In an age of rapid technological progress and digital transformation, the convergence of voting systems and biometric authentication stands as one of the most pressing areas for innovation and security. The transition from traditional paper ballots to electronic voting has been a subject of intense debate for years, with concerns over privacy, accuracy, and security often taking center stage. As we strive to make voting systems more accessible, efficient, and secure, the integration of biometric authentication offers a promising solution to some of these challenges.
Secure Online Voting Using Biometric Authentication and Public Key Encryption provides a comprehensive exploration of the technologies, methodologies, and potential applications of biometric systems in internet voting. From understanding the different types of biometric data to examining the advantages and challenges of implementing such systems on a global scale, it lays out both the theoretical and practical aspects of building a secure online voting infrastructure. The exploration of cryptographic solutions and the legal and ethical implications of biometric data collection also form a critical part of the narrative.
However, as with any new technology, the adoption of internet voting with biometrics comes with its set of challenges. Privacy concerns, data protection regulations, the risk of cyberattacks, and the digital divide all require careful consideration and a thoughtful approach to ensure the success of such systems. This book addresses these concerns headon, providing a balanced view of the promises and pitfalls of this transformative technology.
As we venture into this brave new world of digital democracy, the insights offered in Secure Online Voting Using Biometric Authentication and Public Key Encryption are invaluable for policymakers, technology developers, security experts, and anyone interested in the future of democratic participation. It not only illuminates the technical possibilities but also explores the broader implications of this technology, offering a road map for the future of democratic elections in the digital age.
Sprache
Verlagsort
Verlagsgruppe
Zielgruppe
Für höhere Schule und Studium
Für Beruf und Forschung
Academic, Postgraduate, Professional Reference, and Undergraduate Advanced
Illustrationen
62 s/w Zeichnungen, 69 s/w Abbildungen, 7 s/w Photographien bzw. Rasterbilder, 56 s/w Tabellen
56 Tables, black and white; 62 Line drawings, black and white; 7 Halftones, black and white; 69 Illustrations, black and white
Maße
Höhe: 254 mm
Breite: 178 mm
ISBN-13
978-1-032-55931-5 (9781032559315)
Copyright in bibliographic data and cover images is held by Nielsen Book Services Limited or by the publishers or by their respective licensors: all rights reserved.
Schweitzer Klassifikation
Dr. Ajish S is working as a Principal and Assistant Professor in Computer Science and Engineering, College of Engineering Aranmula, Kerala, India. He has completed his PhD in Technology Management (Information Security) from the University of Kerala in the year 2022 and an M-Tech in Computer Science and Engineering (Information Security) from the College of Engineering Trivandrum, Kerala, in the year 2014. He has more than 20 years of teaching and research experience and has published more than 10 research papers in international journals, and has presented 5 research papers at international conferences.
Dr. K S Ail Kumar is working as a Registrar in the University of Kerala, Kerala, India. He has completed his PhD from the University of Kerala and an M-Tech in Technology Management (Information Security) from the University of Kerala. He has more than 25 years of academics/administration experience and has published more than 25 research papers at international journals and has published 6 books. He has presented 8 research papers in international conferences and 19 research papers at national conferences/seminars.
1. Introduction 2. Internet Voting and Biometric Authentication 3. Internet Voting System with Modified Voting and Verification 4. Internet Voting Using QR Code and Biometric Authentication 5. Secure Mobile Internet System Using QR Code and Biometric Authentication 6. Security Enhancement of Symmetric Hashed Fingerprint Template 7. Performance Enhancement of Symmetric Hashed Fingerprint Template 8. Iris Template Protection Using Double Bloom Filter-Based Feature Transformation 9. Secure Mobile Internet Banking System Using QR code and Biometric Authentication 10. Conclusion