A simple e-voting system ensuring identification, privacy and verifiability

  • 1 Institute for Informatics and Automation Problems of NAS RA, Yerevan, Armenia
  • 2 MoodMap AI, Yerevan, Armenia


Electronic voting (e-voting) offers many advantages compared to traditional types of voting. Today there are many e-voting schemes and systems, which allow their use for various purposes. Because of its fundamental importance for democratic societies, e-voting is subject to high legal standards, in particular security requirements for the voting method. It is hard to create a system or a protocol fulfilling all security requirements. Designing effective e-voting systems is challenging because these aspects often conflict with each other. For example, one of such challenges is trying to ensure identification and keep votes private while still being able to verify them. There are quite a few cryptographic schemes which fulfill wide requirements for electronic elections, but they use sophisticated cryptographic tools that make them hard to implement and require expertise in various fields. In this paper we suggest a new approach that ensures this requirements without complex cryptographic methods, using only face recognition, properties of entropy, hash functions and steganography.



  1. A. Avetisyan, M. Haroutunian and P. Hakobyan, “Discussion on steganographic methods from the perspective of e-voting implementation”, Proc. of 14th International Conf. Computer science and information technologies CSIT 23, pp. 214-217, 2023.
  2. M. Haroutunian, A. Margaryan and K. Mastoyan, “Secure online voting scheme using steganography”, CSIT workshop on Data Analytics and Mathematical Modeling, Tbilisi, 2024.
  3. M. Haroutunian, P. Hakobyan and A. Avetisyan, “Two-stage optimal hypotheses testing for a model of stegosystem with an active adversary”, JUCS - Journal of Universal Computer Science, vol. 29, no. 11, pp. 1254-1273, 2023.
  4. M. V. Vladucu, Z. Dong, J. Medina and R. Rojas-Cessa, "E-voting meets blockchain: A survey," in IEEE Access, vol. 11, pp. 23293-23308, 2023. doi: 10.1109/ACCESS.2023.3253682
  5. A Consensus Study Report of National Academies of Sciences, Engineering, and Medicine, “Securing the vote: protecting American democracy”, Washington, DC: The National Academies Press, 2018.
  6. T. M. Cover and J. A. Thomas, Elements of information theory. 2nd ed. A Wiley-Interscience Publication, USA 2006.
  7. F. Escolano, P. Suau and B. Bonev, Information theory in computer vision and pattern recognition, Springer Verlag London Limited 2009.
  8. M. Haroutunian, D. Asatryan and K. Mastoyan, “Analyzing the quality of distorted images by the Normalized Mutual Information measure”, Mathematical Problems of Computer Science, vol. 61, 2024.

Article full text

Download PDF