Your SlideShare is downloading. ×
  • Like
  • Save
Bio Metric-E-Voting
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.


Now you can save presentations on your phone or tablet

Available for both IPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Bio Metric-E-Voting


we try to give a biometric secure e voting system and with back end compilations supported by DNA archieves which hav d feature of parallel processing as their inherent nature ...

we try to give a biometric secure e voting system and with back end compilations supported by DNA archieves which hav d feature of parallel processing as their inherent nature ...

Published in Technology , News & Politics
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
No Downloads


Total Views
On SlideShare
From Embeds
Number of Embeds



Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

    No notes for slide


  • 1.  
  • 2.
    • Estonian e-Voting @ a Glance:
    • Estonian ID or Smart card bearing digital signatures is used for authentication.
    • Voter’s can vote any number of times.
    • In case of any attacks election commission cancels the e-Voting and cancels the result
    • SERVE e-Voting System @ a Glance
    • No ID’s or Public Key Infrastructures.
    • One person, one vote.
    • Possible to vote any time within 30days before election day until the closing day of poll.
    • In case of any attack the Election commission terminates the voting & cancels the result.
    The main disadvantages in these systems are: ->In case if a voter’s id is lost then someone else can cast their vote ->The steps for authentication is Voter’s ID and Password which can be hacked easily now a days….
  • 3. Preliminary verification Receives Voter’s choice & Encrypts it. Checks whether the person has the right to vote. Storing, Managing & Decrypting Votes for counting. Counts the Votes.
  • 4.
    • Authentication: Biometrics
    • Cryptosystem for safe transmission: DNA cryptosystem
    • Storage device: DNA storage.
    • *****
    • Preliminary step to decrease the unwanted processing of system.
    • Function :
    • -Checks whether the voter’s name and ID number is present in the list of a constituency.
    • The Database used to save the details is made up of DNA.
  • 5.  
  • 6.
    • The table in the database in such a way that the searching is made easy.
    • The data's occupies the place based upon the hash value computed by the function ,
    • f(n)=id mod (size of table)
    • The search success is within one or two attempts.
  • 7.  
  • 8. Heavy web users have an average of 21 passwords:81% of users select a common passwords and 30% write their passwords in a file which can be HACKED easily. Identity theft: Identity thieves steal PIN numbers.3.3 million identity thefts in U.S in 2002 ;6.7 millions victims of credit card fraud
  • 9.
    • Bio-Smart card
    • Imp ringed DNA chip which bears ,
    • ->Voter’s face
    • ->Voter’s finger print
    • ->Voter’s details
    DNA CHIP<Local memory>
  • 10. Step:1-Voter inserts the card Step:2-Camera captures the face of the voter and fingerprint recognizer gets the finger print. Step:3-Checks the unique identification in voters’ card, server and the input obtained from camera and fingerprint recognizer.
  • 11.
    • “ No Null Votes/Multiple Votes”
    • Microcontroller used:AT89S8252
  • 12. secure client-server data transfer No unauthorized data manipulation
  • 13.
    • DNA cryptosystem consisting of
            • DNA Chip
            • Randomly assembled one-time pad.
            • Encryption and Decryption is recorded in arrays of DNA chip.
    • The One-Time-Pad principle is applied (an unbreakable cryptosystem).
    • Cryptography consist of
            • Encryption (at the source end )
            • Decryption (at the destination end)
  • 14.
    • Data to be encrypted: Picture
    • DNA chip has immobilized DNA Strands.
    • Library of one-time pad is encoded in a long DNA strands .
    • Data-pair strands have the unannealed end has the cipher data the annealed end has the plain data word.
  • 15. <Encrypted Message> DNA CHIP ONE –TIME PAD MASK PROTECTION CIPHER TEXT Display complementary of plain data lexicon Data pair annealed to complimentary end Unprotected DNA cleaves between CHIPER and Data
  • 16.
    • This phase is done only by the authenticated election commission officials.
    • Vote management consist of :
          • Decryption
          • Storing of messages
    • Decryption :
    • Here the coded message is converted to the readable original message only by the authorized officials .
  • 17.
    • Word-pair strands constructed, appending cipher word with proper plaintext word.
    • Cipher strands bind to their specific locations on the pad and are appended with their plaintext partner.
    • Bind reformed word-pair strands to DNA chip and reading message by fluorescent microscopy.
    • When word-pair PCR product is bound to the DNA chip, the decrypted message is revealed
  • 18.
    • Reasons for using DNA storage:
    • Resists all kind of attacks- Alteration or destroying data is highly impossible.
    • High memory capacity- The DNA inherits all the traits and characteristics of our ancestors. The human genome embodies the equivalent of 750 megabytes of data, a huge storage space.
    DNA Achieve Stores tons of information
  • 19.
    • An up-counter is used to count the individual votes at the each data table level
    • The display can be shown with a BCD-to-seven segment decoder and a LCD display .
    UP counter
  • 20.
    • On the whole this voting machine is evolved towards a motto to have fool proof access with a high speed , memory and resistance to threats to safeguard the fundamental right of every citizen .
    • As much as the various features offered by the DNA e-voting we have some crucial problems at each level which needs to be overcome .
    • Lots of work resources required to develop it into a fully fledged product.
  • 21.