loading
  • Login
  • Sign-Up

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Jordi Cucurull 1 ; Sandra Guasch 1 ; Alex Escala 1 ; Guillermo Navarro-Arribas 2 and Víctor Acín 2

Affiliations: 1 Scytl Secure Electronic Voting, Spain ; 2 Universitat Autònoma de Barcelona, Spain

ISBN: 978-989-758-045-1

Keyword(s): QR, Security, Steganography, Electronic Voting.

Related Ontology Subjects/Areas/Topics: Data and Application Security and Privacy ; Information and Systems Security ; Information Assurance ; Information Hiding ; Privacy

Abstract: Quick Response (QR) codes, used to store machine readable information, have become very common nowadays and have found many applications in different scenarios. One of such applications is electronic voting systems. Indeed, some electronic voting systems are starting to take advantage of these codes, e.g. to hold the ballots used to vote, or even as a proof of the voting process. Nevertheless, QR codes are susceptible to steganographic techniques to hide information. This steganographic capability enables a covert channel that in electronic voting systems can suppose an important threat. A misbehaving equipment (e.g. infected with malware) can introduce hidden information in the QR code with the aim of breaking voters’ privacy or enabling coercion and vote-selling. This paper shows a method for hiding data inside QR codes and an implementation of a QR writer/reader application with steganographic capabilities. The paper analyses different possible attacks to electronic voting systems that leverage the steganographic properties of the QR codes. Finally, it proposes some solutions to detect the mentioned attacks. (More)

PDF ImageFull Text

Download
Sign In Guest: Register as new SCITEPRESS user or Join INSTICC now for free.

Sign In SCITEPRESS user: please login.

Sign In INSTICC Members: please login. If not a member yet, Join INSTICC now for free.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 23.22.50.12. INSTICC members have higher download limits (free membership now)

In the current month:
Recent papers: 1 available of 1 total
2+ years older papers: 2 available of 2 total

Paper citation in several formats:
Cucurull J., Guasch S., Escala A., Navarro-Arribas G. and Acín V. (2014). QR Steganography - A Threat to New Generation Electronic Voting Systems.In Proceedings of the 11th International Conference on Security and Cryptography (ICETE 2014)ISBN 978-989-758-045-1, pages 484-491. DOI: 10.5220/0005120404840491

@conference{secrypt14,
author={Jordi Cucurull and Sandra Guasch and Alex Escala and Guillermo Navarro-Arribas and Víctor Acín},
title={QR Steganography - A Threat to New Generation Electronic Voting Systems},
booktitle={Proceedings of the 11th International Conference on Security and Cryptography (ICETE 2014)},
year={2014},
pages={484-491},
doi={10.5220/0005120404840491},
isbn={978-989-758-045-1},
}

TY - CONF

JO - Proceedings of the 11th International Conference on Security and Cryptography (ICETE 2014)
TI - QR Steganography - A Threat to New Generation Electronic Voting Systems
SN - 978-989-758-045-1
AU - Cucurull J.
AU - Guasch S.
AU - Escala A.
AU - Navarro-Arribas G.
AU - Acín V.
PY - 2014
SP - 484
EP - 491
DO - 10.5220/0005120404840491

Sorted by: Show papers

Note: The preferred Subjects/Areas/Topics, listed below for each paper, are those that match the selected paper topics and their ontology superclasses.
More...

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.

Show authors

Note: The preferred Subjects/Areas/Topics, listed below for each author, are those that more frequently used in the author's papers.
More...