psdot 3 building and maintaining trust in internet voting with biometrics authentication
DESCRIPTION
FINAL YEAR IEEE PROJECTS, EMBEDDED SYSTEMS PROJECTS, ENGINEERING PROJECTS, MCA PROJECTS, ROBOTICS PROJECTS, ARM PIC BASED PROJECTS, MICRO CONTROLLER PROJECTSTRANSCRIPT
BUILDING AND MAINTAINING TRUST IN INTERNET VOTING WITH
BIOMETRICS AUTHENTICATION
OBJECTIVE:
The main objective of this project is to provide a voting service that allows
people to vote electronically with biometrics authentication system.
PROBLEM DEFINITION:
Integrity of the election process will determine the integrity of democracy
itself. So the election system must be secure and robust against a variety of
fraudulent behaviors, should be transparent and comprehensible that voters and
candidates can accept the results of an election. But in history, there are examples
of elections being manipulated in order to influence their outcome. In a voting
system, whether electronic or using traditional paper ballots, the system should
meet the following criteria: Anonymity, Tamper-resistant, Human factors.
ABSTRACT:
The project entitled as “Building and Maintaining Trust in Internet
Voting with Biometrics Authentication System”. To provide a voting service
that allows people to vote electronically. This system encompasses legal,
regulatory, behavioral, and sociological aspects of the current voting system, while
adding additional convenience and security to the overall voting process.
Biometrics is the study of automated methods for uniquely recognizing
humans based upon one or more intrinsic physical or behavioral traits. Physical
traits includes Fingerprint identification which is the process of comparing
questioned and known friction skin ridge impressions (Minutiae) from fingers,
palms, and toes to determine if the impressions are from the same finger. Using
Cryptography and Steganography at the same time, we try to provide Biometric as
well as Password security to voter accounts. The scheme uses images as cover
objects for Steganography and as keys for Cryptography. The key image is a
Biometric measure, such as a fingerprint image. Proper use of Cryptography
greatly reduces the risks in these systems as the hackers have to find both secret
key and the template. The basic idea is to merge the secret key with the cover
image on the basis of key image. The result of this process produces a STEGO
image which looks quite similar to the cover image but not detectable by human
eye. The system targets the authentication requirement of a voting system.
EXISTING SYSTEM:
In those days a rigorous study of fingerprints, developed scientific methods
for visual matching of fingerprints and strong programs/cultures for training
fingerprint experts, and applied the art of fingerprint identification for nailing
down the perpetrators. Despite the ingenious methods improvised to increase the
efficiency of the manual method of fingerprint indexing and search, the ever
growing demands on manual fingerprint identification quickly became
overwhelming the manual method of fingerprint indexing resulted in a highly
skewed distribution of fingerprints into bins most fingerprints fell into a few bins
and this resulted in search inefficiencies.
Fingerprint training procedures were time-intensive and slow. Further,
demands imposed by painstaking attention needed to visually match the
fingerprints of varied qualities, tedium of monotonic nature of the work, and
increasing workloads due to a higher demand on fingerprint identification services.
Integrity of the election process will determine the integrity of democracy itself. So
the election system must be secure and robust against a variety of fraudulent
behaviors, should be transparent and comprehensible that voters and candidates
can accept the results of an election. But in history, there are examples of elections
being manipulated in order to influence their outcome. In a voting system, whether
electronic or using traditional paper ballots, the system should meet the following
criteria: Anonymity, Tamper-resistant, Human factors.
DISADVANTAGE:
Wastage of time.
There is a chance to do revote.
Less security.
Hacking voter results.
PROPOSED SYSTEM:
To initiate research into acquiring fingerprints through electronic medium
and automatic fingerprint identification based on the biometric representation of
the fingerprints. These efforts have led to development of automatic fingerprint
identification systems over the past few decades. We attempt to present current
state-of-the-art in fingerprint sensing and identification technology.
The objective of this project is to present a high level overview of fingerprint
sensing and matching technology so as to provide the reader with some insights
into the strengths and limitations of the automation in matching fingerprints. To
initiate research into acquiring fingerprints through electronic medium and
automatic fingerprint identification based on the biometric digital representation
of the fingerprints.
ADVANTAGES:
Highly secured and there is no chance to revote.
Finger print recognition.
Real time tracking of results.
Ease of voting.
ALGORITHM USED:
1. RNG(Random Number Generation)
2. LSB(Least Significant Bit)
3. Triple DES(Data Encryption Standard)
ARCHITECTURE DIAGRAM:
ADMIN
USER
Admin
LOGIN
New
Registration
SMS PIN
Number
entry
Thumb
impression
Providing
Secret key
USER Send
SMS PIN
and Secret
key
Thumb
impression
Generate
Stego Image
Get Details
from
Database
Authenticatio
n complete to
enter Vote
SYSTEM REQUIREMENTS:
Hardware configuration:
Intel Pentium IV
256/512 MB RAM
1 GB Free disk space or greater
1 GB on Boot Drive
1 Network Interface Card (NIC
Software configuration:
MS Windows XP/2000
MS IE Browser 6.0/later
MS Dot Net Framework 4.0
Internet Information Server (IIS)
MS SQL Server
Front End: ASP.NET with C#
Back End: MS SQL Server 2005
APPLICATIONS:
Powerful tool for democracy used for polling
Conduct censuses and referendums easily
Direct democracy
Saves Money