SlideShare ist ein Scribd-Unternehmen logo
1 von 21
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The main disadvantages in these systems are: ->In case if  a voter’s  id is lost then someone else can cast their vote ->The steps for authentication is Voter’s ID and Password which can  be hacked easily now a days….
Preliminary verification Receives Voter’s choice & Encrypts it. Checks whether the person has the right to vote. Storing, Managing & Decrypting Votes for counting. Counts the Votes.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
[object Object],[object Object],[object Object],[object Object],[object Object]
 
Heavy web users have an average of 21 passwords:81% of users select a common passwords and 30% write their passwords in a file which can be HACKED easily. Identity theft: Identity thieves steal PIN numbers.3.3 million identity thefts in U.S in 2002 ;6.7 millions victims of credit card fraud
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],DNA CHIP<Local memory>
Step:1-Voter inserts the card Step:2-Camera captures the face of the voter and fingerprint recognizer gets the finger print. Step:3-Checks the unique identification in  voters’ card, server and the input obtained from camera and fingerprint recognizer.
[object Object],[object Object]
secure client-server data  transfer No unauthorized data manipulation
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
<Encrypted Message> DNA  CHIP ONE –TIME PAD MASK PROTECTION CIPHER TEXT Display complementary  of plain data lexicon  Data pair annealed to complimentary end   Unprotected DNA cleaves between CHIPER and Data
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],DNA Achieve Stores tons of information
[object Object],[object Object],UP counter
[object Object],[object Object],[object Object]
 

Weitere ähnliche Inhalte

Was ist angesagt?

Biometrics & AI (Artificial Intelligence) is the future of Authentication
Biometrics & AI (Artificial Intelligence) is the future of AuthenticationBiometrics & AI (Artificial Intelligence) is the future of Authentication
Biometrics & AI (Artificial Intelligence) is the future of Authentication
Tony Chew
 
Electronic Voting Machine
Electronic Voting MachineElectronic Voting Machine
Electronic Voting Machine
Chanda Thakur
 
mobile-iris voting system(1)
mobile-iris voting system(1)mobile-iris voting system(1)
mobile-iris voting system(1)
vasim hasina
 

Was ist angesagt? (20)

Finger print based EVM by saurabh
Finger print based EVM by saurabhFinger print based EVM by saurabh
Finger print based EVM by saurabh
 
Biometric voting system
Biometric  voting systemBiometric  voting system
Biometric voting system
 
Smart Voting System with Face Recognition
Smart Voting System with Face RecognitionSmart Voting System with Face Recognition
Smart Voting System with Face Recognition
 
fingerprint based electronic voting machine
fingerprint based electronic voting machinefingerprint based electronic voting machine
fingerprint based electronic voting machine
 
Biometrics & AI (Artificial Intelligence) is the future of Authentication
Biometrics & AI (Artificial Intelligence) is the future of AuthenticationBiometrics & AI (Artificial Intelligence) is the future of Authentication
Biometrics & AI (Artificial Intelligence) is the future of Authentication
 
Electronic Voting Machine
Electronic Voting MachineElectronic Voting Machine
Electronic Voting Machine
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
Fingerprint voting system
Fingerprint voting systemFingerprint voting system
Fingerprint voting system
 
Biometrics
BiometricsBiometrics
Biometrics
 
Digital Signature ppt
Digital Signature pptDigital Signature ppt
Digital Signature ppt
 
How Fingerprint Scanner Work
How Fingerprint Scanner WorkHow Fingerprint Scanner Work
How Fingerprint Scanner Work
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
mobile-iris voting system(1)
mobile-iris voting system(1)mobile-iris voting system(1)
mobile-iris voting system(1)
 
Fingerprint Biometrics
Fingerprint BiometricsFingerprint Biometrics
Fingerprint Biometrics
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
 
AUTOMATIC VOTING MACHINE-AN ADVANCED MODEL FOR SECURED BIOMETRICS BASED VOTIN...
AUTOMATIC VOTING MACHINE-AN ADVANCED MODEL FOR SECURED BIOMETRICS BASED VOTIN...AUTOMATIC VOTING MACHINE-AN ADVANCED MODEL FOR SECURED BIOMETRICS BASED VOTIN...
AUTOMATIC VOTING MACHINE-AN ADVANCED MODEL FOR SECURED BIOMETRICS BASED VOTIN...
 
Biometrics
BiometricsBiometrics
Biometrics
 
Global Wirelesse Voting Machine
Global Wirelesse Voting MachineGlobal Wirelesse Voting Machine
Global Wirelesse Voting Machine
 

Andere mochten auch

Fingerprint EVM
Fingerprint EVMFingerprint EVM
Fingerprint EVM
Pranay Raj
 
Biometric voting system
Biometric voting systemBiometric voting system
Biometric voting system
karppahavalli
 
Project on Electronic voting machine
Project on Electronic   voting   machineProject on Electronic   voting   machine
Project on Electronic voting machine
Deepak Kumar
 
Aadhar based voting system
Aadhar based voting systemAadhar based voting system
Aadhar based voting system
Nikhilesh Reddy
 
IEEE_paper_work11_2015_12_03_20_49_47_415
IEEE_paper_work11_2015_12_03_20_49_47_415IEEE_paper_work11_2015_12_03_20_49_47_415
IEEE_paper_work11_2015_12_03_20_49_47_415
Shubham Jadhav
 
PROJECT REPORT_ONLINE VOTING SYSTEM
PROJECT REPORT_ONLINE VOTING SYSTEMPROJECT REPORT_ONLINE VOTING SYSTEM
PROJECT REPORT_ONLINE VOTING SYSTEM
Nandasaba Wilson
 
Electronic voting machine using RFID
Electronic voting machine using RFIDElectronic voting machine using RFID
Electronic voting machine using RFID
Bharath Chapala
 

Andere mochten auch (20)

Fingerprint EVM
Fingerprint EVMFingerprint EVM
Fingerprint EVM
 
Biometric voting system
Biometric voting systemBiometric voting system
Biometric voting system
 
Electronic voting machine
Electronic voting machineElectronic voting machine
Electronic voting machine
 
Project on Electronic voting machine
Project on Electronic   voting   machineProject on Electronic   voting   machine
Project on Electronic voting machine
 
Aadhar based voting system
Aadhar based voting systemAadhar based voting system
Aadhar based voting system
 
IEEE_paper_work11_2015_12_03_20_49_47_415
IEEE_paper_work11_2015_12_03_20_49_47_415IEEE_paper_work11_2015_12_03_20_49_47_415
IEEE_paper_work11_2015_12_03_20_49_47_415
 
ELECTRONIC VOTING MACHINE
ELECTRONIC VOTING MACHINEELECTRONIC VOTING MACHINE
ELECTRONIC VOTING MACHINE
 
Online Voting System Project File
Online Voting System Project FileOnline Voting System Project File
Online Voting System Project File
 
Online E-Voting System
Online E-Voting SystemOnline E-Voting System
Online E-Voting System
 
Online voting system ppt by anoop
Online voting system ppt by anoopOnline voting system ppt by anoop
Online voting system ppt by anoop
 
Ppt on online voting
Ppt on online votingPpt on online voting
Ppt on online voting
 
PROJECT REPORT_ONLINE VOTING SYSTEM
PROJECT REPORT_ONLINE VOTING SYSTEMPROJECT REPORT_ONLINE VOTING SYSTEM
PROJECT REPORT_ONLINE VOTING SYSTEM
 
Biometric System Based Electronic Voting Machine Using Arm9 Microcontroller
Biometric System Based Electronic Voting Machine Using Arm9 MicrocontrollerBiometric System Based Electronic Voting Machine Using Arm9 Microcontroller
Biometric System Based Electronic Voting Machine Using Arm9 Microcontroller
 
Biometrics using electronic voting system with embedded security
Biometrics using electronic voting system with embedded securityBiometrics using electronic voting system with embedded security
Biometrics using electronic voting system with embedded security
 
E-voting
E-votingE-voting
E-voting
 
Electronic voting machine using RFID
Electronic voting machine using RFIDElectronic voting machine using RFID
Electronic voting machine using RFID
 
Electronic voting machine
Electronic voting    machineElectronic voting    machine
Electronic voting machine
 
E-Voting Technology
E-Voting TechnologyE-Voting Technology
E-Voting Technology
 
Global wireless e voting system
Global wireless e voting systemGlobal wireless e voting system
Global wireless e voting system
 
Online voting system
Online voting systemOnline voting system
Online voting system
 

Ähnlich wie Bio Metric-E-Voting

Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
Sampat Patnaik
 
4.2.1 Network Issues and Communication [Autosaved].pptx
4.2.1 Network Issues and Communication [Autosaved].pptx4.2.1 Network Issues and Communication [Autosaved].pptx
4.2.1 Network Issues and Communication [Autosaved].pptx
TeenaSharma73
 
Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261
Editor IJARCET
 
Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261
Editor IJARCET
 

Ähnlich wie Bio Metric-E-Voting (20)

Evoting2003
Evoting2003Evoting2003
Evoting2003
 
IRJET- Portable Biometric E-Voting System
IRJET- Portable Biometric E-Voting SystemIRJET- Portable Biometric E-Voting System
IRJET- Portable Biometric E-Voting System
 
Embedded system
Embedded systemEmbedded system
Embedded system
 
Smartcard
SmartcardSmartcard
Smartcard
 
smartcard-120830090352-phpapp02.pdf
smartcard-120830090352-phpapp02.pdfsmartcard-120830090352-phpapp02.pdf
smartcard-120830090352-phpapp02.pdf
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
4.2.1 Network Issues and Communication.pptx
4.2.1 Network Issues and Communication.pptx4.2.1 Network Issues and Communication.pptx
4.2.1 Network Issues and Communication.pptx
 
4.2.1 Network Issues and Communication [Autosaved].pptx
4.2.1 Network Issues and Communication [Autosaved].pptx4.2.1 Network Issues and Communication [Autosaved].pptx
4.2.1 Network Issues and Communication [Autosaved].pptx
 
Data encryption
Data encryptionData encryption
Data encryption
 
Alternatives to Paswords
Alternatives to PaswordsAlternatives to Paswords
Alternatives to Paswords
 
Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261
 
Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261
 
Smart Cards
Smart CardsSmart Cards
Smart Cards
 
DEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malwareDEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malware
 
Smart Card
Smart CardSmart Card
Smart Card
 
Smart Card
Smart CardSmart Card
Smart Card
 
Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9
 
Card reader
Card readerCard reader
Card reader
 
Efficacious electronic voting using biometry
Efficacious electronic voting using biometryEfficacious electronic voting using biometry
Efficacious electronic voting using biometry
 
ATM for visually challenged people
ATM for visually challenged peopleATM for visually challenged people
ATM for visually challenged people
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Bio Metric-E-Voting

  • 1.  
  • 2.
  • 3. Preliminary verification Receives Voter’s choice & Encrypts it. Checks whether the person has the right to vote. Storing, Managing & Decrypting Votes for counting. Counts the Votes.
  • 4.
  • 5.  
  • 6.
  • 7.  
  • 8. Heavy web users have an average of 21 passwords:81% of users select a common passwords and 30% write their passwords in a file which can be HACKED easily. Identity theft: Identity thieves steal PIN numbers.3.3 million identity thefts in U.S in 2002 ;6.7 millions victims of credit card fraud
  • 9.
  • 10. Step:1-Voter inserts the card Step:2-Camera captures the face of the voter and fingerprint recognizer gets the finger print. Step:3-Checks the unique identification in voters’ card, server and the input obtained from camera and fingerprint recognizer.
  • 11.
  • 12. secure client-server data transfer No unauthorized data manipulation
  • 13.
  • 14.
  • 15. <Encrypted Message> DNA CHIP ONE –TIME PAD MASK PROTECTION CIPHER TEXT Display complementary of plain data lexicon Data pair annealed to complimentary end Unprotected DNA cleaves between CHIPER and Data
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.