Journal of Applied Engineering and Technological Science Vol 6. 2025: 997-1018 SECURE E-VOTING SYSTEM UTILIZING FINGERPRINT AUTHENTICATION. AES-GCM ENCRYPTION AND HYBRID BLIND WATERMARKING Asia Abdullah Ahmed1. Nada Hussein M. Ali2 College of science. Department of Computer Science. University of Baghdad. Baghdad. Iraq 12 ahmed2201m@sc. iq1, nada. husn@sc. Received: 01 October 2024. Revised: 13 January 2025. Accepted: 22 January 2025 *Corresponding Author ABSTRACT Ensuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. This paper describes the e-voting system by integrating the biometric authentication, advanced encryption, and watermarking techniques towards meeting such challenges. The system employs the fingerprint authentication by utilizing the Scale-Invariant Feature Transform (SIFT) for verifying the identity of the voter to ensure genuineness and non-repudiation of the service. The vote will be encrypted with the AES-GCM technique to be employed in securing the voting process, thus ensuring both data privacy and integrity. Hybrid Blind Watermarking employs the technique of Discrete Wavelet Transform (DWT) and Discrete Cosine Transform (DCT) for embedding the encrypted vote into the colored watermark cover image. Increased robustness against attacks with maintained vote confidentiality is achieved through this approach. The experimental results proved its imperceptibility to reach a Peak Signal-to-Noise Ratio (PSNR) of 40. 7 and Normalized Correlation (NC) of 1. Thus, the proposed system enhances the theoretical foundation of secure e-voting and provides an implementation strategy for a reliable and tamper-proof voting system. Keywords: E-Voting. Fingerprint Authentication. Encryption. Blind Watermarking. Introduction An election is a democratic procedure when the entire population choose a candidate to assume the leadership of the state. This concept entails switching from the traditional mode of voting, which is based on paper ballots, to voting by electronic means. It involves a number of challenges that are concerned with preventing attempts to manipulate the results of the voting and ensuring that the results are accurate. Starting with a paper-based voting procedure that has negative consequences such as multiple voting, result manipulation, and unprotected digital transmission, leading to in having issues with election integrity (Olumide S. et al. , 2. E-voting encompasses many methods and aims to optimize and enhance the precision of the voting, tallying, and counting processes compared to traditional approaches (Sarkar et al. The previously developed electronic voting was unable to technically address the identified issues of voter impersonation . , confidentiality, integrity and secrecy (Olumide S. et al. , 2. The integration biometric technology such as the face recognition and fingerprint within the e-voting system had improve voting systems, the entire voting process and enhancing the privacy (L. Li et al. , 2. by identifying person based on their biometric traits to avoid multiple voting and impersonates (Okokpujie et al. , 2021. as well as the distinct advantages compared to other authentication methods in terms of being impossible to forget and difficult to be altered (Osama A. Salman, 2. The standard biometrics system consists of several stages, which include enrollment, verification, identification, and matching (Hossain Faruk et al. , 2. The iris in was utilized in (Ali et al. , 2. as a secure method for the voter authentication process while in (Pasha & Jahankhani, 2. the facial recognition is utilized to authenticate voters using algorithms such as the Haar Classifier to ensure accurate identity verification, transparency, and security in electronic voting, supported by robust database management and a secure network infrastructure. Securing the vote after the voter being identified is a fundamental feature of any e-voting The encryption has undergone significant advancements in the past few years (Abdallah et al. , 2. due to its ability for converting the data to non-understandable form (Reyam Jassim Essa, 2. The encryption incorporates key security measures to the e-voting such as Ahmed & M. Ali A Vol 6. 2025: 998-1018 confidentiality, non-repudiation and the prevention of intermediary involvement by encrypting the voter's votes (Waheed et al. , 2. (B. Ahubele and Linda U. Oghenekaro, 2. The modified ElGamal homomorphic encryption had been utilized in the secure e-voting system(Agrawal et al. , 2023. for encrypt the vote though ensuring the secrecy and enabling additive computations while the Homographic was employed for achieving balancing between efficiency and privacy as well as ensuring the voting system resistance against robust attacks(Zhan et al. , 2. While the Watermarking concept was shown for protecting the sensitive data by embedding it into a multimedia file (Ghrare. Adim Mohamad Alamari and Emhemed, 2. and protecting the copyrights (Mohammed et al. , 2. In the field of e-voting systems the watermark technologies adopted to ensuring the of data security by preventing unauthorized access or manipulation (Nakirya Brenda Kintu, 2. (Agrawal et al. , 2023. in addition to enhance the security level though to the robustness to preserve the integrity verification(Han et , 2. For achieving comprehensive security throughout the voting process, the proposed paper presents a secure electronic voting system that integrate the objective of fingerprint authentication for voter verification with the encryption and the watermarking techniques for securing the vote process. The voter authenticated with two authentication step including Sixdigit passcode in addition to the fingerprint. SIFT algorithm was selected as the means for voter This strategy involves detecting and matching the key point of the stored and entered fingerprint image. The consequent scenario about ensuring data integrity by perform vote encryption using the AES-GCM method. Lastly, to further enhance vote security, and achieve confidentiality the encrypted vote is embedded into a colored watermark cover image using blind hybrid DWTDCT watermarking techniques. by convert the encrypted vote into binary representation then perform the embedding into binary watermark image and lastly embedding the watermark image into colorful image using DWT and DCT. Figure 1 presents the general framework procedure of the proposed system. The primary contribution of the main system is: - The development of a voter authentication system that utilizes fingerprint recognition and a unique 6-digit passcode. - Implement a strong and reliable voting scenario by utilizing the encryption with blind watermarking technique with new imbedding procedure for ensure the robustness against - Assess the system's performance by testing the voting results in the presence of several Ahmed & M. Ali A Vol 6. 2025: 998-1018 Fig. The General Framework of The E-Voting Process Literature Review By analyzing the related work for both the e-voting systems and blind watermarking, the proposed work takes the advantage for integrates the voter authentication and vote securing that leveraging the encryption and the hybrid watermarking the integration for improving the system's robustness against various attacks, ensuring the reliability of vote storage and retrieval. These innovations collectively enhance the security, reliability, and scalability of e-voting systems, making them suitable for real-world applications. 1 E-voting systems E-voting systems bring the future of a secure and trustworthy democracy concerned with voter authenticity and data integrity. Advanced techniques have been used the e-voting systems including voter verification and securing the votes during transmission and storing for covering challenges concerning about unauthorized access, vote confidentiality and integrity. According to (Agarwal et al. , 2. the system aims to prevent booth capturing, fraudulent voting, and tampering in the voting process by utilizing Arduino microcontroller, fingerprint sensors, and a keypad interface, fingerprint technology to verify the identity of the However, the system may not be accessible in regions with limited network connectivity furthermore lack of securing data mechanism during the transmission and storage. In (Okokpujie et al. , 2021. the author suggested utilizing two distinct biometric traits . ris and fingerprint ) using specialized sensors (Irishield-UART MO2120 and Digital Persona U&U 4. to enhance the overall security and reliability of electoral procedures. However, the report does not sufficiently address the detection of data tampering inside the database and the dependency on centralized database could possess a potential bottleneck causing data (Sherine et al. , 2. propose a three-step mobile e-voting security solution. Captcha, phone OTP, and fingerprint verification are security measures. The e-voting program has robust verification requirements, however there is not enough information about the communication protocol's encryption technology and the evaluation of the system performance with university student may pose large scale election issues. Ahmed & M. Ali A Vol 6. 2025: 998-1018 (Tamilselvi et al. , 2. proposed an AI-driven facial detection and identification system for online voting uses machine learning and deep learning to evaluate facial traits. This study success in improving online voting security, eligibility, preventing repeated votes, voter confidentiality, and accurate vote tallying are the main goals. While the research lacks a complete analysis of measures against counterfeit face representations and focuses on MySQL's role in data administration, ignoring data security. The study (Adeniyi et al. , 2. presents a blockchain-based e-voting system that integrates fingerprint biometrics. The voter fingerprints utilized to generate unique private and public cryptographic keys will help maintain voter anonymity and avoid any tampering. The use of blockchainAos unchangeable ledger and smart contracts will create a clear place for vote casting and verification, solving the main problems that exist within these traditional systems of 400 votersAo testing showed good performance. further research is recommended to enhance the robustness, including hybrid encryption. The implementation of this system in a real-world scenario with a big population is still pending. The use of encryption methods is seen as an effective means of securing data during In a recent study(Rahman et al. , 2. , the author proposes a blockchain and biometric verification integrated online voting system with special concern to secure data transmission through RSA encryption. The main objective is to use RSA encryption and digital signature as a robust technique in ensuring the security, privacy, and transparency of the election by implementing end-to-end confidentiality and authenticity of the votes. The positive side of RSA includes its wide acceptance and well-established mathematical background in securing However, cryptographic weaknesses are established as inefficient due to the large size of keys, non-performing speed with modern algorithms like ECC, and susceptibility to quantum computing. In the study referenced as (Jayakumari et al. , 2. , the author suggested a system comprising the Key Generation Center (KGC). Election Commission Authority (ECA). IoT devices. Edge Server. Cloud Server, and Hybrid Blockchain Network. The purpose of this system is to improve the security, transparency, and reliability of the existing E-voting system. Despite the system's outstanding performance, users still require more time to adapt and be educated on a wide scale. 2 blind watermarking Blind watermarking is plays a critical role in securing the communication. an idea we shall use throughout this series of articles. The proposed system employs a hybrid watermarking technique which incorporates advanced embedding methodologies for maintaining the imperceptibility as well as the robustness of information. In (Tian et al. , 2. the author combined the Contourlet Transform (CT). Discrete Cosine Transform (DCT), and Singular Value Decomposition (SVD). For enhancing the robustness the low-frequency band is selected for the embedding after applying the CT to the host image. Perform the DCT on non-overlapping block for obtaining the D matrix coefficient. Lastly in the SVD the embedding procedure done by adjusting the largest value in SVD in the carrier matrix that obtained form preforming Zigzag on the D matrix. The reached PSNR of the study about 40. The research in (X. Zhang et al. , 2. aims to create blind watermarking for protect the copy right in the 5G network environment by embedding the watermark into color watermark host employing the discrete Hartley transform (DHT) in the spatial domain. While the embedding capacity 0. 0625 bits per pixel that suitable for many applications, probably not enough in situations that need large amount of watermarking data. The Achieved PSNR about 40 db. While the research (Lee et al. , 2. propose to protect the copy right by scrambling the host image using Arnold transform map, then converting the scrambling image into YCbCr. the watermark, encryption with private key performed and abending into the DCT coefficients of 8*8 non overlapping block within Y. Cb and Cr. lastly the embedding applied multiple times and perform voting mechanism during the extraction in order to improve the robustness. The Ahmed & M. Ali A Vol 6. 2025: 998-1018 multiple embedding may degrade the robustness as a potential drawback. The reached PSNR about db37 to 45db In (D. Liu et al. , 2. the authors propose a color image watermarking scheme in the frequency domain with Schur decomposition and quaternary coding for balancing visual imperceptibility and robustness against attacks as well as increasing watermark capacity. Though it has quite appreciable visual imperceptibility . he average PSNR is higher than 36 dB) and strong robustness (NC values are from 0. 95 to 1. against attacks. The authors in (Mohammed et al. , 2023. propose a self-adaptive scheme to choose either green or blue for more robustness. DCT-DWT determined for embedding the watermark. increase the level of security the watermark image is encrypted using chaotic logistic map. regardless of robustness the watermark image not recognizable on rotation attack as the drawback of the proposed scheme. The propose technique in (Mahagaonkar et al. , 2. combines DWT and SVD using Human Visual System (HVS) where the input image converted form RGB into HVS to apply the 2-level DWT to the v channel decomposing it into LL. LH. HL, and HH sub-bands. The SVD implemented on LH. HL and HH that divided into 4*4 blocks where the random binary sequence applied in the LH and the watermark logo embedded in HL and HH sub-bands by modifying singular values based on calculated means and an optimal threshold. Despite that selecting of the optimal threshold may leads to potential complexity. The PSNR of the proposed work about 30db to 37 db. The proposed work in (Bao and Wang, 2. is a robust blind color watermarking algorithm based on Radon and DCT transforms. Watermark bits are incorporated into the midfrequency coefficients of the DCT of Radon transformed blocks of the U component in the YUV color space. Security is enhanced using the Arnold transform and random permutation, whereas geometric correction ensures robustness against attacks. The experimental results gave an average PSNR above 37 dB and NC=0. 9769 on average for all attacked samples. The method proposes in (Su et al. , 2. to introduce a fusion-domain blind color image a watermarking approach using Graph-Based Transform (GBT) to improve efficiency, robustness, and security. GBT coefficient computation is simplified in the spatial domain of GBT while using a simplified Chen chaotic encryption process and finally, adaptive embedding strength using Particle Swarm Optimization (PSO). The average PSNR is more than 40 dB while NC above 0. Preliminaries In this section the employed method in the proposed e- voting system will be viewed. 1 SIFT SIFT is a feature extraction technique was presented by David G. Lowe(Lowe, 2. that extract features that not effected by objects operation like scaling and rotation. The sift take the input image and convert it into large group of local feature vector known as key points(Alamri et al. , 2022(. The SIFT devided into four steps (Rajab, 2. : . Scale-Space Extrema Detection: searching the scales in the image by using difference-of-Gaussian to identify potential key points that are rotation and scaling invariant. Keypoint Localization: A detailed model is fitted for identifying the location and scale at each potential location. based on indicators of stability the key points are chosen. Orientation Assignment: One or more local image gradient orientations are assigned to each key point location. All subsequent processes use image data transformed to account for feature orientation, scale, and location. Keypoint Descriptors: Each key point location is assigned one or more orientations based on the local image gradient orientations. 2 AES-GCM The AES is a symmetric block cipher algorithm(Yousif et al. , 2. that has key sizes of 128, 192, and 256 bits. The length of the key corresponds to the number of 32-bit words in the The AES considered as a symmetric key encryption algorithm(Harba et al. , 2. The National Institute of Standards and Technology (NIST) developed the incorporation of Galois Ahmed & M. Ali A Vol 6. 2025: 998-1018 Counter Mode (GCM) is a cryptographic mode of operation and the Advanced Encryption Standard (AES)(Hussein et al. , 2. The AES-GCM has three main concepts: firstly, the authentication encryption that considered as a cryptographic method offering the confidentiality and authenticity. transforming of plaintext into ciphertext by incorporating a random sequence that is generated by encrypting an incrementing counter with AES. This ensures both encryption and authentication. And lastly the GHASH as a hash function within AES-GCM to generating authentication tag that ensures the data integrity(Takaki et al. , 2. 3 DCT DCT is a technique used to convert the image from the spatial domain to the frequency domain where the DCT compress the image by transforming it into sum of frequencies and applying the quantization(Garg et al. , 2. DCT has been employed in numerous image processing technologies, including JPEG compression. The DCT of a N y N image f . , . can be defined by Eq. (Z. Li et al. , 2. Oc Oc Where C. is the DCT coefficient at the u, v position , the input image at the position x, y . N is the size of the block and . is the scaling factor . 4 DWT DWT considered as a multi-resolution approach, used for transform the signal from the spatial domain into different levels of the time-frequency domain. It has a great energy compaction property, which is why it is used in image processing applications, such as image denoising and image compression (Mohammed et al. , 2023. The DWT decompose the image into four sub bands called LL. LH. HL. HH. In order to determine the coefficients of each subband, we can compute them using the Haar filter in the following manner in the Eq. (Fares et al. , 2. LL. = . LH. = . HL. = . HL. = . 5 Arnold cat`s map The Arnolds cat's theory of map considers that transition in math that is random in the pixels of images. applying this transformation multiple times will lead to increase in the pixel scrambling, but after a specific number of iterations the original image will appear again. The Arnold transform is defined by the equation . ( ) )( ) Where N is the image size, a and b positive integer, is the pixel original position is the new position of the pixel (Pourjabbar Kari et al. , 2. 6 Logistic Map The logistic map is one of the Most essential type of chaotic map(Saleh et al. , 2. and consider as a one-dimensional map that produces one value every iteration called an iterate. The logistic map employs a single parameter called r which is between 0 and 4, and the which is between 0 and 1. Equation . calculates the new value as follows: = ycA . Oe ) . Ahmed & M. Ali A Vol 6. 2025: 998-1018 Where n . ,2,3A. N} and N referring to the total number of iterations. To achieve unpredictable chaotic behavior, the transient period that refer to the first 1000 iteration is discarded (Oravec. Ovsenik and Papaj, 2. Research Methods The proposed system methodology contains several stages for completing reliable voting 4 Registration process The first stage in the voting system is obtaining the voters information to be inserted within the system database. The voters information including voter name, age, workplace and phone number in addition core data Represented by the voter fingerprint and auto-generated unique pass-code to ensure firstly only eligible voters could vote and each voter vote once. 4 Authentication process In authentication procedure the voter authenticated firstly by matching the six-digit passcode then matching the voter fingerprint relying on SOCOfing dataset that contain in image for 6000 African subjects. SIFT is the technique used to detect and extract the features form the stored and interred fingerprint. The technique used to detect key points and compute the For matching process the SIFT algorithm employs the FLANN (Fast Library for Approximate Nearest Neighbour. The total number of good matches are compared with the static threshold with matching of the stored and entered passcode to decide either the voter authenticated or not and preparing for the voting process. 3 Voting process In the proposed work the voting process including several steps: Step 1: In Voting scenario the voter passcode with the candidate id will be concatenated into single string. Initializing AES within GCM mode to encrypt the string with the secret key and Step 2: The obtained cipher text will be converted to binary string of 0`s and 1`s to be ready for the embedding to binary watermark of size 32*32. Next, the watermarked image will be scrambled with logistic map as shown in Figure 2. Fig. The Watermark Preparing Process Step 3: start embedding the watermark image into colored host image. Firstly, the colored image converted into YCbCr to embed the binary watermark in the Y component then apply the DWT to the extracted Y component using Haar wavelet transform for decomposing the image into the frequency bands. Ahmed & M. Ali A Vol 6. 2025: 998-1018 Step 4: divide the HH frequency band into 4*4 non-overlapping sub-block then initialize a list of 4*4 matrices to embed the sub-blocks within the list. step 5: perform chaotic map to choose the 4*4 sub-block that will be modified during the embedding of the binary watermark. And apply the DCT is applied to the selected 4x4 block. this case, the DCT is used to change the spatial domain of the image block into the frequency domain, which helps in separating low-frequency from high-frequency components within the The combination of DCT and DWT was chosen due to the DCT ability in minimizing the visual distortion associated with watermarking by embedding the watermark within low or midrange components, while DWT provides a variety of resolution levels, this enables the watermark to be robust against attacks. This hybrid method is essential to preserving the invisibility and robustness of the watermarking process. Within each transformed block, the top left 2x2 sub-matrix that corresponds to the low-frequency components will be modified based on the watermark bit value. Phase 6: Applying the max-average-threshold equation to the top left 2*2 sub matrices that represent the low frequency part, where the total summation of the max value of the 2*2 subblock with the average of the 2*2 sub block will be added to a constant value determined to be 110 as shown in . T= MAX (|A_. |) AVG (|A_. |) 110 Where: A_. Represents a 2x2 sub-matrix of DCT coefficients transformed block. MAX (| |) refer to the maximum absolute value in the 2x2 sub-matrix . AVG (|A_. |) denotes to absolute average values of all elements in the 2x2 sub-matrix. And 110 is static threshold value added to ensure robustness. This equation computes a T value that combine the maximum value and an average of the values in the 2x2 sub-matrix. Where the max value refers to the strongest feature in the block while the average spread out the change across the overall block and the value 110 controls the strength of the modification hence the modification is both stable and imperceptible. The 110 Such a formula makes sure that embedding changes are consistent with block characteristics and not too much of disruption to vision content, thus giving robustness to the The embedding done by checking the watermark bit if the bit equal to 1 then the top left coefficient of block . will be modified by adding the T value result from the equation. If the bit equal to 0, the coefficient at . , . is modified. For the bit equal to -1, the top-right coefficient . , . is changed, and when the bit value , the bottom-right coefficient . , . is Step 7: finally, perform inverse DCT (IDCT) to the modified coefficient, to convert the host image back to the spatial domain resulting a colored image containing the watermark image. Figure 3 and Algorithm 1 describes the embedding process precisely: Ahmed & M. Ali A Vol 6. 2025: 998-1018 Fig. The Embedding Process Algorithm 1 : The embedding process Inputs: bw //Binary watermark data. CI //colored image Output: HH new Modified HH sub-band with embedded data Begin Step 1: Convert CI from RGB to yCbCr. Step 2: Apply DWT to the Y component. Step 3: Divide the HH into 4*4 sub bands. Step 4: Assign value to the variable - Set w, h Ia dimensions of HH - Set wn Ia w // 4 //width size - Set hn Ia h // 4 //height size - Set wh Ia wn * hn // total size Step 5: Initialize TR list of 4*4 matrices TR Ia list of wh 4x4 zero matrices Step 6: Extract 4x4 Blocks from HH: Set k Ia 0 For i from 0 to wn-1 do : For j from 0 to hn-1 do : xIai*4 yIaj*4 TR. Ia Y. :x 4, y:y . kIak 1 Step 7: select the embedding index by logistic map - Set Lw Ia length of bw // the size of watermark - Set X Ia logistic_map. Step 8: Embed Binary Data into 4x4 Blocks: For all i from 0 to Lw -1 do : hdd Ia DCT(TR. ], norm='ortho') T Ia . dd[:2, :. )) sum. dd[:2, :. )) / . 110 If bw . == 1 do: , . Ia abs. , . )) T Ahmed & M. Ali A Vol 6. 2025: 998-1018 Else if bw im. == 0 do: , . Ia abs. , . )) T Else if im. == -1 do: , . Ia abs. , . )) T Else if im. == -2 do: , . Ia abs. , . )) T step 9: Apply IDCT // inverse DCT TR. ] Ia IDCT. dd, norm='ortho') Step 10: Apply IDWT // inverse dwt Step 11: convert YCbCr to RGB End 4 Tallying Votes Step 1: The RGB color space is converted into YCbCr color space. Separating luminance (Y) and chrominance (Cb and C. The watermark extraction is conducting in the Y component, since during the watermark embedding phase, the watermark was incorporated into this component. Step 2: DWT Applied to Decompose the Y Component into the four sub-bands. The HH subband is divided into 4x4 non-overlapping blocks and these blocks are stored in a list, with each entry containing a 4x4 matrix representing a block. Stage 3: A chaotic sequence is generated using a logistic map, which was also used during the embedding phase to select the blocks for embedding. This ensures that the extraction process accesses the same 4x4 blocks in the correct sequence, guaranteeing the consistency of the watermark retrieval. Step 3: For every block that has been identified by the chaotic sequence, the DCT is applied to change the block from the spatial domain into the frequency domain. The watermark bit is then extracted by analyzing the top-left 2x2 sub-matrix of DCT coefficients in the block. The absolute values of four specific DCT coefficients, located at positions . , . , . , and . , are analyzed. The coefficient with the highest absolute value is identified and used to determine the corresponding binary value for the watermark. Fig. Presents the watermark Fig. The Extraction Process The extracted watermark converted to into binary format then convert the binary to string. After obtaining string the AES-GCM decryption will be able to decrypt the string and obtaining Ahmed & M. Ali A Vol 6. 2025: 998-1018 the voter passcode in addition to the preferred candidate. in this way each candidate counter will be increment after being chosen by the voter. In Algorithm 2, the Etraction process explained in Algorithm 2 : The extracting process Inputs: CI //colored image Output: string //contain the voter passcode and the candidate Id Begin Step 1: Convert CI from RGB to YCbCr. Step 2: Apply DWT to the Y component. Step 3: Divide the HH into 4x4 sub-bands. Step 4: Assign values to the variables: -Set w, h Ia dimensions of HH. -Set wn Ia w // 4 //width size. -Set hn Ia h // 4 //height size. -Set wh Ia wn * hn // total size. Step 5: Initialize TR list of 4x4 matrices: TR Ia list of wh 4x4 zero matrices. Step 6: Extract 4x4 Blocks from HH: Set k Ia 0. For i from 0 to wn-1 do: For j from 0 to hn-1 do: x Ia i * 4. y Ia j * 4. TR. Ia HH. 4, y . k Ia k 1. Step 7: Select the embedding index by logistic map: -Set Lw Ia length of bw // the size of watermark. -Set X Ia logistic_map. Step 8: Extract Binary Data from 4x4 Blocks: For all i from 0 to Lw-1 do: hdd Ia DCT(TR. ], norm='ortho'). T Ia max. dd[:2, :. )). If hdd. , . == T do: Ia 1. Else if hdd. , . == T do: Ia 0. Else if hdd. , . == T do: Ia -1. Else if hdd. , . == T do: Ia -2. Step 9: Reshape the extracted binary watermark to its original shape. Step 10: Convert the binary watermark to text. Step 12: Decrypt the extracted text to retrieve the encrypted vote. Step 13: Tally the votes for each candidate based on the decrypted data. End Result and Discussion The proposed system has been implemented utilizing python as programming language incompatible with SQLite as database for storing and managing the system data. 1 System evaluation metrics Imperceptibility and robustness are the two indicators that refer to the watermark performance, where the Imperceptibility refer to the visual quality of the image that must not be Ahmed & M. Ali A Vol 6. 2025: 998-1018 affected by the watermark's embedding(Y. Zhang et al. , 2. The PSNR is the metric employed to measure the imperceptibility Eq . PSNR=10 MSE= Where p and q represent the host image and the watermark image respectively while i and j refer to the pixels coordinated. While the robustness refers to the resistance of embedding watermark against attacks(Araghi et al. , 2. The NC is the metric utilized to measure the coefficients of correlation between the original and the extracted watermark. Eq . NC= Oc Oc Where w and e represent the original and extracted watermark respectively and M . N refer to the height and width of the watermark image. 2 Result and analysis For testing and verifying the system performance, the testing mechanism was applied on five colored images 512*512 that considered as standard images . Lena, airplane, girl and peppe. and the binary watermark image with size 32*32. Figure 5 shows the hosted colored image the binary watermark. Fig. Host coloured images, . binary watermark 1 Imperceptibility analysis In watermarking technique, the preserve of high Imperceptibility should be a major concern In the proposed system the binary watermark in Figure 5 b will be imbedded in the hosted color image in Figure 5 a. The achieved PSNR in Figure 8 was greater than 40 db ranging from 2 to 41. Figure 6 show the host-colored image before and after embedding where the original and the watermarked images appear nearly identical, there is no visible difference or corruption caused by the watermark's embedding. This watermarking process preserve the visual quality and confirms the effectiveness of the watermarking algorithm in achieving Ahmed & M. Ali A Vol 6. 2025: 998-1018 Fig. host colored image before embedding the water mark. host colored image before embedding the The Figure 7 represents the histogram of the original and watermarked image shows minimal differences in pixel intensity distributions across the red, green, and blue channels. The original shape of the histogram remains unchanged after the embedding process. the minor change in the histogram refers to the presence of the watermark that not effect on the visual quality of the watermarked images. Fig. The Histogram Of The Host Image Before And After Embedding Ahmed & M. Ali A Vol 6. 2025: 998-1018 Fig. The PSNR value within test images 2 Robustness analysis The robustness of the image refers to the ability of watermark image to endure several type of attack and ensuring the safety of the extracted watermark. As the proposed work is an evoting system, the focus on preserving the watermark Undamaged was a main concern to retrieve accurate voting result. Though several attacks has been tested . alt and pepper, gaussian noise, histogram equalization, sharpening and compressio. The NC was the evaluation metric to measure the robustness as mentioned in eq 3. The achieved ns was in the most attacks 1 that referring the robustness and the efficiency of the proposed work without losing the quality of watermark image. Table 1 show the Nc value without attacks. Image Baboon Table 1- the Nc value without attack Lake Airplane Lena By throwing an attack to the host image, the salt and pepper resulting 0. 9 NC value while preserving the NC value equalling 1 with the rest attacks. Table 2- 6 and Figures demonstrates The NC value within applying the attacks. Image name Table 2 - the NC value of Baboon image with several attack PSNR Attack Baboon Baboon Salt and pepper 0. Baboon Gaussian noise Baboon Histogram equalization Baboon Sharpening Baboon JPEG Compression QF=50 Baboon JPEG Compression QF=55 Baboon JPEG Compression QF=36 Baboon JPEG Compression QF=33 Baboon JPEG Compression QF=36 Baboon JPEG Compression QF=67 Image name Table 3 - the NC value of Peppers image with several attack PSNR Attack Peppers Peppers No result back Salt and pepper 0. Peppers Gaussian 0. Ahmed & M. Ali A Vol 6. 2025: 998-1018 Peppers Histogram equalization Peppers Sharpening Peppers The passcode and Id note back JPEG Compression QF=50 Peppers The passcode retrieved JPEG Compression QF=55 Peppers The passcode retrieved JPEG Compression QF=60 Peppers The passcode retrieved JPEG Compression QF=66 Peppers The passcode retrieved JPEG Compression QF=63 Peppers JPEG Compression QF=67 Peppers JPEG Compression QF=70 Table 4 - the NC value of Lake image with several attack Attack Image name PSNR Lake Lake Salt and pepper 0. Lake Gaussian noise Lake Histogram equalization Lake Lake Sharpening Beta -0. Compression QF=50 Lake The and Id not The passcode Id and passcode Compression QF=55 Lake Compression QF=60 Lake Compression QF=66 Lake Compression QF=63 Lake Compression QF=67 Lake Compression QF=70 Image name Table 5 - the NC value of Lena image with several attack PSNR Attack Lena Lena The id and passcode not Salt and pepper noise 0. Lena Gaussian noise Lena Histogram equalization Lena Lena The passcode and Id not Sharpening Beta -0. Compression QF=50 Lena The Id and passcode not Compression QF=55 Ahmed & M. Ali A Vol 6. 2025: 998-1018 Lena The Id and passcode not Compression QF=60 Lena The Id and Compression QF=66 Lena Compression QF=63 Lena Compression QF=67 Lena Compression QF=70 Image name Table 6 - the NC value of airplane image with several attack PSNR Attack Airplane Airplane The id and passcode not Salt and pepper 0. Airplane Gaussian noise Airplane The id and passcode Histogram equalization Airplane Airplane Sharpening Beta -0. Compression QF=50 Airplane Compression QF=55 Airplane Airplane The passcode and Id not back Id and passcode The Airplane Compression QF=63 Airplane Compression QF=67 Airplane Compression QF=70 Compression QF=60 Compression QF=66 The results in Tables 2Ae6 show the proposed system to be very robust against attacks of various kinds. for NC, values remained almost entirely at 1. n most cases,) meaning the embedded watermark was only slightly degraded. These fluctuations in NC values obtained for different images under the same type of attack may largely be attributed to the inherent characteristics of the images themselves and the manner in which a particular attack affects the frequency domain. For example, high-texture images like "Baboon," which depicts a large variance of different frequency components, can often withstand salt-and-pepper noise better since they have spread the information of the watermark much better over various frequencies. Therefore, in such cases, the high Texture images will better resist salt-and-pepper noise. Smoother images such as "Lena," on the other hand, exhibit very few spatial details. For instance, they may have slightly lower values of NC under noise-based attacks since these images can clearly exhibit a few selected damaged regions that can obscure localized Likewise, some attacks, for instance, the compressive or sharpening ones, may be less effective since the frequencies of the image are in resonance with the embedding strategy. Very close, consistent NC values around 1. 0 for most scenarios drive home the point of steadfastness of the hybrid watermarking scheme under consideration based on DWT-DCT, giving an assertion of it being able to provide invariance for the watermark under a host of practical conditions. 3 comparison analysis The proposed work imperceptibility achieves PSNR higher than in the researches (Bao & Wang, 2. , (X. Zhang et al. , 2. ,(Lee et al. , 2. and (Su et al. , 2. where the binary watermark has been tested in size 23*32. The result of the proposed system focusing on preserving the robustness of the watermarking process refers to the ability of retrieve the encrypted vote and safeguard the vote confidentiality. While the achieved PSNR indicates Ahmed & M. Ali A Vol 6. 2025: 998-1018 minimal distortion in compression with the previous study reducing the likelihood of detecting embedding vote within the hosted image by the attacker. The table 7 and Figure 8 shows the PSNR comparison. Table 7 - PSNR comparison Baboon Peppers Scheme Lena Airplane Lake (Bao and Wang, 2024. (Su et al. , 2. (Zhang and Su, 2021. (Lee et al. , 2. (D. Liu et al. , 2. Proposed Fig. PSNR comparison In the concept of robustness, the proposed scheme has proven its ability to maintain the watermark even after repelling attacks, as the value of the NC within salt and pepper attack was ranging from 9. 9 to 9. 6 while in JPEG Compression. Sharpening. Histogram equalization and Gaussian noise the scheme success in preserving the watermark without any damage and consequently preserving the vote retrieving and the NC value is 1. Table 8 and Figure 9 display the NC value compared with other researches. Attack (Bao Wang, 2024. Salt & pepper Gaussian noise Sharpening Histogram JPEG until 65 QF Table 8 - NC comparison (Su et al. , (Zhang and (Lee et al. Su, 2021. (D. Liu et , 2. Proposed . ,0. QF) Ahmed & M. Ali A Vol 6. 2025: 998-1018 Fig. NC comparison 4 imperceptibility Analysis A better imperceptibility achieved by the proposed system due to the embedding of the watermark bits in the Y component of the YCbCr color space, resulting in very few visual (Bao et al. , 2024. work on DCT-transformed blocks at middle frequency coefficients, that may be conspicuous in high-quality images (Su et al. , 2. depended on GBT and chaotic encryption, that make a lot of influence in the visual appearance of the image due to the complexity of the estimated embedding domain. DWT and DCT are particularly embedded methods where the most visual changes are not imposed, and high imperceptibility is DHT implemented in spatial resolution was highly effective but comparably crude compared to frequency-based embedding techniques for obvious reasons as cited by (X. Zhang et al. , 2. Repetitive embedding using voting techniques certainly deteriorates output quality as discussed by (Lee et al. , 2. (D. Liu et al. , 2. ), using simpler DCT-based embedding, did not optimize for imperceptibility as effectively as our approach. By setting the embedding process with the max-average-threshold equation while concentrating on the low-frequency components, a balanced trade-off between robustness and imperceptibility is achieved by the proposed system, which is highly workable for real applications such as secure e-voting. 5 Robustness Analysis Proposed system exceeds other studies in robustness by using the chaotic logistic map, and the max-average-threshold equation that adjusts embedding strength dynamically. For ensuring the watermark is robust against different attacks. Unlike (Bao et al. , 2024. who applied Radon and DCT transforms with fixed mid-frequency embedding, and (Su et al. , 2. who applied Graph-Based Transform (GBT) with adaptive embedding strength based on Particle Swarm Optimization, our method embeds watermark bits in selected low-frequency Such components are not much sensitive to usual image processing attacks, which enhances the proposed methodAos robustness. (X. Zhang et al. , 2. , utilized discrete Hartley transform (DHT) less robust against noise and compression attacks compared to frequencybased techniques. Additionally, the embedding capacity is limited, making the method unsuitable for applications requiring larger watermark data and (Lee et al. , 2. that employs repetitive DCT embedding with voting mechanisms that introduced a distortion compromised image quality. (D. Liu et al. , 2. concentrated more on unsophisticated DCT-based embedding without the positive robustness enhancements inherent in their proposed technique. Practical Implications The proposed work has several implication aspects within the e-voting system. Regarding the voter authentication process the proposed system utilized the SIFT algorithm for detecting Ahmed & M. Ali A Vol 6. 2025: 998-1018 and matching the distinct features along with utilizing passcode matching as dual authentication Regarding the voting securing, encrypting the vote with AES_GCM ensuring both integrity and confidentiality where the vote remain secure during the transmission and storage. The robustness of the embedding procedure against attacks enhances the reliability of the voting In the real-world framework retrieving the vote despite the accidental or intention distortion referring to the robustness of safeguarding the vote. Though, preserving the vote While the higher PSNR referring to the minimal distortion to the host image and preserving the visual quality. Limitations Although the proposed system gives satisfactory results in terms of robustness and stealth, the system may be subject to limitations in terms of engineering attack, and the need to test the system in the real world in terms of latency, storage overhead, and processing capacity in highdemand scenarios may require further optimization. The robustness of the watermark is also affected by the quality of the host image, as low-quality or over-compressed images affect the extraction accuracy, posing challenges in real-world environments with variable image quality. Conclusion The proposed work focus on achieving authenticity and vote secrecy in the e-voting In concept of voter authenticity, the unique Six-digit passcode in addition to fingerprint as biometric traits will be able to prevent ineligible people from vote. The SIFT algorithm is the method utilized of identified the voter biometrically. While the securing the vote implemented within several stages, starting with encrypting the vote by the AES-GCM method for keeping the vote integrity. Then, the embedding of the vote within colored host image using the blind, robust and hybrid DWT-DCT algorithms with utilizing the chaotic map techniques for increasing the security level and keeping the vote process reliable and robust against several The experimental results of the proposed the system had ability to maintain high imperceptibility and robustness to distortions, achieving a PSNR above 40 dB and an NC value of 1 in most scenarios. While the system's performance is exceptional in securing and verifying votes, future enhancements could focus on addressing geometric attacks and improving the scalability of large- scale elections, this would lead to a more secure, reliable, and popular evoting system. References