Voting system using eye-rise image

Abstract : In any developing country democracy plays an important role where a leader for a country is elected by the citizen. One of the main issues in the conventional voting system is that it consumes lots of man-power as well as resources and the preparation have been started many days before the commencement of the election. During this preparation some people may involve in illegal arrangement with each other or try to replace with their henchmen in this process to win the election. It is a confidential process so it must be transparent, Meddle-Proof, Usable, Authenticated, Accurate, Verifiability and Mobility. There are some drawbacks in conventional voting system such as damage of machines, chances of violence, dummy voting and problem of proper monitoring. Manual voting system has been followed in many parts of our country so people could not poll their vote because it is place oriented and there is region wise distribution, voters need to reach the place of voting. To overcome these problems a new confidential E-Voting system is introduced which provides security to the election system by detection and recognising voter’s face who is going to cast his/her vote. In this system the voter’s face is detected, captured and stored in the database then match the captured image with the image already stored on database to recognise the person. If match occurs then the person is allow to cast their vote once the vote is casted the same person will not be permitted to cast votes this provide security against duplicate vote and fraudulent and make the system more efficient and user friendly.
 EXISTING SYSTEM :
 ? The existing surveys on citizens’ attitudes towards Internet voting indicate a strong majority of support for Internet voting. ? This includes potential transformations of existing legal frameworks in order to embrace and regulate the new voting procedure. ? The substantive changes necessary to enable and regulate Internet voting depend on the particular characteristics of the existing legal framework aimed at regulating voting. ? Existing research highlights the importance of citizens’ attitudes towards Internet voting for its successful implementation. ? While a focus has to be on updating existing legal and regulatory frameworks aimed at governing (Internet) voting, a clear link exists with other important policy areas.
 DISADVANTAGE :
 ? Safety has offered passive in addition to dynamic intruder and this system also grabs a decision of convinced problems. ? Due to usage of more number of techniques leads to complexity of the system and also the voter should aware of their availability of network they use because the voting is done through their mobile phone these are the main issues in this system ? The main drawback or issues in this system is that it can be used only in android mobiles i.e., this system is applicable only for android platform. ? By using face as their identity which avoid the security issues on conventional system.
 PROPOSED SYSTEM :
 • The proposed work implements retina matching process in the e-voting system and analyses security features such as accuracy and efficiency. • However, should Internet voting be made available to European citizens, it should be proposed as an alternative to on-paper ballot voting. • The work represents pilot work carried out by DG CONNECT F4 in relation to action 62 of the Digital Agenda to propose "EU-wide indicators of digital competence". • In particular, citizens’ digital competencies in the EU, trust to operations over the Internet, and citizens attitudes toward Internet voting.
 ADVANTAGE :
 ? It also improves efficiency of the system and to provide user friendly environment for voters to cast their valuable votes. ? Asymmetric key are used to afford protection from active interloper who can change vote that is casted while it is transferred from client server to voting server, for this purpose to avoid fraudulent digital signature is used during casting of vote and the digital signature is verified on the server side with the accurate digital signature of the electorate that is known openly. ? In this model a secret key is used along with voter image as key image to produce a new image to perform electorate authentication and to minimize risk factors such as hacking. ? It also provides protection against fraudulent behaviours.

We have more than 145000 Documents , PPT and Research Papers

Have a question ?

Mail us : info@nibode.com