Secure Online Voting System Proposed By Biometrics And Steganography

spotlessstareΑσφάλεια

29 Νοε 2013 (πριν από 3 χρόνια και 7 μήνες)

71 εμφανίσεις


International Journal of Emerging Technology and Advanced Engineering

Website: www.ijetae.com (
ISSN 2250
-
2459,

ISO 9001:2008 Certifie
d Journal,

Volume 3, Issue 5, May 2013)

213


Secure Online Voting System Proposed By Biometrics And
Steganography

Malwade Nikita
1
,

Patil Chetan
2
, Chavan Suruchi
3
,

Prof. Raut S.

Y
4

BE Computer, P.R.E.C., Loni.

Abstract


N
ow

days it is very important to provide
security to any kind of data and it bec
omes more sensitive
when we require this for voting system and mostly which is
online one. In this paper we route a technique to provide
security to an online voting system not only by
Steganography

concept but also combing Cryptography with this.
Steganog
raphy and
Cryptography is used together to provide
security to user account. So for this images and keys get used
in combination first time. Here for steagnography main object
is image and for cryptography it is keys.


To reduce the risk factor of such
sys
tem proper use of
c
ryptography

is needed. So it strongly minimizes

risks in these
systems
. This is because the hacker needs to find not only the
template but also the secret keys and it is not possible.

Main
idea behind this is to combined
secret key with
the cover
image on the basis of key image.
As a result such system
produces a new image known as
stego image
. This kind of
image is much more same as cover image. But human eyes are
not able to detect such kind of image
.

This system mainly provide a authe
ntication scheme for
online voting system

.

Keywords


E
-
Voting
, Steganography
, Biometric.

I.

I
NTRODUCTION

Elections enable every citizen of the country to
participate in the process of government formation. The
constitution of India provides for an election c
ommission
of India which is responsible for superintendence direction
and control of all elections. Integrity of election process
will determine the integrity of democracy itself. So the
election system must be secure against a variety of
fraudulent behavi
ors and should be transparent and
comprehensible that voters can accept the result of an
election.

The election must be
-

1)

Sufficiently robust to withstand a variety of fraudulent
behaviors.








2)

Scalability.

3)

Speed and accuracy and Authentication.

Online v
oting system is a web based that facilities the
running of elections and surveys online. This system has
been developed to simplify the process of organizing
elections and make it convenient for votes to vote remotely
from their home computers while takin
g into consideration
security, anonymity and providing auditioning capabilities.
Users are individuals who interact with the system through
web browsers.

Biometrics is the science that tries to fetch human
biological features with an automated Machine eith
er to
authentication or identification.

Biometric systems try to
exchange Knowledge with an individual feature, e.g. finger
print.

A.
N
ecessity

Electronic voting machines use in India , punch card
systems, Global Election Management System used in
other c
ountries have lack of indecisive or incorrect election
results.

So, we have present Online Voting System with
Biometric and Steganography, in order to avoid rigging and
to enhance the accuracy and the speed of the process so
that, one can cast his vote ir
respective of his location
.

B. Advantages

1)

Cost saving

2)

Reduced administration

3)

Create and deploy ballot quickly and with ease,
integrity of the vote counting.

4)

No need for renounces

5)

Greater performance














International Journal of Emerging Technology and Advanced Engineering

Website: www.ijetae.com (
ISSN 2250
-
2459,

ISO 9001:2008 Certifie
d Journal,

Volume 3, Issue 5, May 2013)

214


II.

A
RCHITECTURE


Fig.1 System Architecture











A.

Working Flow of the System:
-



Fig.2 System Flow

1)

Every individual in the country is first register for
voting. So, our first step is the registration.

2)

At the time of registration each person give thumb
impression for the security purpose by usin
g Digital
Persona Hardware.

3)

After doing this system provide to person a personal
identification number(PIN) and secrete key is
generated as shown in figure.




Fig.3 Secret Key Generation




PIN


Secret
Key


PIN&
Secret
Key


International Journal of Emerging Technology and Advanced Engineering

Website: www.ijetae.com (
ISSN 2250
-
2459,

ISO 9001:2008 Certifie
d Journal,

Volume 3, Issue 5, May 2013)

215


4)

By using Personal identific
ation number and secrete
key with thumb gives cover image as shown in fig.2.

5)

After that stego image is generated by using cover
image as shown fig.2







Stego Image

Fig.4 Stego Image Creation

Stego I
mage Creation A
lgorithm


Fig. 5 Stego Image creation algorithm

6)

The registered user login to the system for voting by
entering PIN and secrete key with thumb impression.

7)

After login at the server side stego image will be
decoded by using authentication alg
orithm as shown
in fig.



Fig.6 Stego Image Decoding

Authentication A
lgorithm


Fig. 7 Authentication Algorithm

8)

Decoding the stego image details of the voter are find
from the database at the server side.

9)

If details are matched with the database sto
red then
voter will be authenticated for voting and caste the
vote.

10)

Finally result is generated.






International Journal of Emerging Technology and Advanced Engineering

Website: www.ijetae.com (
ISSN 2250
-
2459,

ISO 9001:2008 Certifie
d Journal,

Volume 3, Issue 5, May 2013)

216


III.

A
CTUAL
R
ESULT

A.

Client Side

1)

Registration


2)

Thumb Impression


3)

Login


4)

Voting


B.


Server side

1)

Admin Login



International Journal of Emerging Technology and Advanced Engineering

Website: www.ijetae.com (
ISSN 2250
-
2459,

ISO 9001:2008 Certifie
d Journal,

Volume 3, Issue 5, May 2013)

217


2)

Home Page


3)

Result


IV.

P
ROBLEMS
I
N
F
INGER
P
RINT
R
ECO
GNIZATION

1.

Handicapped people does not applicable for voting in
our system.

2.

Hardware is required for taking thumb impression
which is costly.



V.

C
ONCLUSION

The focus of this paper is on use of techniques like
cryptography and Steganography for fingerprint
re
cognition also by using these techniques the highly
secure voting system will be established. The security level
of our system is greatly improved by the new idea of
random cover image generation for each user.

By using the biometric and password security

the
authentication process of system is highly improved. Thus
this strategy does not give any chance to steganalytic tools
of searching for predictable set of modifications. Thus
citizens can be sure that they alone can choose their
leaders, thus exercis
ing their right in the democracy.

REFERENCES

[1]

International Conference on Computing and Control Engineering
(ICCCE 2012), 12 & 13 April, 2012

―A Novel Data Hiding
Technique based Bio
-
Secure Online Voting System‖ Prabha Susy
Mammen and S. Ramamoorthy

[2]


E
-
Voti
ng through Biometrics and Cryptography
-

Steganography
Technique with conjunction of GSM Modem‖

Emerging Trends in
Computer Science and Information Technology
-
2012(ETCSIT2012) Proceedings published in International Journal
of Computer Applications® (IJCA)
b
y

Shobha lokhande…

[3]


SECURE ELECTRONIC REGISTRATION & VOTING SYSTEM

BASED

ON BIOMETRICS

National Conference on Future
Computing
Volume 1, March 2012 by
Dr.K.Kuppusamy1
Associate
Professor

Department of Computer Science Engineering

Alagappa
University Kar
aikudi 630 003.&
K.Kavitha 2
M.Phil Scholar

Department of Computer Science &

Engineering

Alagappa
University

Karaikudi 630 003.

[4]


E
-
Voting and Biometric Systems?‖
Sonja Hof

University of Linz,
Austria

Institute of Applied Computer Science,

Division: Busines
s,
Administration and Society;

University of Linz, AUSTRIA
sonja.hof@ifs.uni
-
linz.ac.at

[5]

‖Highly Secure Online Voting System with Multi Security using
Biometric and Steganography‖
B. Swaminathan#1, J. Cross Datson
Dinesh#2 2012

[6]

―Online Voting System Powere
d By Biometric Security Using
Steganography‖

2011 Second International Conference on Emerging
Applications of Information Technology by Shivendra Katiyar,
Kullai Reddy Meka, Ferdous A. Barbhuiya, Sukumar Nandi
Department of Computer Science and Engineering

Indian Institute of
Technology Guwahati, India


781039

{
s.katiyar, kullai, ferdous,
sukumar
}
@iitg.ernet.in