Your SlideShare is downloading. ×
0
Bio Metric-E-Voting
Bio Metric-E-Voting
Bio Metric-E-Voting
Bio Metric-E-Voting
Bio Metric-E-Voting
Bio Metric-E-Voting
Bio Metric-E-Voting
Bio Metric-E-Voting
Bio Metric-E-Voting
Bio Metric-E-Voting
Bio Metric-E-Voting
Bio Metric-E-Voting
Bio Metric-E-Voting
Bio Metric-E-Voting
Bio Metric-E-Voting
Bio Metric-E-Voting
Bio Metric-E-Voting
Bio Metric-E-Voting
Bio Metric-E-Voting
Bio Metric-E-Voting
Bio Metric-E-Voting
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Bio Metric-E-Voting

1,579

Published on

we try to give a biometric secure e voting system and with back end compilations supported by DNA archieves which hav d feature of parallel processing as their inherent nature ...

we try to give a biometric secure e voting system and with back end compilations supported by DNA archieves which hav d feature of parallel processing as their inherent nature ...

Published in: Technology, News & Politics
1 Comment
3 Likes
Statistics
Notes
No Downloads
Views
Total Views
1,579
On Slideshare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
0
Comments
1
Likes
3
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1.  
  • 2. <ul><li>Estonian e-Voting @ a Glance: </li></ul><ul><li>Estonian ID or Smart card bearing digital signatures is used for authentication. </li></ul><ul><li>Voter’s can vote any number of times. </li></ul><ul><li>In case of any attacks election commission cancels the e-Voting and cancels the result </li></ul><ul><li>SERVE e-Voting System @ a Glance </li></ul><ul><li>No ID’s or Public Key Infrastructures. </li></ul><ul><li>One person, one vote. </li></ul><ul><li>Possible to vote any time within 30days before election day until the closing day of poll. </li></ul><ul><li>In case of any attack the Election commission terminates the voting & cancels the result. </li></ul>The main disadvantages in these systems are: ->In case if a voter’s id is lost then someone else can cast their vote ->The steps for authentication is Voter’s ID and Password which can be hacked easily now a days….
  • 3. Preliminary verification Receives Voter’s choice & Encrypts it. Checks whether the person has the right to vote. Storing, Managing & Decrypting Votes for counting. Counts the Votes.
  • 4. <ul><li>FEATURES OF PROPOSED E-VOTING: </li></ul><ul><li>Authentication: Biometrics </li></ul><ul><li>Cryptosystem for safe transmission: DNA cryptosystem </li></ul><ul><li>Storage device: DNA storage. </li></ul><ul><li>***** </li></ul><ul><li>Preliminary step to decrease the unwanted processing of system. </li></ul><ul><li>Function : </li></ul><ul><li>-Checks whether the voter’s name and ID number is present in the list of a constituency. </li></ul><ul><li>The Database used to save the details is made up of DNA. </li></ul>
  • 5.  
  • 6. <ul><li>HASH SEARCHING. </li></ul><ul><li>The table in the database in such a way that the searching is made easy. </li></ul><ul><li>The data's occupies the place based upon the hash value computed by the function , </li></ul><ul><li>f(n)=id mod (size of table) </li></ul><ul><li>The search success is within one or two attempts. </li></ul>
  • 7.  
  • 8. Heavy web users have an average of 21 passwords:81% of users select a common passwords and 30% write their passwords in a file which can be HACKED easily. Identity theft: Identity thieves steal PIN numbers.3.3 million identity thefts in U.S in 2002 ;6.7 millions victims of credit card fraud
  • 9. <ul><li>Bio-Smart card </li></ul><ul><li>FEATURES OF SMART CARD: </li></ul><ul><li>Imp ringed DNA chip which bears , </li></ul><ul><li>->Voter’s face </li></ul><ul><li>->Voter’s finger print </li></ul><ul><li>->Voter’s details </li></ul>DNA CHIP<Local memory>
  • 10. Step:1-Voter inserts the card Step:2-Camera captures the face of the voter and fingerprint recognizer gets the finger print. Step:3-Checks the unique identification in voters’ card, server and the input obtained from camera and fingerprint recognizer.
  • 11. <ul><li>“ No Null Votes/Multiple Votes” </li></ul><ul><li>Microcontroller used:AT89S8252 </li></ul>
  • 12. secure client-server data transfer No unauthorized data manipulation
  • 13. <ul><li>DNA cryptosystem consisting of </li></ul><ul><ul><ul><ul><ul><li>DNA Chip </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Randomly assembled one-time pad. </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Encryption and Decryption is recorded in arrays of DNA chip. </li></ul></ul></ul></ul></ul><ul><li>The One-Time-Pad principle is applied (an unbreakable cryptosystem). </li></ul><ul><li>Cryptography consist of </li></ul><ul><ul><ul><ul><ul><li>Encryption (at the source end ) </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Decryption (at the destination end) </li></ul></ul></ul></ul></ul>
  • 14. <ul><li>Data to be encrypted: Picture </li></ul><ul><li>DNA chip has immobilized DNA Strands. </li></ul><ul><li>Library of one-time pad is encoded in a long DNA strands . </li></ul><ul><li>Data-pair strands have the unannealed end has the cipher data the annealed end has the plain data word. </li></ul>
  • 15. <Encrypted Message> DNA CHIP ONE –TIME PAD MASK PROTECTION CIPHER TEXT Display complementary of plain data lexicon Data pair annealed to complimentary end Unprotected DNA cleaves between CHIPER and Data
  • 16. <ul><li>This phase is done only by the authenticated election commission officials. </li></ul><ul><li>Vote management consist of : </li></ul><ul><ul><ul><ul><li>Decryption </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Storing of messages </li></ul></ul></ul></ul><ul><li>Decryption : </li></ul><ul><li>Here the coded message is converted to the readable original message only by the authorized officials . </li></ul>
  • 17. <ul><li>Word-pair strands constructed, appending cipher word with proper plaintext word. </li></ul><ul><li>Cipher strands bind to their specific locations on the pad and are appended with their plaintext partner. </li></ul><ul><li>Bind reformed word-pair strands to DNA chip and reading message by fluorescent microscopy. </li></ul><ul><li>When word-pair PCR product is bound to the DNA chip, the decrypted message is revealed </li></ul>
  • 18. <ul><li>Reasons for using DNA storage: </li></ul><ul><li>Resists all kind of attacks- Alteration or destroying data is highly impossible. </li></ul><ul><li>High memory capacity- The DNA inherits all the traits and characteristics of our ancestors. The human genome embodies the equivalent of 750 megabytes of data, a huge storage space. </li></ul>DNA Achieve Stores tons of information
  • 19. <ul><li>An up-counter is used to count the individual votes at the each data table level </li></ul><ul><li>The display can be shown with a BCD-to-seven segment decoder and a LCD display . </li></ul>UP counter
  • 20. <ul><li>On the whole this voting machine is evolved towards a motto to have fool proof access with a high speed , memory and resistance to threats to safeguard the fundamental right of every citizen . </li></ul><ul><li>As much as the various features offered by the DNA e-voting we have some crucial problems at each level which needs to be overcome . </li></ul><ul><li>Lots of work resources required to develop it into a fully fledged product. </li></ul>
  • 21.  

×