Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
BUILDING AND MAINTAINING TRUST IN INTERNET VOTING WITH                     BIOMETRICS AUTHENTICATIONOBJECTIVE:      The ma...
Biometrics is the study of automated methods for uniquely recognizinghumans based upon one or more intrinsic physical or b...
Fingerprint training procedures were time-intensive and slow. Further,demands imposed by painstaking attention needed to v...
The objective of this project is to present a high level overview of fingerprintsensing and matching technology so as to p...
ARCHITECTURE DIAGRAM:ADMIN Admin           New                SMS PIN         Thumb LOGIN           Registration       Num...
SYSTEM REQUIREMENTS:    Hardware configuration:               Intel Pentium IV               256/512 MB RAM            ...
Upcoming SlideShare
Loading in …5
×

Psdot 3 building and maintaining trust in internet voting with biometrics authentication

1,172 views

Published on

FINAL YEAR IEEE PROJECTS,
EMBEDDED SYSTEMS PROJECTS,
ENGINEERING PROJECTS,
MCA PROJECTS,
ROBOTICS PROJECTS,
ARM PIC BASED PROJECTS, MICRO CONTROLLER PROJECTS

Published in: Education
  • Be the first to comment

  • Be the first to like this

Psdot 3 building and maintaining trust in internet voting with biometrics authentication

  1. 1. BUILDING AND MAINTAINING TRUST IN INTERNET VOTING WITH BIOMETRICS AUTHENTICATIONOBJECTIVE: The main objective of this project is to provide a voting service that allowspeople to vote electronically with biometrics authentication system.PROBLEM DEFINITION: Integrity of the election process will determine the integrity of democracyitself. So the election system must be secure and robust against a variety offraudulent behaviors, should be transparent and comprehensible that voters andcandidates can accept the results of an election. But in history, there are examplesof elections being manipulated in order to influence their outcome. In a votingsystem, whether electronic or using traditional paper ballots, the system shouldmeet the following criteria: Anonymity, Tamper-resistant, Human factors.ABSTRACT: The project entitled as “Building and Maintaining Trust in InternetVoting with Biometrics Authentication System”. To provide a voting servicethat allows people to vote electronically. This system encompasses legal,regulatory, behavioral, and sociological aspects of the current voting system, whileadding additional convenience and security to the overall voting process.
  2. 2. Biometrics is the study of automated methods for uniquely recognizinghumans based upon one or more intrinsic physical or behavioral traits. Physicaltraits includes Fingerprint identification which is the process of comparingquestioned and known friction skin ridge impressions (Minutiae) from fingers,palms, and toes to determine if the impressions are from the same finger. UsingCryptography and Steganography at the same time, we try to provide Biometric aswell as Password security to voter accounts. The scheme uses images as coverobjects for Steganography and as keys for Cryptography. The key image is aBiometric measure, such as a fingerprint image. Proper use of Cryptographygreatly reduces the risks in these systems as the hackers have to find both secretkey and the template. The basic idea is to merge the secret key with the coverimage on the basis of key image. The result of this process produces a STEGOimage which looks quite similar to the cover image but not detectable by humaneye. The system targets the authentication requirement of a voting system.EXISTING SYSTEM: In those days a rigorous study of fingerprints, developed scientific methodsfor visual matching of fingerprints and strong programs/cultures for trainingfingerprint experts, and applied the art of fingerprint identification for nailingdown the perpetrators. Despite the ingenious methods improvised to increase theefficiency of the manual method of fingerprint indexing and search, the evergrowing demands on manual fingerprint identification quickly becameoverwhelming the manual method of fingerprint indexing resulted in a highlyskewed distribution of fingerprints into bins most fingerprints fell into a few binsand this resulted in search inefficiencies.
  3. 3. Fingerprint training procedures were time-intensive and slow. Further,demands imposed by painstaking attention needed to visually match thefingerprints of varied qualities, tedium of monotonic nature of the work, andincreasing workloads due to a higher demand on fingerprint identification services.Integrity of the election process will determine the integrity of democracy itself. Sothe election system must be secure and robust against a variety of fraudulentbehaviors, should be transparent and comprehensible that voters and candidatescan accept the results of an election. But in history, there are examples of electionsbeing manipulated in order to influence their outcome. In a voting system, whetherelectronic or using traditional paper ballots, the system should meet the followingcriteria: Anonymity, Tamper-resistant, Human factors.DISADVANTAGE:  Wastage of time.  There is a chance to do revote.  Less security.  Hacking voter results.PROPOSED SYSTEM: To initiate research into acquiring fingerprints through electronic medium and automatic fingerprint identification based on the biometric representation of the fingerprints. These efforts have led to development of automatic fingerprint identification systems over the past few decades. We attempt to present current state-of-the-art in fingerprint sensing and identification technology.
  4. 4. The objective of this project is to present a high level overview of fingerprintsensing and matching technology so as to provide the reader with some insightsinto the strengths and limitations of the automation in matching fingerprints. Toinitiate research into acquiring fingerprints through electronic medium andautomatic fingerprint identification based on the biometric digital representationof the fingerprints.ADVANTAGES:  Highly secured and there is no chance to revote.  Finger print recognition.  Real time tracking of results.  Ease of voting.ALGORITHM USED: 1. RNG(Random Number Generation) 2. LSB(Least Significant Bit) 3. Triple DES(Data Encryption Standard)
  5. 5. ARCHITECTURE DIAGRAM:ADMIN Admin New SMS PIN Thumb LOGIN Registration Number impression entry Providing Secret keyUSER USER Send Thumb Generate Get Details SMS PIN impression Stego Image from and Secret Database key Authenticatio n complete to enter Vote
  6. 6. SYSTEM REQUIREMENTS: Hardware configuration:  Intel Pentium IV  256/512 MB RAM  1 GB Free disk space or greater  1 GB on Boot Drive  1 Network Interface Card (NIC Software configuration:  MS Windows XP/2000  MS IE Browser 6.0/later  MS Dot Net Framework 4.0  Internet Information Server (IIS)  MS SQL Server  Front End: ASP.NET with C#  Back End: MS SQL Server 2005APPLICATIONS:  Powerful tool for democracy used for polling  Conduct censuses and referendums easily  Direct democracy  Saves Money

×