SlideShare a Scribd company logo
1 of 13
1
VOTE THROUGHMOBILE-IRIS RECOGNITION
AND CRYPTOGRAPHICTECHNIQUE
VASIM HASINA.S
III YEAR,ECE
SARANATHAN COLLEGE OF ENGINEERING
TRICHY.
ABSTRACT
With the advancement of electronics, mobile
communication technology leads us to a fast
moving world. In this scenario, we have lot of
responsibilities, one of it is voting for our
country, but even we don't have time for it,
and also our votes may not useful to our
nation, because of fake votes and cheating
process during the election. This problem is
rectified by the latest voting system as “VOTE
THROUGH MOBILE” which is discussed in
this paper. The mobile voting system uses the
efficient techniques, iris recognition and
cryptography for the secured voting process.
The iris recognition and cryptography avoids
the fake votes and cheating process. The
election commission spends lot of money, for
each election unnecessarily, which will be
minimized by this system..
1.INTRODUCTION:
Mobile voting system use the iris recognition
and cryptography techniques, for voting
purpose, the encryption algorithm is uploaded
in the mobile phone. As like the eye scanner
which scans the iris is fixed in the mobile, so
the mobile phone having camera is preferred
for that. To obtain the voting the voters eye
iris is recognized. During the transmission
from the source (mobile) to destination
(election database system) the data is
encrypted using the encryption algorithm. The
data sending and receiving is doing with the
help of the mobile networks.
In our system the voting can be done in
our place remotely without standing in a queue
for a long time with less expensive techniques.
computerized. In general, Phone Voting
System (MPVS) provides mobility feature.
Internet voting there is a wide range of
criticism.
Without eliminating the security
threats like buying a vote and Coercion, online
registration, secrecy of ballot, anonymity of
2
voter and double voting this latest technology
can’t be allowed.
An efficient and reliable system is
essential for the trustworthy and successful
implementation of this technology. The
proposed system uses mobile phone device
having: small in size, low power, low-price as
compared to computers and Direct Recording
Electronic voting System, Electronic Voting
Machine’s, provide mobility feature and
security. Proposed system uses Global System
for Mobile Communication technology which
is a secure and globally used mobile
technology in the current situation. Mobile
phone also uses Subscriber Identity Module
technology which provides user identity
privacy, user identity verification and
subscriber data secrecy providing more
security to the proposed system.
The key features of our proposed
Mobile Phone Voting System is:
1. Eligibility: only authorized voter can
cast their vote.
2. Uniqueness: Each user can cast their only
one vote.
3. Integrity: Valid vote should not be modified
or deleted.
4. Fairness: The election result should not be
accessible before the official time ended.
5. Secrecy: No one should be able to find how
voter cast their vote.
2.LITERATURE REVIEW:
Voting through the mobile phone it is
the new and advanced area of research. We
take the review of some IEEE papers which
presented in past.
[1] Proposes mobile phone voting system
developed on modular square root and blind
signature system uses confidentiality of voter,
secrecy of ballot, voter anonymity and no
computation cost and communication
overhead. CA (certificate authority) involves
as third party that is distribution of certificates
to voters is the responsibility of CA for
authentication purposes, delayed occurred
which make the process slow.
[2] Proposed GSM based mobile phone voting
system is used to cast vote without registering
for voting in advance and going to polling
booths. System prevents repetition voting but
It has big disadvantage to security, proposes
system does not used any cryptographic
algorithm.
[3] Proposed mobile phone voting system
based on public key encryption algorithm
RSA. It contains three parts: access control;
voting and election administrator server. First
part holds validation and identification for the
voters.
Voting part done by ciphering voter data using
RSA algorithm and last part is the election
administrator server classifies ending result
using decryption RSA private key for received
3
encrypted data. There is no any online
registration, more expensive computational
cost and communication overhead due to RSA
algorithm.
2.1 PROPOSED SYSTEM:
Our propose system provide online
registration of voter and also offline
registration is available for voter in case of
failure of online registration. After registration
voter will cast their vote and result will
display. For proposed system it required five
elements
 Mobile Phone, Election Commission Server
(ECS);
 Election Commission Databases (ECD);
 Vote Collecting and Result Phase Server
(VCRPS) and
 Election Commission Office (ECO).
Proposed system consists of three steps:
A. Online registration phase
B. Voting phase
C. Vote collection and result phase
A. Online Registration Phase:
In this phase we will provide the one
highly secured website for registration
purpose.
After that user have to SIGN IN there
and fill its whole information including NIC
and SIM card number. After pressing submit
button, server send one public key to them
which encrypt the whole information and send
over the server. And then server sends one
secret symmetric key to user. User must have
to keep this key secret. Because this key is
required on day of election. Election
commission server should keep two updated
databases. First database consists of public
NIC’s and second database contained SIM
cards from the concern authorities for user
verification and authentication purposes at the
registration time. Short Message Services
(SMS) is used throughout voting process
without the need of internet. ECS will create
two key, first one is a public key and second
one is a private key. The ECS will keep only
private key secret and will put public key on
its server.
Fig.1. Online Registration phase
4
Fig.2.FlowchartforRegistrationphase
1) In the first step user will send their
National Identity Card No + SIM Card No +
Symmetric Key which encrypt with public key
of ECS to ECS server.
2) When ECS receiving data they will
decrypt this data with his private key.
3) ECS will verify the user’s NIC and
SIM card number with its two latest databases,
one consist public NIC numbers and other
database consist SIM card numbers.
4) If ECS verified that user is authentic
then,
5) ECS will send PIN encrypted with
user symmetric key to the user. This PIN will
be used for the authenticity of the voter in the
latter stages of the election process.
6) Receiving this user will decrypt the
PIN with his/her symmetric key. User should
securely keep their PIN from disclosing to
others because it’s disclosing will
compromised confidentiality.
7) When Mobile phone user got PIN
then Mobile phone user will send
acknowledgement message to election
commission server .Mobile phone user will
become certified as mobile phone voter. Here
online registration phase will be completed.
8) This is offline registration phase
which will be used in case someone registers
his/herself on genuine user credentials.
9) When the genuine user registering
his/herself with election commission server,
ECS will send registration problem message of
can’t be register through online registration
phase and will requested his/her to come to
ECO for correction of their registration as
someone already register his/herself on
genuine user credentials.
10) In this case user should go to
election commission Office. The previous
registration will be canceled and genuine user
will be register.
11) Election commission office (ECO).
B. Voting Phase:
1) In this phase, ECS will send
candidate list to authenticated voter according
to their constituency via SMS encrypted with
voter symmetric key.
This will ensure that the candidate list
message only send to the authenticated voter
5
list. This method also prevents unauthorized
voter to cast their vote...
2) After that voter will receive the
SMS of candidate list on voting day.
3) In this step voter will select their
candidate from the candidate list. After
selecting their candidate voter will then send
the message to ECS with public key, candidate
PIN encrypt both with user symmetric key and
again concatenate NIC number and send to
ECS via SMS.
4) ECS will find user symmetric key
using NIC number. Then it will decrypt the
remaining SMS part with user symmetric key.
ECS will mark only the PIN part of the
message for the record purposes and to avoid
double voting. The remaining encrypted
candidate list message will be forwarded to the
vote collecting and result phase server.
Fig.3.Voting phase
Fig.4. Flowchart for voting phase
C. Vote Collection and Result Phase Server
1) Before the start of the election, we used
time lock mechanism which will not accept
vote after time end on VCRPS. It will keep the
vote in encrypted form until the official time
of the election ended. Implementing this
restriction on this server, the decryption of the
votes will be started after the end of the
election time. The third party will not see the
result before the official time ends, thus it
prevents to seeing of the election results.
2) After ending of voting phase, vote will be
decrypt by using ECS private key.
3) At end of the process, votes will be counted
and the results will be officially display to the
public.
6
Fig.6.Flowchart for result phase
2.2 SECURITYALGORITHAM:
Security is provided to our proposed system by
using RSA algorithm.
A simple explanation of the RSA
algorithm is that it was made for public-key
cryptography, which is based on factoring
large integers. The steps involved are RSA
algorithm are key generation, encryption, and
decryption.
A. Key Generation: Whoever wants to
receive secret messages creates a public key
(which is published) and a private key (kept
secret). The keys are generated in a way that
conceals their construction and makes it
'difficult' to find the private key by only
knowing the public key.
B. Encryption: A secret message to any
person can be encrypted by his/her public key
(that could be officially listed like phone
numbers).
C. Decryption: Only the person being
addressed can easily decrypt the secret
message using the private key.
7
3.MOBILE VOTING SYSTEM
Mobile Voting System (MVS) is a system that
will operate in parallel with the existing
manual and automated voting processes. It will
enable legitimate voters to cast their vote from
wherever they please using their mobile
devices unlike other means that require the
voter to appear at the polling station and a
graphical display will be available on a site
(attached to the system) for all stakeholders to
view progress, hence ensuring transparency.
There are systems such as DRE (Direct
Electronic Recording) voting machines that
record the vote without that vote being
transmitted over the Internet or another
network in e-voting. The interface of a DRE
machine can be a touch screen or a scanner
that scans the ballot paper where the voter
marked the vote.
The vote is then registered and stored in the
voting machine. Then there is voting over the
Internet that uses a PC with an Internet-
connection to cast the vote and send it to be
stored in another remote computer. Personal
Digital Assistants (PDA’s), telephones or
mobile phones can also be used to cast a vote
electronically.
Besides its hype and advantages over
traditional voting systems, MVS reliability,
security and transparency are still issues that
limit its deployment in many countries.
Mobile Voting still faces a number of risks
and challenges.
Risks:
1. Third parties: Unauthorized intervention of
third parties in the voting process.
2. Errors and technical malfunctions: More
difficult to detect and identify the source of
errors and technical malfunctions.
3. Unreliability: Possibility that fully digitized
system would fail to produce results and lack
physical back-up records, making a public
recount difficult or impossible.
Challenges:
1. Security: In the context of remote e-voting,
special attention should be given to the process
guaranteeing a free and secret vote. Only
entitled voters are allowed to cast a vote and
this requires that every voter be authenticated
(e.g. by using a PIN -Personal Identification
Number or TAN -Transaction Number or by
the use of digital signature) and their right to
vote verified. In order to prevent multiple
votes being cast or other misuse, a record must
be made and checked in order to establish
whether the voter has already cast a vote.
There must be an electronic separation
between the vote and the identification of the
voter.
8
2. Reliability: Mobile Voting Systems have to
interact with some database server, or some
other server, over a network.
3. There might be instances when this network
goes down during the voting process to Keep
the network stable and available during the
voting process is a challenge that MVS
application developers need to consider.
Mobile Voting Systems are composed of
several interacting agents, the Vote Collector,
the Vote Manager, the Vote Authority, the
Candidate, and the Voters. The Vote Authority
(VA) is responsible for registering candidates
for elections and commissioning Vote
Managers. The Vote Collector (VC) is a
mobile agent mandated by a stationary Vote
Manager (VM) agent to collect votes from
stationary voting agents (VOs). The
arrangement of the system in such components
can ensure a stable system suitable for voting.
Usage of Mobile Voting Systems:
Today, the development and widespread use of
information technologies is changing the way
people view voting processes and, ultimately,
the way they vote.
Mobile Voting Systems offer multiple
advantages over traditional paper-based voting
systems-advantages that increase citizen
access to democratic processes and encourage
participation.
Reduced costs - E-voting system reduces the
materials required for printing and distributing
ballots.
Increased participation and voting options -
E-voting offers increased convenience to the
voter encourages more voters to cast their
votes remotely, and increases the likelihood of
participation for mobile voters.
Greater speed and accuracy placing and
tallying votes -E-voting's step-by-step
processes help minimize the number of
miscast votes. The electronic gathering and
counting of ballots reduces the amount of time
spent tallying votes and delivering results.
Greater accessibility for the disabled and
the sick - Because they support a variety of
interfaces and accessibility features, e-voting
systems allow the physically challenged
people to vote independently and privately.
Flexibility - E-voting can support multiple
languages, and the flexible design allows up-
to-the-minute ballot modifications.
9
3.1.Phone toPhone voting system
requirements
1.Voter can send short text message from
his/her smart phone to specific smart phone
running voting software A (Android version).
2.Upon receipt of the short text message
containing the ID number of the best poster
(only one should be selected), the said ID
number will be entered in a Tally Table with
attributes Candidate ID count.
3.The phone number of the voter will be
remembered in a Voter Table with attributes
Voter Phone No, Candidate ID, so that no
voter can use the same phone to vote twice.
4.The administrator at the smart phone running
voting software A can issue a special
command, which will terminate the voting.
The voting software A will display the Tally
Table in decreasing number of votes so that
the first winner will be displayed first and so
on. At the end the Voter Table will be
eliminated.
3.2.Phone to PC voting system
requirements
:
1.Voter can send email from his/her smart
phone to specific PC running voting software
X (Linux version).
1. 2.Upon receipt of the email containing the ID
number of the best poster (only one should be
selected), the said ID number will be entered
in a Tally Table with attributes Candidate ID,
count.
2. 3.The phone number of the voter will be
remembered in a Voter Table with attributes
Voter Phone No, Candidate ID, so that no
voter can use the same phone to vote twice.
3. 4.The administrator at the PC running voting
software X can issue a special command,
which will terminate the voting. The voting
software X will display the Tally Table in
decreasing number of votes so that the first
winner will be displayed first and so on. At the
end the Voter Table will be eliminated.
10
3.3.Phone to Phone or PC voting system
requirements
:
1. An integration of the above two approaches,
so that a voter can either vote by sending short
text message to a specific smart phone, or by
sending email to a PC.
2. The voting software A on the smart phone will
forward e-mail to PC, so that the PC will
receive all the votes.
3. The final tally will be done by voting software
X, which will display the final results.
4. Both voting software A and voting software X
will eliminate its Voter Table at the end.
4. IRIS RECOGNITION:
Iris recognition is an automated
method of biometric identification that uses
mathematical pattern-recognition .
Iris recognition uses video camera
technology with subtle near
infrared illumination to acquire images of the
detail-rich, intricate structures of the iris which
are visible externally.
Databases of enrolled templates are
searched by matcher engines at speeds
measured in the millions of templates per
second per (single-core) CPU, and with
remarkably low false match rates.
4.1RIS ACQUISITION:
Iris biometrics systems do not use
laser-scans to capture the image of the human
eye. Instead, an infrared photo or video camera
is used at a set distance to capture a high
quality image of the iris. Working in the
infrared range provides many advantages
when compared to the visible range: Iris
ridges, nerves, and crypts are more evident the
border between the iris and the pupil is more
pronounced; and users are not exposed to
annoying flashes.
4.2.IRIS SEGMENTATION:
The main purpose of this process is to
locate the iris on the image and isolate it from
the rest of the eye image for further
processing.
11
Some other important tasks that are also
performed in this iris segmentation block
include image quality enhancement, noise
reduction, and emphasis of the ridges of the
iris. Several proposals have been made by
different authors for iris location and
segmentation, wherein most consider iris
detections finding two circumferences that
model the iris boundaries.
Here, the iris location varies depending on
preset external and internal forces until an
equilibrium state is reached.
4.3.FEATURE EXTRACTION:
The normalization becomes necessary
when considering that the pupil varies in size
for different light intensities. After
normalization, the phase information is studied
by applying different Gabor filters. This was
followed by the codification of this
information in terms of the quadrant where the
phase belongs however, Wilds, performs the
extraction using Laplacian or Gaussian filters
by obtaining several images of different scales
for posterior comparison .
4.4.MATCHING:
Although some authors have studied other
matching algorithms the most employed
matching algorithm has been the Hamming
distance, as was initially proposed by
Daugman.
The Hamming distance is described by the
following equation: where is the vector length
and are the component of the template and
sample vector, respectively, which are XOR in
the equation. If the distance obtained is below
a predefined threshold level, the studied
sample is considered to belong to the user
whose template is being studied. Selection of
the threshold level usually depends on the final
application.
4.5. STAGES INVOLVED IN IRIS
DETECTION
It includes Three Main Stages
2.3.1) Image Acquisition and Segmentation
2.3.2) Image Normalization
2.3.3) Feature Coding and Matching
5.CRYPTOGRAPHIC
TECHNIQUES:
Cryptography is one of the essential
technologies used in building a secure VPN.
Different applications of the same basic
algorithms can provide both encryptions that
keep data secret and authentication that
ensures the two security peers in a VPN are
who they claim to be.
12
Data confidentiality may be provided
by one of two categories of encryption
algorithm, namely symmetric cryptography
and asymmetric cryptography. Symmetric, or
conventional, cryptography requires that the
sender and receiver share a key, which is an
item of secret information used to encrypt and
decrypt data. The process by which two peers
agree upon a key over an insecure medium can
be problematic as, until the key is agreed, the
peers have no way to communicate in secret.
Asymmetric, or Public Key, cryptography
solves the key exchange problem by using two
keys, either of which may be used to encrypt a
message. The encrypted data may then only be
decrypted by means of the other key.
Messages may be received securely by
publishing one of the keys (for example, in the
footer of an e-mail message) as a Public Key
and keeping the second, the Private Key,
secret. Anyone wishing to send a secure
communication may then encrypt the message
with the recipient’s Public Key and, providing
the Private Key has not been disclosed, only
the intended recipient will be able to decrypt
the encrypted text and recover the original
message.
Cryptography or cryptology;
From Greek, "hidden, secret"; and "writing",
or "study", respectively is the practice and
study of techniques for secure
communication in the presence of third parties
called adversaries.]These adversaries are often
referred to as Eve in cryptography, while the
sender and recipient of messages are called
Alice and Bob respectively. Cryptography is
about constructing and
analyzing protocols that prevent third parties
or the public from reading private messages.
Various aspects in information security such
as data confidentiality, data
integrity, authentication, and non-
repudiation[5] are central to modern
cryptography. Modern cryptography exists at
the intersection of the disciplines
of mathematics, computer science,
and electrical engineering. Applications of
cryptography include ATM cards, computer
passwords, and electronic commerce.
The originator of an encrypted
message (Alice) shared the decoding technique
needed to recover the original information
only with intended recipients (Bob), thereby
precluding unwanted persons (Eve) from
doing the same.
13
Cryptographic algorithms are designed
around computational hardness assumptions,
making such algorithms hard to break in
practice by any adversary. It is theoretically
possible to break such a system, but it is
infeasible to do so by any known practical
means. These schemes are therefore termed
computationally secure; theoretical advances,
e.g., improvements in integer
factorization algorithms, and faster computing
technology require these solutions to be
continually adapted. There exist information-
theoretically secure schemes that provably
cannot be broken even with unlimited
computing power.
Cryptography also plays a major role
in digital rights management and piracy of
digital media.
5. SCOPE:
In our proposed system registration
process done through website which minimize
time, energy and cost. Voting done through the
SMS provides mobility option to the voter.
Because of RSA security double voting will
prevented dandy offer choice to the public to
cast their vote through their cell phone. If this
system is implemented using cloud computing
then it has a scope to use in government
elections.
6. CONCLUSION:
This paper proposes mobile phone
voting system avoiding double voting in case
of casting ballots first from mobile phone and
then from pooling booth, it is more useful,
efficient and reliable in mobile phone voting
process. This system does not require any
internet facility, decreases expensive hardware
cost and it requires only mobile phone and
SIM card.
REFERENCES:
1. Rivest, Ronald L. (1990). "Cryptography".
In J. Van Leeuwen. Handbook of
Theoretical Computer Science 1. Elsevier.
2. Bellare, Mihir; Rogaway, Phillip (21
September 2005).
"Introduction". Introduction to Modern
Cryptography. p. 10.
3. Menezes, A. J.; van Oorschot, P. C.;
Vanstone, S.A. Handbook of Applied
Cryptography. ISBN 0-8493-8523-7.
Archived from the original on 7 March
2005.
4. Biggs, Norman (2008). Codes: An
introduction to Information Communication
and Cryptography. Springer. p. 171.
5. Overview per country". Crypto Law
Survey. February 2013. Retrieved 26
March 2015.
6. "UK Data Encryption Disclosure Law
Takes Effect". PC World. 1 October 2007.
Retrieved 26 March 2015.

More Related Content

What's hot

Global Wireless E-voting system with retinal scan
Global Wireless E-voting system with retinal scanGlobal Wireless E-voting system with retinal scan
Global Wireless E-voting system with retinal scanShubh Agarwal
 
E-Voting Technology
E-Voting TechnologyE-Voting Technology
E-Voting TechnologyGautam Kumar
 
Hard copy of proj doc
Hard copy of proj docHard copy of proj doc
Hard copy of proj docnawaldiatm
 
Global Wireless E-Voting Documentation
Global Wireless E-Voting DocumentationGlobal Wireless E-Voting Documentation
Global Wireless E-Voting DocumentationCharan Reddy Mutyala
 
Online voting system
Online voting systemOnline voting system
Online voting systemSaurabh Kheni
 
Global wireless e voting powerpoint presentation
Global wireless e voting powerpoint presentationGlobal wireless e voting powerpoint presentation
Global wireless e voting powerpoint presentationPrateeksha Singh
 
Synopsis on railway reservation system
Synopsis on railway reservation systemSynopsis on railway reservation system
Synopsis on railway reservation systemAnkit Verma
 
Online Voting System Project Proposal ( Presentation Slide).pptx
Online Voting System Project Proposal ( Presentation Slide).pptxOnline Voting System Project Proposal ( Presentation Slide).pptx
Online Voting System Project Proposal ( Presentation Slide).pptxKhondokerAbuNaim
 
E voting(online voting system)
E voting(online voting system)E voting(online voting system)
E voting(online voting system)Saurabh Kheni
 
Online Voting System
Online Voting SystemOnline Voting System
Online Voting Systemapolama
 
Online Voting System - Project
Online Voting System - ProjectOnline Voting System - Project
Online Voting System - ProjectSubhashis Das
 
ONline Voting System Report PHP
ONline Voting System Report PHPONline Voting System Report PHP
ONline Voting System Report PHPShikha Mishra
 
Documentation work online voting
Documentation work  online votingDocumentation work  online voting
Documentation work online votingThenmozhi Divya
 

What's hot (20)

Global Wireless E-voting system with retinal scan
Global Wireless E-voting system with retinal scanGlobal Wireless E-voting system with retinal scan
Global Wireless E-voting system with retinal scan
 
Ppt on online voting
Ppt on online votingPpt on online voting
Ppt on online voting
 
E-Voting Technology
E-Voting TechnologyE-Voting Technology
E-Voting Technology
 
Hard copy of proj doc
Hard copy of proj docHard copy of proj doc
Hard copy of proj doc
 
E voting app
E voting appE voting app
E voting app
 
Online E-Voting System
Online E-Voting SystemOnline E-Voting System
Online E-Voting System
 
Global Wireless E-Voting Documentation
Global Wireless E-Voting DocumentationGlobal Wireless E-Voting Documentation
Global Wireless E-Voting Documentation
 
ONLINE BUS BOOKING SYSTEM
ONLINE BUS BOOKING SYSTEMONLINE BUS BOOKING SYSTEM
ONLINE BUS BOOKING SYSTEM
 
Online voting system
Online voting systemOnline voting system
Online voting system
 
Global wireless e voting powerpoint presentation
Global wireless e voting powerpoint presentationGlobal wireless e voting powerpoint presentation
Global wireless e voting powerpoint presentation
 
Synopsis on railway reservation system
Synopsis on railway reservation systemSynopsis on railway reservation system
Synopsis on railway reservation system
 
Online Voting System Project Proposal ( Presentation Slide).pptx
Online Voting System Project Proposal ( Presentation Slide).pptxOnline Voting System Project Proposal ( Presentation Slide).pptx
Online Voting System Project Proposal ( Presentation Slide).pptx
 
E voting(online voting system)
E voting(online voting system)E voting(online voting system)
E voting(online voting system)
 
Online Voting System
Online Voting SystemOnline Voting System
Online Voting System
 
Online polling system
Online polling systemOnline polling system
Online polling system
 
Online Voting System - Project
Online Voting System - ProjectOnline Voting System - Project
Online Voting System - Project
 
Online Voting System ppt
Online Voting System pptOnline Voting System ppt
Online Voting System ppt
 
E voting
E votingE voting
E voting
 
ONline Voting System Report PHP
ONline Voting System Report PHPONline Voting System Report PHP
ONline Voting System Report PHP
 
Documentation work online voting
Documentation work  online votingDocumentation work  online voting
Documentation work online voting
 

Viewers also liked

Mobile voting by using biometrics
Mobile  voting  by  using biometricsMobile  voting  by  using biometrics
Mobile voting by using biometricsJEEVA ARAVINTH
 
Online voting system ppt by anoop
Online voting system ppt by anoopOnline voting system ppt by anoop
Online voting system ppt by anoopAnoop Kumar
 
PROJECT REPORT_ONLINE VOTING SYSTEM
PROJECT REPORT_ONLINE VOTING SYSTEMPROJECT REPORT_ONLINE VOTING SYSTEM
PROJECT REPORT_ONLINE VOTING SYSTEMNandasaba Wilson
 
Online Voting System Project File
Online Voting System Project FileOnline Voting System Project File
Online Voting System Project FileNitin Bhasin
 
FUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICES
FUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICESFUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICES
FUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICESvasim hasina
 
A Transition To Mobile Voting Systems
A Transition To Mobile Voting SystemsA Transition To Mobile Voting Systems
A Transition To Mobile Voting SystemsCloud Vote
 
Iris by @run@$uj! final
Iris by @run@$uj!    finalIris by @run@$uj!    final
Iris by @run@$uj! finalARUNASUJITHA
 
Online voting system project
Online voting system projectOnline voting system project
Online voting system projectsnauriyal1994
 
ptElectronic voting machine
ptElectronic voting    machineptElectronic voting    machine
ptElectronic voting machinePrabhu Kiran
 
The Inbuilt Password Iris Final
The Inbuilt Password Iris FinalThe Inbuilt Password Iris Final
The Inbuilt Password Iris FinalSwarupKulkarni
 
Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...
Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...
Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...Waqas Tariq
 
Mobile, Secure E - Voting Architecture for the Nigerian Electoral System
Mobile, Secure E - Voting Architecture for the Nigerian Electoral SystemMobile, Secure E - Voting Architecture for the Nigerian Electoral System
Mobile, Secure E - Voting Architecture for the Nigerian Electoral Systemiosrjce
 
Mobile Voting System Using Advanced NFC Technology
Mobile Voting System Using Advanced NFC TechnologyMobile Voting System Using Advanced NFC Technology
Mobile Voting System Using Advanced NFC Technologyijsrd.com
 
GSM_BASED_VOTING_SYSTEM
GSM_BASED_VOTING_SYSTEMGSM_BASED_VOTING_SYSTEM
GSM_BASED_VOTING_SYSTEMchandan mishra
 
E voting system using mobile sms
E voting system using mobile smsE voting system using mobile sms
E voting system using mobile smseSAT Journals
 

Viewers also liked (20)

Iris Recognition
Iris RecognitionIris Recognition
Iris Recognition
 
Mobile voting by using biometrics
Mobile  voting  by  using biometricsMobile  voting  by  using biometrics
Mobile voting by using biometrics
 
Online voting system ppt by anoop
Online voting system ppt by anoopOnline voting system ppt by anoop
Online voting system ppt by anoop
 
PROJECT REPORT_ONLINE VOTING SYSTEM
PROJECT REPORT_ONLINE VOTING SYSTEMPROJECT REPORT_ONLINE VOTING SYSTEM
PROJECT REPORT_ONLINE VOTING SYSTEM
 
Online Voting System Project File
Online Voting System Project FileOnline Voting System Project File
Online Voting System Project File
 
FUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICES
FUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICESFUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICES
FUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICES
 
A Transition To Mobile Voting Systems
A Transition To Mobile Voting SystemsA Transition To Mobile Voting Systems
A Transition To Mobile Voting Systems
 
Iris by @run@$uj! final
Iris by @run@$uj!    finalIris by @run@$uj!    final
Iris by @run@$uj! final
 
Iris recognition
Iris recognition Iris recognition
Iris recognition
 
Online voting system project
Online voting system projectOnline voting system project
Online voting system project
 
Iris recognition seminar
Iris recognition seminarIris recognition seminar
Iris recognition seminar
 
ptElectronic voting machine
ptElectronic voting    machineptElectronic voting    machine
ptElectronic voting machine
 
Mobile
MobileMobile
Mobile
 
The Inbuilt Password Iris Final
The Inbuilt Password Iris FinalThe Inbuilt Password Iris Final
The Inbuilt Password Iris Final
 
Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...
Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...
Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...
 
Mobile, Secure E - Voting Architecture for the Nigerian Electoral System
Mobile, Secure E - Voting Architecture for the Nigerian Electoral SystemMobile, Secure E - Voting Architecture for the Nigerian Electoral System
Mobile, Secure E - Voting Architecture for the Nigerian Electoral System
 
Mobile Voting System Using Advanced NFC Technology
Mobile Voting System Using Advanced NFC TechnologyMobile Voting System Using Advanced NFC Technology
Mobile Voting System Using Advanced NFC Technology
 
GSM_BASED_VOTING_SYSTEM
GSM_BASED_VOTING_SYSTEMGSM_BASED_VOTING_SYSTEM
GSM_BASED_VOTING_SYSTEM
 
E voting system using mobile sms
E voting system using mobile smsE voting system using mobile sms
E voting system using mobile sms
 
Final seminar ppt
Final seminar pptFinal seminar ppt
Final seminar ppt
 

Similar to Mobile voting system using iris recognition and cryptography

IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...IRJET Journal
 
IRJET- Smart and Secured Voting System using Magnetic Stripe Voter ID Card an...
IRJET- Smart and Secured Voting System using Magnetic Stripe Voter ID Card an...IRJET- Smart and Secured Voting System using Magnetic Stripe Voter ID Card an...
IRJET- Smart and Secured Voting System using Magnetic Stripe Voter ID Card an...IRJET Journal
 
Captiosus Voting System
Captiosus Voting SystemCaptiosus Voting System
Captiosus Voting SystemIJMTST Journal
 
IRJET- Design and Development of Security based Voting System
IRJET- Design and Development of Security based Voting SystemIRJET- Design and Development of Security based Voting System
IRJET- Design and Development of Security based Voting SystemIRJET Journal
 
Biometric System Based Electronic Voting Machine Using Arm9 Microcontroller
Biometric System Based Electronic Voting Machine Using Arm9 MicrocontrollerBiometric System Based Electronic Voting Machine Using Arm9 Microcontroller
Biometric System Based Electronic Voting Machine Using Arm9 MicrocontrollerIOSR Journals
 
A REPORT ANALYSIS OF A Secure E-Voting System Using RSA and Md5 Algorithms- P...
A REPORT ANALYSIS OF A Secure E-Voting System Using RSA and Md5 Algorithms- P...A REPORT ANALYSIS OF A Secure E-Voting System Using RSA and Md5 Algorithms- P...
A REPORT ANALYSIS OF A Secure E-Voting System Using RSA and Md5 Algorithms- P...SIR SUCCESS PRINCE DUAH DUAH
 
Secure e voting system
Secure e voting systemSecure e voting system
Secure e voting systemMonira Monir
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMijcax
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMijcax
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMijcax
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMijcax
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMijcax
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMijcax
 
A NOVEL VOTING SYSTEM USING SMS
A NOVEL VOTING SYSTEM USING SMS A NOVEL VOTING SYSTEM USING SMS
A NOVEL VOTING SYSTEM USING SMS cscpconf
 
IRJET- Online Election Management System
IRJET- Online Election Management SystemIRJET- Online Election Management System
IRJET- Online Election Management SystemIRJET Journal
 
IRJET-Effective and Secure E- Voting Application in GSM Module using IOT
IRJET-Effective and Secure E- Voting Application in GSM Module using IOTIRJET-Effective and Secure E- Voting Application in GSM Module using IOT
IRJET-Effective and Secure E- Voting Application in GSM Module using IOTIRJET Journal
 

Similar to Mobile voting system using iris recognition and cryptography (20)

IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
 
eVoting.pptx
eVoting.pptxeVoting.pptx
eVoting.pptx
 
IRJET- Smart and Secured Voting System using Magnetic Stripe Voter ID Card an...
IRJET- Smart and Secured Voting System using Magnetic Stripe Voter ID Card an...IRJET- Smart and Secured Voting System using Magnetic Stripe Voter ID Card an...
IRJET- Smart and Secured Voting System using Magnetic Stripe Voter ID Card an...
 
Convenient voting machine
Convenient voting machineConvenient voting machine
Convenient voting machine
 
Captiosus Voting System
Captiosus Voting SystemCaptiosus Voting System
Captiosus Voting System
 
IRJET- Design and Development of Security based Voting System
IRJET- Design and Development of Security based Voting SystemIRJET- Design and Development of Security based Voting System
IRJET- Design and Development of Security based Voting System
 
J010125765
J010125765J010125765
J010125765
 
Biometric System Based Electronic Voting Machine Using Arm9 Microcontroller
Biometric System Based Electronic Voting Machine Using Arm9 MicrocontrollerBiometric System Based Electronic Voting Machine Using Arm9 Microcontroller
Biometric System Based Electronic Voting Machine Using Arm9 Microcontroller
 
A REPORT ANALYSIS OF A Secure E-Voting System Using RSA and Md5 Algorithms- P...
A REPORT ANALYSIS OF A Secure E-Voting System Using RSA and Md5 Algorithms- P...A REPORT ANALYSIS OF A Secure E-Voting System Using RSA and Md5 Algorithms- P...
A REPORT ANALYSIS OF A Secure E-Voting System Using RSA and Md5 Algorithms- P...
 
Secure e voting system
Secure e voting systemSecure e voting system
Secure e voting system
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
 
A NOVEL VOTING SYSTEM USING SMS
A NOVEL VOTING SYSTEM USING SMS A NOVEL VOTING SYSTEM USING SMS
A NOVEL VOTING SYSTEM USING SMS
 
F1802024245
F1802024245F1802024245
F1802024245
 
IRJET- Online Election Management System
IRJET- Online Election Management SystemIRJET- Online Election Management System
IRJET- Online Election Management System
 
IRJET-Effective and Secure E- Voting Application in GSM Module using IOT
IRJET-Effective and Secure E- Voting Application in GSM Module using IOTIRJET-Effective and Secure E- Voting Application in GSM Module using IOT
IRJET-Effective and Secure E- Voting Application in GSM Module using IOT
 

Mobile voting system using iris recognition and cryptography

  • 1. 1 VOTE THROUGHMOBILE-IRIS RECOGNITION AND CRYPTOGRAPHICTECHNIQUE VASIM HASINA.S III YEAR,ECE SARANATHAN COLLEGE OF ENGINEERING TRICHY. ABSTRACT With the advancement of electronics, mobile communication technology leads us to a fast moving world. In this scenario, we have lot of responsibilities, one of it is voting for our country, but even we don't have time for it, and also our votes may not useful to our nation, because of fake votes and cheating process during the election. This problem is rectified by the latest voting system as “VOTE THROUGH MOBILE” which is discussed in this paper. The mobile voting system uses the efficient techniques, iris recognition and cryptography for the secured voting process. The iris recognition and cryptography avoids the fake votes and cheating process. The election commission spends lot of money, for each election unnecessarily, which will be minimized by this system.. 1.INTRODUCTION: Mobile voting system use the iris recognition and cryptography techniques, for voting purpose, the encryption algorithm is uploaded in the mobile phone. As like the eye scanner which scans the iris is fixed in the mobile, so the mobile phone having camera is preferred for that. To obtain the voting the voters eye iris is recognized. During the transmission from the source (mobile) to destination (election database system) the data is encrypted using the encryption algorithm. The data sending and receiving is doing with the help of the mobile networks. In our system the voting can be done in our place remotely without standing in a queue for a long time with less expensive techniques. computerized. In general, Phone Voting System (MPVS) provides mobility feature. Internet voting there is a wide range of criticism. Without eliminating the security threats like buying a vote and Coercion, online registration, secrecy of ballot, anonymity of
  • 2. 2 voter and double voting this latest technology can’t be allowed. An efficient and reliable system is essential for the trustworthy and successful implementation of this technology. The proposed system uses mobile phone device having: small in size, low power, low-price as compared to computers and Direct Recording Electronic voting System, Electronic Voting Machine’s, provide mobility feature and security. Proposed system uses Global System for Mobile Communication technology which is a secure and globally used mobile technology in the current situation. Mobile phone also uses Subscriber Identity Module technology which provides user identity privacy, user identity verification and subscriber data secrecy providing more security to the proposed system. The key features of our proposed Mobile Phone Voting System is: 1. Eligibility: only authorized voter can cast their vote. 2. Uniqueness: Each user can cast their only one vote. 3. Integrity: Valid vote should not be modified or deleted. 4. Fairness: The election result should not be accessible before the official time ended. 5. Secrecy: No one should be able to find how voter cast their vote. 2.LITERATURE REVIEW: Voting through the mobile phone it is the new and advanced area of research. We take the review of some IEEE papers which presented in past. [1] Proposes mobile phone voting system developed on modular square root and blind signature system uses confidentiality of voter, secrecy of ballot, voter anonymity and no computation cost and communication overhead. CA (certificate authority) involves as third party that is distribution of certificates to voters is the responsibility of CA for authentication purposes, delayed occurred which make the process slow. [2] Proposed GSM based mobile phone voting system is used to cast vote without registering for voting in advance and going to polling booths. System prevents repetition voting but It has big disadvantage to security, proposes system does not used any cryptographic algorithm. [3] Proposed mobile phone voting system based on public key encryption algorithm RSA. It contains three parts: access control; voting and election administrator server. First part holds validation and identification for the voters. Voting part done by ciphering voter data using RSA algorithm and last part is the election administrator server classifies ending result using decryption RSA private key for received
  • 3. 3 encrypted data. There is no any online registration, more expensive computational cost and communication overhead due to RSA algorithm. 2.1 PROPOSED SYSTEM: Our propose system provide online registration of voter and also offline registration is available for voter in case of failure of online registration. After registration voter will cast their vote and result will display. For proposed system it required five elements  Mobile Phone, Election Commission Server (ECS);  Election Commission Databases (ECD);  Vote Collecting and Result Phase Server (VCRPS) and  Election Commission Office (ECO). Proposed system consists of three steps: A. Online registration phase B. Voting phase C. Vote collection and result phase A. Online Registration Phase: In this phase we will provide the one highly secured website for registration purpose. After that user have to SIGN IN there and fill its whole information including NIC and SIM card number. After pressing submit button, server send one public key to them which encrypt the whole information and send over the server. And then server sends one secret symmetric key to user. User must have to keep this key secret. Because this key is required on day of election. Election commission server should keep two updated databases. First database consists of public NIC’s and second database contained SIM cards from the concern authorities for user verification and authentication purposes at the registration time. Short Message Services (SMS) is used throughout voting process without the need of internet. ECS will create two key, first one is a public key and second one is a private key. The ECS will keep only private key secret and will put public key on its server. Fig.1. Online Registration phase
  • 4. 4 Fig.2.FlowchartforRegistrationphase 1) In the first step user will send their National Identity Card No + SIM Card No + Symmetric Key which encrypt with public key of ECS to ECS server. 2) When ECS receiving data they will decrypt this data with his private key. 3) ECS will verify the user’s NIC and SIM card number with its two latest databases, one consist public NIC numbers and other database consist SIM card numbers. 4) If ECS verified that user is authentic then, 5) ECS will send PIN encrypted with user symmetric key to the user. This PIN will be used for the authenticity of the voter in the latter stages of the election process. 6) Receiving this user will decrypt the PIN with his/her symmetric key. User should securely keep their PIN from disclosing to others because it’s disclosing will compromised confidentiality. 7) When Mobile phone user got PIN then Mobile phone user will send acknowledgement message to election commission server .Mobile phone user will become certified as mobile phone voter. Here online registration phase will be completed. 8) This is offline registration phase which will be used in case someone registers his/herself on genuine user credentials. 9) When the genuine user registering his/herself with election commission server, ECS will send registration problem message of can’t be register through online registration phase and will requested his/her to come to ECO for correction of their registration as someone already register his/herself on genuine user credentials. 10) In this case user should go to election commission Office. The previous registration will be canceled and genuine user will be register. 11) Election commission office (ECO). B. Voting Phase: 1) In this phase, ECS will send candidate list to authenticated voter according to their constituency via SMS encrypted with voter symmetric key. This will ensure that the candidate list message only send to the authenticated voter
  • 5. 5 list. This method also prevents unauthorized voter to cast their vote... 2) After that voter will receive the SMS of candidate list on voting day. 3) In this step voter will select their candidate from the candidate list. After selecting their candidate voter will then send the message to ECS with public key, candidate PIN encrypt both with user symmetric key and again concatenate NIC number and send to ECS via SMS. 4) ECS will find user symmetric key using NIC number. Then it will decrypt the remaining SMS part with user symmetric key. ECS will mark only the PIN part of the message for the record purposes and to avoid double voting. The remaining encrypted candidate list message will be forwarded to the vote collecting and result phase server. Fig.3.Voting phase Fig.4. Flowchart for voting phase C. Vote Collection and Result Phase Server 1) Before the start of the election, we used time lock mechanism which will not accept vote after time end on VCRPS. It will keep the vote in encrypted form until the official time of the election ended. Implementing this restriction on this server, the decryption of the votes will be started after the end of the election time. The third party will not see the result before the official time ends, thus it prevents to seeing of the election results. 2) After ending of voting phase, vote will be decrypt by using ECS private key. 3) At end of the process, votes will be counted and the results will be officially display to the public.
  • 6. 6 Fig.6.Flowchart for result phase 2.2 SECURITYALGORITHAM: Security is provided to our proposed system by using RSA algorithm. A simple explanation of the RSA algorithm is that it was made for public-key cryptography, which is based on factoring large integers. The steps involved are RSA algorithm are key generation, encryption, and decryption. A. Key Generation: Whoever wants to receive secret messages creates a public key (which is published) and a private key (kept secret). The keys are generated in a way that conceals their construction and makes it 'difficult' to find the private key by only knowing the public key. B. Encryption: A secret message to any person can be encrypted by his/her public key (that could be officially listed like phone numbers). C. Decryption: Only the person being addressed can easily decrypt the secret message using the private key.
  • 7. 7 3.MOBILE VOTING SYSTEM Mobile Voting System (MVS) is a system that will operate in parallel with the existing manual and automated voting processes. It will enable legitimate voters to cast their vote from wherever they please using their mobile devices unlike other means that require the voter to appear at the polling station and a graphical display will be available on a site (attached to the system) for all stakeholders to view progress, hence ensuring transparency. There are systems such as DRE (Direct Electronic Recording) voting machines that record the vote without that vote being transmitted over the Internet or another network in e-voting. The interface of a DRE machine can be a touch screen or a scanner that scans the ballot paper where the voter marked the vote. The vote is then registered and stored in the voting machine. Then there is voting over the Internet that uses a PC with an Internet- connection to cast the vote and send it to be stored in another remote computer. Personal Digital Assistants (PDA’s), telephones or mobile phones can also be used to cast a vote electronically. Besides its hype and advantages over traditional voting systems, MVS reliability, security and transparency are still issues that limit its deployment in many countries. Mobile Voting still faces a number of risks and challenges. Risks: 1. Third parties: Unauthorized intervention of third parties in the voting process. 2. Errors and technical malfunctions: More difficult to detect and identify the source of errors and technical malfunctions. 3. Unreliability: Possibility that fully digitized system would fail to produce results and lack physical back-up records, making a public recount difficult or impossible. Challenges: 1. Security: In the context of remote e-voting, special attention should be given to the process guaranteeing a free and secret vote. Only entitled voters are allowed to cast a vote and this requires that every voter be authenticated (e.g. by using a PIN -Personal Identification Number or TAN -Transaction Number or by the use of digital signature) and their right to vote verified. In order to prevent multiple votes being cast or other misuse, a record must be made and checked in order to establish whether the voter has already cast a vote. There must be an electronic separation between the vote and the identification of the voter.
  • 8. 8 2. Reliability: Mobile Voting Systems have to interact with some database server, or some other server, over a network. 3. There might be instances when this network goes down during the voting process to Keep the network stable and available during the voting process is a challenge that MVS application developers need to consider. Mobile Voting Systems are composed of several interacting agents, the Vote Collector, the Vote Manager, the Vote Authority, the Candidate, and the Voters. The Vote Authority (VA) is responsible for registering candidates for elections and commissioning Vote Managers. The Vote Collector (VC) is a mobile agent mandated by a stationary Vote Manager (VM) agent to collect votes from stationary voting agents (VOs). The arrangement of the system in such components can ensure a stable system suitable for voting. Usage of Mobile Voting Systems: Today, the development and widespread use of information technologies is changing the way people view voting processes and, ultimately, the way they vote. Mobile Voting Systems offer multiple advantages over traditional paper-based voting systems-advantages that increase citizen access to democratic processes and encourage participation. Reduced costs - E-voting system reduces the materials required for printing and distributing ballots. Increased participation and voting options - E-voting offers increased convenience to the voter encourages more voters to cast their votes remotely, and increases the likelihood of participation for mobile voters. Greater speed and accuracy placing and tallying votes -E-voting's step-by-step processes help minimize the number of miscast votes. The electronic gathering and counting of ballots reduces the amount of time spent tallying votes and delivering results. Greater accessibility for the disabled and the sick - Because they support a variety of interfaces and accessibility features, e-voting systems allow the physically challenged people to vote independently and privately. Flexibility - E-voting can support multiple languages, and the flexible design allows up- to-the-minute ballot modifications.
  • 9. 9 3.1.Phone toPhone voting system requirements 1.Voter can send short text message from his/her smart phone to specific smart phone running voting software A (Android version). 2.Upon receipt of the short text message containing the ID number of the best poster (only one should be selected), the said ID number will be entered in a Tally Table with attributes Candidate ID count. 3.The phone number of the voter will be remembered in a Voter Table with attributes Voter Phone No, Candidate ID, so that no voter can use the same phone to vote twice. 4.The administrator at the smart phone running voting software A can issue a special command, which will terminate the voting. The voting software A will display the Tally Table in decreasing number of votes so that the first winner will be displayed first and so on. At the end the Voter Table will be eliminated. 3.2.Phone to PC voting system requirements : 1.Voter can send email from his/her smart phone to specific PC running voting software X (Linux version). 1. 2.Upon receipt of the email containing the ID number of the best poster (only one should be selected), the said ID number will be entered in a Tally Table with attributes Candidate ID, count. 2. 3.The phone number of the voter will be remembered in a Voter Table with attributes Voter Phone No, Candidate ID, so that no voter can use the same phone to vote twice. 3. 4.The administrator at the PC running voting software X can issue a special command, which will terminate the voting. The voting software X will display the Tally Table in decreasing number of votes so that the first winner will be displayed first and so on. At the end the Voter Table will be eliminated.
  • 10. 10 3.3.Phone to Phone or PC voting system requirements : 1. An integration of the above two approaches, so that a voter can either vote by sending short text message to a specific smart phone, or by sending email to a PC. 2. The voting software A on the smart phone will forward e-mail to PC, so that the PC will receive all the votes. 3. The final tally will be done by voting software X, which will display the final results. 4. Both voting software A and voting software X will eliminate its Voter Table at the end. 4. IRIS RECOGNITION: Iris recognition is an automated method of biometric identification that uses mathematical pattern-recognition . Iris recognition uses video camera technology with subtle near infrared illumination to acquire images of the detail-rich, intricate structures of the iris which are visible externally. Databases of enrolled templates are searched by matcher engines at speeds measured in the millions of templates per second per (single-core) CPU, and with remarkably low false match rates. 4.1RIS ACQUISITION: Iris biometrics systems do not use laser-scans to capture the image of the human eye. Instead, an infrared photo or video camera is used at a set distance to capture a high quality image of the iris. Working in the infrared range provides many advantages when compared to the visible range: Iris ridges, nerves, and crypts are more evident the border between the iris and the pupil is more pronounced; and users are not exposed to annoying flashes. 4.2.IRIS SEGMENTATION: The main purpose of this process is to locate the iris on the image and isolate it from the rest of the eye image for further processing.
  • 11. 11 Some other important tasks that are also performed in this iris segmentation block include image quality enhancement, noise reduction, and emphasis of the ridges of the iris. Several proposals have been made by different authors for iris location and segmentation, wherein most consider iris detections finding two circumferences that model the iris boundaries. Here, the iris location varies depending on preset external and internal forces until an equilibrium state is reached. 4.3.FEATURE EXTRACTION: The normalization becomes necessary when considering that the pupil varies in size for different light intensities. After normalization, the phase information is studied by applying different Gabor filters. This was followed by the codification of this information in terms of the quadrant where the phase belongs however, Wilds, performs the extraction using Laplacian or Gaussian filters by obtaining several images of different scales for posterior comparison . 4.4.MATCHING: Although some authors have studied other matching algorithms the most employed matching algorithm has been the Hamming distance, as was initially proposed by Daugman. The Hamming distance is described by the following equation: where is the vector length and are the component of the template and sample vector, respectively, which are XOR in the equation. If the distance obtained is below a predefined threshold level, the studied sample is considered to belong to the user whose template is being studied. Selection of the threshold level usually depends on the final application. 4.5. STAGES INVOLVED IN IRIS DETECTION It includes Three Main Stages 2.3.1) Image Acquisition and Segmentation 2.3.2) Image Normalization 2.3.3) Feature Coding and Matching 5.CRYPTOGRAPHIC TECHNIQUES: Cryptography is one of the essential technologies used in building a secure VPN. Different applications of the same basic algorithms can provide both encryptions that keep data secret and authentication that ensures the two security peers in a VPN are who they claim to be.
  • 12. 12 Data confidentiality may be provided by one of two categories of encryption algorithm, namely symmetric cryptography and asymmetric cryptography. Symmetric, or conventional, cryptography requires that the sender and receiver share a key, which is an item of secret information used to encrypt and decrypt data. The process by which two peers agree upon a key over an insecure medium can be problematic as, until the key is agreed, the peers have no way to communicate in secret. Asymmetric, or Public Key, cryptography solves the key exchange problem by using two keys, either of which may be used to encrypt a message. The encrypted data may then only be decrypted by means of the other key. Messages may be received securely by publishing one of the keys (for example, in the footer of an e-mail message) as a Public Key and keeping the second, the Private Key, secret. Anyone wishing to send a secure communication may then encrypt the message with the recipient’s Public Key and, providing the Private Key has not been disclosed, only the intended recipient will be able to decrypt the encrypted text and recover the original message. Cryptography or cryptology; From Greek, "hidden, secret"; and "writing", or "study", respectively is the practice and study of techniques for secure communication in the presence of third parties called adversaries.]These adversaries are often referred to as Eve in cryptography, while the sender and recipient of messages are called Alice and Bob respectively. Cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages. Various aspects in information security such as data confidentiality, data integrity, authentication, and non- repudiation[5] are central to modern cryptography. Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, and electrical engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce. The originator of an encrypted message (Alice) shared the decoding technique needed to recover the original information only with intended recipients (Bob), thereby precluding unwanted persons (Eve) from doing the same.
  • 13. 13 Cryptographic algorithms are designed around computational hardness assumptions, making such algorithms hard to break in practice by any adversary. It is theoretically possible to break such a system, but it is infeasible to do so by any known practical means. These schemes are therefore termed computationally secure; theoretical advances, e.g., improvements in integer factorization algorithms, and faster computing technology require these solutions to be continually adapted. There exist information- theoretically secure schemes that provably cannot be broken even with unlimited computing power. Cryptography also plays a major role in digital rights management and piracy of digital media. 5. SCOPE: In our proposed system registration process done through website which minimize time, energy and cost. Voting done through the SMS provides mobility option to the voter. Because of RSA security double voting will prevented dandy offer choice to the public to cast their vote through their cell phone. If this system is implemented using cloud computing then it has a scope to use in government elections. 6. CONCLUSION: This paper proposes mobile phone voting system avoiding double voting in case of casting ballots first from mobile phone and then from pooling booth, it is more useful, efficient and reliable in mobile phone voting process. This system does not require any internet facility, decreases expensive hardware cost and it requires only mobile phone and SIM card. REFERENCES: 1. Rivest, Ronald L. (1990). "Cryptography". In J. Van Leeuwen. Handbook of Theoretical Computer Science 1. Elsevier. 2. Bellare, Mihir; Rogaway, Phillip (21 September 2005). "Introduction". Introduction to Modern Cryptography. p. 10. 3. Menezes, A. J.; van Oorschot, P. C.; Vanstone, S.A. Handbook of Applied Cryptography. ISBN 0-8493-8523-7. Archived from the original on 7 March 2005. 4. Biggs, Norman (2008). Codes: An introduction to Information Communication and Cryptography. Springer. p. 171. 5. Overview per country". Crypto Law Survey. February 2013. Retrieved 26 March 2015. 6. "UK Data Encryption Disclosure Law Takes Effect". PC World. 1 October 2007. Retrieved 26 March 2015.