Professional Documents
Culture Documents
Abstract
In India elections are conducted almost exclusively Each one has unique fingerprints, face which have
using Electronic Voting Machines (EVMs) developed been used for identification over time. There have
over the past two decades by the government have been been several studies on using electronic
praised for their simple design, ease of use, and technologies to improve elections with biometric
reliability. Illiterate people are cheated by some
criminals through booth capturing wherein party
technique, cryptography, Steganography.
loyalists would take over a polling station by force and
stuff the ballot box. So we took effort to overcome these 2. RELATED WORKS
mischievous activities & maintain the right of vote.
Thus in proposed methods there are different levels of Thumb impression is used for the voters
security in the voting process which makes safer. The authentication. User security is provided by
methods included are biometric techniques like thumb Steganography and Cryptography. Steganography
impression and face recognition for voters main object is image and for cryptography it is
authentication and cloud storage for database which keys. However hardware is required for taking
would make voting process more effective. thumb impression which is costly[1].
www.ijreat.org
Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org ) 1
IJREAT International Journal of Research in Engineering & Advanced Technology, Volume2Issue2, April - May,2014
ISSN: 2320 8791 (Impact Factor: 1.479)
www.ijreat.org
www.ijreat.org
Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org ) 2
IJREAT International Journal of Research in Engineering & Advanced Technology, Volume2Issue2, April - May,2014
ISSN: 2320 8791 (Impact Factor: 1.479)
www.ijreat.org
Embedded Algorithm to their choice the user can vote their selected
candidate. Then logout from the corresponding site
Begin and they cant re-enter.
SI[ ]=CI[ ]
for every bit of Secret Message SecretMsg[i] do
ifSecretMsg[i]=1 then
if CI[Random[i]] and KI[Random[i]]both either
even or odd then
if odd then
SI[Random[i]]=CI[Random[i]]-1 Figure 3.3 stego authentication algorithms
else
SI[Random[i]]=CI[Random[i]]+1 Authentication Algorithm
else
Begin
SI[Random[i]]=CI[Random[i]]
SecretMsg[ ],Date[32],SecretKeyDate,j
else
for i=0 to 287 do
if CI[Random[i]] and KI[Random[i]]both either
if SI[Random[i]] & KI[Random[i]] both either
even or odd then
even or odd then
SI[Random[i]]=CI[Random[i]]
SecretMsg[i]=0
else else
SI[Random[i]]=CI[Random[i]]+1 SecretMsg[i]=1
END for i=256 to 287 do
Date[j++]=SecretMsg[i]
SecretKeyDate=Concatenate(SecretKey,Date)
Stego image is the number which is given for if
every user for security purpose and avoiding
duplication of vote the number is send to the user compare(SecretMsg[],SHA256(SecretKeyDate))th
mail account. This image then passes to the server en
for authentication algorithm. Return:Authentic Person
else
5.2 Authentication algorithm Return:Not an Authentic Person
END
It is the Decoding process initially PIN is
generated from the Stego image. We can compare 6. RESULTS AND DISCUSSION
the Key image and the Secrete image of the
By analysing the online voting system
individual from the voter Database. If the Stego with statistical data, we found that only three out
image is valid then the system will generate the of seven peoples are voted successfully in online.
user id and password for the login. After the Failures are occur due to some lack of knowledge
successful login system will capture the face of the in using system, technical problems. This figure
user by the webcam and thumb impression by the 1.4 shows the relation between numbers of voters
versus number of voting.
scanner for the recognition. In this algorithm, we
are compare the two image first is newly capture
image and the second is same photo of the person
which are stored at the time of registration in the
database. .If the image can be match then the user
will get the candidate list and ward no. According
www.ijreat.org
Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org ) 3
IJREAT International Journal of Research in Engineering & Advanced Technology, Volume2Issue2, April - May,2014
May,
ISSN: 2320 8791 (Impact Factor: 1.479))
www.ijreat.org
90 REFERENCES
80
70
60 [1] Face Base Onlinene Voting System Using
50 Stegnography (Volume 3, Issue 10,, and October
40 voting 2013).
strategy
30
20 [2] Secure Online Voting System Proposed By
10
Biometrics and
nd Steganography Issue 5,May
0
2013.
Server operates automatically, manual [4] Online Voting System Powereded By Biometric
operation is not needed which reduce Security Using Stenography 2011 second
administration.It reduce the manual work ork and it International Conference on Emerging
takes only less time and high performance is also Applications of Information Technology
obtained. The information is secure. Other
ther than the http://www.softinfology.com/ieee/catlog/security/
voter nobody can know the voting details. The PSJAV 16 Online Voting System Powered By
process can be done quickly. It avoids the Biometric Security Using Steganography.pdf.
duplicate vote. So it gives es right to vote to
eople can select the right leader. [5]
everyone. People Secure Online Voting System Proposed By
Voting can be done from anywhere through web. Biometric and Steganography.
It surely increase the voting percentage [6] A Biometric-Secure e-Voting
Voting System for Election
Processes http://www.sunday chennai.com
hennai.com
7. CONCLUSION AND FUTURE
WORK [7] E-Voting System http://www.vvk.ee/public/ dok/
Yldkirjelduseng.pdf.
In this system we have enforced a
method for integrating Cryptography and [8] A Survey on Voting System Techniques
Steganography to present a highly secure Online http://www.ijarcsse.com/docs/papers/Volume 3/1
Voting System. The security level of our system is January 2013/V3Il-0221.pdf.
greatly improved by the new idea of stego image
[9] Analyzing Internet Voting Security
generation with algorithm.
http://www.cs.berkeley.edu/daw/paper/camserve.p
It can include features like fingerprint, df.
face and eye recognition for more security. It also10] Proposed Of a new online voting system
uses the cloud which contain database in order to
http://easyvote-app.sourceforge.net.
store voters information. So, the data can be
easily accessible. Thus, the citizens can be sure
that
hat they alone can choose their leaders, thus AUTHORS
exercising their right in the democracy. First author V. Jothi Lakshmi, is currently
doing her Third year B. tech Information
It can be used in future engineering
ngineering TechnologyatJeppiaar
Jeppiaar Engineering College in
research.. After voting Confirmation SMS can send Chennai, Tamil Nadu .She has presented a paper
to the voter from server to indicate voting is based on cloud computing in national level
successfully done. Create the e-votingvoting system technical symposium and has attended many
usable for handicapped people by using g the eye workshops.
retina or voice, etc for authentication. Email ID - jyothjo30@gmail.com
www.ijreat.org
Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org
( ) 4
IJREAT International Journal of Research in Engineering & Advanced Technology, Volume2Issue2, April - May,2014
ISSN: 2320 8791 (Impact Factor: 1.479)
www.ijreat.org
www.ijreat.org
Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org ) 5