Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: BUILDING AND MAINTAINING TRUST IN INTERNET VOTING WITH BIOMETRICS AUTHENTICATION pdf
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
BUILDING AND MAINTAINING TRUST IN INTERNET VOTING WITH BIOMETRICS AUTHENTICATION

[attachment=62505]

OBJECTIVE:

The main objective of this project is to provide a voting service that allows
people to vote electronically with biometrics authentication system.

PROBLEM DEFINITION:

Integrity of the election process will determine the integrity of democracy
itself. So the election system must be secure and robust against a variety of
fraudulent behaviors, should be transparent and comprehensible that voters and
candidates can accept the results of an election. But in history, there are examples
of elections being manipulated in order to influence their outcome. In a voting
system, whether electronic or using traditional paper ballots, the system should
meet the following criteria: Anonymity, Tamper-resistant, Human factors.

ABSTRACT:

The project entitled as “Building and Maintaining Trust in Internet
Voting with Biometrics Authentication System”. To provide a voting service
that allows people to vote electronically. This system encompasses legal,
regulatory, behavioral, and sociological aspects of the current voting system, while
adding additional convenience and security to the overall voting process.Biometrics is the study of automated methods for uniquely recognizing
humans based upon one or more intrinsic physical or behavioral traits. Physical
traits includes Fingerprint identification
which is the process of comparing
questioned and known friction skin ridge impressions (Minutiae) from fingers,
palms, and toes to determine if the impressions are from the same finger. Using
Cryptography and Steganography at the same time, we try to provide Biometric as
well as Password security to voter accounts. The scheme uses images as cover
objects for Steganography and as keys for Cryptography. The key image is a
Biometric measure, such as a fingerprint image. Proper use of Cryptography
greatly reduces the risks in these systems as the hackers have to find both secret
key and the template. The basic idea is to merge the secret key with the cover
image on the basis of key image. The result of this process produces a STEGO
image which looks quite similar to the cover image but not detectable by human
eye. The system targets the authentication requirement of a voting system.

EXISTING SYSTEM:

In those days a rigorous study of fingerprints, developed scientific methods
for visual matching of fingerprints and strong programs/cultures for training
fingerprint experts, and applied the art of fingerprint identification for nailing
down the perpetrators. Despite the ingenious methods improvised to increase the
efficiency of the manual method of fingerprint indexing and search, the ever
growing demands
on manual fingerprint
identification quickly became
overwhelming the manual method of fingerprint indexing resulted in a highly
skewed distribution of fingerprints into bins most fingerprints fell into a few bins
and this resulted in search inefficiencies.