SlideShare a Scribd company logo
http://www.iaeme.com/IJCIET/index.asp 57 editor@iaeme.com
International Journal of Civil Engineering and Technology (IJCIET)
Volume 10, Issue 02, February 2019, pp. 57–68, Article ID: IJCIET_10_02_008
Available online at http://www.iaeme.com/ijciet/issues.asp?JType=IJCIET&VType=10&IType=2
ISSN Print: 0976-6308 and ISSN Online: 0976-6316
©IAEME Publication Scopus Indexed
AN ENHANCED VOTERS REGISTRATION AND
AUTHENTICATION APPLICATION USING IRIS
RECOGNITION TECHNOLOGY
Kennedy Okokpujie*, Samuel Ndueso John, Etinosa Noma-Osaghae, Charles Ndujiuba
Department of Electrical and Information Engineering,
Covenant University, Ota, Ogun State, Nigeria
Okokpujie Imhade Princess
Department of Mechanical Engineering,
Covenant University, Ota, Ogun State, Nigeria
*Corresponding Author email: kennedy.okokpujie@covenantuniversity.edu.ng
ABSTRACT
The use of fingerprints in a voting system for registration and authentication
application has its limitations. Among these limitations are mismatches caused by
disparity in fingerprint trait and templates of voters taken at the point of registration
and at the point of authentication (voter’s accreditation). Manual labour, aging,
variations in user interaction (i.e. pressure on the scanner), environmental changes
and injuries are a few of the factors that can cause these disparities. The iris is more
resistant to these factors that cause disparity in biometrics. In this designed model, the
iris was used in place of fingerprints as the biometric measure to register and
authenticate voters. An iris scanner obtains the voter’s iris image, segments and
digitizes it. The digitized iris image of the voter is used as a training data and stored
in the template. This template is stored together with the voter’s particulars in a
database. An algorithm design using the C# (C sharp) language issues a PIN for the
voter’s authentication. At the point of authentication, the PIN of the voter is keyed in.
The iris scanner obtains the voter’s iris image, generates a template of the iris and
with the aid of the system’s embedded algorithm, compares the details of the voter’s
pin and iris trait with the one in the database for a match. A match grants the voter
the pass to vote. A mismatch denies the voter access to the voting system. This
implemented Iris Recognition Technology drastically reduces the chances of
mismatches for genuine voters and denies imposters in the voting system due to its
reliability and robustness as revealed by the tests carried out on the designed model.
Key words: biometric, iris, registration, e-voting, recognition, authentication.
Cite this Article: Kennedy Okokpujie, Samuel Ndueso John, Etinosa Noma-Osaghae,
Charles Ndujiuba, Okokpujie Imhade Princess, An Enhanced Voters Registration and
Authentication Application Using Iris Recognition Technology, International Journal
of Civil Engineering and Technology (IJCIET) 10(2), 2019, pp. 57–68.
http://www.iaeme.com/IJCIET/issues.asp?JType=IJCIET&VType=10&IType=2
An Enhanced Voters Registration and Authentication Application Using Iris Recognition
Technology
http://www.iaeme.com/IJCIET/index.asp 58 editor@iaeme.com
1. INTRODUCTION
Political elections in many developing nations are bedeviled with complaints of unfairness.
Registration to vote is usually done at the local government level and voters’ cards are issued
as proof of registration [1]. Although some form of biometrics may be collected during
enrolment and perhaps even used during the voting process, many elections in developing
nations are still riddled with electoral fraud [2]. Voters’ registration is the most expensive and
complex activity within the framework of elections. This process is so crucial that the
outcome of an election in terms of credibility and smoothness depend largely on it [3].
Voting registration and authentication have not been efficient in developing nations.
Developing nations that have tried to incorporate biometric recognition into their voting
processes are still grappling with the lingering problems of impersonation, rigging and bribery
[4].
This paper suggests the use of iris biometric recognition for voters’ enrolment and
verification. This will improve the credibility of election results in developing nations. The
Iris is a physical biometric trait that is very difficult to spoof. It is also unique to every
individual and remains permanent for a lifetime. Iris biometric technology also has a niche
benefit of being a non-contact biometric recognition system. This makes iris biometric
recognition systems less prone to errors or noise that may arise from inadequate pressure and
small contact area. Iris biometric technology also has the advantage of protecting users from
communicable diseases that can be transferred through contact [5].
The major objective of this paper is to propose a system of enrolling and verifying eligible
voters using iris recognition technology. Microsoft Visual Studio’s integrated development
environment was used to create a voting system software application. The language used to
write the software program was C#. The database was designed using Mini SQL [6]. An iris
scanner was incorporated into the design to complete the enhanced iris recognition voters’
system. During registration, personal details were taken. The iris scanner captured the image
of the iris and embedded algorithms in the scanner localized, segmented, normalized and
performed feature extraction on the iris image. A template of the iris’ unique characteristics
was stored along with the voter’s particulars in the database. The implemented system issued
a pin to the voter at the completion of the registration/enrolment process [7].
To be authenticated, the voter keys the pin issued after the registration process into the
recognition system. The pin was used to call up the voter’s particulars and a 1:1 verification
using the voter’s iris is carried out to confirm the voter’s identity. If authenticated, the voter is
given the permission to vote. A voter may not be authenticated if there is more than one
record of the voter on the database, the voter did not enroll or the iris recognition gives a false
non-match result. The use of iris recognition technology in the voting process of developing
nations is justified by the inevitable improvement it will bring to the credibility of electoral
result in developing nations [8].
2. RELATED WORKS
De and Ghoshal, [9] proposed an electoral process based on a voter’s registration list that was
created purely with human iris recognition technology. The authors concentrated on the
algorithm used to localize, segment, normalize and extract the unique features of the iris
image captured by a scanner. The authors used Canny Edge detection algorithm for localizing
the iris and pupils. Normalization was carried out using the Daughman’s technique.
Segmentation by the Log Gabor filter and matching was done using Euclidean distance. The
authors also elaborated on the software used to efficiently carry out iris recognition. The
authors used MATLAB®
to implement their recognition system.
Kennedy Okokpujie, Samuel Ndueso John, Etinosa Noma-Osaghae, Charles Ndujiuba,
Okokpujie Imhade Princess
http://www.iaeme.com/IJCIET/index.asp 59 editor@iaeme.com
The gradient magnitudes used to identify the edges of the iris image (Canning Edge
detection algorithm was:
| | √
Where; G = Gradient Magnitude, Gx = Gradient in the X direction, Gy = Gradient in the Y
direction.
The equation used to change the circular nature of the iris into a rectangular shape was given as:
[ ] [ ] (2)
(3)
(4)
(xi, yi) – The area between the directions of the pupillary and limbic limits in the heading.
- Heading. (xp, yp) – The inside direction of the understudy, Rp – Radius of the pupil, Rl( ) – The separation
between focal point of the understudy and the purpose of limbic limit. The Log Gabor Filter frequency response
was given as:
(
( ( ))
( ( ))
)
fo – Centre frequency, – Bandwidth of the filter
The matching, computed using Euclidean distance. The two points in the Euclidean space,
P and Q to be compared in terms of distance from each other was given as:
√ (6)
Where, X – Measured distance, P and Q – Points on Euclidean plane
In the spring of 2016, researchers from the Department of Government, Democracy and
Governance Studies Program in the University of Georgetown carried out a research on behalf
of the United States Agency for International Development (USAID) on how the introduction
of new technology into electoral processes either boosts or drains voters’ confidence in
electoral processes. The researchers focused on emerging and established sample states to
define how technologies have affected voters’ confidence in the electoral process. The
researchers declared that technology in itself may not completely solve the problem of
electoral fraud or boost looters confidence in the electoral process. The researchers
extensively explored the use of iris recognition in Somaliland’s electoral process and the
success it recorded. The researchers also stressed the need to adequately define the electoral
problems technology seeks to address before implementing any new technology into electoral
processes [10].
Okokpujie et al., [11] extensively analyzed segmentation of the irises using the popular
Daugman Integro-differential approach and the less popular Circular Hough Transform. The
researchers from Covenant University, Ota, Ogun State, Nigeria, declared that Iris
Segmentation, using Circular Hough Transform gave a better result than the more popular
integro-differential approach Daugman developed. The authors also recommended the use of
Circular Hough Transform for iris segmentation in crucial iris recognition technology
applications such as electoral processes to boost the confidence of voters [11].
An Enhanced Voters Registration and Authentication Application Using Iris Recognition
Technology
http://www.iaeme.com/IJCIET/index.asp 60 editor@iaeme.com
Schueller and Walls, [12] conducted a research on the voter registration process that took
place in Somaliland from January to September, 2016. The researchers highlighted the fact
that previous voter registration in Somaliland was riddled with multiple applications and little
trust in the electoral process. The researchers also stressed the fact that the government of
Somaliland decided to overcome the problem of multiple applications by using iris
recognition technology. The implementation of iris recognition technology in registering
voters in Somaliland was adjudged successful.
Hobbis and Hobbis, [13] looked closely at voter integrity, trust and the promise of digital
technologies using Solomon Islands as a case study. The researchers tried to answer the
questions of technological peculiarities, strengths and shortcomings of integrating biometrics
into electoral voting processes. They also looked at the way the world is gradually embracing
the use of biometrics in electoral processes due to its ability to uniquely identify every
individual. Lastly, the researchers examined the efforts made by the government of Solomon
Island to show how the use of biometrics in her electoral process has helped to stabilize
governance. This lead to several researchers in this area for economic development tending
towards sustainability of biometrics in automated teller machines for enhanced user
authentication [14-23]
2. METHODOLOGY
The application software that forms the backbone of the designed and implemented iris
recognition based voter registration and authentication system was designed specifically for
the Windows® operating system. The C# language was used to develop the software
application. Mini SQL was used to design the database. Microsoft Visual Studio provided the
integrated development environment for writing, compiling and debugging the software
application. The iris scanner used infra-red light emitting diodes to illuminate the eyes and
thus could capture the iris in all outdoor and indoor conditions. The scanner also has
embedded algorithms that can perform localization, segmentation, normalization, template
formation, storage and matching.
The Waterfall software development model was adopted to create the application software
used in tandem with the iris scanner. The aim and objectives of the application software were
clearly defined at the beginning of the design process. Afterward, the application software
was developed, tested and debugged. This is shown diagrammatically in Figure 1.
Figure 1 Application Software Development Model
Kennedy Okokpujie, Samuel Ndueso John, Etinosa Noma-Osaghae, Charles Ndujiuba,
Okokpujie Imhade Princess
http://www.iaeme.com/IJCIET/index.asp 61 editor@iaeme.com
The database was created using Mini SQL (MSQL), a light-weight database management
tool used to create memory-efficient, performance-efficient and portable databases. Mini SQL
can support basic query generation, load and save SQL script files, quick table data lookups,
generation of SQL code and data scripts. The integrated development environment is shown
in Figure 2.
Figure 2 The Integrated Development Environment
Figure 3 The Mini SQL Window
An Enhanced Voters Registration and Authentication Application Using Iris Recognition
Technology
http://www.iaeme.com/IJCIET/index.asp 62 editor@iaeme.com
Figure 4 Sample of Relationships between Tables
The Mini SQL program was used to create tables that were linked together with primary
and foreign keys. A sample of the relationship between the tables is shown in Figure 4. Upon
completion of the Windows application software, the key objectives of being able to register,
enroll and authenticate voters were achieved.
Figure 5 Flowchart for Voters’ Registration
Kennedy Okokpujie, Samuel Ndueso John, Etinosa Noma-Osaghae, Charles Ndujiuba,
Okokpujie Imhade Princess
http://www.iaeme.com/IJCIET/index.asp 63 editor@iaeme.com
Figure 6 Flowchart for Voters’ Authentication
The Algorithm for the Registration (Iris recognition enrollment) process is shown in
Figure 5
During registration or enrolment, the following data were acquired:
a. Personal details such as age, name, sex etc.
b. Iris image.
Voters particulars are stored in the database alongside the unique iris template created
from the iris image captured. Each unique iris details are stored as templates indexes by the
voter registration particulars it represents. At the end of the enrolment process, a Personal
Identification Number (PIN) is issued to the voter.
Authentication in this context is the process of carrying out a one-to-one verification to
determine if a voter is indeed eligible to vote. The voter keys in the PIN acquired at the point
of registration. The PIN enables the system to pull up the particulars related to the PIN. The
iris scanner captures the voter’s iris image, localizes, segments, normalizes, extracts its
features and forms a template (query template) which is compared with the stored template
indexed by the voter’s particulars for a match. If there is s match, the voter is allowed to vote,
otherwise, the voter is disallowed from voting. The algorithm for the authentication process is
shown in Figure 6.
An Enhanced Voters Registration and Authentication Application Using Iris Recognition
Technology
http://www.iaeme.com/IJCIET/index.asp 64 editor@iaeme.com
 Contestants Section: All qualified contestants are registered via the contestants’ window.
 Voters Section: Represents the portal for voters are registration and authentication.
 Iris enrolment Window: The portal was used to acquire and store the unique features of
voters’ iris image.
 The application interface has the following windows: they are depicted in Figures 7 to 12.
 Post Section: The various posts to be filled are highlighted in this window.
 Party Window: Participating political parties are registered here.
Figure 7 The Voters’ Registration Portal
Figure 8 The Application Interface for Contestants and Voter
Kennedy Okokpujie, Samuel Ndueso John, Etinosa Noma-Osaghae, Charles Ndujiuba,
Okokpujie Imhade Princess
http://www.iaeme.com/IJCIET/index.asp 65 editor@iaeme.com
Figure 9 The Application Interface for Political Positions
Figure 10 The Application Interface for Political Parties
Figure 11 The Application Interface for Contestants’ Registration
An Enhanced Voters Registration and Authentication Application Using Iris Recognition
Technology
http://www.iaeme.com/IJCIET/index.asp 66 editor@iaeme.com
Figure 12 The Iris Image Acquiring Window.
3. CONCLUSIONS
The False Rejection Rate (FRR) which is the probability that the system will not authorize a
duly enrolled applicant and False Acceptance Rate which is the probability that the system
will authorize an unregistered applicant were zero (0). The objective of creating an iris
biometric recognition based voter registration and authentication system was achieved. The
application software worked seamlessly with the iris scanner.
FUTURE WORK
The creation of better and more efficient matching algorithms to lower the time it takes to
make a decision based on the match score. An iris camera with a high image acquiring
distance would be used for future applications.
ACKNOWLEDGMENT
This work is sponsored by Covenant University, Ota, Ogun State, Nigeria.
REFERENCES
[1] A. Evrensel, "Voter Registration in Africa A Comparative Analysis," 2010.
[2] J. Baylis, P. Owens, and S. Smith, The globalization of world politics: An introduction to
international relations: Oxford University Press, 2017.
[3] K. Okokpujie, N.-O. Etinosa, S. John, and E. Joy, "Comparative Analysis of Fingerprint
Preprocessing Algorithms for Electronic Voting Processes," in International Conference on
Information Theoretic Security, 2017, pp. 212-219.
[4] S. John, C. Anele, O. O. Kennedy, F. Olajide, and C. G. Kennedy, "Realtime Fraud Detection
in the Banking Sector Using Data Mining Techniques/Algorithm," in Computational Science
and Computational Intelligence (CSCI), 2016 International Conference on, 2016, pp. 1186-
1191.
Kennedy Okokpujie, Samuel Ndueso John, Etinosa Noma-Osaghae, Charles Ndujiuba,
Okokpujie Imhade Princess
http://www.iaeme.com/IJCIET/index.asp 67 editor@iaeme.com
[5] J. A. Badejo, A. A. Atayero, and T. S. Ibiyemi, "A robust preprocessing algorithm for iris
segmentation from low contrast eye images," in Future Technologies Conference (FTC), 2016,
pp. 567-576.
[6] K. Okokpujie, F. Olajide, S. John, and C. G. Kennedy, "Implementation of the Enhanced
Fingerprint Authentication in the ATM System Using ATmega128," in Proceedings of the
International Conference on Security and Management (SAM), 2016, p. 258.
[7] S. A. Daramola, M. A. Adefuminiyi, and T. M. John, "Review and Proposed Methodology for
a Lecture Attendance System using Neural Network," in Proceedings of the World Congress
on Engineering, 2016.
[8] T. O. Majekodunmi and F. E. Idachaba, "A review of the fingerprint, speaker recognition, face
recognition and iris recognition based biometric identification technologies," 2011.
[9] P. De and D. Ghoshal, "Human Iris Recognition for clean Electoral process in India by
creating a fraud free voter registration list," Procedia Computer Science, vol. 89, pp. 850-855,
2016.
[10] S. Araida, S. Herrera, and M. Ping, "Georgetown University Department of Government
Democracy and Governance Studies Program United States Agency for International
Development (USAID) Electoral Policy Study Group Report on Elections, Technology and
Voter Confidence," 2016.
[11] K. Okokpujie, E. Noma-Osaghae, S. John, and A. Ajulibe, "An Improved Iris Segmentation
Technique Using Circular Hough Transform," in International Conference on Information
Theoretic Security, 2017, pp. 203-211.
[12] M.-L. Schueller and M. Walls, "Report by International Observers on the 2016 Voter
Registration Process in Somaliland," Progressio, 2017.
[13] S. K. Hobbis and G. Hobbis, "Voter Integrity, Trust and the Promise of Digital Technologies:
Biometric Voter Registration in Solomon Islands," in Anthropological Forum, 2017, pp. 1-21.
[14] K. Okokpujie, O. Shobayo, E. Noma-Osaghae, O. Imhade, O. Okoyeigbo. Realization of
MPLS-Based VPN Network for Improved Qos Metrics. TELKOMNIKA (Telecommunication
Computing Electronics and Control). 2018;16.
[15] I. Dunmade, M. Udo, T. Akintayo, S. Oyedepo, I. P. Okokpujie. Lifecycle Impact Assessment
of an Engineering Project Management Process–a SLCA Approach. InIOP Conference Series:
Materials Science and Engineering 2018 Sep (Vol. 413, No. 1, p. 012061). IOP Publishing.
[16] I. P. Okokpujie, O. S. Fayomi, R. O. Leramo. The Role of Research in Economic
Development. InIOP Conference Series: Materials Science and Engineering 2018 Sep (Vol.
413, No. 1, p. 012060). IOP Publishing.
[17] O. S. Fayomi, I. P. Okokpujie, M. Udo. The Role of Research in Attaining Sustainable
Development Goals. InIOP Conference Series: Materials Science and Engineering 2018 Sep
(Vol. 413, No. 1, p. 012002). IOP Publishing.
[18] A. Onawumi, M. Udo, E. Awoyemi, I. P. Okokpujie. Alternate Maintainability Evaluation
Technique for Steering System of Used Automobiles. InIOP Conference Series: Materials
Science and Engineering 2018 Sep (Vol. 413, No. 1, p. 012062). IOP Publishing.
An Enhanced Voters Registration and Authentication Application Using Iris Recognition
Technology
http://www.iaeme.com/IJCIET/index.asp 68 editor@iaeme.com
[19] K. Okokpujie, E. Noma-Osaghae, O. Okesola, O. Omoruyi, C. Okereke, S. John, I. P.
Okokpujie. Fingerprint Biometric Authentication Based Point of Sale Terminal.
InInternational Conference on Information Science and Applications 2018 Jun 25 (pp. 229-
237). Springer, Singapore.
[20] K. Okokpujie, E. Noma-Osaghae, O. Okesola, O. Omoruyi, C. Okereke, S. John, I. P.
Okokpujie. Integration of Iris Biometrics in Automated Teller Machines for Enhanced User
Authentication. InInternational Conference on Information Science and Applications 2018 Jun
25 (pp. 219-228). Springer, Singapore.
[21] E. Noma-Osaghae, K. O. Okokpujie, C. U. Ndujiuba, O. Olatunji, I. P. Okokpujie. Epidemic
Alert System: A Web-based Grassroots Model. International Journal of Electrical and
Computer Engineering (IJECE). 2018;8(5):3809-28.
[22] K. Okokpujie, E. Noma-Osaghae, S. John, P. C. Jumbo. Automatic home appliance switching
using speech recognition software and embedded system. InComputing Networking and
Informatics (ICCNI), 2017 International Conference on 2017 Oct 29 (pp. 1-4). IEEE.
[23] K. Okokpujie, E. Noma-Osaghae, S. John, K. A. Grace, I. Okokpujie. A face recognition
attendance system with GSM notification. InElectro-Technology for National Development
(NIGERCON), 2017 IEEE 3rd International Conference on 2017 Nov 7 (pp. 239-244). IEEE.
[24] Sayeesh, Dr. Nagaratna P. Hegde, A Comparison Of Multiple Wavelet Algorithms For Iris
Recognition, International Journal of Computer Engineering and Technology (IJCET),
Volume 4,Issue 2, March – April (2013)

More Related Content

What's hot

Multimodal fusion of fingerprint and iris
Multimodal fusion of fingerprint and iris Multimodal fusion of fingerprint and iris
Multimodal fusion of fingerprint and iris
Dr. Vinayak Bharadi
 
Integrating Fusion levels for Biometric Authentication System
Integrating Fusion levels for Biometric Authentication SystemIntegrating Fusion levels for Biometric Authentication System
Integrating Fusion levels for Biometric Authentication System
IOSRJECE
 
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET Journal
 
A comparative analysis of Iris data compression
A comparative analysis of Iris data compressionA comparative analysis of Iris data compression
A comparative analysis of Iris data compression
IJSRED
 
Optimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifierOptimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifier
IRJET Journal
 
N010438890
N010438890N010438890
N010438890
IOSR Journals
 
50120130406045
5012013040604550120130406045
50120130406045
IAEME Publication
 
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET Journal
 
A Study of Iris Recognition
A Study of Iris RecognitionA Study of Iris Recognition
A Study of Iris Recognition
editor1knowledgecuddle
 
IRJET- Library Management System with Facial Biometric Authentication
IRJET- Library Management System with Facial Biometric AuthenticationIRJET- Library Management System with Facial Biometric Authentication
IRJET- Library Management System with Facial Biometric Authentication
IRJET Journal
 
Smart Voting System with Face Recognition
Smart Voting System with Face RecognitionSmart Voting System with Face Recognition
Smart Voting System with Face Recognition
Nikhil Katte
 
IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET-Biostatistics in Indian Banks: An Enhanced Security ApproachIRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET Journal
 
Final Report Biometrics
Final Report BiometricsFinal Report Biometrics
Final Report Biometrics
anoop80686
 
Signature Recognition Poster
Signature Recognition PosterSignature Recognition Poster
Signature Recognition Poster
Tejraj Thakor
 
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
IJERA Editor
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
IRJET Journal
 
Role of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics systemRole of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics system
Kishor Singh
 
Wireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint SensorWireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint Sensor
ijtsrd
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
OECLIB Odisha Electronics Control Library
 

What's hot (19)

Multimodal fusion of fingerprint and iris
Multimodal fusion of fingerprint and iris Multimodal fusion of fingerprint and iris
Multimodal fusion of fingerprint and iris
 
Integrating Fusion levels for Biometric Authentication System
Integrating Fusion levels for Biometric Authentication SystemIntegrating Fusion levels for Biometric Authentication System
Integrating Fusion levels for Biometric Authentication System
 
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
 
A comparative analysis of Iris data compression
A comparative analysis of Iris data compressionA comparative analysis of Iris data compression
A comparative analysis of Iris data compression
 
Optimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifierOptimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifier
 
N010438890
N010438890N010438890
N010438890
 
50120130406045
5012013040604550120130406045
50120130406045
 
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
 
A Study of Iris Recognition
A Study of Iris RecognitionA Study of Iris Recognition
A Study of Iris Recognition
 
IRJET- Library Management System with Facial Biometric Authentication
IRJET- Library Management System with Facial Biometric AuthenticationIRJET- Library Management System with Facial Biometric Authentication
IRJET- Library Management System with Facial Biometric Authentication
 
Smart Voting System with Face Recognition
Smart Voting System with Face RecognitionSmart Voting System with Face Recognition
Smart Voting System with Face Recognition
 
IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET-Biostatistics in Indian Banks: An Enhanced Security ApproachIRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
 
Final Report Biometrics
Final Report BiometricsFinal Report Biometrics
Final Report Biometrics
 
Signature Recognition Poster
Signature Recognition PosterSignature Recognition Poster
Signature Recognition Poster
 
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
 
Role of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics systemRole of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics system
 
Wireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint SensorWireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint Sensor
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 

Similar to Ijciet 10 02_008

SECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoT
SECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoTSECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoT
SECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoT
IRJET Journal
 
Fingerprint Based E Voting System
Fingerprint Based E Voting SystemFingerprint Based E Voting System
Fingerprint Based E Voting System
ijtsrd
 
ONLINE FINGERPRINT VOTING SYSTEM
ONLINE FINGERPRINT VOTING SYSTEMONLINE FINGERPRINT VOTING SYSTEM
ONLINE FINGERPRINT VOTING SYSTEM
IRJET Journal
 
IRJET- Biometric Voting Machine
IRJET- Biometric Voting MachineIRJET- Biometric Voting Machine
IRJET- Biometric Voting Machine
IRJET Journal
 
A SECURITY BASED VOTING SYSTEMUSING BIOMETRIC
A SECURITY BASED VOTING SYSTEMUSING BIOMETRICA SECURITY BASED VOTING SYSTEMUSING BIOMETRIC
A SECURITY BASED VOTING SYSTEMUSING BIOMETRIC
IJERA Editor
 
IRJET - A Survey on Biometric Voting System using Iris Recognition
IRJET - A Survey on Biometric Voting System using Iris RecognitionIRJET - A Survey on Biometric Voting System using Iris Recognition
IRJET - A Survey on Biometric Voting System using Iris Recognition
IRJET Journal
 
A Novel Method for Facial Recognition Based Smart Voting System Using Machine...
A Novel Method for Facial Recognition Based Smart Voting System Using Machine...A Novel Method for Facial Recognition Based Smart Voting System Using Machine...
A Novel Method for Facial Recognition Based Smart Voting System Using Machine...
IRJET Journal
 
Smart Voting System Using Java Servlets
Smart Voting System Using Java ServletsSmart Voting System Using Java Servlets
Smart Voting System Using Java Servlets
IRJET Journal
 
IRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
IRJET - Smart E-Voting System with Fingerprint Authentication using ArduinoIRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
IRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
IRJET Journal
 
Online Voting System using Aadhaar Card and Biometric
Online Voting System using Aadhaar Card and BiometricOnline Voting System using Aadhaar Card and Biometric
Online Voting System using Aadhaar Card and Biometric
IRJET Journal
 
An in-depth review on Contactless Fingerprint Identification using Deep Learning
An in-depth review on Contactless Fingerprint Identification using Deep LearningAn in-depth review on Contactless Fingerprint Identification using Deep Learning
An in-depth review on Contactless Fingerprint Identification using Deep Learning
IRJET Journal
 
Internation Journal Conference
Internation Journal ConferenceInternation Journal Conference
Internation Journal Conference
Hemanth Kumar
 
VIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTP
VIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTPVIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTP
VIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTP
IRJET Journal
 
Biometric Based Human Recognition Systems for Institutions using Exeat Monito...
Biometric Based Human Recognition Systems for Institutions using Exeat Monito...Biometric Based Human Recognition Systems for Institutions using Exeat Monito...
Biometric Based Human Recognition Systems for Institutions using Exeat Monito...
ijtsrd
 
novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...
INFOGAIN PUBLICATION
 
PREVENTION OF VOTER FRAUD USING BLOCKCHAIN TECHNOLOGY
PREVENTION OF VOTER FRAUD USING BLOCKCHAIN TECHNOLOGYPREVENTION OF VOTER FRAUD USING BLOCKCHAIN TECHNOLOGY
PREVENTION OF VOTER FRAUD USING BLOCKCHAIN TECHNOLOGY
IRJET Journal
 
Design of biometric electronic voting machine
Design of biometric electronic voting machineDesign of biometric electronic voting machine
Design of biometric electronic voting machine
IJARIIT
 
Atm security using_fingerprint_biometric_identifer
Atm security using_fingerprint_biometric_identiferAtm security using_fingerprint_biometric_identifer
Atm security using_fingerprint_biometric_identifer
RutwikShitole1
 
IRJET- A Survey on: Aadhar Based Dual Authentication Secured E-Voting System
IRJET- A Survey on: Aadhar Based Dual Authentication Secured E-Voting SystemIRJET- A Survey on: Aadhar Based Dual Authentication Secured E-Voting System
IRJET- A Survey on: Aadhar Based Dual Authentication Secured E-Voting System
IRJET Journal
 
Smart Voting System using Aadhar Card
Smart Voting System using Aadhar CardSmart Voting System using Aadhar Card
Smart Voting System using Aadhar Card
Associate Professor in VSB Coimbatore
 

Similar to Ijciet 10 02_008 (20)

SECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoT
SECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoTSECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoT
SECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoT
 
Fingerprint Based E Voting System
Fingerprint Based E Voting SystemFingerprint Based E Voting System
Fingerprint Based E Voting System
 
ONLINE FINGERPRINT VOTING SYSTEM
ONLINE FINGERPRINT VOTING SYSTEMONLINE FINGERPRINT VOTING SYSTEM
ONLINE FINGERPRINT VOTING SYSTEM
 
IRJET- Biometric Voting Machine
IRJET- Biometric Voting MachineIRJET- Biometric Voting Machine
IRJET- Biometric Voting Machine
 
A SECURITY BASED VOTING SYSTEMUSING BIOMETRIC
A SECURITY BASED VOTING SYSTEMUSING BIOMETRICA SECURITY BASED VOTING SYSTEMUSING BIOMETRIC
A SECURITY BASED VOTING SYSTEMUSING BIOMETRIC
 
IRJET - A Survey on Biometric Voting System using Iris Recognition
IRJET - A Survey on Biometric Voting System using Iris RecognitionIRJET - A Survey on Biometric Voting System using Iris Recognition
IRJET - A Survey on Biometric Voting System using Iris Recognition
 
A Novel Method for Facial Recognition Based Smart Voting System Using Machine...
A Novel Method for Facial Recognition Based Smart Voting System Using Machine...A Novel Method for Facial Recognition Based Smart Voting System Using Machine...
A Novel Method for Facial Recognition Based Smart Voting System Using Machine...
 
Smart Voting System Using Java Servlets
Smart Voting System Using Java ServletsSmart Voting System Using Java Servlets
Smart Voting System Using Java Servlets
 
IRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
IRJET - Smart E-Voting System with Fingerprint Authentication using ArduinoIRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
IRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
 
Online Voting System using Aadhaar Card and Biometric
Online Voting System using Aadhaar Card and BiometricOnline Voting System using Aadhaar Card and Biometric
Online Voting System using Aadhaar Card and Biometric
 
An in-depth review on Contactless Fingerprint Identification using Deep Learning
An in-depth review on Contactless Fingerprint Identification using Deep LearningAn in-depth review on Contactless Fingerprint Identification using Deep Learning
An in-depth review on Contactless Fingerprint Identification using Deep Learning
 
Internation Journal Conference
Internation Journal ConferenceInternation Journal Conference
Internation Journal Conference
 
VIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTP
VIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTPVIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTP
VIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTP
 
Biometric Based Human Recognition Systems for Institutions using Exeat Monito...
Biometric Based Human Recognition Systems for Institutions using Exeat Monito...Biometric Based Human Recognition Systems for Institutions using Exeat Monito...
Biometric Based Human Recognition Systems for Institutions using Exeat Monito...
 
novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...
 
PREVENTION OF VOTER FRAUD USING BLOCKCHAIN TECHNOLOGY
PREVENTION OF VOTER FRAUD USING BLOCKCHAIN TECHNOLOGYPREVENTION OF VOTER FRAUD USING BLOCKCHAIN TECHNOLOGY
PREVENTION OF VOTER FRAUD USING BLOCKCHAIN TECHNOLOGY
 
Design of biometric electronic voting machine
Design of biometric electronic voting machineDesign of biometric electronic voting machine
Design of biometric electronic voting machine
 
Atm security using_fingerprint_biometric_identifer
Atm security using_fingerprint_biometric_identiferAtm security using_fingerprint_biometric_identifer
Atm security using_fingerprint_biometric_identifer
 
IRJET- A Survey on: Aadhar Based Dual Authentication Secured E-Voting System
IRJET- A Survey on: Aadhar Based Dual Authentication Secured E-Voting SystemIRJET- A Survey on: Aadhar Based Dual Authentication Secured E-Voting System
IRJET- A Survey on: Aadhar Based Dual Authentication Secured E-Voting System
 
Smart Voting System using Aadhar Card
Smart Voting System using Aadhar CardSmart Voting System using Aadhar Card
Smart Voting System using Aadhar Card
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
IAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
IAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
IAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
harshapolam10
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
ijaia
 
Assistant Engineer (Chemical) Interview Questions.pdf
Assistant Engineer (Chemical) Interview Questions.pdfAssistant Engineer (Chemical) Interview Questions.pdf
Assistant Engineer (Chemical) Interview Questions.pdf
Seetal Daas
 
Power Electronics- AC -AC Converters.pptx
Power Electronics- AC -AC Converters.pptxPower Electronics- AC -AC Converters.pptx
Power Electronics- AC -AC Converters.pptx
Poornima D
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
Divyanshu
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
Kamal Acharya
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
aryanpankaj78
 
Zener Diode and its V-I Characteristics and Applications
Zener Diode and its V-I Characteristics and ApplicationsZener Diode and its V-I Characteristics and Applications
Zener Diode and its V-I Characteristics and Applications
Shiny Christobel
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
Paris Salesforce Developer Group
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
Atif Razi
 
Open Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surfaceOpen Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surface
Indrajeet sahu
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
Ericsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.pptEricsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.ppt
wafawafa52
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
upoux
 
Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...
pvpriya2
 
openshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoinopenshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoin
snaprevwdev
 
Accident detection system project report.pdf
Accident detection system project report.pdfAccident detection system project report.pdf
Accident detection system project report.pdf
Kamal Acharya
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
MadhavJungKarki
 
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Transcat
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
21UME003TUSHARDEB
 

Recently uploaded (20)

SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Assistant Engineer (Chemical) Interview Questions.pdf
Assistant Engineer (Chemical) Interview Questions.pdfAssistant Engineer (Chemical) Interview Questions.pdf
Assistant Engineer (Chemical) Interview Questions.pdf
 
Power Electronics- AC -AC Converters.pptx
Power Electronics- AC -AC Converters.pptxPower Electronics- AC -AC Converters.pptx
Power Electronics- AC -AC Converters.pptx
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
 
Zener Diode and its V-I Characteristics and Applications
Zener Diode and its V-I Characteristics and ApplicationsZener Diode and its V-I Characteristics and Applications
Zener Diode and its V-I Characteristics and Applications
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
 
Open Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surfaceOpen Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surface
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
Ericsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.pptEricsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.ppt
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
 
Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...
 
openshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoinopenshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoin
 
Accident detection system project report.pdf
Accident detection system project report.pdfAccident detection system project report.pdf
Accident detection system project report.pdf
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
 
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
 

Ijciet 10 02_008

  • 1. http://www.iaeme.com/IJCIET/index.asp 57 editor@iaeme.com International Journal of Civil Engineering and Technology (IJCIET) Volume 10, Issue 02, February 2019, pp. 57–68, Article ID: IJCIET_10_02_008 Available online at http://www.iaeme.com/ijciet/issues.asp?JType=IJCIET&VType=10&IType=2 ISSN Print: 0976-6308 and ISSN Online: 0976-6316 ©IAEME Publication Scopus Indexed AN ENHANCED VOTERS REGISTRATION AND AUTHENTICATION APPLICATION USING IRIS RECOGNITION TECHNOLOGY Kennedy Okokpujie*, Samuel Ndueso John, Etinosa Noma-Osaghae, Charles Ndujiuba Department of Electrical and Information Engineering, Covenant University, Ota, Ogun State, Nigeria Okokpujie Imhade Princess Department of Mechanical Engineering, Covenant University, Ota, Ogun State, Nigeria *Corresponding Author email: kennedy.okokpujie@covenantuniversity.edu.ng ABSTRACT The use of fingerprints in a voting system for registration and authentication application has its limitations. Among these limitations are mismatches caused by disparity in fingerprint trait and templates of voters taken at the point of registration and at the point of authentication (voter’s accreditation). Manual labour, aging, variations in user interaction (i.e. pressure on the scanner), environmental changes and injuries are a few of the factors that can cause these disparities. The iris is more resistant to these factors that cause disparity in biometrics. In this designed model, the iris was used in place of fingerprints as the biometric measure to register and authenticate voters. An iris scanner obtains the voter’s iris image, segments and digitizes it. The digitized iris image of the voter is used as a training data and stored in the template. This template is stored together with the voter’s particulars in a database. An algorithm design using the C# (C sharp) language issues a PIN for the voter’s authentication. At the point of authentication, the PIN of the voter is keyed in. The iris scanner obtains the voter’s iris image, generates a template of the iris and with the aid of the system’s embedded algorithm, compares the details of the voter’s pin and iris trait with the one in the database for a match. A match grants the voter the pass to vote. A mismatch denies the voter access to the voting system. This implemented Iris Recognition Technology drastically reduces the chances of mismatches for genuine voters and denies imposters in the voting system due to its reliability and robustness as revealed by the tests carried out on the designed model. Key words: biometric, iris, registration, e-voting, recognition, authentication. Cite this Article: Kennedy Okokpujie, Samuel Ndueso John, Etinosa Noma-Osaghae, Charles Ndujiuba, Okokpujie Imhade Princess, An Enhanced Voters Registration and Authentication Application Using Iris Recognition Technology, International Journal of Civil Engineering and Technology (IJCIET) 10(2), 2019, pp. 57–68. http://www.iaeme.com/IJCIET/issues.asp?JType=IJCIET&VType=10&IType=2
  • 2. An Enhanced Voters Registration and Authentication Application Using Iris Recognition Technology http://www.iaeme.com/IJCIET/index.asp 58 editor@iaeme.com 1. INTRODUCTION Political elections in many developing nations are bedeviled with complaints of unfairness. Registration to vote is usually done at the local government level and voters’ cards are issued as proof of registration [1]. Although some form of biometrics may be collected during enrolment and perhaps even used during the voting process, many elections in developing nations are still riddled with electoral fraud [2]. Voters’ registration is the most expensive and complex activity within the framework of elections. This process is so crucial that the outcome of an election in terms of credibility and smoothness depend largely on it [3]. Voting registration and authentication have not been efficient in developing nations. Developing nations that have tried to incorporate biometric recognition into their voting processes are still grappling with the lingering problems of impersonation, rigging and bribery [4]. This paper suggests the use of iris biometric recognition for voters’ enrolment and verification. This will improve the credibility of election results in developing nations. The Iris is a physical biometric trait that is very difficult to spoof. It is also unique to every individual and remains permanent for a lifetime. Iris biometric technology also has a niche benefit of being a non-contact biometric recognition system. This makes iris biometric recognition systems less prone to errors or noise that may arise from inadequate pressure and small contact area. Iris biometric technology also has the advantage of protecting users from communicable diseases that can be transferred through contact [5]. The major objective of this paper is to propose a system of enrolling and verifying eligible voters using iris recognition technology. Microsoft Visual Studio’s integrated development environment was used to create a voting system software application. The language used to write the software program was C#. The database was designed using Mini SQL [6]. An iris scanner was incorporated into the design to complete the enhanced iris recognition voters’ system. During registration, personal details were taken. The iris scanner captured the image of the iris and embedded algorithms in the scanner localized, segmented, normalized and performed feature extraction on the iris image. A template of the iris’ unique characteristics was stored along with the voter’s particulars in the database. The implemented system issued a pin to the voter at the completion of the registration/enrolment process [7]. To be authenticated, the voter keys the pin issued after the registration process into the recognition system. The pin was used to call up the voter’s particulars and a 1:1 verification using the voter’s iris is carried out to confirm the voter’s identity. If authenticated, the voter is given the permission to vote. A voter may not be authenticated if there is more than one record of the voter on the database, the voter did not enroll or the iris recognition gives a false non-match result. The use of iris recognition technology in the voting process of developing nations is justified by the inevitable improvement it will bring to the credibility of electoral result in developing nations [8]. 2. RELATED WORKS De and Ghoshal, [9] proposed an electoral process based on a voter’s registration list that was created purely with human iris recognition technology. The authors concentrated on the algorithm used to localize, segment, normalize and extract the unique features of the iris image captured by a scanner. The authors used Canny Edge detection algorithm for localizing the iris and pupils. Normalization was carried out using the Daughman’s technique. Segmentation by the Log Gabor filter and matching was done using Euclidean distance. The authors also elaborated on the software used to efficiently carry out iris recognition. The authors used MATLAB® to implement their recognition system.
  • 3. Kennedy Okokpujie, Samuel Ndueso John, Etinosa Noma-Osaghae, Charles Ndujiuba, Okokpujie Imhade Princess http://www.iaeme.com/IJCIET/index.asp 59 editor@iaeme.com The gradient magnitudes used to identify the edges of the iris image (Canning Edge detection algorithm was: | | √ Where; G = Gradient Magnitude, Gx = Gradient in the X direction, Gy = Gradient in the Y direction. The equation used to change the circular nature of the iris into a rectangular shape was given as: [ ] [ ] (2) (3) (4) (xi, yi) – The area between the directions of the pupillary and limbic limits in the heading. - Heading. (xp, yp) – The inside direction of the understudy, Rp – Radius of the pupil, Rl( ) – The separation between focal point of the understudy and the purpose of limbic limit. The Log Gabor Filter frequency response was given as: ( ( ( )) ( ( )) ) fo – Centre frequency, – Bandwidth of the filter The matching, computed using Euclidean distance. The two points in the Euclidean space, P and Q to be compared in terms of distance from each other was given as: √ (6) Where, X – Measured distance, P and Q – Points on Euclidean plane In the spring of 2016, researchers from the Department of Government, Democracy and Governance Studies Program in the University of Georgetown carried out a research on behalf of the United States Agency for International Development (USAID) on how the introduction of new technology into electoral processes either boosts or drains voters’ confidence in electoral processes. The researchers focused on emerging and established sample states to define how technologies have affected voters’ confidence in the electoral process. The researchers declared that technology in itself may not completely solve the problem of electoral fraud or boost looters confidence in the electoral process. The researchers extensively explored the use of iris recognition in Somaliland’s electoral process and the success it recorded. The researchers also stressed the need to adequately define the electoral problems technology seeks to address before implementing any new technology into electoral processes [10]. Okokpujie et al., [11] extensively analyzed segmentation of the irises using the popular Daugman Integro-differential approach and the less popular Circular Hough Transform. The researchers from Covenant University, Ota, Ogun State, Nigeria, declared that Iris Segmentation, using Circular Hough Transform gave a better result than the more popular integro-differential approach Daugman developed. The authors also recommended the use of Circular Hough Transform for iris segmentation in crucial iris recognition technology applications such as electoral processes to boost the confidence of voters [11].
  • 4. An Enhanced Voters Registration and Authentication Application Using Iris Recognition Technology http://www.iaeme.com/IJCIET/index.asp 60 editor@iaeme.com Schueller and Walls, [12] conducted a research on the voter registration process that took place in Somaliland from January to September, 2016. The researchers highlighted the fact that previous voter registration in Somaliland was riddled with multiple applications and little trust in the electoral process. The researchers also stressed the fact that the government of Somaliland decided to overcome the problem of multiple applications by using iris recognition technology. The implementation of iris recognition technology in registering voters in Somaliland was adjudged successful. Hobbis and Hobbis, [13] looked closely at voter integrity, trust and the promise of digital technologies using Solomon Islands as a case study. The researchers tried to answer the questions of technological peculiarities, strengths and shortcomings of integrating biometrics into electoral voting processes. They also looked at the way the world is gradually embracing the use of biometrics in electoral processes due to its ability to uniquely identify every individual. Lastly, the researchers examined the efforts made by the government of Solomon Island to show how the use of biometrics in her electoral process has helped to stabilize governance. This lead to several researchers in this area for economic development tending towards sustainability of biometrics in automated teller machines for enhanced user authentication [14-23] 2. METHODOLOGY The application software that forms the backbone of the designed and implemented iris recognition based voter registration and authentication system was designed specifically for the Windows® operating system. The C# language was used to develop the software application. Mini SQL was used to design the database. Microsoft Visual Studio provided the integrated development environment for writing, compiling and debugging the software application. The iris scanner used infra-red light emitting diodes to illuminate the eyes and thus could capture the iris in all outdoor and indoor conditions. The scanner also has embedded algorithms that can perform localization, segmentation, normalization, template formation, storage and matching. The Waterfall software development model was adopted to create the application software used in tandem with the iris scanner. The aim and objectives of the application software were clearly defined at the beginning of the design process. Afterward, the application software was developed, tested and debugged. This is shown diagrammatically in Figure 1. Figure 1 Application Software Development Model
  • 5. Kennedy Okokpujie, Samuel Ndueso John, Etinosa Noma-Osaghae, Charles Ndujiuba, Okokpujie Imhade Princess http://www.iaeme.com/IJCIET/index.asp 61 editor@iaeme.com The database was created using Mini SQL (MSQL), a light-weight database management tool used to create memory-efficient, performance-efficient and portable databases. Mini SQL can support basic query generation, load and save SQL script files, quick table data lookups, generation of SQL code and data scripts. The integrated development environment is shown in Figure 2. Figure 2 The Integrated Development Environment Figure 3 The Mini SQL Window
  • 6. An Enhanced Voters Registration and Authentication Application Using Iris Recognition Technology http://www.iaeme.com/IJCIET/index.asp 62 editor@iaeme.com Figure 4 Sample of Relationships between Tables The Mini SQL program was used to create tables that were linked together with primary and foreign keys. A sample of the relationship between the tables is shown in Figure 4. Upon completion of the Windows application software, the key objectives of being able to register, enroll and authenticate voters were achieved. Figure 5 Flowchart for Voters’ Registration
  • 7. Kennedy Okokpujie, Samuel Ndueso John, Etinosa Noma-Osaghae, Charles Ndujiuba, Okokpujie Imhade Princess http://www.iaeme.com/IJCIET/index.asp 63 editor@iaeme.com Figure 6 Flowchart for Voters’ Authentication The Algorithm for the Registration (Iris recognition enrollment) process is shown in Figure 5 During registration or enrolment, the following data were acquired: a. Personal details such as age, name, sex etc. b. Iris image. Voters particulars are stored in the database alongside the unique iris template created from the iris image captured. Each unique iris details are stored as templates indexes by the voter registration particulars it represents. At the end of the enrolment process, a Personal Identification Number (PIN) is issued to the voter. Authentication in this context is the process of carrying out a one-to-one verification to determine if a voter is indeed eligible to vote. The voter keys in the PIN acquired at the point of registration. The PIN enables the system to pull up the particulars related to the PIN. The iris scanner captures the voter’s iris image, localizes, segments, normalizes, extracts its features and forms a template (query template) which is compared with the stored template indexed by the voter’s particulars for a match. If there is s match, the voter is allowed to vote, otherwise, the voter is disallowed from voting. The algorithm for the authentication process is shown in Figure 6.
  • 8. An Enhanced Voters Registration and Authentication Application Using Iris Recognition Technology http://www.iaeme.com/IJCIET/index.asp 64 editor@iaeme.com  Contestants Section: All qualified contestants are registered via the contestants’ window.  Voters Section: Represents the portal for voters are registration and authentication.  Iris enrolment Window: The portal was used to acquire and store the unique features of voters’ iris image.  The application interface has the following windows: they are depicted in Figures 7 to 12.  Post Section: The various posts to be filled are highlighted in this window.  Party Window: Participating political parties are registered here. Figure 7 The Voters’ Registration Portal Figure 8 The Application Interface for Contestants and Voter
  • 9. Kennedy Okokpujie, Samuel Ndueso John, Etinosa Noma-Osaghae, Charles Ndujiuba, Okokpujie Imhade Princess http://www.iaeme.com/IJCIET/index.asp 65 editor@iaeme.com Figure 9 The Application Interface for Political Positions Figure 10 The Application Interface for Political Parties Figure 11 The Application Interface for Contestants’ Registration
  • 10. An Enhanced Voters Registration and Authentication Application Using Iris Recognition Technology http://www.iaeme.com/IJCIET/index.asp 66 editor@iaeme.com Figure 12 The Iris Image Acquiring Window. 3. CONCLUSIONS The False Rejection Rate (FRR) which is the probability that the system will not authorize a duly enrolled applicant and False Acceptance Rate which is the probability that the system will authorize an unregistered applicant were zero (0). The objective of creating an iris biometric recognition based voter registration and authentication system was achieved. The application software worked seamlessly with the iris scanner. FUTURE WORK The creation of better and more efficient matching algorithms to lower the time it takes to make a decision based on the match score. An iris camera with a high image acquiring distance would be used for future applications. ACKNOWLEDGMENT This work is sponsored by Covenant University, Ota, Ogun State, Nigeria. REFERENCES [1] A. Evrensel, "Voter Registration in Africa A Comparative Analysis," 2010. [2] J. Baylis, P. Owens, and S. Smith, The globalization of world politics: An introduction to international relations: Oxford University Press, 2017. [3] K. Okokpujie, N.-O. Etinosa, S. John, and E. Joy, "Comparative Analysis of Fingerprint Preprocessing Algorithms for Electronic Voting Processes," in International Conference on Information Theoretic Security, 2017, pp. 212-219. [4] S. John, C. Anele, O. O. Kennedy, F. Olajide, and C. G. Kennedy, "Realtime Fraud Detection in the Banking Sector Using Data Mining Techniques/Algorithm," in Computational Science and Computational Intelligence (CSCI), 2016 International Conference on, 2016, pp. 1186- 1191.
  • 11. Kennedy Okokpujie, Samuel Ndueso John, Etinosa Noma-Osaghae, Charles Ndujiuba, Okokpujie Imhade Princess http://www.iaeme.com/IJCIET/index.asp 67 editor@iaeme.com [5] J. A. Badejo, A. A. Atayero, and T. S. Ibiyemi, "A robust preprocessing algorithm for iris segmentation from low contrast eye images," in Future Technologies Conference (FTC), 2016, pp. 567-576. [6] K. Okokpujie, F. Olajide, S. John, and C. G. Kennedy, "Implementation of the Enhanced Fingerprint Authentication in the ATM System Using ATmega128," in Proceedings of the International Conference on Security and Management (SAM), 2016, p. 258. [7] S. A. Daramola, M. A. Adefuminiyi, and T. M. John, "Review and Proposed Methodology for a Lecture Attendance System using Neural Network," in Proceedings of the World Congress on Engineering, 2016. [8] T. O. Majekodunmi and F. E. Idachaba, "A review of the fingerprint, speaker recognition, face recognition and iris recognition based biometric identification technologies," 2011. [9] P. De and D. Ghoshal, "Human Iris Recognition for clean Electoral process in India by creating a fraud free voter registration list," Procedia Computer Science, vol. 89, pp. 850-855, 2016. [10] S. Araida, S. Herrera, and M. Ping, "Georgetown University Department of Government Democracy and Governance Studies Program United States Agency for International Development (USAID) Electoral Policy Study Group Report on Elections, Technology and Voter Confidence," 2016. [11] K. Okokpujie, E. Noma-Osaghae, S. John, and A. Ajulibe, "An Improved Iris Segmentation Technique Using Circular Hough Transform," in International Conference on Information Theoretic Security, 2017, pp. 203-211. [12] M.-L. Schueller and M. Walls, "Report by International Observers on the 2016 Voter Registration Process in Somaliland," Progressio, 2017. [13] S. K. Hobbis and G. Hobbis, "Voter Integrity, Trust and the Promise of Digital Technologies: Biometric Voter Registration in Solomon Islands," in Anthropological Forum, 2017, pp. 1-21. [14] K. Okokpujie, O. Shobayo, E. Noma-Osaghae, O. Imhade, O. Okoyeigbo. Realization of MPLS-Based VPN Network for Improved Qos Metrics. TELKOMNIKA (Telecommunication Computing Electronics and Control). 2018;16. [15] I. Dunmade, M. Udo, T. Akintayo, S. Oyedepo, I. P. Okokpujie. Lifecycle Impact Assessment of an Engineering Project Management Process–a SLCA Approach. InIOP Conference Series: Materials Science and Engineering 2018 Sep (Vol. 413, No. 1, p. 012061). IOP Publishing. [16] I. P. Okokpujie, O. S. Fayomi, R. O. Leramo. The Role of Research in Economic Development. InIOP Conference Series: Materials Science and Engineering 2018 Sep (Vol. 413, No. 1, p. 012060). IOP Publishing. [17] O. S. Fayomi, I. P. Okokpujie, M. Udo. The Role of Research in Attaining Sustainable Development Goals. InIOP Conference Series: Materials Science and Engineering 2018 Sep (Vol. 413, No. 1, p. 012002). IOP Publishing. [18] A. Onawumi, M. Udo, E. Awoyemi, I. P. Okokpujie. Alternate Maintainability Evaluation Technique for Steering System of Used Automobiles. InIOP Conference Series: Materials Science and Engineering 2018 Sep (Vol. 413, No. 1, p. 012062). IOP Publishing.
  • 12. An Enhanced Voters Registration and Authentication Application Using Iris Recognition Technology http://www.iaeme.com/IJCIET/index.asp 68 editor@iaeme.com [19] K. Okokpujie, E. Noma-Osaghae, O. Okesola, O. Omoruyi, C. Okereke, S. John, I. P. Okokpujie. Fingerprint Biometric Authentication Based Point of Sale Terminal. InInternational Conference on Information Science and Applications 2018 Jun 25 (pp. 229- 237). Springer, Singapore. [20] K. Okokpujie, E. Noma-Osaghae, O. Okesola, O. Omoruyi, C. Okereke, S. John, I. P. Okokpujie. Integration of Iris Biometrics in Automated Teller Machines for Enhanced User Authentication. InInternational Conference on Information Science and Applications 2018 Jun 25 (pp. 219-228). Springer, Singapore. [21] E. Noma-Osaghae, K. O. Okokpujie, C. U. Ndujiuba, O. Olatunji, I. P. Okokpujie. Epidemic Alert System: A Web-based Grassroots Model. International Journal of Electrical and Computer Engineering (IJECE). 2018;8(5):3809-28. [22] K. Okokpujie, E. Noma-Osaghae, S. John, P. C. Jumbo. Automatic home appliance switching using speech recognition software and embedded system. InComputing Networking and Informatics (ICCNI), 2017 International Conference on 2017 Oct 29 (pp. 1-4). IEEE. [23] K. Okokpujie, E. Noma-Osaghae, S. John, K. A. Grace, I. Okokpujie. A face recognition attendance system with GSM notification. InElectro-Technology for National Development (NIGERCON), 2017 IEEE 3rd International Conference on 2017 Nov 7 (pp. 239-244). IEEE. [24] Sayeesh, Dr. Nagaratna P. Hegde, A Comparison Of Multiple Wavelet Algorithms For Iris Recognition, International Journal of Computer Engineering and Technology (IJCET), Volume 4,Issue 2, March – April (2013)