(21), 32855–32881. https://doi.org/10.1007/s11042-023-14797-0

Mohammed, A. O., Hussein, H. I., Mstafa, R. J., & Abdulazeez, A. M. (2023b). A blind and robust color image watermarking scheme based on DCT and DWT domains. Multimedia Tools and Applications, 82(21), 32855–32881. https://doi.org/10.1007/s11042-023-14797-0

Okokpujie, K., Abubakar, J., John, S., Noma-Osaghae, E., Ndujiuba, C., & Princess Okokpujie, I. (2021a). A secured automated bimodal biometric electronic voting system. IAES International Journal of Artificial Intelligence (IJ-AI), 10(1), 1. https://doi.org/10.11591/ijai.v10.i1.pp1-8

Okokpujie, K., Abubakar, J., John, S., Noma-Osaghae, E., Ndujiuba, C., & Princess Okokpujie, I. (2021b). A secured automated bimodal biometric electronic voting system. IAES International Journal of Artificial Intelligence (IJ-AI), 10(1), 1. https://doi.org/10.11591/ijai.v10.i1.pp1-8

Olumide S., A., Olutayo K., B., & E. Adekunle, S. (2020). A Review of Electronic Voting Systems: Strategy for a Novel. International Journal of Information Engineering and Electronic Business, 12(1), 19–29. https://doi.org/10.5815/ijieeb.2020.01.03

Oravec, J., Ovsenik, L., & Papaj, J. (2021). An Image Encryption Algorithm Using Logistic Map with Plaintext-Related Parameter Values. Entropy, 23(11), 1373. https://doi.org/10.3390/e23111373

Osama A. Salman, S. M. H. (2018). User Authentication via Mouse Dynamics. IRAQI JOURNAL OF SCIENCE, 59(2B). https://doi.org/10.24996/ijs.2018.59.2B.18

Pasha, X., & Jahankhani, H. (2024). Securing E-Voting Authentication: A Framework Integrating AI-Based Facial Recognition. In Navigating the Intersection of Artificial Intelligence, Security, and Ethical Governance: Sentinels of Cyberspace (pp. 19-46). Cham: Springer Nature Switzerland.

Pourjabbar Kari, A., Habibizad Navin, A., Bidgoli, A. M., & Mirnia, M. (2021). A new image encryption scheme based on hybrid chaotic maps. Multimedia Tools and Applications, 80(2), 2753–2772. https://doi.org/10.1007/s11042-020-09648-1

Rahman, K. N., Hridoy, M. W., Mizanur Rahman, M., Islam, M. R., & Banik, S. (2024). Highly secured and effective management of app-based online voting system using RSA encryption and decryption. Heliyon, 10(3), e25373. https://doi.org/10.1016/j.heliyon.2024.e25373

Rajab, M. (2023). Human Identification Based on SIFT Features of Hand Image. International Journal of Computing and Digital Systems, 14(1), 367–375. https://doi.org/10.12785/ijcds/140128

Reyam Jassim Essa, N. A. Z. A. R. D. A.-D. (2018). Steganography Technique using Genetic Algorithm. IRAQI JOURNAL OF SCIENCE, 59(3A). https://doi.org/10.24996/ijs.2018.59.3A.19

Saleh, F. F., & Ali, N. H. M. (2022). Generating Streams of Random Key Based on Image Chaos and Genetic Algorithm. Iraqi Journal of Science, 3652–3661. https://doi.org/10.24996/ijs.2022.63.8.39

Sarkar, A., & Singh, B. K. (2020). A review on performance,security and various biometric template protection schemes for biometric authentication systems. Multimedia Tools and Applications, 79(37–38), 27721–27776. https://doi.org/10.1007/s11042-020-09197-7

Sherine, A., Peter, G., Stonier, A. A., Leh Ping, D. W., Praghash, K., & Ganji, V. (2022). Development of an Efficient and Secured E-Voting Mobile Application Using Android. Mobile Information Systems, 2022, 1–11. https://doi.org/10.1155/2022/8705841

Su, Q., Hu, F., Tian, X., Su, L., & Cao, S. (2024). A fusion-domain intelligent blind color image watermarking scheme using graph-based transform. Optics and Laser Technology, 177. https://doi.org/10.1016/j.optlastec.2024.111191

Takaki, T., Li, Y., Sakiyama, K., Nashimoto, S., Suzuki, D., & Sugawara, T. (2020). An Optimized Implementation of AES-GCM for FPGA Acceleration Using High-Level Synthesis. 2020 IEEE 9th Global Conference on Consumer Electronics, GCCE 2020, 176–180. https://doi.org/10.1109/GCCE50665.2020.9291973

Tamilselvi, M., Manimaran, B., & Inunganbi, S. C. (2023). Empirical Assessment of Artificial Intelligence Enabled Electronic Voting System Using Face Biometric Verification Strategy. 2023 Eighth International Conference on Science Technology Engineering and Mathematics (ICONSTEM), 1–7. https://doi.org/10.1109/ICONSTEM56934.2023.10142923

Tian, C., Wen, R.-H., Zou, W.-P., & Gong, L.-H. (2020). Robust and blind watermarking algorithm based on DCT and SVD in the contourlet domain. Multimedia Tools and Applications, 79(11–12), 7515–7541. https://doi.org/10.1007/s11042-019-08530-z

Waheed, A., Din, N., Umar, A. I., Ullah, R., & Amin, N.-. (2021). Novel Blind Signcryption Scheme for E-Voting System Based on Elliptic Curves. Mehran University Research Journal of Engineering and Technology, 40(2), 314–322. https://doi.org/10.22581/muet1982.2102.06

Yousif, H. M., & Hameed, S. M. (2024). Preserving Genotype Privacy Using AES and Partially Homomorphic Encryption. Iraqi Journal of Science, 1663–1678. https://doi.org/10.24996/ijs.2024.65.3.38

Zhan, Y., Zhao, W., Zhu, C., Zhao, Z., Yang, N., & Wang, B. (2024). Efficient Electronic Voting System Based on Homomorphic Encryption. Electronics, 13(2), 286. https://doi.org/10.3390/electronics13020286

Zhang, X., & Su, Q. (2021). A spatial domain?based color image blind watermarking scheme integrating multilevel discrete Hartley transform. International Journal of Intelligent Systems, 36(8), 4321–4345. https://doi.org/10.1002/int.22461

Zhang, Y., & Sun, Y. (2019). An image watermarking method based on visual saliency and contourlet transform. Optik, 186, 379–389. https://doi.org/10.1016/j.ijleo.2019.04.091

Downloads

Published

2025-06-08

How to Cite

Abdullah, A., & Hussein M. Ali, N. . (2025). Secure E-Voting System Utilizing Fingerprint Authentication, AES-GCM Encryption and Hybrid Blind Watermarking. Journal of Applied Engineering and Technological Science (JAETS), 6(2), 997–1018. https://doi.org/10.37385/jaets.v6i2.6223