SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1506
A Survey on Biometric Voting System using Iris Recognition
Jayapriya J1, Roghini M2, Jayanthi S
1UG Student, Department of CSE, Agni College of Technology, Tamil Nadu, India
3Assistant Professor, Dept of Computer Science and Engineering, Agni College of Technology, Tamil Nadu, India
------------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - In every election ,he election commission isfacinga
lot of troubles and different type of problems throughout the
election. The most familiar issue faced by the election
commission is inappropriate confirmation with respect to the
arrangement of casting thevotes, duplicationor illegalcasting
of votes. In this paper, a secure and new voting system is
developed to improve the existing voting system using iris
recognition. Iris one of the most secure biometric of person
identification. The main goal of this article is to avoid
duplication of casting votes.
Key Words: - Iris, Recognition, Data mining ,feature
extraction algorithms, matching.
1. INTRODUCTION
Voting System is the government electionprocessesinevery
democratic nation. Democracy is to allow people to vote on
their interest and it is right of every individual of a
democratic nation. The democratic government depends on
the results of the election.
Today’s world is an era of internet and technology, internet
and electronics are increasing day by day. It is unavoidable
to upgrade the traditional voting system and protect the
security of it. The main intention of thisarticleistodevelopa
new idea about voting system and also ensure security of it.
To safeguard the security of voting system, We use iris
recognition in proposed system. Iris recognition is used
since it is highly unique, stable, cannot be duplicated and
easily captured.
Many types of voting system have been used around the
world. Paper ballot voting system is an old and unsecure
voting system where it is possible to fling multiple votes
from same person. It runs to fling the vote with a ballot
paper and a stamp.
Fig. 1. Traditional voting system
In electronic voting system, the process of election data is
recorded, stored and preceded as digital information .
Electronic voting system is used to fling vote as well as
counting number of votes . Electronic voting system using
solar power is shown in fig. 2. The electronic voting system
uses AVISPA technique.
Fig. 2. Electronic voting system
Security is the important aspect of existing voting systems.
There is a lot of chances for fake voting. Nowadays some
politicians are following illegal method to succeed in the
election. The traditional paper ballot and electronic voting
systems need more manpower. These existing systems are
more time consuming and also slow. In the proposedsystem
we use Iris pattern. Hence proposed system is secure than
the existing system
2. RELATED WORK
In this Section we have studied few papers which show that
data mining has a strong connection towards the collection
of images and data required for the biometric votingsystem.
A survey of Existing models/Work
1. Anil K. Jain(2019),Michigan State University: This paper
tells the science of automatically identifying individuals
based on their physiological or behavioral characteristics
2. Emma New ham(2014):Biometric as well as password
security to voter is provided using cryptography and
stenography. The main purpose of this system is to provide
proper authentication of voter for voting system
3. A.Stoney(2001):to fling a vote, a voter has to enter the
personal identification number and a secret key and along
with this fingerprint is also required on the sensor. The
system generates a cover image and embed secretkeyintoit
to generate a stego image. Now the stego image is sent tothe
server ,at server side optical recognitioncharactertechnique
is used after reading this ,the server will find the individuals
from the datasets.
4. Sobia Biag(2016)COMSATS University Islamabad: The
proposed filter based algorithm uses a bank of
Gaborfiltertocapture both local and global details in a
fingerprint as compact fixed length finger code.
Check
voters list
Issue ballot paper
voting
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1507
5. Sonia Hof(2008)University of Linz ,Austria: In this paper
biometrics is used to identify individuals using face ,iris,
retina, palm-print ,etc.
6. Shanu Agarwal(2018): In this the system uses thumb
impression for voter identification. The fingerprint is
matched with the database if a match is available the person
is permitted to fling a vote.
3. DATASETS
Before creating the database, All that have to be done is to
collect the appropriate data sets from the user. It takes the
following process.
A. Collect various iris images of theentirecitizenusing
the CASIA database.
B. Collect the details of the parties who are all
participating in the election process.
4. PROPOSED SYSTEM
The main intention of the article is to develop a new idea
about voting system and also ensure the security of the
system. To ensure the security of the voting system iris
recognition is used in the proposed system. The concept of
iris recognition is used since every individual has a unique
iris. The image of iris can be easily captured. The two main
stages are iris verification and iris identification. Iris
verification verifies the identity of a person while iris
identification establish the identity of the person.
4.1. RELATED CONCEPTS:
The voting system has to be improved in order to avoid the
duplication of votes and voting by an unauthorized person
without proper verification.
4.2. FRONT END
It collects the details such as candidate information ,iris
image, and sends the details to the PHP to access the results
from database. Front end is designed using HTML, CSS, Java
Scripting languages.
4.3. BACK END
SERVER :It collects the details from the front end
DATA BASE :
1) Collect the iris image of all the citizens iris image is
collected from CASIA database.
2) Collect the details of the candidateswhoarecompeting
in the election
4.4. TECHNIQUES APPROACHED:
Iris recognition process consists of five major stepstheyare:
4.4.1 Image acquisition
4.4.2 Segmentation
4.4.3 Normalization
4.4.4 Feature extraction
4.4.5 Matching
4.4.1 IMAGE ACQUISITION:
The image of an iris cannot be acquired by camera as it is
small in size and also because of the light reflection in the
camera. Hence acquiring good image has some difficulties.
We are using CASIA(Institute of Automation Chinese
Academy of Sciences)iris image database version 4.0.
4.4.2 SEGMENTATION:
Here we use Hough transformation for Segmentation. The
edge detection techniqueisusedbeforetheHoughtransform
is applied and canny edge detector is used for image
extraction. the first step is to find out all the edges in the iris
to detect inner and outer boundary of the iris.
A circle is drawn at each edge of iris which has been found
earlier with center at the point and with radius needed. X-
axis is a value ,y-axis is b value, and z-axis is radius.
Original image using edge detector
After Hough Transform
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1508
4.4.3 IRIS NORMALIZATION:
Dough man’s rubber sheet model is used for normalization
of iris. The segmented iris is converted from Cartesian to
polar coordinates.
4.4.4 FEATURE EXTRACTION:
In this 1D log Gabor Wavelet is used to create a template
representing pattern information.
Feature extraction is implemented by the normalized iris
pattern which has been convoluted with 1D log-
gaborwavelet. First step of the process is breaking down of
the 2D normalized iris pattern into number of 1D signal.
Each row corresponds to a circular ring on iris region[14].
After encoding the process producesa bitwisetemplatewith
a number of bits of information, a noise mask that
communicate the area which are corrupted within the iris
pattern and mark the corrupted bits .
4.4.5 MATCHING:
In this article matching is done using hamming distance.
hamming distance of to templates is calculated by shifting
one template left and right bitwise. The successive shifts are
used in calculating number of hamming distance
Image of shifting process
5. ARCHITECTURE:
6. RESULT OF SEGMENTATION:
images in the database has been segmented accurately.
Only sum of the images in database cannot be segmented
accurately.
Circle iris and circle pupil is used to calculate the
segmentation value of iris image, this can be done using
Hough transform .
7. RESULT OF MATCHING:
There are total of 54,607 iris images are present in the
CASIA-Iris V4 which were collected from more than 1800
genuine subjects and 1000 from virtual subjects. The main
advantage of CASIA database is that it does not produce any
light reflection. The image can viewed clearly .
8. CONCLUSION:
There is a constant increase in the population of our nation
day to day, therefore improvement in the voting system is a
mandatory thing. Even though there are many biometric
techniques we have implemented iris recognition concept
for providing high accuracy and this technique also reduces
time required. And the important use of this is there is no
chance of invalid vote.
9. REFERENCES
[1]. K. Ramya Devi and J. V. Vidhya , ”SURVEY ON SECURE
ELECTRONIC VOTING SYSTEM”,International Journal of
Pharmacy &Technology(IJPT),Vol.9,April-2017
[2]Asif Ahmed Anik, Rayees Jameel, Abul Farah Anik,
NowrozeAkter, ”Design of a solar piwer Electronic Voting
Machine”, Proceedings of 2017 International Conference on
Networking, Systems and Security(NSysS), 5-8
jan.2017,Dhaka,Bangladsh
[3]Htet Ne Oo, Aye Moe Aung, “Design and formal analysisof
electronic voting protocol using AVISPA”, Proceedings of
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1509
2017 2nd International Conference for Convergence in
Technology(12CT), 7-9 April 2017, Mumbai, India
[4] John, K. A., and Kofi S. A. M. (2014). IJCSI International
Journal of Computer Science Issues. A Trustworthy
Architectural Framework for the AdministrationofE-voting,
11 (30, 97.
[5]ZuyinaAyuningSapturi, AmangSudarsonos,MikeYuliana,
“E-voting security system for the election of EEPIS BEM
president”, 2017 International Electronics Symposium on
Knowledge Creation andIntelligent Co putting (IES-KCIC),
26-27 Sept. 2017, Surbaya, Indonesia.
[6]NoureddineCherabit, Fatma Zohra Chelali, Amar Djeradi,
“Circular hough Transform for Iris localization” Science and
Technology, PISSN: 2163-2669, e-ISSN: 2163-2677, 2(5):
114-121, 2012.
[7]Krzysztof Misztal, Emil Saeed, Jacek Tabor, and Khalid
Saeed, “Iris Pattern Recognition with a New Mathematical
Model to Its Rotation Detection”, Human Identification by
Vascular Pattern (pp.43-65), November 2012.
[8] Caroline Houston, “Iris Segmentation and Recognition
Using Circular Hough Transform and Wavelets Features”,
Rochester Institute of technology.
[9] Richard Yew Fatt Ng, Yong Haur Tay, Kai Ming Mok, “A
Review of Iris Recognition Algorithms”, 2008 International
Symosium on Information Technology, Volume: 2, ITSim
2008.
[10] Libor Masek, “Recognition of Human Iris Patterns for
Biometric Identification”, The University of Western
Australia, 2003.
[11] K. Seetharaman, R. Ragupathy, “Iris Recognition for
Personal Identification System”, ICMOC-2012,India
[12] Z. Zainal Abidin, M. Manaf, A. S. Shibghatullah, S.H. A.
MohdYunos,S.Anawar, Z. Ayop, “Iris Segmentation Analysis
using Integro-Differential Operator andHoughTransform in
BiometricSystem”, Journal ofTelecommunication,Electronic
and Computer Engineering, ISSN:2180-1843Vol.4No.2July
-December 2012.
[13] U T Tania, S M AMotakabber and M I Ibrahimy, “Edge
Detection Techniques for Iris Recognition System”, IOP
Conference Series: Materials Sciences and Engineering,
Volume 53, conference 1, 2013.
[14] K. Seetharaman, R. Ragupathu, “Iris Recognition for
Identification System”, Procedia Engineering, Volium 38

More Related Content

What's hot

An overview of face liveness detection
An overview of face liveness detectionAn overview of face liveness detection
An overview of face liveness detectionijitjournal
 
Enhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric SystemEnhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric Systemijtsrd
 
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...IRJET Journal
 
An embedded finger vein recognition system
An embedded finger vein recognition systemAn embedded finger vein recognition system
An embedded finger vein recognition systemeSAT Publishing House
 
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET Journal
 
Finger vein based biometric security system
Finger vein based biometric security systemFinger vein based biometric security system
Finger vein based biometric security systemeSAT Journals
 
M phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projectsM phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projectsVijay Karan
 
IRJET- Design an Approach for Prediction of Human Activity Recognition us...
IRJET-  	  Design an Approach for Prediction of Human Activity Recognition us...IRJET-  	  Design an Approach for Prediction of Human Activity Recognition us...
IRJET- Design an Approach for Prediction of Human Activity Recognition us...IRJET Journal
 
IRJET-An Interline Dynamic Voltage Restorer (IDVR)
IRJET-An Interline Dynamic Voltage Restorer (IDVR)IRJET-An Interline Dynamic Voltage Restorer (IDVR)
IRJET-An Interline Dynamic Voltage Restorer (IDVR)IRJET Journal
 
A SECURITY BASED VOTING SYSTEMUSING BIOMETRIC
A SECURITY BASED VOTING SYSTEMUSING BIOMETRICA SECURITY BASED VOTING SYSTEMUSING BIOMETRIC
A SECURITY BASED VOTING SYSTEMUSING BIOMETRICIJERA Editor
 
Online Voting System using Aadhaar Card and Biometric
Online Voting System using Aadhaar Card and BiometricOnline Voting System using Aadhaar Card and Biometric
Online Voting System using Aadhaar Card and BiometricIRJET Journal
 
Biometric System Based Electronic Voting Machine Using Arm9 Microcontroller
Biometric System Based Electronic Voting Machine Using Arm9 MicrocontrollerBiometric System Based Electronic Voting Machine Using Arm9 Microcontroller
Biometric System Based Electronic Voting Machine Using Arm9 MicrocontrollerIOSR Journals
 
Overlapped Fingerprint Separation for Fingerprint Authentication
Overlapped Fingerprint Separation for Fingerprint AuthenticationOverlapped Fingerprint Separation for Fingerprint Authentication
Overlapped Fingerprint Separation for Fingerprint AuthenticationIJERA Editor
 
Infrared Vein Detection System For Person Identification – An Image Processin...
Infrared Vein Detection System For Person Identification – An Image Processin...Infrared Vein Detection System For Person Identification – An Image Processin...
Infrared Vein Detection System For Person Identification – An Image Processin...IRJET Journal
 
Smart Voting System with Face Recognition
Smart Voting System with Face RecognitionSmart Voting System with Face Recognition
Smart Voting System with Face RecognitionNikhil Katte
 
IRJET- Biometric Scanner using Compressed Sensing
IRJET- Biometric Scanner using Compressed SensingIRJET- Biometric Scanner using Compressed Sensing
IRJET- Biometric Scanner using Compressed SensingIRJET Journal
 
Wireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint SensorWireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint Sensorijtsrd
 
IRJET- Secure Voting System using Aadhar and Biometrics
IRJET- Secure Voting System using Aadhar and BiometricsIRJET- Secure Voting System using Aadhar and Biometrics
IRJET- Secure Voting System using Aadhar and BiometricsIRJET Journal
 

What's hot (20)

An overview of face liveness detection
An overview of face liveness detectionAn overview of face liveness detection
An overview of face liveness detection
 
Enhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric SystemEnhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric System
 
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
 
An embedded finger vein recognition system
An embedded finger vein recognition systemAn embedded finger vein recognition system
An embedded finger vein recognition system
 
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
 
Finger vein based biometric security system
Finger vein based biometric security systemFinger vein based biometric security system
Finger vein based biometric security system
 
M phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projectsM phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projects
 
IRJET- Design an Approach for Prediction of Human Activity Recognition us...
IRJET-  	  Design an Approach for Prediction of Human Activity Recognition us...IRJET-  	  Design an Approach for Prediction of Human Activity Recognition us...
IRJET- Design an Approach for Prediction of Human Activity Recognition us...
 
IRJET-An Interline Dynamic Voltage Restorer (IDVR)
IRJET-An Interline Dynamic Voltage Restorer (IDVR)IRJET-An Interline Dynamic Voltage Restorer (IDVR)
IRJET-An Interline Dynamic Voltage Restorer (IDVR)
 
A SECURITY BASED VOTING SYSTEMUSING BIOMETRIC
A SECURITY BASED VOTING SYSTEMUSING BIOMETRICA SECURITY BASED VOTING SYSTEMUSING BIOMETRIC
A SECURITY BASED VOTING SYSTEMUSING BIOMETRIC
 
184
184184
184
 
Online Voting System using Aadhaar Card and Biometric
Online Voting System using Aadhaar Card and BiometricOnline Voting System using Aadhaar Card and Biometric
Online Voting System using Aadhaar Card and Biometric
 
Biometric System Based Electronic Voting Machine Using Arm9 Microcontroller
Biometric System Based Electronic Voting Machine Using Arm9 MicrocontrollerBiometric System Based Electronic Voting Machine Using Arm9 Microcontroller
Biometric System Based Electronic Voting Machine Using Arm9 Microcontroller
 
Overlapped Fingerprint Separation for Fingerprint Authentication
Overlapped Fingerprint Separation for Fingerprint AuthenticationOverlapped Fingerprint Separation for Fingerprint Authentication
Overlapped Fingerprint Separation for Fingerprint Authentication
 
Infrared Vein Detection System For Person Identification – An Image Processin...
Infrared Vein Detection System For Person Identification – An Image Processin...Infrared Vein Detection System For Person Identification – An Image Processin...
Infrared Vein Detection System For Person Identification – An Image Processin...
 
Smart Voting System with Face Recognition
Smart Voting System with Face RecognitionSmart Voting System with Face Recognition
Smart Voting System with Face Recognition
 
IRJET- Biometric Scanner using Compressed Sensing
IRJET- Biometric Scanner using Compressed SensingIRJET- Biometric Scanner using Compressed Sensing
IRJET- Biometric Scanner using Compressed Sensing
 
Wireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint SensorWireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint Sensor
 
Ijciet 10 02_008
Ijciet 10 02_008Ijciet 10 02_008
Ijciet 10 02_008
 
IRJET- Secure Voting System using Aadhar and Biometrics
IRJET- Secure Voting System using Aadhar and BiometricsIRJET- Secure Voting System using Aadhar and Biometrics
IRJET- Secure Voting System using Aadhar and Biometrics
 

Similar to IRJET - A Survey on Biometric Voting System using Iris Recognition

Internation Journal Conference
Internation Journal ConferenceInternation Journal Conference
Internation Journal ConferenceHemanth Kumar
 
ONLINE FINGERPRINT VOTING SYSTEM
ONLINE FINGERPRINT VOTING SYSTEMONLINE FINGERPRINT VOTING SYSTEM
ONLINE FINGERPRINT VOTING SYSTEMIRJET Journal
 
A Novel Method for Facial Recognition Based Smart Voting System Using Machine...
A Novel Method for Facial Recognition Based Smart Voting System Using Machine...A Novel Method for Facial Recognition Based Smart Voting System Using Machine...
A Novel Method for Facial Recognition Based Smart Voting System Using Machine...IRJET Journal
 
Biometric Ear Recognition System
Biometric Ear Recognition SystemBiometric Ear Recognition System
Biometric Ear Recognition SystemIRJET Journal
 
SECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoT
SECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoTSECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoT
SECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoTIRJET Journal
 
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET-  	  Secure Online Payment with Facial Recognition using CNNIRJET-  	  Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNNIRJET Journal
 
Online Voting System
Online Voting SystemOnline Voting System
Online Voting SystemIRJET Journal
 
IRJET- Advanced Two Factor Authentication using Image Processing
IRJET- Advanced Two Factor Authentication using Image ProcessingIRJET- Advanced Two Factor Authentication using Image Processing
IRJET- Advanced Two Factor Authentication using Image ProcessingIRJET Journal
 
IRJET- Digital Image Processing based Vote Polling using Mat Lab and Cryptogr...
IRJET- Digital Image Processing based Vote Polling using Mat Lab and Cryptogr...IRJET- Digital Image Processing based Vote Polling using Mat Lab and Cryptogr...
IRJET- Digital Image Processing based Vote Polling using Mat Lab and Cryptogr...IRJET Journal
 
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET-  	  Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET-  	  Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET Journal
 
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile Devices
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile DevicesIRJET- Deep Feature Fusion for Iris Biometrics on Mobile Devices
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile DevicesIRJET Journal
 
Fingerprint Based Voting
Fingerprint Based VotingFingerprint Based Voting
Fingerprint Based VotingIRJET Journal
 
IRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIJTET Journal
 
Iris Biometric Based Person Identification Using Deep Learning Technique
Iris Biometric Based Person Identification Using Deep Learning TechniqueIris Biometric Based Person Identification Using Deep Learning Technique
Iris Biometric Based Person Identification Using Deep Learning TechniqueIRJET Journal
 
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABMaria Perkins
 
Self-X: Geo Fencing and Face Recognition based Smart Attendance Management Ap...
Self-X: Geo Fencing and Face Recognition based Smart Attendance Management Ap...Self-X: Geo Fencing and Face Recognition based Smart Attendance Management Ap...
Self-X: Geo Fencing and Face Recognition based Smart Attendance Management Ap...IRJET Journal
 
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...IRJET Journal
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...IRJET Journal
 

Similar to IRJET - A Survey on Biometric Voting System using Iris Recognition (20)

Internation Journal Conference
Internation Journal ConferenceInternation Journal Conference
Internation Journal Conference
 
ONLINE FINGERPRINT VOTING SYSTEM
ONLINE FINGERPRINT VOTING SYSTEMONLINE FINGERPRINT VOTING SYSTEM
ONLINE FINGERPRINT VOTING SYSTEM
 
A Novel Method for Facial Recognition Based Smart Voting System Using Machine...
A Novel Method for Facial Recognition Based Smart Voting System Using Machine...A Novel Method for Facial Recognition Based Smart Voting System Using Machine...
A Novel Method for Facial Recognition Based Smart Voting System Using Machine...
 
Biometric Ear Recognition System
Biometric Ear Recognition SystemBiometric Ear Recognition System
Biometric Ear Recognition System
 
SECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoT
SECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoTSECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoT
SECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoT
 
Smart Voting System using Aadhar Card
Smart Voting System using Aadhar CardSmart Voting System using Aadhar Card
Smart Voting System using Aadhar Card
 
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET-  	  Secure Online Payment with Facial Recognition using CNNIRJET-  	  Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNN
 
N010438890
N010438890N010438890
N010438890
 
Online Voting System
Online Voting SystemOnline Voting System
Online Voting System
 
IRJET- Advanced Two Factor Authentication using Image Processing
IRJET- Advanced Two Factor Authentication using Image ProcessingIRJET- Advanced Two Factor Authentication using Image Processing
IRJET- Advanced Two Factor Authentication using Image Processing
 
IRJET- Digital Image Processing based Vote Polling using Mat Lab and Cryptogr...
IRJET- Digital Image Processing based Vote Polling using Mat Lab and Cryptogr...IRJET- Digital Image Processing based Vote Polling using Mat Lab and Cryptogr...
IRJET- Digital Image Processing based Vote Polling using Mat Lab and Cryptogr...
 
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET-  	  Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET-  	  Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
 
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile Devices
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile DevicesIRJET- Deep Feature Fusion for Iris Biometrics on Mobile Devices
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile Devices
 
Fingerprint Based Voting
Fingerprint Based VotingFingerprint Based Voting
Fingerprint Based Voting
 
IRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATM
 
Iris Biometric Based Person Identification Using Deep Learning Technique
Iris Biometric Based Person Identification Using Deep Learning TechniqueIris Biometric Based Person Identification Using Deep Learning Technique
Iris Biometric Based Person Identification Using Deep Learning Technique
 
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
 
Self-X: Geo Fencing and Face Recognition based Smart Attendance Management Ap...
Self-X: Geo Fencing and Face Recognition based Smart Attendance Management Ap...Self-X: Geo Fencing and Face Recognition based Smart Attendance Management Ap...
Self-X: Geo Fencing and Face Recognition based Smart Attendance Management Ap...
 
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 

Recently uploaded (20)

Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 

IRJET - A Survey on Biometric Voting System using Iris Recognition

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1506 A Survey on Biometric Voting System using Iris Recognition Jayapriya J1, Roghini M2, Jayanthi S 1UG Student, Department of CSE, Agni College of Technology, Tamil Nadu, India 3Assistant Professor, Dept of Computer Science and Engineering, Agni College of Technology, Tamil Nadu, India ------------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - In every election ,he election commission isfacinga lot of troubles and different type of problems throughout the election. The most familiar issue faced by the election commission is inappropriate confirmation with respect to the arrangement of casting thevotes, duplicationor illegalcasting of votes. In this paper, a secure and new voting system is developed to improve the existing voting system using iris recognition. Iris one of the most secure biometric of person identification. The main goal of this article is to avoid duplication of casting votes. Key Words: - Iris, Recognition, Data mining ,feature extraction algorithms, matching. 1. INTRODUCTION Voting System is the government electionprocessesinevery democratic nation. Democracy is to allow people to vote on their interest and it is right of every individual of a democratic nation. The democratic government depends on the results of the election. Today’s world is an era of internet and technology, internet and electronics are increasing day by day. It is unavoidable to upgrade the traditional voting system and protect the security of it. The main intention of thisarticleistodevelopa new idea about voting system and also ensure security of it. To safeguard the security of voting system, We use iris recognition in proposed system. Iris recognition is used since it is highly unique, stable, cannot be duplicated and easily captured. Many types of voting system have been used around the world. Paper ballot voting system is an old and unsecure voting system where it is possible to fling multiple votes from same person. It runs to fling the vote with a ballot paper and a stamp. Fig. 1. Traditional voting system In electronic voting system, the process of election data is recorded, stored and preceded as digital information . Electronic voting system is used to fling vote as well as counting number of votes . Electronic voting system using solar power is shown in fig. 2. The electronic voting system uses AVISPA technique. Fig. 2. Electronic voting system Security is the important aspect of existing voting systems. There is a lot of chances for fake voting. Nowadays some politicians are following illegal method to succeed in the election. The traditional paper ballot and electronic voting systems need more manpower. These existing systems are more time consuming and also slow. In the proposedsystem we use Iris pattern. Hence proposed system is secure than the existing system 2. RELATED WORK In this Section we have studied few papers which show that data mining has a strong connection towards the collection of images and data required for the biometric votingsystem. A survey of Existing models/Work 1. Anil K. Jain(2019),Michigan State University: This paper tells the science of automatically identifying individuals based on their physiological or behavioral characteristics 2. Emma New ham(2014):Biometric as well as password security to voter is provided using cryptography and stenography. The main purpose of this system is to provide proper authentication of voter for voting system 3. A.Stoney(2001):to fling a vote, a voter has to enter the personal identification number and a secret key and along with this fingerprint is also required on the sensor. The system generates a cover image and embed secretkeyintoit to generate a stego image. Now the stego image is sent tothe server ,at server side optical recognitioncharactertechnique is used after reading this ,the server will find the individuals from the datasets. 4. Sobia Biag(2016)COMSATS University Islamabad: The proposed filter based algorithm uses a bank of Gaborfiltertocapture both local and global details in a fingerprint as compact fixed length finger code. Check voters list Issue ballot paper voting
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1507 5. Sonia Hof(2008)University of Linz ,Austria: In this paper biometrics is used to identify individuals using face ,iris, retina, palm-print ,etc. 6. Shanu Agarwal(2018): In this the system uses thumb impression for voter identification. The fingerprint is matched with the database if a match is available the person is permitted to fling a vote. 3. DATASETS Before creating the database, All that have to be done is to collect the appropriate data sets from the user. It takes the following process. A. Collect various iris images of theentirecitizenusing the CASIA database. B. Collect the details of the parties who are all participating in the election process. 4. PROPOSED SYSTEM The main intention of the article is to develop a new idea about voting system and also ensure the security of the system. To ensure the security of the voting system iris recognition is used in the proposed system. The concept of iris recognition is used since every individual has a unique iris. The image of iris can be easily captured. The two main stages are iris verification and iris identification. Iris verification verifies the identity of a person while iris identification establish the identity of the person. 4.1. RELATED CONCEPTS: The voting system has to be improved in order to avoid the duplication of votes and voting by an unauthorized person without proper verification. 4.2. FRONT END It collects the details such as candidate information ,iris image, and sends the details to the PHP to access the results from database. Front end is designed using HTML, CSS, Java Scripting languages. 4.3. BACK END SERVER :It collects the details from the front end DATA BASE : 1) Collect the iris image of all the citizens iris image is collected from CASIA database. 2) Collect the details of the candidateswhoarecompeting in the election 4.4. TECHNIQUES APPROACHED: Iris recognition process consists of five major stepstheyare: 4.4.1 Image acquisition 4.4.2 Segmentation 4.4.3 Normalization 4.4.4 Feature extraction 4.4.5 Matching 4.4.1 IMAGE ACQUISITION: The image of an iris cannot be acquired by camera as it is small in size and also because of the light reflection in the camera. Hence acquiring good image has some difficulties. We are using CASIA(Institute of Automation Chinese Academy of Sciences)iris image database version 4.0. 4.4.2 SEGMENTATION: Here we use Hough transformation for Segmentation. The edge detection techniqueisusedbeforetheHoughtransform is applied and canny edge detector is used for image extraction. the first step is to find out all the edges in the iris to detect inner and outer boundary of the iris. A circle is drawn at each edge of iris which has been found earlier with center at the point and with radius needed. X- axis is a value ,y-axis is b value, and z-axis is radius. Original image using edge detector After Hough Transform
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1508 4.4.3 IRIS NORMALIZATION: Dough man’s rubber sheet model is used for normalization of iris. The segmented iris is converted from Cartesian to polar coordinates. 4.4.4 FEATURE EXTRACTION: In this 1D log Gabor Wavelet is used to create a template representing pattern information. Feature extraction is implemented by the normalized iris pattern which has been convoluted with 1D log- gaborwavelet. First step of the process is breaking down of the 2D normalized iris pattern into number of 1D signal. Each row corresponds to a circular ring on iris region[14]. After encoding the process producesa bitwisetemplatewith a number of bits of information, a noise mask that communicate the area which are corrupted within the iris pattern and mark the corrupted bits . 4.4.5 MATCHING: In this article matching is done using hamming distance. hamming distance of to templates is calculated by shifting one template left and right bitwise. The successive shifts are used in calculating number of hamming distance Image of shifting process 5. ARCHITECTURE: 6. RESULT OF SEGMENTATION: images in the database has been segmented accurately. Only sum of the images in database cannot be segmented accurately. Circle iris and circle pupil is used to calculate the segmentation value of iris image, this can be done using Hough transform . 7. RESULT OF MATCHING: There are total of 54,607 iris images are present in the CASIA-Iris V4 which were collected from more than 1800 genuine subjects and 1000 from virtual subjects. The main advantage of CASIA database is that it does not produce any light reflection. The image can viewed clearly . 8. CONCLUSION: There is a constant increase in the population of our nation day to day, therefore improvement in the voting system is a mandatory thing. Even though there are many biometric techniques we have implemented iris recognition concept for providing high accuracy and this technique also reduces time required. And the important use of this is there is no chance of invalid vote. 9. REFERENCES [1]. K. Ramya Devi and J. V. Vidhya , ”SURVEY ON SECURE ELECTRONIC VOTING SYSTEM”,International Journal of Pharmacy &Technology(IJPT),Vol.9,April-2017 [2]Asif Ahmed Anik, Rayees Jameel, Abul Farah Anik, NowrozeAkter, ”Design of a solar piwer Electronic Voting Machine”, Proceedings of 2017 International Conference on Networking, Systems and Security(NSysS), 5-8 jan.2017,Dhaka,Bangladsh [3]Htet Ne Oo, Aye Moe Aung, “Design and formal analysisof electronic voting protocol using AVISPA”, Proceedings of
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1509 2017 2nd International Conference for Convergence in Technology(12CT), 7-9 April 2017, Mumbai, India [4] John, K. A., and Kofi S. A. M. (2014). IJCSI International Journal of Computer Science Issues. A Trustworthy Architectural Framework for the AdministrationofE-voting, 11 (30, 97. [5]ZuyinaAyuningSapturi, AmangSudarsonos,MikeYuliana, “E-voting security system for the election of EEPIS BEM president”, 2017 International Electronics Symposium on Knowledge Creation andIntelligent Co putting (IES-KCIC), 26-27 Sept. 2017, Surbaya, Indonesia. [6]NoureddineCherabit, Fatma Zohra Chelali, Amar Djeradi, “Circular hough Transform for Iris localization” Science and Technology, PISSN: 2163-2669, e-ISSN: 2163-2677, 2(5): 114-121, 2012. [7]Krzysztof Misztal, Emil Saeed, Jacek Tabor, and Khalid Saeed, “Iris Pattern Recognition with a New Mathematical Model to Its Rotation Detection”, Human Identification by Vascular Pattern (pp.43-65), November 2012. [8] Caroline Houston, “Iris Segmentation and Recognition Using Circular Hough Transform and Wavelets Features”, Rochester Institute of technology. [9] Richard Yew Fatt Ng, Yong Haur Tay, Kai Ming Mok, “A Review of Iris Recognition Algorithms”, 2008 International Symosium on Information Technology, Volume: 2, ITSim 2008. [10] Libor Masek, “Recognition of Human Iris Patterns for Biometric Identification”, The University of Western Australia, 2003. [11] K. Seetharaman, R. Ragupathy, “Iris Recognition for Personal Identification System”, ICMOC-2012,India [12] Z. Zainal Abidin, M. Manaf, A. S. Shibghatullah, S.H. A. MohdYunos,S.Anawar, Z. Ayop, “Iris Segmentation Analysis using Integro-Differential Operator andHoughTransform in BiometricSystem”, Journal ofTelecommunication,Electronic and Computer Engineering, ISSN:2180-1843Vol.4No.2July -December 2012. [13] U T Tania, S M AMotakabber and M I Ibrahimy, “Edge Detection Techniques for Iris Recognition System”, IOP Conference Series: Materials Sciences and Engineering, Volume 53, conference 1, 2013. [14] K. Seetharaman, R. Ragupathu, “Iris Recognition for Identification System”, Procedia Engineering, Volium 38