Authentication for Online Voting Using Steganography and Biometrics
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 10
Abstract
In this paper an online voting authentication technique is proposed which provides biometric as well as password security to voter accounts. Voters are first identified by their facial image by using PCA. Second step is the fingerprint recognition. Third one is steganographic method. The basic idea of strganographic method is to merge the secret key and pin number with the cover image which produces a stego image which looks same as the cover image. The cover image is a biometric measure, such as a fingerprint image. The secret key and pin number is extracted from the stego image at the server side to perform the voter authentication function. This system greatly reduces the risks as the hackers have to find the secret key, pin number, fingerprint and facial image, which makes the election procedure to be secure against a variety of fraudulent behaviors. SHA 256 used for hashing is replaced with MD5 in order to improve the speed
Authors and Affiliations
Linu Paul , Anilkumar M. N
Association Rule Mining using Apriori Algorithm: A Survey
— Association rule mining is the most important technique in the field of data mining. Association rule mining finding frequent patterns, associations, correlations, or causal structures among sets of items or obje...
Calculation of Transient Overvoltages by using EMTP software in a 2-Phase 132KV GIS
VFTO of a 132 kV gas insulated substation have been calculation by using EMTP 2.4 version software. This paper is focused on simulation options of the transient connection GISoverhead line in simulation software. Howe...
lant Recognition through Leaf Features Mapping
There are thousands of plants around us and they are useful in many ways, but in day today life we are so busy that we can’t even recognize few important ones e.g. everyone loves mango, lemon is a well known fruits...
Gabor Filter, PCA and SVM Based Breast Tissue Analysis and Classification
Early signs of breast cancer are revealed in Mammographic images. This experiment focuses towards the identification of relevant, representative and more important, discriminate image features for analysis of medic...
Preserving Privacy Using Data Perturbation in Data Stream
Data stream can be conceived as a continuous and changing sequence of data that continuously arrive at a system to store or process. Examples of data streams include computer network traffic, phone conversations, web sea...