By Topic

Manipulation and transparency control of ICT constituted e-administrative protocol via digital watermarking for LDC's

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

6 Author(s)
Alam, S.B. ; Dept. of EEE, Bangladesh Univ. of Eng. & Technol. (BUET), Dhaka, Bangladesh ; Sazzad, A.B.M.R. ; Sakib, M.N. ; Kabir, H.M.D.
more authors

Theme of E-Governance admits agile and ameliorated citizen service from a quantitative and qualitative point of view. An efficacious e-Governance system ascertains completion of administrative tasks in a nimble way reducing bureaucracy through a transparent protocol being robust against corruption. With the increased utilization and adaptation of the information and communication technologies (ICT), especially through the overhauls of the Internet, the idea of e-governance becomes easy to implement and lucrative for both the administrators and mass population. In this paper, a four dimensional e-governance approach for any administrative entity is proposed. This protocol provides a better control for decision makers over their employees as well as defends employees against over dominance and victimization from high officials. Proper sharing of work and organizational hierarchy is also ensured for the Least Developed Countries (LDC's) using their existing infrastructure in the proposed scheme. Most importantly security and integrity of emergency data are enhanced using digital watermarking based on DCT coefficients replacement method.

Published in:

Information Theory and Information Security (ICITIS), 2010 IEEE International Conference on

Date of Conference:

17-19 Dec. 2010