Biometrics using Electronic Voting System with Embedded Security
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 3
Abstract
Abstract-An electronic voting (e-voting) system is a voting system in which the election data is recorded, stored and processed primarily as digital information. There are two types of e-voting: On-Line and Offline. On-line, e.g. via Internet, and offline, by using a voting machine or an electronic polling booth. Authentication of Voters, Security of voting process, Securing voted data are the main challenge of e-voting. This is the reason why designing a secure e-voting system is very important. In many proposals, the security of the system relies mainly on the black box voting machine. But security of data, privacy of the voters and the accuracy of the vote are also main aspects that have to be taken into consideration while building secure e-voting system. In this project the authenticating voters and polling data security aspects for e-voting systems was discussed. It ensures that vote casting cannot be altered by unauthorized person. The voter authentication in online e-voting process can be done by formal registration through administrators and by entering One time password. In Offline e-voting process authentication can be done using Iris recognization, finger vein sensing which enables the electronic ballot reset for allowing voters to cast their votes. Also the voted data and voters details can be sent to the nearby Database Administration unit in a timely manner using GSM System with cryptography technique.
Authors and Affiliations
Alaguvel. R , Gnanavel. G , agadhambal. K
Mobile Cloud Computing
Despite increasing usage of mobile computing, using its full potential is difficult due to its problems such as resource scarcity, frequent disconnections, and mobility. Mobile cloud computing can address these problems...
Selective on-demand protocol for finding reliable nodes to form stable paths in ADHOC networks
A wireless adhoc network consists of a group of wireless nodes which can dynamically self-organize themselves into a temporary topology to form a network without using any existing infrastructure. Generally adhoc...
SURVEY ON DYNAMIC ANALYSIS TO DETECT VULNERABILITIES AND UNSAFE COMPONENT LOADINGS
Dynamic loading is an important mechanism for software development. It allows an application, the flexibility to dynamically link a component and use its exported functionalities. Dynamic loading is a mechanism by...
MANET PROTOCOLS ANALYSIS WITH VARYING PAUSE TIME SIMULATION TIME AND SPEED
In this paper we are doing comparison of different routing protocols in MANET and these routing protocols are AODV, DSDV, and DSR [1]. The parameters on which the comparison is to be performed are speed, no. of pac...
CLASSIFICATION OF TEXT USING FUZZY BASED INCREMENTAL FEATURE CLUSTERING ALGORITHM
The dimensionality of feature vector plays a major in text classification. We can reduce the dimensionality of feature vector by using feature clustering based on fuzzy logic. We propose a fuzzy based incremental...