Professional Documents
Culture Documents
K.S.K.GUPTA
U.SRIKANTH
-Information Technology
GITAM UNIVERSITY
-Information Technology
ANITS college of engineering
VISAKHAPATNAM
VISAKHAPATNAM
Email:gupta043@gmail.com
Email:sri_srikanth4all@yahoo.co.in
ABSTRACT
1.OVERVIEW
Elections allow the people to choose their
representatives and express their preferences for how
they will be governed. Naturally, the integrity of the
election process is fundamental to the integrity of
democracy itself. The election system must be
sufficiently robust to withstand a variety of
fraudulent behaviors and must be sufficiently
transparent and comprehensible that voters and
candidates can accept the results of an election.
Unsurprisingly, history is littered with examples of
elections being manipulated in order to nuence their
out come. The design of a good voting system,
whether electronic or using traditional paper ballots
or mechanical devices, must satisfy a number of
sometimes competing criteria.
The anonymity of a voters ballot must be preserved,
both to guarantee the voters safety when voting
against a malevolent candidate, and to guarantee that
Figure1.
During enrollment:
Capture the biometrics, which has to be stored in the
database;
Process the biometric, extract and enroll the
biometric template;
Store the template in a local repository, a central
repository, or a portable token such as a smart card.
During access to database:
4) Live-scan the biometric feature;
5) Process the biometric and extract the biometric
template;
6) Match the scanned biometric against stored
templates;
7) Incase of successful verification; provide a
matching score to business application;
8) Record a secure audit trail with respect to system
use
Biometric applications depend on comparing as new
Measure against previously captured information. In
Biometric application some aspect of a person is
measured; the measure is processed; and the resulting
data is stored; At a subsequent time, the same aspect
of a person is measured and compared against the
stored data .If it is being used for authentication, the
new data is compared against the data, already in
storage for that person. If it is being used for
identification, the entire database is searched, in order
Figure2:
Finger Scanner
start
(b)
(d)
no
Voice
scan
(g)
(f)
(k)
yes
no
Hand
scan
Flow
chart-2
no
yes
Flow
chart-2
(i)
into
database
file
stop
Flow chart
algorithm-2
Password
spoken
Data
Glow the
red light
base
indicator
Speech processing
circuit.
Operating system
searches for
security file
Textual password
(o)
stop
Figure 4.flowchart-2
9.Conclusion
Multimodal Biometric Voting System
Considering various biometric techniques like finger
scan, retina scan etc, finger scan is widely used.
Biometric technology has been around for decades
But has mainly been for highly secretive
environments with extreme security measures. The
proposed algorithm for multimodal biometric voting
system minimizes the corruption involved by human
intention . The technologies behind biometrics are
still emerging. This article gives a snapshot of the
dynamics under way in this emerging biometric
market, and we hope it will help all the possible
alternatives when
acquiring new biometric
technologies.
10.REFERENCES:
Biometrics, Personal identification in Networked
Society: Vol.479, Anil K. Jain (Editor). Ruud Bolle,
Sharath Pankanti.
A Practical Guide to
Biometric
security
Technology
Simon Liu and Mark Silverman
Biometrics and strong Authentication
Chris Mills, Karl Ware, Christopher Mills, April
2002,Osborne McGraw-Hill.
Biometrics: identity Verification in a Networked
Worked
Samir Nanavati, March 2002, John Wiley & Sons