Abstract: Phishing is one amongst the foremost common social engineering attacks that users over the web fall for. Associate degree example is balloting systems, and since such systems ought to be correct and error free, phishing interference techniques square measure crucial. Visual Cryptography (VC) is employed for economical electoral system authentication to solid votes. VC is one amongst the foremost secure approaches for privacy protection because it ensures the confidentiality of the electoral system. This paper discusses planned phishing interference strategies and compares totally different proposed strategies.

Keywords: Remote Voting System (RVS), Voting System (VS), Shares Ballots, Commons Attribution International Authentication, Visual Cryptography, Phishing, Captcha.

PDF | DOI: 10.17148/IJARCCE.2022.111138

Open chat
Chat with IJARCCE