SlideShare a Scribd company logo
BUILDING AND MAINTAINING TRUST IN INTERNET VOTING WITH
                     BIOMETRICS AUTHENTICATION


OBJECTIVE:


      The main objective of this project is to provide a voting service that allows
people to vote electronically with biometrics authentication system.


PROBLEM DEFINITION:


      Integrity of the election process will determine the integrity of democracy
itself. So the election system must be secure and robust against a variety of
fraudulent behaviors, should be transparent and comprehensible that voters and
candidates can accept the results of an election. But in history, there are examples
of elections being manipulated in order to influence their outcome. In a voting
system, whether electronic or using traditional paper ballots, the system should
meet the following criteria: Anonymity, Tamper-resistant, Human factors.




ABSTRACT:


      The project entitled as “Building and Maintaining Trust in Internet
Voting with Biometrics Authentication System”. To provide a voting service
that allows people to vote electronically. This system encompasses legal,
regulatory, behavioral, and sociological aspects of the current voting system, while
adding additional convenience and security to the overall voting process.
Biometrics is the study of automated methods for uniquely recognizing
humans based upon one or more intrinsic physical or behavioral traits. Physical
traits includes Fingerprint identification    which is the process of comparing
questioned and known friction skin ridge impressions (Minutiae) from fingers,
palms, and toes to determine if the impressions are from the same finger. Using
Cryptography and Steganography at the same time, we try to provide Biometric as
well as Password security to voter accounts. The scheme uses images as cover
objects for Steganography and as keys for Cryptography. The key image is a
Biometric measure, such as a fingerprint image. Proper use of Cryptography
greatly reduces the risks in these systems as the hackers have to find both secret
key and the template. The basic idea is to merge the secret key with the cover
image on the basis of key image. The result of this process produces a STEGO
image which looks quite similar to the cover image but not detectable by human
eye. The system targets the authentication requirement of a voting system.


EXISTING SYSTEM:


      In those days a rigorous study of fingerprints, developed scientific methods
for visual matching of fingerprints and strong programs/cultures for training
fingerprint experts, and applied the art of fingerprint identification for nailing
down the perpetrators. Despite the ingenious methods improvised to increase the
efficiency of the manual method of fingerprint indexing and search, the ever
growing demands on manual fingerprint identification quickly became
overwhelming the manual method of fingerprint indexing resulted in a highly
skewed distribution of fingerprints into bins most fingerprints fell into a few bins
and this resulted in search inefficiencies.
Fingerprint training procedures were time-intensive and slow. Further,
demands imposed by painstaking attention needed to visually match the
fingerprints of varied qualities, tedium of monotonic nature of the work, and
increasing workloads due to a higher demand on fingerprint identification services.
Integrity of the election process will determine the integrity of democracy itself. So
the election system must be secure and robust against a variety of fraudulent
behaviors, should be transparent and comprehensible that voters and candidates
can accept the results of an election. But in history, there are examples of elections
being manipulated in order to influence their outcome. In a voting system, whether
electronic or using traditional paper ballots, the system should meet the following
criteria: Anonymity, Tamper-resistant, Human factors.




DISADVANTAGE:


    Wastage of time.
    There is a chance to do revote.
    Less security.
    Hacking voter results.


PROPOSED SYSTEM:


      To initiate research into acquiring fingerprints through electronic medium
 and automatic fingerprint identification based on the biometric representation of
 the fingerprints. These efforts have led to development of automatic fingerprint
 identification systems over the past few decades. We attempt to present current
 state-of-the-art in fingerprint sensing and identification technology.
The objective of this project is to present a high level overview of fingerprint
sensing and matching technology so as to provide the reader with some insights
into the strengths and limitations of the automation in matching fingerprints. To
initiate research into acquiring fingerprints through electronic medium and
automatic fingerprint identification based on the biometric digital representation
of the fingerprints.


ADVANTAGES:


   Highly secured and there is no chance to revote.
   Finger print recognition.
   Real time tracking of results.
   Ease of voting.


ALGORITHM USED:


     1. RNG(Random Number Generation)
     2. LSB(Least Significant Bit)
     3. Triple DES(Data Encryption Standard)
ARCHITECTURE DIAGRAM:




ADMIN

 Admin           New                SMS PIN         Thumb
 LOGIN           Registration       Number          impression
                                    entry

                                                    Providing
                                                    Secret key




USER

 USER Send    Thumb             Generate      Get Details
 SMS PIN      impression        Stego Image   from
 and Secret                                   Database
 key

                                              Authenticatio
                                              n complete to
                                              enter Vote
SYSTEM REQUIREMENTS:


    Hardware configuration:


               Intel Pentium IV
               256/512 MB RAM
               1 GB Free disk space or greater
               1 GB on Boot Drive
               1 Network Interface Card (NIC


  Software configuration:


               MS Windows XP/2000
               MS IE Browser 6.0/later
               MS Dot Net Framework 4.0
               Internet Information Server (IIS)
               MS SQL Server
               Front End: ASP.NET with C#
               Back End: MS SQL Server 2005


APPLICATIONS:
               Powerful tool for democracy used for polling
               Conduct censuses and referendums easily
               Direct democracy
               Saves Money

More Related Content

What's hot

3 d password
3 d password3 d password
3 d password
hetal gauswami
 
3d passwords
3d passwords3d passwords
3d passwords
shwetaag
 
SRAVYA
SRAVYASRAVYA
SRAVYA
pvpsit
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
Amrit Sharma
 
3D password
3D password3D password
3D password
Jaya Sinha
 
3D PASSWORD
3D PASSWORD 3D PASSWORD
3D PASSWORD
Rajashree Swain
 
3d password
3d password3d password
3d password
shivi123456
 
3D password
3D password3D password
3D password
anuradha srivastava
 
3D-Password
3D-Password 3D-Password
3D-Password
Devyani Vaidya
 
3D password
3D password 3D password
3D password
Muniba Bukhari
 
3 d password by M Sangam Subudhi
3 d password by M Sangam Subudhi3 d password by M Sangam Subudhi
3 d password by M Sangam Subudhi
M Sangam Subudhi
 
3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14
Saddam Ahmed
 
3D-PASSWORD SEMI
3D-PASSWORD SEMI3D-PASSWORD SEMI
3D-PASSWORD SEMI
Neeraj Kumar Tiwari
 
3D Password
3D Password3D Password
3D Password
Zishan Mohsin
 
3dpassword
3dpassword3dpassword
3dpassword
Belal Ahmad
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
Seminar Links
 
3d password
3d password3d password
3d password
Abinaya Sathya
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORD
Karishma Khan
 
3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication
Mahesh Gadhwal
 
3 d password
3 d password 3 d password
3 d password
blogger at indiandswad
 

What's hot (20)

3 d password
3 d password3 d password
3 d password
 
3d passwords
3d passwords3d passwords
3d passwords
 
SRAVYA
SRAVYASRAVYA
SRAVYA
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D password
3D password3D password
3D password
 
3D PASSWORD
3D PASSWORD 3D PASSWORD
3D PASSWORD
 
3d password
3d password3d password
3d password
 
3D password
3D password3D password
3D password
 
3D-Password
3D-Password 3D-Password
3D-Password
 
3D password
3D password 3D password
3D password
 
3 d password by M Sangam Subudhi
3 d password by M Sangam Subudhi3 d password by M Sangam Subudhi
3 d password by M Sangam Subudhi
 
3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14
 
3D-PASSWORD SEMI
3D-PASSWORD SEMI3D-PASSWORD SEMI
3D-PASSWORD SEMI
 
3D Password
3D Password3D Password
3D Password
 
3dpassword
3dpassword3dpassword
3dpassword
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
 
3d password
3d password3d password
3d password
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORD
 
3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication
 
3 d password
3 d password 3 d password
3 d password
 

Viewers also liked

Chapter10 conceptual data modeling
Chapter10 conceptual data modelingChapter10 conceptual data modeling
Chapter10 conceptual data modeling
Dhani Ahmad
 
System design
System designSystem design
System design
Saba Siddique
 
Chap12
Chap12Chap12
11.file system implementation
11.file system implementation11.file system implementation
11.file system implementation
Senthil Kanth
 
Chapter09 logic modeling
Chapter09 logic modelingChapter09 logic modeling
Chapter09 logic modeling
Dhani Ahmad
 
Chapter 11 designing interfaces and dialogues
Chapter 11 designing interfaces and dialoguesChapter 11 designing interfaces and dialogues
Chapter 11 designing interfaces and dialogues
Job Master
 
L10 system implementation
L10 system implementationL10 system implementation
L10 system implementation
OMWOMA JACKSON
 
Chapter14 designing interfaces and dialogues
Chapter14 designing interfaces and dialoguesChapter14 designing interfaces and dialogues
Chapter14 designing interfaces and dialogues
Dhani Ahmad
 
Chapter17 system implementation
Chapter17 system implementationChapter17 system implementation
Chapter17 system implementation
Dhani Ahmad
 
Enterprise system implementation strategies and phases
Enterprise system implementation strategies and phasesEnterprise system implementation strategies and phases
Enterprise system implementation strategies and phases
John Cachat
 
Removal of directors
Removal of directorsRemoval of directors
Removal of directors
Uttma Shukla
 
System Analysis and Design
System Analysis and DesignSystem Analysis and Design
System Analysis and Design
Aamir Abbas
 

Viewers also liked (12)

Chapter10 conceptual data modeling
Chapter10 conceptual data modelingChapter10 conceptual data modeling
Chapter10 conceptual data modeling
 
System design
System designSystem design
System design
 
Chap12
Chap12Chap12
Chap12
 
11.file system implementation
11.file system implementation11.file system implementation
11.file system implementation
 
Chapter09 logic modeling
Chapter09 logic modelingChapter09 logic modeling
Chapter09 logic modeling
 
Chapter 11 designing interfaces and dialogues
Chapter 11 designing interfaces and dialoguesChapter 11 designing interfaces and dialogues
Chapter 11 designing interfaces and dialogues
 
L10 system implementation
L10 system implementationL10 system implementation
L10 system implementation
 
Chapter14 designing interfaces and dialogues
Chapter14 designing interfaces and dialoguesChapter14 designing interfaces and dialogues
Chapter14 designing interfaces and dialogues
 
Chapter17 system implementation
Chapter17 system implementationChapter17 system implementation
Chapter17 system implementation
 
Enterprise system implementation strategies and phases
Enterprise system implementation strategies and phasesEnterprise system implementation strategies and phases
Enterprise system implementation strategies and phases
 
Removal of directors
Removal of directorsRemoval of directors
Removal of directors
 
System Analysis and Design
System Analysis and DesignSystem Analysis and Design
System Analysis and Design
 

Similar to Psdot 3 building and maintaining trust in internet voting with biometrics authentication

IRJET - Decentralized E-Voting System using Blockchain
IRJET - Decentralized E-Voting System using BlockchainIRJET - Decentralized E-Voting System using Blockchain
IRJET - Decentralized E-Voting System using Blockchain
IRJET Journal
 
Online Voting System Using Blockchain Technology
Online Voting System Using Blockchain TechnologyOnline Voting System Using Blockchain Technology
Online Voting System Using Blockchain Technology
IRJET Journal
 
Online Voting System Using Fingerprint sensor and Blockchain
Online Voting System Using Fingerprint sensor and BlockchainOnline Voting System Using Fingerprint sensor and Blockchain
Online Voting System Using Fingerprint sensor and Blockchain
IRJET Journal
 
project presentation -2 nov (2).pptx
project presentation -2 nov (2).pptxproject presentation -2 nov (2).pptx
project presentation -2 nov (2).pptx
muralimurali239921
 
Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authentication
ZTech Proje
 
a famework for analyzing template security and privacy in biometric authenti...
 a famework for analyzing template security and privacy in biometric authenti... a famework for analyzing template security and privacy in biometric authenti...
a famework for analyzing template security and privacy in biometric authenti...
ZTech Proje
 
E-Voting Using Blockchain Technology for Security
E-Voting Using Blockchain Technology for SecurityE-Voting Using Blockchain Technology for Security
E-Voting Using Blockchain Technology for Security
smeetramteke
 
eVoting.pptx
eVoting.pptxeVoting.pptx
eVoting.pptx
AmeenNaseefPT1
 
IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...
IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...
IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...
IRJET Journal
 
BEE – Blockchain Enabled Election System
BEE – Blockchain Enabled Election SystemBEE – Blockchain Enabled Election System
BEE – Blockchain Enabled Election System
IRJET Journal
 
Secure Internet Voting System
Secure Internet Voting SystemSecure Internet Voting System
Secure Internet Voting System
theijes
 
Captiosus Voting System
Captiosus Voting SystemCaptiosus Voting System
Captiosus Voting System
IJMTST Journal
 
Online e voting
Online e votingOnline e voting
Online e voting
MerbinJose
 
Fingerprint combination for privacy protection
Fingerprint combination for privacy protectionFingerprint combination for privacy protection
Fingerprint combination for privacy protection
Migrant Systems
 
Blockchain voting
Blockchain votingBlockchain voting
Blockchain voting
sandhyajoshi17
 
Biometrics
BiometricsBiometrics
Biometrics
Satish Chandra
 
Design of biometric electronic voting machine
Design of biometric electronic voting machineDesign of biometric electronic voting machine
Design of biometric electronic voting machine
IJARIIT
 
Online paymentusingsteganographt&Visualcryptography
Online paymentusingsteganographt&VisualcryptographyOnline paymentusingsteganographt&Visualcryptography
Online paymentusingsteganographt&Visualcryptography
Nagarjuna mahanti
 
7. 9589 1-pb
7. 9589 1-pb7. 9589 1-pb
7. 9589 1-pb
IAESIJEECS
 
Final project prosal.docx
Final project prosal.docxFinal project prosal.docx
Final project prosal.docx
ShangaviS2
 

Similar to Psdot 3 building and maintaining trust in internet voting with biometrics authentication (20)

IRJET - Decentralized E-Voting System using Blockchain
IRJET - Decentralized E-Voting System using BlockchainIRJET - Decentralized E-Voting System using Blockchain
IRJET - Decentralized E-Voting System using Blockchain
 
Online Voting System Using Blockchain Technology
Online Voting System Using Blockchain TechnologyOnline Voting System Using Blockchain Technology
Online Voting System Using Blockchain Technology
 
Online Voting System Using Fingerprint sensor and Blockchain
Online Voting System Using Fingerprint sensor and BlockchainOnline Voting System Using Fingerprint sensor and Blockchain
Online Voting System Using Fingerprint sensor and Blockchain
 
project presentation -2 nov (2).pptx
project presentation -2 nov (2).pptxproject presentation -2 nov (2).pptx
project presentation -2 nov (2).pptx
 
Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authentication
 
a famework for analyzing template security and privacy in biometric authenti...
 a famework for analyzing template security and privacy in biometric authenti... a famework for analyzing template security and privacy in biometric authenti...
a famework for analyzing template security and privacy in biometric authenti...
 
E-Voting Using Blockchain Technology for Security
E-Voting Using Blockchain Technology for SecurityE-Voting Using Blockchain Technology for Security
E-Voting Using Blockchain Technology for Security
 
eVoting.pptx
eVoting.pptxeVoting.pptx
eVoting.pptx
 
IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...
IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...
IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...
 
BEE – Blockchain Enabled Election System
BEE – Blockchain Enabled Election SystemBEE – Blockchain Enabled Election System
BEE – Blockchain Enabled Election System
 
Secure Internet Voting System
Secure Internet Voting SystemSecure Internet Voting System
Secure Internet Voting System
 
Captiosus Voting System
Captiosus Voting SystemCaptiosus Voting System
Captiosus Voting System
 
Online e voting
Online e votingOnline e voting
Online e voting
 
Fingerprint combination for privacy protection
Fingerprint combination for privacy protectionFingerprint combination for privacy protection
Fingerprint combination for privacy protection
 
Blockchain voting
Blockchain votingBlockchain voting
Blockchain voting
 
Biometrics
BiometricsBiometrics
Biometrics
 
Design of biometric electronic voting machine
Design of biometric electronic voting machineDesign of biometric electronic voting machine
Design of biometric electronic voting machine
 
Online paymentusingsteganographt&Visualcryptography
Online paymentusingsteganographt&VisualcryptographyOnline paymentusingsteganographt&Visualcryptography
Online paymentusingsteganographt&Visualcryptography
 
7. 9589 1-pb
7. 9589 1-pb7. 9589 1-pb
7. 9589 1-pb
 
Final project prosal.docx
Final project prosal.docxFinal project prosal.docx
Final project prosal.docx
 

More from ZTech Proje

separable reversible data hiding in encrypted image
separable reversible data hiding in encrypted imageseparable reversible data hiding in encrypted image
separable reversible data hiding in encrypted image
ZTech Proje
 
message passing interface
message passing interfacemessage passing interface
message passing interface
ZTech Proje
 
message passing interface
message passing interfacemessage passing interface
message passing interface
ZTech Proje
 
Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authentication
ZTech Proje
 
Psdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computingPsdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computing
ZTech Proje
 
Psdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computingPsdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computing
ZTech Proje
 
Psdot 17 new channel selection rule for jpeg steganography
Psdot 17 new channel selection rule for jpeg steganographyPsdot 17 new channel selection rule for jpeg steganography
Psdot 17 new channel selection rule for jpeg steganography
ZTech Proje
 
Psdot 16 a new framework for credit card transactions involving mutual authen...
Psdot 16 a new framework for credit card transactions involving mutual authen...Psdot 16 a new framework for credit card transactions involving mutual authen...
Psdot 16 a new framework for credit card transactions involving mutual authen...
ZTech Proje
 
Psdot 15 performance analysis of cloud computing
Psdot 15 performance analysis of cloud computingPsdot 15 performance analysis of cloud computing
Psdot 15 performance analysis of cloud computing
ZTech Proje
 
Psdot 14 using data mining techniques in heart
Psdot 14 using data mining techniques in heartPsdot 14 using data mining techniques in heart
Psdot 14 using data mining techniques in heart
ZTech Proje
 
Psdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering systemPsdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering system
ZTech Proje
 
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
ZTech Proje
 
Psdot 11 highly secured net banking system using fingerprint recognition tech...
Psdot 11 highly secured net banking system using fingerprint recognition tech...Psdot 11 highly secured net banking system using fingerprint recognition tech...
Psdot 11 highly secured net banking system using fingerprint recognition tech...
ZTech Proje
 
Psdot 10 real time smart car lock security system using
Psdot 10 real time smart car lock security system usingPsdot 10 real time smart car lock security system using
Psdot 10 real time smart car lock security system using
ZTech Proje
 
Psdot 9 facial expression recognition in perceptual
Psdot 9 facial expression recognition in perceptualPsdot 9 facial expression recognition in perceptual
Psdot 9 facial expression recognition in perceptual
ZTech Proje
 
Psdot 23 airport reasoning about time-dependent parking lot occupancy
Psdot 23 airport reasoning about time-dependent parking lot occupancyPsdot 23 airport reasoning about time-dependent parking lot occupancy
Psdot 23 airport reasoning about time-dependent parking lot occupancy
ZTech Proje
 
Psdot 8 a weak security notion for visual
Psdot 8 a weak security notion for visualPsdot 8 a weak security notion for visual
Psdot 8 a weak security notion for visual
ZTech Proje
 
Psdot 6 web based security analysis of opass authentication schemes using mob...
Psdot 6 web based security analysis of opass authentication schemes using mob...Psdot 6 web based security analysis of opass authentication schemes using mob...
Psdot 6 web based security analysis of opass authentication schemes using mob...
ZTech Proje
 
Psdot 4 scalable and secure sharing of personal health records in cloud compu...
Psdot 4 scalable and secure sharing of personal health records in cloud compu...Psdot 4 scalable and secure sharing of personal health records in cloud compu...
Psdot 4 scalable and secure sharing of personal health records in cloud compu...
ZTech Proje
 
Psdot 7 change detection algorithm for visual
Psdot 7 change detection algorithm for visualPsdot 7 change detection algorithm for visual
Psdot 7 change detection algorithm for visual
ZTech Proje
 

More from ZTech Proje (20)

separable reversible data hiding in encrypted image
separable reversible data hiding in encrypted imageseparable reversible data hiding in encrypted image
separable reversible data hiding in encrypted image
 
message passing interface
message passing interfacemessage passing interface
message passing interface
 
message passing interface
message passing interfacemessage passing interface
message passing interface
 
Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authentication
 
Psdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computingPsdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computing
 
Psdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computingPsdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computing
 
Psdot 17 new channel selection rule for jpeg steganography
Psdot 17 new channel selection rule for jpeg steganographyPsdot 17 new channel selection rule for jpeg steganography
Psdot 17 new channel selection rule for jpeg steganography
 
Psdot 16 a new framework for credit card transactions involving mutual authen...
Psdot 16 a new framework for credit card transactions involving mutual authen...Psdot 16 a new framework for credit card transactions involving mutual authen...
Psdot 16 a new framework for credit card transactions involving mutual authen...
 
Psdot 15 performance analysis of cloud computing
Psdot 15 performance analysis of cloud computingPsdot 15 performance analysis of cloud computing
Psdot 15 performance analysis of cloud computing
 
Psdot 14 using data mining techniques in heart
Psdot 14 using data mining techniques in heartPsdot 14 using data mining techniques in heart
Psdot 14 using data mining techniques in heart
 
Psdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering systemPsdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering system
 
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
 
Psdot 11 highly secured net banking system using fingerprint recognition tech...
Psdot 11 highly secured net banking system using fingerprint recognition tech...Psdot 11 highly secured net banking system using fingerprint recognition tech...
Psdot 11 highly secured net banking system using fingerprint recognition tech...
 
Psdot 10 real time smart car lock security system using
Psdot 10 real time smart car lock security system usingPsdot 10 real time smart car lock security system using
Psdot 10 real time smart car lock security system using
 
Psdot 9 facial expression recognition in perceptual
Psdot 9 facial expression recognition in perceptualPsdot 9 facial expression recognition in perceptual
Psdot 9 facial expression recognition in perceptual
 
Psdot 23 airport reasoning about time-dependent parking lot occupancy
Psdot 23 airport reasoning about time-dependent parking lot occupancyPsdot 23 airport reasoning about time-dependent parking lot occupancy
Psdot 23 airport reasoning about time-dependent parking lot occupancy
 
Psdot 8 a weak security notion for visual
Psdot 8 a weak security notion for visualPsdot 8 a weak security notion for visual
Psdot 8 a weak security notion for visual
 
Psdot 6 web based security analysis of opass authentication schemes using mob...
Psdot 6 web based security analysis of opass authentication schemes using mob...Psdot 6 web based security analysis of opass authentication schemes using mob...
Psdot 6 web based security analysis of opass authentication schemes using mob...
 
Psdot 4 scalable and secure sharing of personal health records in cloud compu...
Psdot 4 scalable and secure sharing of personal health records in cloud compu...Psdot 4 scalable and secure sharing of personal health records in cloud compu...
Psdot 4 scalable and secure sharing of personal health records in cloud compu...
 
Psdot 7 change detection algorithm for visual
Psdot 7 change detection algorithm for visualPsdot 7 change detection algorithm for visual
Psdot 7 change detection algorithm for visual
 

Recently uploaded

BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
sayalidalavi006
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 

Recently uploaded (20)

BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 

Psdot 3 building and maintaining trust in internet voting with biometrics authentication

  • 1. BUILDING AND MAINTAINING TRUST IN INTERNET VOTING WITH BIOMETRICS AUTHENTICATION OBJECTIVE: The main objective of this project is to provide a voting service that allows people to vote electronically with biometrics authentication system. PROBLEM DEFINITION: Integrity of the election process will determine the integrity of democracy itself. So the election system must be secure and robust against a variety of fraudulent behaviors, should be transparent and comprehensible that voters and candidates can accept the results of an election. But in history, there are examples of elections being manipulated in order to influence their outcome. In a voting system, whether electronic or using traditional paper ballots, the system should meet the following criteria: Anonymity, Tamper-resistant, Human factors. ABSTRACT: The project entitled as “Building and Maintaining Trust in Internet Voting with Biometrics Authentication System”. To provide a voting service that allows people to vote electronically. This system encompasses legal, regulatory, behavioral, and sociological aspects of the current voting system, while adding additional convenience and security to the overall voting process.
  • 2. Biometrics is the study of automated methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. Physical traits includes Fingerprint identification which is the process of comparing questioned and known friction skin ridge impressions (Minutiae) from fingers, palms, and toes to determine if the impressions are from the same finger. Using Cryptography and Steganography at the same time, we try to provide Biometric as well as Password security to voter accounts. The scheme uses images as cover objects for Steganography and as keys for Cryptography. The key image is a Biometric measure, such as a fingerprint image. Proper use of Cryptography greatly reduces the risks in these systems as the hackers have to find both secret key and the template. The basic idea is to merge the secret key with the cover image on the basis of key image. The result of this process produces a STEGO image which looks quite similar to the cover image but not detectable by human eye. The system targets the authentication requirement of a voting system. EXISTING SYSTEM: In those days a rigorous study of fingerprints, developed scientific methods for visual matching of fingerprints and strong programs/cultures for training fingerprint experts, and applied the art of fingerprint identification for nailing down the perpetrators. Despite the ingenious methods improvised to increase the efficiency of the manual method of fingerprint indexing and search, the ever growing demands on manual fingerprint identification quickly became overwhelming the manual method of fingerprint indexing resulted in a highly skewed distribution of fingerprints into bins most fingerprints fell into a few bins and this resulted in search inefficiencies.
  • 3. Fingerprint training procedures were time-intensive and slow. Further, demands imposed by painstaking attention needed to visually match the fingerprints of varied qualities, tedium of monotonic nature of the work, and increasing workloads due to a higher demand on fingerprint identification services. Integrity of the election process will determine the integrity of democracy itself. So the election system must be secure and robust against a variety of fraudulent behaviors, should be transparent and comprehensible that voters and candidates can accept the results of an election. But in history, there are examples of elections being manipulated in order to influence their outcome. In a voting system, whether electronic or using traditional paper ballots, the system should meet the following criteria: Anonymity, Tamper-resistant, Human factors. DISADVANTAGE:  Wastage of time.  There is a chance to do revote.  Less security.  Hacking voter results. PROPOSED SYSTEM: To initiate research into acquiring fingerprints through electronic medium and automatic fingerprint identification based on the biometric representation of the fingerprints. These efforts have led to development of automatic fingerprint identification systems over the past few decades. We attempt to present current state-of-the-art in fingerprint sensing and identification technology.
  • 4. The objective of this project is to present a high level overview of fingerprint sensing and matching technology so as to provide the reader with some insights into the strengths and limitations of the automation in matching fingerprints. To initiate research into acquiring fingerprints through electronic medium and automatic fingerprint identification based on the biometric digital representation of the fingerprints. ADVANTAGES:  Highly secured and there is no chance to revote.  Finger print recognition.  Real time tracking of results.  Ease of voting. ALGORITHM USED: 1. RNG(Random Number Generation) 2. LSB(Least Significant Bit) 3. Triple DES(Data Encryption Standard)
  • 5. ARCHITECTURE DIAGRAM: ADMIN Admin New SMS PIN Thumb LOGIN Registration Number impression entry Providing Secret key USER USER Send Thumb Generate Get Details SMS PIN impression Stego Image from and Secret Database key Authenticatio n complete to enter Vote
  • 6. SYSTEM REQUIREMENTS: Hardware configuration:  Intel Pentium IV  256/512 MB RAM  1 GB Free disk space or greater  1 GB on Boot Drive  1 Network Interface Card (NIC Software configuration:  MS Windows XP/2000  MS IE Browser 6.0/later  MS Dot Net Framework 4.0  Internet Information Server (IIS)  MS SQL Server  Front End: ASP.NET with C#  Back End: MS SQL Server 2005 APPLICATIONS:  Powerful tool for democracy used for polling  Conduct censuses and referendums easily  Direct democracy  Saves Money