SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Integrated Intelligent Research (IIR) International Journal of Web Technology
Volume: 02 Issue: 02 December 2013 Page No.32-36
ISSN: 2278-2389
32
Highly Secured Online Voting System (OVS)
Over Network
1
S.N.Mugunthan, 2
Ms. D.Parameswari
1
MCA,Jerusalem College of Engineering, Chennai, India
2
Sr. Assistant professor, Jerusalem College of Engineering, Chennai, India.
Abstract- Internet voting systems have gained popularity and
have been used for government elections and referendums in
the United Kingdom, Estonia and Switzerland as well as
municipal elections in Canada and party primary elections in
the United States. Voting system can involve transmission of
ballots and votes via private computer networks or the Internet.
Electronic voting technology can speed the counting of ballots
and can provide improved accessibility for disabled voters. The
aim of this paper is to people who have citizenship of India and
whose age is above 18 years and of any sex can give their vote
through online without going to any physical polling station.
Election Commission Officer (Election Commission Officer
who will verify whether registered user and candidates are
authentic or not) to participate in online voting. This online
voting system is highly secured, and its design is very simple,
ease of use and also reliable. The proposed software is
developed and tested to work on Ethernet and allows online
voting. It also creates and manages voting and an election
detail as all the users must login by user name and password
and click on his favorable candidates to register vote. This will
increase the voting percentage in India. By applying high
security it will reduce false votes.
Keywords- Internet voting, e-voting, Face recognition, Image
Processing, Secured network, JDBC.
I. INTRODUCTION
In every country Election is a basic ornament of democracy
that allows people to show their opinions by electing their
leaders. India is in need of such a system where people can
vote without any problem and feel secure and no one can
manipulate the results. Such environment can only be created
through some automated system which cannot be cheated by
any one. Breaking down the problems more deeply into the
security concerns we found that the present day system being
followed by the Government of India is not secure and hence
people can misuse the facilities. As there are a lot of financial
issues with the election commission and hence cannot appoint
so many security guards to make sure that the process runs
smoothly without corruption and even if they do so, it is likely
they will have a way to deceive them as well and keep on
bluffing the Government and the people [15] [16]. As soon as
computer went on e – move there was a need to figure out how
to safe guard the sensitive information of companies and
governments. Understanding the needs of time, the
governments measured how to start and where to start. Security
and trust are among the main issues in e – Government, and are
the main problems in practicing e – Government [13]. Along
with these issues one the main emergence of e – government is
e – democracy specifically eVoting. How to secure eVoting;
may it be electronics machines being used at polling stations,
or getting citizen cast their votes through specifically driven
websites for the sake of election.One basic precondition for e-
elections must be the feasibility of implementing the voting
under such conditions that the principles underpinning the
electoral system are not disregarded. Accordingly, the system
must be at least as secure as corresponding traditional voting
procedures. Another precondition is that the e-voting procedure
must be simple and function smoothly for the voters. Its overall
purpose is to enhance accessibility to voters.The present form
of voting in general elections is founded entirely on paperbased
and largely manual voting procedures. New technology with
advanced vote-client machines (computer terminals used for
voting) for eelections may entail several advantages. It may, as
mentioned above, enhance the voters’ scope for participating in
the election. It also creates scope for more rapid tallying of
votes and distribution of seats. This also enables the electoral
administration to promptly announce the election results to a
broader circle. The risk of error in vote-tallying can also be
largely eliminated. The new technology also entails
disadvantages that must be considered. One is the difficulty of
guaranteeing ballot secrecy with absolute certainty. Another is
the question of how to guarantee the reliability of the system,
i.e. that the system will in all situations function in the manner
in which it is meant to function. Another disadvantage is the
expense of development and operation. All in all, then, the
primary considerations are security and reliability.
In this proposed system, the Internet is changing citizen
expectations around the speed and convenience with which all
government services and elections should be delivered. We use
the Internet to shop, bank, maintain our social and professional
networks, and to find answers to our questions. Since 2004,
when Elections BC introduced North America’s first fully
integrated online voter registration service, British Columbians
have also been using the Internet to register to vote. It is
natural that citizens are asking when they will be able to vote
online, especially given that banking and other transactions
requiring security to protect personal information are now
routinely performed in the virtual world.Questions about
Internet voting have sparked a vibrant debate, as policy
makers, election administrators, computer experts, academics,
private technology suppliers and interested members of the
public discuss the potentially far-reaching implications of this
form of voting for the security, transparency and integrity of
voting and counting processes. Several prominent computer
security and e-law experts have expressed concerns about the
suitability of the Internet as a voting platform. Figure 1.1
shows the architecture of the voting system through online.
Integrated Intelligent Research (IIR) International Journal of Web Technology
Volume: 02 Issue: 02 December 2013 Page No.32-36
ISSN: 2278-2389
33
Figure 1.1 Architecture of online voting.
1.1 Problem Background
This discussion paper addresses the question of what Internet
voting may mean for through a review of the relevant
literature. Our intent is not to propose a particular online voting
solution, but rather to provide input to a future government
committee or task force that may be created to delve further
into the topic.The potential benefits and risks of Internet voting
are discussed in terms of seven of the core democratic
principles that shape modern electoral systems: accessibility,
equal voting power, secrecy, security, audit ability,
transparency, and simplicity.
1.2 Problem Statement
Internet voting is about making the act of voting as convenient
as possible and it holds great promise to improve accessibility,
particularly to those who are absent from the jurisdiction, live
in a remote area, or who have mobility issues. However, this
voting channel introduces risks to some of the fundamental
principles of democratic systems. As policy makers consider a
place for Internet voting, it is important that a balance is struck
between competing principles, all of which are critical to
electoral integrity, so that public confidence in election
outcomes is maintained.
1.3 Research Objective
The main objective of this work is to develop an interactive
voting system application with which users can participate
using their information stored prior in database while creating
the voter ID and the information need to be updated at an
period of less than six months for perfect user verification by
the Independent Electoral Commission of India (IECI). In this
system people who have citizenship of India and whose age is
above 18 years and of any sex can give their vote through
online without going to any physical polling station. After
registration each voter/user is assigned with the particular ID
generated by the Electoral Commission of India along with the
online registration ID i.e. user name. With every time logging
in to the system the user is validated with both of the ID.
Through these development we can obtain a secured website
comprises of all the voting methodologies in a single website.
1.4 Scope of Study
The scope of the work is that it will use the ID and password
created by user to register him/her in the voting site, through
this all the details of voter are saved in database. And it will act
as the main security to the votes system.
Advanced technology: It is an advanced technology used now
a day. It increases the internet knowledge of the users which is
very necessary for current generation.
Internet: It is an online facility and hence very useful for the
users. Voters can vote from anywhere at any time in India.
E-Mails: Election Commission can send the error report to a
particular user if he/she entered false information.
Image: Image is being captured through online and that image
is being validated with the image on the database.
II. LITERATURE STUDY
2.1 Background
Traditionally in a manual, paper based election system, voters
have to reach at polling stations to cast their votes by standing
in a long queue, therefore it is very much difficult for voters to
vote their votes in this way there is a low rate of vote
casting[1]. In 2004, Chaum [Ch04] and, independently, Neff
[Ne04] proposed 316 cryptographically secure voting systems
in which the voter has access to no computational device at the
time of voting. Since then, most research has focused on such
bare-handed, end-to-end verifiable voting systems [2].In 2004,
the Department of Defense cancelled the Internet-based voting
system SERVE that was developed by Accenture on a $22
million contract [4] because of justified security concerns
raised by the academic community [5]. At the same time, the
source code of currently used electronic voting systems was
put under scrutiny and a multitude of flaws was unearthed
[6].In 2010, Washington, D.C. developed an Internet voting
pilot project that was intended to allow overseas absentee
voters to cast their ballots using a website. Prior to deploying
the system in the general election, the District held a unique
public trial: a mock election during which anyone was invited
to test the system or attempt to compromise its security [9].
There are some drawbacks with this system are, there can be
software failure issue, insecure access of internet and also voter
should be familiar with internet [7].In our proposed system we
proposed new Blind signature which is a special form of digital
signature, which was introduced by David Chaum in 1982
[13], in which the content of a message is blinded before
signature. In blind signature scheme, signer signs on the blind
message using his/her private key and anyone can verify the
legitimacy of the signature using signer’s public key [14]. This
software is being developed for use of e-voting. Here each user
is registered with the application. After registration each
voter/user is assigned with the particular ID generated by the
Electoral Commission of India along with the online
registration ID i.e. user name. With every time logging in to
the system the user is validated with both of the ID. Through
these development we can obtain a secured website comprises
of all the voting methodologies in a single website.Internet
voting presents a challenge to policy makers. On the positive
side, Internet voting fits with the B.C. government policy
direction to provide citizens with access to a greater variety of
high quality online services. Internet voting offers voters a
convenient alternative to in-person voting. This may be
particularly important to voters who have difficulty attending
in-person voting opportunities. And finally, concerns about the
digital divide are diminishing as the proportion of British
Columbians who use the Internet continues to grow. Policy
makers need to weigh these positive considerations with
compromises that Internet voting would entail for several
Integrated Intelligent Research (IIR) International Journal of Web Technology
Volume: 02 Issue: 02 December 2013 Page No.32-36
ISSN: 2278-2389
34
foundational principles of elections. With the current state of
technology, Internet voting is considered to be less effective
than traditional, in-person and postal voting methods at
protecting ballots against larges cale fraud, ensuring the
secrecy of the vote, and providing a fully transparent and
observable process that can be effectively audited. Because
specialized computer skills are required to observe an Internet
voting process, voters would have to delegate their trust to
“experts” to confirm that the election is conducted
properly.Through these methodologies an objective of this
research is to capture the image through camera at the time of
logging on to the page and it validates the image along with the
password generated. Then the particular login is authenticated.
2.2 Design and Implementation
Electronic voting technology can include punched cards,
optical scan voting systems and specialized voting kiosks
(including self-contained direct-recording electronic voting
systems, or DRE). To increase the security of this e-voting
system to another level which is quiet concern at different
origins we have implemented an online image verification
system.The aim of this design is to develop an interactive
voting system with which users can participate using their
images stored prior in database while creating the voter ID and
the image need to be updated at an period of less than six
months for perfect user verification. The project will involve
three phases: the development of a graphical front-end to the
voting system; the development of a method of interaction with
web cams, and the development of a web-based administration
tool. The new user must produce their photo while registering
in the e-voting system.This should not be surprising. Almost
weekly we learn of one system or another that is penetrated by
outsiders, including teens and overseas criminals.
Organizations that have been unable to protect networks and
applications include banks, government agencies, the
Department of Defense and ironically, Internet security firms.
To the public, like some legislators, it seems intuitive to accept
that "We use ATMs and bank online with no problems, why
not vote that way?" This argument fails theoretically and
practically. The anonymous ballot does not provide the
verification and proof of banking receipts or double entry
bookkeeping which help detect fraud. ATMs are bank-owned
computers with special network security, much safer than
general purpose computers. Even so, banks lose billions each
year to fraud with ATMs and online banking. The system is
highly insecure and prone to election malpractice. Due to the
fact that any student can come and fill out a ballot sheet
without prior authentication to determine who he/she says they
are, is a major concern.
2.3. Algorithm
Recent work on face identification using continuous density
Hidden Markov Models (HMMs) has shown that stochastic
modelling can be used successfully to encode feature
information. When frontal images of faces are sampled using
top-bottom scanning, there is a natural order in which the
features appear and this can be conveniently be modelled using
a top-bottom HMM. However, a top-bottom HMM is
characterised by different parameters, the choice of which has
so far been based on subjective intuition. This paper presents a
set of experimental results in which various HMM
parameterisations are analysed. Matlab is used to implement
the Eigenfaces, Fisherfaces, and SIFT matching algorithms.
The following algorithm states the work of Principal
Component Analysis (PCA):
Principal Component Analysis:
a random vector
do c times:
(a vector of length m)
for each row
return
2.4 Methodology
Every voter should have a personal identification number. This
number will be automatically checked along with the ID stored
on the database. Let us use 256*256 pixels bitmap cover image
which should be clear so that it will be very easy for
comparison. This image will be chosen from among a set of
images in the system which matches the cover image. Cover
image is a simple image for personal identification over the
base image. So, the cover image for each voter is different
which will reduce the chances of predicting the image by an
attacker during transmission.
2.5 Workflow
The Figure 2.5.1 shows the workflow where the user identity
and a perfect image is being compared and validated.
2.6 Experimental result
Voting System needs the verification of the user through the
username and password and the figure 2.6.1 shows the home
page along with the login panel.
From the above page while login the image stored on the
database is compared with the image taken while
authentication is done through Figure 2.6.2.
Integrated Intelligent Research (IIR) International Journal of Web Technology
Volume: 02 Issue: 02 December 2013 Page No.32-36
ISSN: 2278-2389
35
Figure 2.5.1 WorkFlow
Figure 2.6.1 Home Page
Figure 2.6.2 Image Recognition
After perfect authentication is made then the user can vote up
for the desired candidate as the figure 2.6.3.
Figure 2.6.3 Voting Page
III. CONCLUSION
In this paper we have enforced a method for integrating
Cryptography over network to present a highly secure Online
Voting System. The security level of our system is greatly
improved by the new idea of random cover image generation
for each voter. The user authentication process of the system is
improved by adding both face recognition and password
security. The recognition portion of the system is secured by
the cover image. This system will preclude the illegal practices
like rigging. Thus, the citizens can be sure that they alone can
choose their leaders, thus exercising their right in the
democracy. The usage of online voting has the capability to
reduce or remove unwanted human errors. In addition to its
reliability, online voting can handle multiple modalities, and
provide better scalability for large elections. Online voting is
also an excellent mechanism that does not require geographical
proximity of the voters. For example, soldiers abroad can
participate in elections by voting online. Hence, by this voting
percentage will increase drastically.
REFERENCES
[1] R. Mercuri, “Electronic Vote Tabulation Checks and Balances”, PhD
thesis, University of Pennsylvania, Philadelphia, PA, October 2000
[2] A New Implementation of a Dual (Paper and Cryptographic) Voting
System Jonathan Ben-Nun, Niko Farhi, Morgan Llewellyn, Ben Riva1,
Alon Rosen, Amnon Ta-Shma, Douglas Wikström
[3] Highly Secure Online Voting System with Multi Security using
Biometric and Steganography - B. Swaminathan, J. Cross Datson
Dinesh
[4] J. Schwartz. Online Voting Canceled for Americans Overseas . The
New York Times, February, 6 2004.
[5] D. Jefferson, A. Rubin, B. Simmons, and D. Wagner. A Security
Analysis of the Secure Electronic Registration and Voting Experiment
(SERVE). Technical report, 2004. http://servesecurityreport.org/.
[6] T. Kohno, A. Stubblefield, A. Rubin, and D. Wallach. Analysis of an
Electronic Voting System. In IEEE Symposium on Security and
Privacy, May 2004.
[7] An Efficient Online Voting System - Ankit Anand, Pallavi Divya
[8] Internetvoting.VerifiedVoting.http://www.verifiedvoting.org/article.php
?list= type&type=27, May 2011.
[9] Attacking the Washington, D.C. Internet Voting System Scott Wolchok,
Eric Wustrow, Dawn Isabel, and J. Alex Halderman.
[10] http://www.cl.cam.ac.uk/research/dtg/attarchive/facedatabase.html
[11] Adida, B. Helios: Web-based open-audit voting. In Proc. 17th USENIX
Security Symposium (July 2008).
Integrated Intelligent Research (IIR) International Journal of Web Technology
Volume: 02 Issue: 02 December 2013 Page No.32-36
ISSN: 2278-2389
36
[12] Rubin, A. Security considerations for remote electronic voting over the
Internet. http://avirubin.com/e-voting.security.html
[13] D. Chaum, "Blind Signature Systems", U.S. Patent 4,759,063, 19 Jul
1988.
[14] Zuowen Tan, Zhuojun Liu, Chunming Tang, "Digital Proxy Blind
Signature Schemes Based on DLP and ECDLP", MM Research
Preprints, 212–217, 21, December 2002.
[15] ECDLP", MM Research Preprints, 212–217, 21, December 2002.
[16] Daily Times, PPP wants fresh election in Bannu
http://www.dailytimes.com.pk/default.asp?page=200
7%5C04%5C03%5Cstory_3-4-2007_pg11_2
[17] 2002,MonitoryReport
http://action.web.ca/home/sap/attach/pk%20election
%20monitor%202002.rtf
[18] J. Gilberg. E-VOTE: An Internet-based Electronic Voting System:
Consolidated Prototype 2 Documentation. Technical Report e-
VOTE/WP-7/D7.4/3.0/29-05-2003, May 2003.
http://www.instore.gr/evote/evote end/htm/3public/doc3/public/public
deliverables/d7 4/Consolidated Docu final.zip.
[19] I. Damgård, J. Groth, and G. Salomonsen. Secure Electronic Voting,
chapter 6, pages 77–99. Kluwer Academic Publishers, 2003.
[20] A. Riera and P. Brown. Bringing Confidence to Electronic Voting.
EJEG, 2(1), July 2004.
[21] Lin, Y. and Chlamtac, I. (2000) Wireless and Mobile Network
Architectures. Wiley Publications.
[22] R.J. Baron, ªMechanisms of Human Facial Recognition,º Int'l J. Man
Machine Studies, vol. 15, pp. 137-178, 1981.
[23] Cardinaux, F., Sanderson, C., and Bengio, S. User authentication via
adapted statistical models of face images. IEEE Transactions on Signal
Processing 54 (January 2006), 361-373.
[24] Lee, K.-C., Ho, J., and Kriegman, D. Acquiring linear subspaces for
face recognition under variable lighting. IEEE Transactions on Pattern
Analysis and Machine Intelligence (PAMI) 27, 5 (2005).
[25] Maturana, D., Mery, D., and Soto, A. Face recognition with local binary
patterns, spatial pyramid histograms and naive bayes nearest neighbor
classification. 2009 International Conference of the Chilean Computer
Science Society (SCCC) (2009), 125-132.
[26] Rowley, H., Baluja, S., & Kanade, T. (1998). Neural network-based
face detection. IEEE Trans. on Pattern Analysis and Machine
Intelligence, 1 (20), 23–28.

Weitere ähnliche Inhalte

Ähnlich wie Highly Secured Online Voting System (OVS) Over Network

kgec-projectnew-150802134711-lva1-app6892.pdf
kgec-projectnew-150802134711-lva1-app6892.pdfkgec-projectnew-150802134711-lva1-app6892.pdf
kgec-projectnew-150802134711-lva1-app6892.pdf
ShubhamGour29
 
Online voting system
Online voting systemOnline voting system
Online voting system
Arti Gupta
 

Ähnlich wie Highly Secured Online Voting System (OVS) Over Network (20)

ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
 
Online Voting System project proposal report.doc
Online Voting System project proposal report.docOnline Voting System project proposal report.doc
Online Voting System project proposal report.doc
 
IRJET - Precaution of Trolling Intrusions in Online Ballot System using Optic...
IRJET - Precaution of Trolling Intrusions in Online Ballot System using Optic...IRJET - Precaution of Trolling Intrusions in Online Ballot System using Optic...
IRJET - Precaution of Trolling Intrusions in Online Ballot System using Optic...
 
Electronic Voting: Challenges and Prospects in Nigeria’s Democracy
Electronic Voting: Challenges and Prospects in Nigeria’s DemocracyElectronic Voting: Challenges and Prospects in Nigeria’s Democracy
Electronic Voting: Challenges and Prospects in Nigeria’s Democracy
 
Mobile, Secure E - Voting Architecture for the Nigerian Electoral System
Mobile, Secure E - Voting Architecture for the Nigerian Electoral SystemMobile, Secure E - Voting Architecture for the Nigerian Electoral System
Mobile, Secure E - Voting Architecture for the Nigerian Electoral System
 
E017222736
E017222736E017222736
E017222736
 
kgec-projectnew-150802134711-lva1-app6892.pdf
kgec-projectnew-150802134711-lva1-app6892.pdfkgec-projectnew-150802134711-lva1-app6892.pdf
kgec-projectnew-150802134711-lva1-app6892.pdf
 
SECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoT
SECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoTSECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoT
SECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoT
 
Online Voting System - Project
Online Voting System - ProjectOnline Voting System - Project
Online Voting System - Project
 
Online voting system project by bipin bhardwaj
Online voting system project by bipin bhardwajOnline voting system project by bipin bhardwaj
Online voting system project by bipin bhardwaj
 
Online voting system full thesis project by jahir
Online voting system full thesis project by jahirOnline voting system full thesis project by jahir
Online voting system full thesis project by jahir
 
IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...
IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...
IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...
 
Report on online voting system
Report on online voting systemReport on online voting system
Report on online voting system
 
Online Voting System Project File
Online Voting System Project FileOnline Voting System Project File
Online Voting System Project File
 
PREVENTION OF VOTER FRAUD USING BLOCKCHAIN TECHNOLOGY
PREVENTION OF VOTER FRAUD USING BLOCKCHAIN TECHNOLOGYPREVENTION OF VOTER FRAUD USING BLOCKCHAIN TECHNOLOGY
PREVENTION OF VOTER FRAUD USING BLOCKCHAIN TECHNOLOGY
 
A SECURITY BASED VOTING SYSTEMUSING BIOMETRIC
A SECURITY BASED VOTING SYSTEMUSING BIOMETRICA SECURITY BASED VOTING SYSTEMUSING BIOMETRIC
A SECURITY BASED VOTING SYSTEMUSING BIOMETRIC
 
IRJET- Digital Voting System
IRJET-  	  Digital Voting SystemIRJET-  	  Digital Voting System
IRJET- Digital Voting System
 
Online voting system
Online voting systemOnline voting system
Online voting system
 

Mehr von ijbuiiir1

Vehicle to Vehicle Communication of Content Downloader in Mobile
Vehicle to Vehicle Communication of Content Downloader in MobileVehicle to Vehicle Communication of Content Downloader in Mobile
Vehicle to Vehicle Communication of Content Downloader in Mobile
ijbuiiir1
 
SPOC: A Secure and Private-pressuring Opportunity Computing Framework for Mob...
SPOC: A Secure and Private-pressuring Opportunity Computing Framework for Mob...SPOC: A Secure and Private-pressuring Opportunity Computing Framework for Mob...
SPOC: A Secure and Private-pressuring Opportunity Computing Framework for Mob...
ijbuiiir1
 
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
ijbuiiir1
 
Stock Prediction Using Artificial Neural Networks
Stock Prediction Using Artificial Neural NetworksStock Prediction Using Artificial Neural Networks
Stock Prediction Using Artificial Neural Networks
ijbuiiir1
 
Indian Language Text Representation and Categorization Using Supervised Learn...
Indian Language Text Representation and Categorization Using Supervised Learn...Indian Language Text Representation and Categorization Using Supervised Learn...
Indian Language Text Representation and Categorization Using Supervised Learn...
ijbuiiir1
 

Mehr von ijbuiiir1 (20)

Facial Feature Recognition Using Biometrics
Facial Feature Recognition Using BiometricsFacial Feature Recognition Using Biometrics
Facial Feature Recognition Using Biometrics
 
Partial Image Retrieval Systems in Luminance and Color Invariants : An Empiri...
Partial Image Retrieval Systems in Luminance and Color Invariants : An Empiri...Partial Image Retrieval Systems in Luminance and Color Invariants : An Empiri...
Partial Image Retrieval Systems in Luminance and Color Invariants : An Empiri...
 
Applying Clustering Techniques for Efficient Text Mining in Twitter Data
Applying Clustering Techniques for Efficient Text Mining in Twitter DataApplying Clustering Techniques for Efficient Text Mining in Twitter Data
Applying Clustering Techniques for Efficient Text Mining in Twitter Data
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
 
Vehicle to Vehicle Communication of Content Downloader in Mobile
Vehicle to Vehicle Communication of Content Downloader in MobileVehicle to Vehicle Communication of Content Downloader in Mobile
Vehicle to Vehicle Communication of Content Downloader in Mobile
 
SPOC: A Secure and Private-pressuring Opportunity Computing Framework for Mob...
SPOC: A Secure and Private-pressuring Opportunity Computing Framework for Mob...SPOC: A Secure and Private-pressuring Opportunity Computing Framework for Mob...
SPOC: A Secure and Private-pressuring Opportunity Computing Framework for Mob...
 
A Survey on Implementation of Discrete Wavelet Transform for Image Denoising
A Survey on Implementation of Discrete Wavelet Transform for Image DenoisingA Survey on Implementation of Discrete Wavelet Transform for Image Denoising
A Survey on Implementation of Discrete Wavelet Transform for Image Denoising
 
A Study on migrated Students and their Well - being using Amartya Sens Functi...
A Study on migrated Students and their Well - being using Amartya Sens Functi...A Study on migrated Students and their Well - being using Amartya Sens Functi...
A Study on migrated Students and their Well - being using Amartya Sens Functi...
 
Methodologies on user Behavior Analysis and Future Request Prediction in Web ...
Methodologies on user Behavior Analysis and Future Request Prediction in Web ...Methodologies on user Behavior Analysis and Future Request Prediction in Web ...
Methodologies on user Behavior Analysis and Future Request Prediction in Web ...
 
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
 
Enhancing Effective Interoperability Between Mobile Apps Using LCIM Model
Enhancing Effective Interoperability Between Mobile Apps Using LCIM ModelEnhancing Effective Interoperability Between Mobile Apps Using LCIM Model
Enhancing Effective Interoperability Between Mobile Apps Using LCIM Model
 
Deployment of Intelligent Transport Systems Based on User Mobility to be Endo...
Deployment of Intelligent Transport Systems Based on User Mobility to be Endo...Deployment of Intelligent Transport Systems Based on User Mobility to be Endo...
Deployment of Intelligent Transport Systems Based on User Mobility to be Endo...
 
Stock Prediction Using Artificial Neural Networks
Stock Prediction Using Artificial Neural NetworksStock Prediction Using Artificial Neural Networks
Stock Prediction Using Artificial Neural Networks
 
Indian Language Text Representation and Categorization Using Supervised Learn...
Indian Language Text Representation and Categorization Using Supervised Learn...Indian Language Text Representation and Categorization Using Supervised Learn...
Indian Language Text Representation and Categorization Using Supervised Learn...
 
Software Developers Performance relationship with Cognitive Load Using Statis...
Software Developers Performance relationship with Cognitive Load Using Statis...Software Developers Performance relationship with Cognitive Load Using Statis...
Software Developers Performance relationship with Cognitive Load Using Statis...
 
Wireless Health Monitoring System Using ZigBee
Wireless Health Monitoring System Using ZigBeeWireless Health Monitoring System Using ZigBee
Wireless Health Monitoring System Using ZigBee
 
Image Compression Using Discrete Cosine Transform & Discrete Wavelet Transform
Image Compression Using Discrete Cosine Transform & Discrete Wavelet TransformImage Compression Using Discrete Cosine Transform & Discrete Wavelet Transform
Image Compression Using Discrete Cosine Transform & Discrete Wavelet Transform
 
Secured Cloud ERP
Secured Cloud ERPSecured Cloud ERP
Secured Cloud ERP
 
Web Based Secure Soa
Web Based Secure SoaWeb Based Secure Soa
Web Based Secure Soa
 
Internet Scheduling of Bluetooth Scatter Nets By Inter Piconet Scheduling
Internet Scheduling of Bluetooth Scatter Nets By Inter Piconet SchedulingInternet Scheduling of Bluetooth Scatter Nets By Inter Piconet Scheduling
Internet Scheduling of Bluetooth Scatter Nets By Inter Piconet Scheduling
 

Kürzlich hochgeladen

Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 

Kürzlich hochgeladen (20)

PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 

Highly Secured Online Voting System (OVS) Over Network

  • 1. Integrated Intelligent Research (IIR) International Journal of Web Technology Volume: 02 Issue: 02 December 2013 Page No.32-36 ISSN: 2278-2389 32 Highly Secured Online Voting System (OVS) Over Network 1 S.N.Mugunthan, 2 Ms. D.Parameswari 1 MCA,Jerusalem College of Engineering, Chennai, India 2 Sr. Assistant professor, Jerusalem College of Engineering, Chennai, India. Abstract- Internet voting systems have gained popularity and have been used for government elections and referendums in the United Kingdom, Estonia and Switzerland as well as municipal elections in Canada and party primary elections in the United States. Voting system can involve transmission of ballots and votes via private computer networks or the Internet. Electronic voting technology can speed the counting of ballots and can provide improved accessibility for disabled voters. The aim of this paper is to people who have citizenship of India and whose age is above 18 years and of any sex can give their vote through online without going to any physical polling station. Election Commission Officer (Election Commission Officer who will verify whether registered user and candidates are authentic or not) to participate in online voting. This online voting system is highly secured, and its design is very simple, ease of use and also reliable. The proposed software is developed and tested to work on Ethernet and allows online voting. It also creates and manages voting and an election detail as all the users must login by user name and password and click on his favorable candidates to register vote. This will increase the voting percentage in India. By applying high security it will reduce false votes. Keywords- Internet voting, e-voting, Face recognition, Image Processing, Secured network, JDBC. I. INTRODUCTION In every country Election is a basic ornament of democracy that allows people to show their opinions by electing their leaders. India is in need of such a system where people can vote without any problem and feel secure and no one can manipulate the results. Such environment can only be created through some automated system which cannot be cheated by any one. Breaking down the problems more deeply into the security concerns we found that the present day system being followed by the Government of India is not secure and hence people can misuse the facilities. As there are a lot of financial issues with the election commission and hence cannot appoint so many security guards to make sure that the process runs smoothly without corruption and even if they do so, it is likely they will have a way to deceive them as well and keep on bluffing the Government and the people [15] [16]. As soon as computer went on e – move there was a need to figure out how to safe guard the sensitive information of companies and governments. Understanding the needs of time, the governments measured how to start and where to start. Security and trust are among the main issues in e – Government, and are the main problems in practicing e – Government [13]. Along with these issues one the main emergence of e – government is e – democracy specifically eVoting. How to secure eVoting; may it be electronics machines being used at polling stations, or getting citizen cast their votes through specifically driven websites for the sake of election.One basic precondition for e- elections must be the feasibility of implementing the voting under such conditions that the principles underpinning the electoral system are not disregarded. Accordingly, the system must be at least as secure as corresponding traditional voting procedures. Another precondition is that the e-voting procedure must be simple and function smoothly for the voters. Its overall purpose is to enhance accessibility to voters.The present form of voting in general elections is founded entirely on paperbased and largely manual voting procedures. New technology with advanced vote-client machines (computer terminals used for voting) for eelections may entail several advantages. It may, as mentioned above, enhance the voters’ scope for participating in the election. It also creates scope for more rapid tallying of votes and distribution of seats. This also enables the electoral administration to promptly announce the election results to a broader circle. The risk of error in vote-tallying can also be largely eliminated. The new technology also entails disadvantages that must be considered. One is the difficulty of guaranteeing ballot secrecy with absolute certainty. Another is the question of how to guarantee the reliability of the system, i.e. that the system will in all situations function in the manner in which it is meant to function. Another disadvantage is the expense of development and operation. All in all, then, the primary considerations are security and reliability. In this proposed system, the Internet is changing citizen expectations around the speed and convenience with which all government services and elections should be delivered. We use the Internet to shop, bank, maintain our social and professional networks, and to find answers to our questions. Since 2004, when Elections BC introduced North America’s first fully integrated online voter registration service, British Columbians have also been using the Internet to register to vote. It is natural that citizens are asking when they will be able to vote online, especially given that banking and other transactions requiring security to protect personal information are now routinely performed in the virtual world.Questions about Internet voting have sparked a vibrant debate, as policy makers, election administrators, computer experts, academics, private technology suppliers and interested members of the public discuss the potentially far-reaching implications of this form of voting for the security, transparency and integrity of voting and counting processes. Several prominent computer security and e-law experts have expressed concerns about the suitability of the Internet as a voting platform. Figure 1.1 shows the architecture of the voting system through online.
  • 2. Integrated Intelligent Research (IIR) International Journal of Web Technology Volume: 02 Issue: 02 December 2013 Page No.32-36 ISSN: 2278-2389 33 Figure 1.1 Architecture of online voting. 1.1 Problem Background This discussion paper addresses the question of what Internet voting may mean for through a review of the relevant literature. Our intent is not to propose a particular online voting solution, but rather to provide input to a future government committee or task force that may be created to delve further into the topic.The potential benefits and risks of Internet voting are discussed in terms of seven of the core democratic principles that shape modern electoral systems: accessibility, equal voting power, secrecy, security, audit ability, transparency, and simplicity. 1.2 Problem Statement Internet voting is about making the act of voting as convenient as possible and it holds great promise to improve accessibility, particularly to those who are absent from the jurisdiction, live in a remote area, or who have mobility issues. However, this voting channel introduces risks to some of the fundamental principles of democratic systems. As policy makers consider a place for Internet voting, it is important that a balance is struck between competing principles, all of which are critical to electoral integrity, so that public confidence in election outcomes is maintained. 1.3 Research Objective The main objective of this work is to develop an interactive voting system application with which users can participate using their information stored prior in database while creating the voter ID and the information need to be updated at an period of less than six months for perfect user verification by the Independent Electoral Commission of India (IECI). In this system people who have citizenship of India and whose age is above 18 years and of any sex can give their vote through online without going to any physical polling station. After registration each voter/user is assigned with the particular ID generated by the Electoral Commission of India along with the online registration ID i.e. user name. With every time logging in to the system the user is validated with both of the ID. Through these development we can obtain a secured website comprises of all the voting methodologies in a single website. 1.4 Scope of Study The scope of the work is that it will use the ID and password created by user to register him/her in the voting site, through this all the details of voter are saved in database. And it will act as the main security to the votes system. Advanced technology: It is an advanced technology used now a day. It increases the internet knowledge of the users which is very necessary for current generation. Internet: It is an online facility and hence very useful for the users. Voters can vote from anywhere at any time in India. E-Mails: Election Commission can send the error report to a particular user if he/she entered false information. Image: Image is being captured through online and that image is being validated with the image on the database. II. LITERATURE STUDY 2.1 Background Traditionally in a manual, paper based election system, voters have to reach at polling stations to cast their votes by standing in a long queue, therefore it is very much difficult for voters to vote their votes in this way there is a low rate of vote casting[1]. In 2004, Chaum [Ch04] and, independently, Neff [Ne04] proposed 316 cryptographically secure voting systems in which the voter has access to no computational device at the time of voting. Since then, most research has focused on such bare-handed, end-to-end verifiable voting systems [2].In 2004, the Department of Defense cancelled the Internet-based voting system SERVE that was developed by Accenture on a $22 million contract [4] because of justified security concerns raised by the academic community [5]. At the same time, the source code of currently used electronic voting systems was put under scrutiny and a multitude of flaws was unearthed [6].In 2010, Washington, D.C. developed an Internet voting pilot project that was intended to allow overseas absentee voters to cast their ballots using a website. Prior to deploying the system in the general election, the District held a unique public trial: a mock election during which anyone was invited to test the system or attempt to compromise its security [9]. There are some drawbacks with this system are, there can be software failure issue, insecure access of internet and also voter should be familiar with internet [7].In our proposed system we proposed new Blind signature which is a special form of digital signature, which was introduced by David Chaum in 1982 [13], in which the content of a message is blinded before signature. In blind signature scheme, signer signs on the blind message using his/her private key and anyone can verify the legitimacy of the signature using signer’s public key [14]. This software is being developed for use of e-voting. Here each user is registered with the application. After registration each voter/user is assigned with the particular ID generated by the Electoral Commission of India along with the online registration ID i.e. user name. With every time logging in to the system the user is validated with both of the ID. Through these development we can obtain a secured website comprises of all the voting methodologies in a single website.Internet voting presents a challenge to policy makers. On the positive side, Internet voting fits with the B.C. government policy direction to provide citizens with access to a greater variety of high quality online services. Internet voting offers voters a convenient alternative to in-person voting. This may be particularly important to voters who have difficulty attending in-person voting opportunities. And finally, concerns about the digital divide are diminishing as the proportion of British Columbians who use the Internet continues to grow. Policy makers need to weigh these positive considerations with compromises that Internet voting would entail for several
  • 3. Integrated Intelligent Research (IIR) International Journal of Web Technology Volume: 02 Issue: 02 December 2013 Page No.32-36 ISSN: 2278-2389 34 foundational principles of elections. With the current state of technology, Internet voting is considered to be less effective than traditional, in-person and postal voting methods at protecting ballots against larges cale fraud, ensuring the secrecy of the vote, and providing a fully transparent and observable process that can be effectively audited. Because specialized computer skills are required to observe an Internet voting process, voters would have to delegate their trust to “experts” to confirm that the election is conducted properly.Through these methodologies an objective of this research is to capture the image through camera at the time of logging on to the page and it validates the image along with the password generated. Then the particular login is authenticated. 2.2 Design and Implementation Electronic voting technology can include punched cards, optical scan voting systems and specialized voting kiosks (including self-contained direct-recording electronic voting systems, or DRE). To increase the security of this e-voting system to another level which is quiet concern at different origins we have implemented an online image verification system.The aim of this design is to develop an interactive voting system with which users can participate using their images stored prior in database while creating the voter ID and the image need to be updated at an period of less than six months for perfect user verification. The project will involve three phases: the development of a graphical front-end to the voting system; the development of a method of interaction with web cams, and the development of a web-based administration tool. The new user must produce their photo while registering in the e-voting system.This should not be surprising. Almost weekly we learn of one system or another that is penetrated by outsiders, including teens and overseas criminals. Organizations that have been unable to protect networks and applications include banks, government agencies, the Department of Defense and ironically, Internet security firms. To the public, like some legislators, it seems intuitive to accept that "We use ATMs and bank online with no problems, why not vote that way?" This argument fails theoretically and practically. The anonymous ballot does not provide the verification and proof of banking receipts or double entry bookkeeping which help detect fraud. ATMs are bank-owned computers with special network security, much safer than general purpose computers. Even so, banks lose billions each year to fraud with ATMs and online banking. The system is highly insecure and prone to election malpractice. Due to the fact that any student can come and fill out a ballot sheet without prior authentication to determine who he/she says they are, is a major concern. 2.3. Algorithm Recent work on face identification using continuous density Hidden Markov Models (HMMs) has shown that stochastic modelling can be used successfully to encode feature information. When frontal images of faces are sampled using top-bottom scanning, there is a natural order in which the features appear and this can be conveniently be modelled using a top-bottom HMM. However, a top-bottom HMM is characterised by different parameters, the choice of which has so far been based on subjective intuition. This paper presents a set of experimental results in which various HMM parameterisations are analysed. Matlab is used to implement the Eigenfaces, Fisherfaces, and SIFT matching algorithms. The following algorithm states the work of Principal Component Analysis (PCA): Principal Component Analysis: a random vector do c times: (a vector of length m) for each row return 2.4 Methodology Every voter should have a personal identification number. This number will be automatically checked along with the ID stored on the database. Let us use 256*256 pixels bitmap cover image which should be clear so that it will be very easy for comparison. This image will be chosen from among a set of images in the system which matches the cover image. Cover image is a simple image for personal identification over the base image. So, the cover image for each voter is different which will reduce the chances of predicting the image by an attacker during transmission. 2.5 Workflow The Figure 2.5.1 shows the workflow where the user identity and a perfect image is being compared and validated. 2.6 Experimental result Voting System needs the verification of the user through the username and password and the figure 2.6.1 shows the home page along with the login panel. From the above page while login the image stored on the database is compared with the image taken while authentication is done through Figure 2.6.2.
  • 4. Integrated Intelligent Research (IIR) International Journal of Web Technology Volume: 02 Issue: 02 December 2013 Page No.32-36 ISSN: 2278-2389 35 Figure 2.5.1 WorkFlow Figure 2.6.1 Home Page Figure 2.6.2 Image Recognition After perfect authentication is made then the user can vote up for the desired candidate as the figure 2.6.3. Figure 2.6.3 Voting Page III. CONCLUSION In this paper we have enforced a method for integrating Cryptography over network to present a highly secure Online Voting System. The security level of our system is greatly improved by the new idea of random cover image generation for each voter. The user authentication process of the system is improved by adding both face recognition and password security. The recognition portion of the system is secured by the cover image. This system will preclude the illegal practices like rigging. Thus, the citizens can be sure that they alone can choose their leaders, thus exercising their right in the democracy. The usage of online voting has the capability to reduce or remove unwanted human errors. In addition to its reliability, online voting can handle multiple modalities, and provide better scalability for large elections. Online voting is also an excellent mechanism that does not require geographical proximity of the voters. For example, soldiers abroad can participate in elections by voting online. Hence, by this voting percentage will increase drastically. REFERENCES [1] R. Mercuri, “Electronic Vote Tabulation Checks and Balances”, PhD thesis, University of Pennsylvania, Philadelphia, PA, October 2000 [2] A New Implementation of a Dual (Paper and Cryptographic) Voting System Jonathan Ben-Nun, Niko Farhi, Morgan Llewellyn, Ben Riva1, Alon Rosen, Amnon Ta-Shma, Douglas Wikström [3] Highly Secure Online Voting System with Multi Security using Biometric and Steganography - B. Swaminathan, J. Cross Datson Dinesh [4] J. Schwartz. Online Voting Canceled for Americans Overseas . The New York Times, February, 6 2004. [5] D. Jefferson, A. Rubin, B. Simmons, and D. Wagner. A Security Analysis of the Secure Electronic Registration and Voting Experiment (SERVE). Technical report, 2004. http://servesecurityreport.org/. [6] T. Kohno, A. Stubblefield, A. Rubin, and D. Wallach. Analysis of an Electronic Voting System. In IEEE Symposium on Security and Privacy, May 2004. [7] An Efficient Online Voting System - Ankit Anand, Pallavi Divya [8] Internetvoting.VerifiedVoting.http://www.verifiedvoting.org/article.php ?list= type&type=27, May 2011. [9] Attacking the Washington, D.C. Internet Voting System Scott Wolchok, Eric Wustrow, Dawn Isabel, and J. Alex Halderman. [10] http://www.cl.cam.ac.uk/research/dtg/attarchive/facedatabase.html [11] Adida, B. Helios: Web-based open-audit voting. In Proc. 17th USENIX Security Symposium (July 2008).
  • 5. Integrated Intelligent Research (IIR) International Journal of Web Technology Volume: 02 Issue: 02 December 2013 Page No.32-36 ISSN: 2278-2389 36 [12] Rubin, A. Security considerations for remote electronic voting over the Internet. http://avirubin.com/e-voting.security.html [13] D. Chaum, "Blind Signature Systems", U.S. Patent 4,759,063, 19 Jul 1988. [14] Zuowen Tan, Zhuojun Liu, Chunming Tang, "Digital Proxy Blind Signature Schemes Based on DLP and ECDLP", MM Research Preprints, 212–217, 21, December 2002. [15] ECDLP", MM Research Preprints, 212–217, 21, December 2002. [16] Daily Times, PPP wants fresh election in Bannu http://www.dailytimes.com.pk/default.asp?page=200 7%5C04%5C03%5Cstory_3-4-2007_pg11_2 [17] 2002,MonitoryReport http://action.web.ca/home/sap/attach/pk%20election %20monitor%202002.rtf [18] J. Gilberg. E-VOTE: An Internet-based Electronic Voting System: Consolidated Prototype 2 Documentation. Technical Report e- VOTE/WP-7/D7.4/3.0/29-05-2003, May 2003. http://www.instore.gr/evote/evote end/htm/3public/doc3/public/public deliverables/d7 4/Consolidated Docu final.zip. [19] I. Damgård, J. Groth, and G. Salomonsen. Secure Electronic Voting, chapter 6, pages 77–99. Kluwer Academic Publishers, 2003. [20] A. Riera and P. Brown. Bringing Confidence to Electronic Voting. EJEG, 2(1), July 2004. [21] Lin, Y. and Chlamtac, I. (2000) Wireless and Mobile Network Architectures. Wiley Publications. [22] R.J. Baron, ªMechanisms of Human Facial Recognition,º Int'l J. Man Machine Studies, vol. 15, pp. 137-178, 1981. [23] Cardinaux, F., Sanderson, C., and Bengio, S. User authentication via adapted statistical models of face images. IEEE Transactions on Signal Processing 54 (January 2006), 361-373. [24] Lee, K.-C., Ho, J., and Kriegman, D. Acquiring linear subspaces for face recognition under variable lighting. IEEE Transactions on Pattern Analysis and Machine Intelligence (PAMI) 27, 5 (2005). [25] Maturana, D., Mery, D., and Soto, A. Face recognition with local binary patterns, spatial pyramid histograms and naive bayes nearest neighbor classification. 2009 International Conference of the Chilean Computer Science Society (SCCC) (2009), 125-132. [26] Rowley, H., Baluja, S., & Kanade, T. (1998). Neural network-based face detection. IEEE Trans. on Pattern Analysis and Machine Intelligence, 1 (20), 23–28.