• Save
Bio Metric-E-Voting
Upcoming SlideShare
Loading in...5

Bio Metric-E-Voting



we try to give a biometric secure e voting system and with back end compilations supported by DNA archieves which hav d feature of parallel processing as their inherent nature ...

we try to give a biometric secure e voting system and with back end compilations supported by DNA archieves which hav d feature of parallel processing as their inherent nature ...



Total Views
Views on SlideShare
Embed Views



5 Embeds 22

http://lifegoesonistaystill.blogspot.com 15
http://meeravisu1116.wordpress.com 3
http://www.slideshare.net 2
http://www.docshut.com 1
http://www.slashdocs.com 1


Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

Bio Metric-E-Voting Bio Metric-E-Voting Presentation Transcript

    • Estonian e-Voting @ a Glance:
    • Estonian ID or Smart card bearing digital signatures is used for authentication.
    • Voter’s can vote any number of times.
    • In case of any attacks election commission cancels the e-Voting and cancels the result
    • SERVE e-Voting System @ a Glance
    • No ID’s or Public Key Infrastructures.
    • One person, one vote.
    • Possible to vote any time within 30days before election day until the closing day of poll.
    • In case of any attack the Election commission terminates the voting & cancels the result.
    The main disadvantages in these systems are: ->In case if a voter’s id is lost then someone else can cast their vote ->The steps for authentication is Voter’s ID and Password which can be hacked easily now a days….
  • Preliminary verification Receives Voter’s choice & Encrypts it. Checks whether the person has the right to vote. Storing, Managing & Decrypting Votes for counting. Counts the Votes.
    • Authentication: Biometrics
    • Cryptosystem for safe transmission: DNA cryptosystem
    • Storage device: DNA storage.
    • *****
    • Preliminary step to decrease the unwanted processing of system.
    • Function :
    • -Checks whether the voter’s name and ID number is present in the list of a constituency.
    • The Database used to save the details is made up of DNA.
    • The table in the database in such a way that the searching is made easy.
    • The data's occupies the place based upon the hash value computed by the function ,
    • f(n)=id mod (size of table)
    • The search success is within one or two attempts.
  • Heavy web users have an average of 21 passwords:81% of users select a common passwords and 30% write their passwords in a file which can be HACKED easily. Identity theft: Identity thieves steal PIN numbers.3.3 million identity thefts in U.S in 2002 ;6.7 millions victims of credit card fraud
    • Bio-Smart card
    • Imp ringed DNA chip which bears ,
    • ->Voter’s face
    • ->Voter’s finger print
    • ->Voter’s details
    DNA CHIP<Local memory>
  • Step:1-Voter inserts the card Step:2-Camera captures the face of the voter and fingerprint recognizer gets the finger print. Step:3-Checks the unique identification in voters’ card, server and the input obtained from camera and fingerprint recognizer.
    • “ No Null Votes/Multiple Votes”
    • Microcontroller used:AT89S8252
  • secure client-server data transfer No unauthorized data manipulation
    • DNA cryptosystem consisting of
            • DNA Chip
            • Randomly assembled one-time pad.
            • Encryption and Decryption is recorded in arrays of DNA chip.
    • The One-Time-Pad principle is applied (an unbreakable cryptosystem).
    • Cryptography consist of
            • Encryption (at the source end )
            • Decryption (at the destination end)
    • Data to be encrypted: Picture
    • DNA chip has immobilized DNA Strands.
    • Library of one-time pad is encoded in a long DNA strands .
    • Data-pair strands have the unannealed end has the cipher data the annealed end has the plain data word.
  • <Encrypted Message> DNA CHIP ONE –TIME PAD MASK PROTECTION CIPHER TEXT Display complementary of plain data lexicon Data pair annealed to complimentary end Unprotected DNA cleaves between CHIPER and Data
    • This phase is done only by the authenticated election commission officials.
    • Vote management consist of :
          • Decryption
          • Storing of messages
    • Decryption :
    • Here the coded message is converted to the readable original message only by the authorized officials .
    • Word-pair strands constructed, appending cipher word with proper plaintext word.
    • Cipher strands bind to their specific locations on the pad and are appended with their plaintext partner.
    • Bind reformed word-pair strands to DNA chip and reading message by fluorescent microscopy.
    • When word-pair PCR product is bound to the DNA chip, the decrypted message is revealed
    • Reasons for using DNA storage:
    • Resists all kind of attacks- Alteration or destroying data is highly impossible.
    • High memory capacity- The DNA inherits all the traits and characteristics of our ancestors. The human genome embodies the equivalent of 750 megabytes of data, a huge storage space.
    DNA Achieve Stores tons of information
    • An up-counter is used to count the individual votes at the each data table level
    • The display can be shown with a BCD-to-seven segment decoder and a LCD display .
    UP counter
    • On the whole this voting machine is evolved towards a motto to have fool proof access with a high speed , memory and resistance to threats to safeguard the fundamental right of every citizen .
    • As much as the various features offered by the DNA e-voting we have some crucial problems at each level which needs to be overcome .
    • Lots of work resources required to develop it into a fully fledged product.