Open Access Open Access  Restricted Access Subscription or Fee Access

Biometric Based Secured Electronic Voting System

K. Ranjitha, S. Selva Sundaram, S. Sethuraman, V. Sowndrya, K. Sivaraj

Abstract


The voting process is been fully manual and paper based.  This process can be overwhelming, time-consuming and prone to security breaches and electoral fraud. These systems  were still prone to electoral  frauds  and  voters  has  to  make  tremendous  effort  in order to cast their ballots. We propose a technology which is the combination of finger print identification and User identification based voting system which will be used to provide security in order to avoid counterfeit voting. The Proposed machine in this system is faster, efficient, reliable, error free and secured as compared to previous voting system. Its main feature is ease to operate, avoid illegal voting and time consumption and reduce manpower.


Keywords


Voting, Security, Fingerprint, Counterfeit, Proposed Machine.

Full Text:

PDF

References


Sodiya, A.S; Onashoga, S.A, “ A Secure E-voting Architecture ”, 8th International Conference on Information Technology : New Generations, IEEE INMIC 2011, Page(s):342

M. Ali, “Critical thoughts from a government mindset”, Cartridge Books Oxford, Hexagon House Avenue 4, 2013, pp 162-165.

Alexander. K, “Ten Things I Want People to Know About Voting Technology”, Presented to the Democracy Online Project’s National Task Force, National Press Club, Washington, D. C., January 18, 2001.

Saltman. R.G., “Effective use of computing technology in vote- tallying”, The National Institute of Standards and Technology (NIST), available at http://csrc.nist.gov/publications/nistpubs/NBS_SP_500-30.pdf.

Keshk.A.E, “Development of remotely secure E-Voting”, 5th International Conference on Information and Communications Technology, ICICT 2007, Page(s):235

[CES (2002), “E-voting Security Study, Communications and Electronic Security Group (CESG)”. Available at “http://www.edemocracy.gov.uk/library/papers/study.pdf”.

G. Dimitris, “Secure Electronic Voting”, 7th Computer Security Incidents Response Teams Workshop Syros, Greece, September 2002, available at http://www.terena.org/activities/tf-csirt/meeting7/gritzaliselectronic-voting.pdf , pp 9-10

L. Weinstein, “Risks of Internet voting”, Communications of ACM 43, 6 (Jun. 2000).

A. Fujioka, T. Okamoto and K. Ohta, “A practical secret voting scheme for large scale elections”. LNCS 718 Advances in Cryptology: Proc. Auscrypt’92, Springer, pp 244-251.

T. Wan, W. Liao, “Cryptanalysis on Polynomial-Based E-Voting Schemes”, 2010 International Conference on E-Business and E- Government, pp 436.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.