Finally, another option is to modify the design of
electronic voting systems using approaches not vul-
nerable to the secret channel attacks. In this cases it
is worth to change the design for better security.
6 CONCLUSION
The use of QR Codes has increased during the last
years, specially thanks to the possibility to scan them
using smartphones. In addition, the usage of these
codes has been integrated in applications, such as
ticketing systems, tracking systems, and so on. As ex-
plained in this paper the field of electronic voting sys-
tems has not been an exception. QR codes have been
integrated in different electronic voting solutions.
QR codes can be easily manipulated to include
hidden information. In this paper we have demon-
strated this by modifying a QR reader/writer appli-
cation for smartphones that inserts and reads hidden
messages to the QR codes. Thus, as we explained the
usage of QR codes can be exploited to attack the pri-
vacy of voters and verifiability properties of electronic
voting systems.
The threat and explotation technique of the elec-
tronic voting system using QR codes depends on the
place and purpose of the code usage. Most of the at-
tacks can be detected, and in some cases prevented,
at QR level. Some additional security controls can
be applied to increase the security of the system. As
a conclusion we claim that QR codes can be used in
electronic voting systems, but always considering the
possibility these codes have to include hidden infor-
mation. So the systems have to be designed accord-
ingly and the corresponding additional measures put
in place.
REFERENCES
(2014). Wombat Voting System. http://www.wombat-
voting.com.
Chaum, D. L. (1981). Untraceable electronic mail, return
addresses, and digital pseudonyms. Commun. ACM,
24(2):84–90.
Chen, W.-Y. and Wang, J.-W. (2009). Nested image
steganography scheme using QR-barcode technique.
Optical Engineering, 48(5).
Chung, C.-H., Chen, W.-Y., and Tu, C.-M. (2009). Image
hidden technique using QR-Barcode. In Fifth Interna-
tional Conference on Intelligent Information Hiding
and Multimedia Signal Processing, 2009. IIH-MSP
’09, pages 522–525.
Dey, S., Mondal, K., Nath, J., and Nath, A. (2012). Ad-
vanced steganography algorithm using randomized in-
termediate QR host embedded with any encrypted
secret message: ASA
QR algorithm. International
Journal of Modern Education and Computer Sci-
ence(IJMECS), 4(6).
Elektroonilise hletamine komisjon (2014).
Verification of Internet votes.
https://www.valimised.ee/eng/nutitelefon.
Farhi, N. (2013). An implementation of dual (paper and
cryptograhic) voting system. Master thesis, Tel Aviv
University.
Fujioka, A., Okamoto, T., and Ohta, K. (1993). A practi-
cal secret voting scheme for large scale elections. In
Seberry, J. and Zheng, Y., editors, Advances in Cryp-
tology AUSCRYPT ’92, volume 718 of Lecture Notes
in Computer Science, pages 244–251. Springer Berlin
Heidelberg.
Gharadaghy, R. and Volkamer, M. (2010). Verifiability in
electronic voting - explanations for non security ex-
perts. In Krimmer, R. and Grimm, R., editors, Elec-
tronic Voting, volume 167 of LNI, pages 151–162. GI.
Huang, H.-C., Chang, F.-C., and Fang, W.-C. (2011). Re-
versible data hiding with histogram-based difference
expansion for QR code applications. IEEE Transac-
tions on Consumer Electronics, 57(2):779–787.
ISO/IEC (2006). ISO/IEC 18004:2006. information tech-
nology – automatic identification and data capture
techniques – qr code 2005 bar code symbology speci-
fication.
Lin, P.-Y., Chen, Y.-H., Lu, E., and Chen, P.-J. (2013). Se-
cret hiding mechanism using QR barcode. In 2013 In-
ternational Conference on Signal-Image Technology
Internet-Based Systems (SITIS), pages 22–25.
Maaten, E. and Hall, T. (2008). Improving the transparency
of remote e-voting: The estonian experience. In Krim-
mer, R. and Grimm, R., editors, 3rd international
Conference on Electronic Voting 2008, volume 131 of
LNI GI, pages 31–43. Gesellschaft fr Informatik (GI).
Reed, I. S. and Solomon, G. (1960). Polynomial codes over
certain finite fields. Journal of the Society for Indus-
trial & Applied Mathematics, 8(2):300–304.
Sako, K. and Kilian, J. (1995). Receipt-free mix-type vot-
ing scheme. In Guillou, L. and Quisquater, J.-J., edi-
tors, Advances in Cryptology EUROCRYPT 95, vol-
ume 921 of Lecture Notes in Computer Science, pages
393–403. Springer Berlin Heidelberg.
Vegas, C. (2012). The new belgian e-voting system. In
Kripp, M., Volkamer, M., and Grimm, R., editors, 5th
International Conference on Electronic Voting 2012
(EVOTE2012), volume P-205 of LNI GI, pages 200–
213. Gesellschaft fr Informatik (GI).
Volkamer, M., Budurushi, J., and Demirel, D. (2011). Vote
casting device with VV-SV-PAT for elections with
complicated ballot papers. In Requirements Engineer-
ing for Electronic Voting Systems (REVOTE), 2011 In-
ternational Workshop on, pages 1–8.
von Bergen, P. (2012). Swissivi: Proof-of-concept for a
novel e-voting platform.
ZXing (2014). Zxing (Zebra Crossing Barcode Scanner Li-
brary). https://github.com/zxing/zxing.
QRSteganography-AThreattoNewGenerationElectronicVotingSystems
491