Open Access Open Access  Restricted Access Subscription or Fee Access

Voting through Mobile using Biometric Template with Integration of Spatial Cloud Computing and Data Hiding Security

D. Karthikeyan, P. Arunkumar

Abstract


Computing methodology is one of the emerging technologies for the people to reach their global environment. The method of voting through mobile by the people, to determine their own government from any where in the world, is needed. This paper explains on “Voting through Mobile, with Combined Finger Print Authentication, integrated with Inter Could Computing and Automated Load Balancing, fused with Data Hiding Security”. To make it possible, vote can be made through mobile by using wireless network with combined finger print biometric identification systems. We advocate Spatial Cloud Computing to focuses on adding geography to the cloud computing paradigm. Spatial cloud computing provides dynamically scalable geographic information technology, spatial data, and geo-applications as a web service / utility. A data hiding method, which is applicable to fingerprint images compressed with wavelet-based scheme and provide full security for biometric data that is passed through the network from different places. This combined method creates a new evaluation of process with 100% security, 100% privacy & 100% voting by any kind of people from anywhere.

Keywords


Biometric Authentication, Bayesian, Finger Print Template, Spatial Cloud, Voting.

Full Text:

PDF

References


A. K. Jain, R. Bolle, and S. Pankanti, eds., Biometrics: Personal Identification in Networked Society. Kluwer Academic Publishers, 1999.

D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition. Springer-Verlag, 2003.

U. Uludag and A. K. Jain, “Attacks on biometric systems: a case study in fingerprints,” in Proc. SPIE, Security, Seganography and Watermarking of Multimedia Contents VI, vol. 5306, pp. 622–633, (San Jose, CA),January 2004.

J. Douceur, “The sybil attack,” in Proc. IPTPS Workshop, Mar. 2002,pp. 251–260.

S. Kent and T. Polk, “Public-key infrastructure (x.509) (pkix) charter.” [Online]. Available: http://www.ietf.org/html.charters/pkixcharter. html.

J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, “Providing robust and ubiquitous security support for mobile ad-hoc networks,” in Proc. 9th IEEE Int. Conf. Network Protocols, 2001, pp. 251–260.

S. Capkun, L. Buttyan, and J.-P. Hubaux, “Self-organized public-key management for mobile ad hoc networks,” IEEE Trans. Mobile Comput., vol. 2, no. 1, pp. 52–64, Jan./Mar. 2003.

A. Cheng and E. Friedman, “Sybilproof reputation mechanisms,” in Proc. ACMWorkshop Economics Peer-to-Peer Systems, Aug. 2005, pp. 128–132.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.