E-Voting System for on Duty Person Using RSA Algorithm with Kerberos Concept
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 7
Abstract
An electronic voting (e-voting) system is a voting system in which the election data is recorded, stored and processed primarily as digital information. There are many security challenges associated with the use of Internet voting solutions. Authentication of Voters, Security of voting process, Securing voted data are the main challenge of e-voting. This E-Voting system mainly for those people who are unable to come to the voting booth due to on duty leave or the people who are physically handicapped. In voting system there are many processes. This system having main four processes: firstly, application control process which involves the identification and authentication phases for the applied citizens. Secondly, the voting process which will be done by voter information. In Third section confirmation process, in this system check the image captured in application duration and match the image of voter which is online for giving vote for their identification. Finally the election server, administrator will sort out the final result by decipher the received encrypted information using private key.
Authors and Affiliations
Ms. Tanzila Afrin , Prof. K. J. Satao
Improving Memory Access time by Building an AMBA AHB compliant Memory Controller
Memory access time has been a bottleneck in many microprocessor applications which limits the system performance. Memory controller (MC) is designed and built to attacking this problem. The memory controller is the...
Improving P2P Performance by Applying Proper Replica Placement Strategies
One among the several emerging distributed computing systems is Peer-to-Peer (P2P) systems that provide a platform for large internet scale distributed applications, with no dedicated infrastructure, develops distr...
Authentication for Online Voting Using Steganography and Biometrics
In this paper an online voting authentication technique is proposed which provides biometric as well as password security to voter accounts. Voters are first identified by their facial image by using PCA. Second st...
Data Hiding in Color Images Using Modified Quantization Table
With the rapid growth of of internet and wireless networks, information security becomes significant to protect e-commerce and personal privacy. Data Hiding is an important issue for information security.There has...
An Efficient Geometric feature based License Plate Localization and Stop Line Violation Detection System
Stop line violation causes in myanmar when the back wheel of the car either passed over or reach at the stop line when the red light changes. the objective of this work is to design and implement algorithms for sto...