Вы находитесь на странице: 1из 24

www.SeminarsTopics.

com

Seminar Report
On
MOBILE VOTING SYSTEM USING IRIS RECOGNITION
AND CRYPTOGRAPHY TECHNIQUES

www.SeminarsTopics.com

ABSTRACT
With the advancement of electronics and computer science, mobile communication
technology leads us to a fast moving entirely different world. In this scenario, we have lot of
responsibilities, one of it is voting for our country, but even we don't have time for it, and also
our votes may not useful to our nation, because of fake votes and cheating process happened
during the election. This problem is rectified by the latest voting system as Mobile Voting
System which is discussed in this paper. The mobile voting system uses the efficient techniques,
iris recognition and cryptography for the secured voting process. The iris recognition and
cryptography avoids the fake votes and cheating process. The election commission spends lot of
money, for each election unnecessarily, which will be minimized by this system. This system
enables the voter to vote to the Nation from his place itself.

www.SeminarsTopics.com

1. INTRODUCTION:
Mobile voting system use the iris recognition and cryptography techniques, for voting
purpose, the encryption algorithm is uploaded in the mobile phone. As like the eye scanner which
scans the iris is fixed in the mobile, so the mobile phone having camera is preferred for that. To
obtain the voting the voters eye iris is recognized. During the transmission from the source
(mobile) to destination (election database system) the data is encrypted using the encryption
algorithm. The data sending and receiving is doing with the help of the mobile networks.
As democracies across the globe fight challenges related to electronic voting systems,
here a mobile phone-based voting system that incorporated into the current large-scale election
process, gives the promising research. Traditionally, voting process is organized in centralized or
distributed manner called voting booths. The earlier process of election is quite complex and time
consuming. People were waiting in queue for long time. To reduce this problem mobile voting
system is introduced. This mobile voting system provide many benefits like we dont need to go
to polling booths, no need to use paper ballots and we have time and cost efficiency and it also
avoid tiredness and violence . In our system there is no expensive hardware is used. For the
different reasons, voters may not able to come to the voting booths physically, but now with the
use of this new system he can vote remotely. For example, he can vote from home or while
travelling abroad or sitting in the Office. Thats why there is more demand for remote voting. In
this system procedures are easy, transparent and most secure.
Today the most common way for remote voting is postal voting, where voters cast their
votes by cell Phones...Internet voting was introduced to provide more flexibility. Because of the
inherited security vulnerabilities Of the Internet and computerized systems. In general, Phone
Voting System (MPVS) provides mobility feature. Internet voting there is awide range of
criticism. Mobile However this technology accesses certain security threats for its successful
implementation in election. Without eliminating these security threats like buying a vote and
Coercion, online registration, secrecy of ballot, anonymity of voter and double voting this latest
technology cant be allowed. An efficient and reliable system is essential for the trustworthy and
successful implementation of this technology. In our system we design mobile application for evoting (electronic voting) process. The proposed system uses mobile phone device having: small
3

www.SeminarsTopics.com

in size, low power, low-price as compared to computers and Direct Recording Electronic voting
System, Electronic Voting Machines, provide mobility feature and security. Proposed system
uses Global System for Mobile Communication technology which is a secure and globally used
mobile technology in the current situation. Mobile phone also uses Subscriber Identity Module
technology which provides user identity privacy, user identity verification and subscriber data
secrecy providing more security to the proposed system.
The key features of our proposed Mobile Phone Voting System is:
1. Eligibility: only authorized voter can cast their vote.
2. Uniqueness: Each user can cast their only one vote.
3. Integrity: Valid vote should not be modified or deleted.
4. Fairness: The election result should not be accessible before the official time ended.
5. Secrecy: No one should be able to find how voter cast their vote.
6. Cost-effectiveness: Election system should be efficient and affordable.

2. LITERATURE REVIEW:
Voting through the mobile phone it is the new and advanced area of research. We take the
review of some IEEE papers which presented in past.
[1] Proposes mobile phone voting system developed on modular square root and blind signature
system. System uses confidentiality of voter, secrecy of ballot, voter anonymity and no
computation cost and communication overhead. CA (certificate authority) involves as third party
that is distribution of certificates to voters is the responsibility of CA for authentication purposes,
delayed occurred which make the process slow.
[2] Proposes mobile phone voting system using Global System for Mobile communication
technology. In the system voter authentication is occurred through GSM mobile operator. user
validation is done through GSM challenge-response protocol. System contain of four parts:
mobile phone; authentication server; verification server and result counting server. Proposed
system contain three levels: pre voting level; voting level and post voting level. For keeping
Voter secrecy using blind signature system. Because of GSM authentication setup public key
overhead is mostly decreased. More work is required to deal with the trust retained on
authentication server, end user device (ME) and application security.

www.SeminarsTopics.com

[3] Proposes mobile phone intermediate e-voting system uses the extended Pillars encryptions
system. This system is used to enforce the cut-of-the choose method to exclude the computational
zero knowledge evidences and show the effectiveness of the system. Proposed system is probably
safe in simulation-based prototype.
[4] Propose GSM based mobile phone voting system is used to cast vote without registering for
voting in advance and going to polling booths. System prevents repetition voting but It has big
disadvantage to security, proposes system does not used any cryptographic algorithm.
[5] Proposed mobile phone voting system based on public key encryption algorithm RSA.
Proposed system contains three parts: access control; voting and election administrator server.
First part holds validation and identification for the voters. Voting part done by ciphering voter
data using RSA algorithm And last part is the election administrator server classifies ending
result using decryption RSA private key for received encrypted data. System has disadvantages
like there is no any online registration and more expensive computational cost and
communication overhead due to RSA algorithm.

2.1 PROPOSED SYSTEM:


Our propose system provide online registration of voter and also offline registration is
available for voter in case of failure of online registration. After registration voter will cast their
vote and result will display. For proposed system it required five elements

Mobile Phone, Election Commission Server (ECS);

Election Commission Databases (ECD);

Vote Collecting and Result Phase Server (VCRPS) and

Election Commission Office (ECO).

Proposed system consists of three steps:


A. Online registration phase
B. Voting phase
C. Vote collecting and result phase

www.SeminarsTopics.com

A. Online Registration Phase:


In this phase we will provide the one highly secured website for registration purpose.
After that user have to SIGN IN there and fill its whole information including NIC and SIM card
number. After pressing submit button, server send one public key to them which encrypt the
whole information and send over the server. And then server sends one secret symmetric key to
user. User must have to keep this key secret. Because this key is required on day of election.
Election commission server should keep two updated databases. First database consists of public
NICs and second database contained SIM cards from the concern authorities for user verification
and authentication purposes at the registration time. Short Message Services (SMS) is used
throughout voting process without the need of internet. ECS will create two key, first one is a
public key and second one is a private key. The ECS will keep only private key secret and will
put public key on its server.

Fig.1. Online Registration phase

www.SeminarsTopics.com

Fig.2.Flowchart for Registration phase

1) In the first step user will send their National Identity Card No + SIM Card No +
Symmetric Key which encrypt with public key of ECS to ECS server.
2) When ECS receiving data they will decrypt this data with his private key.
3) ECS will verify the users NIC and SIM card number with its two latest databases, one
consist public NIC numbers and other database consist SIM card numbers.
4) If ECS verified that user is authentic then,
5) ECS will send PIN encrypted with user symmetric key to the user. This PIN will be
used for the authenticity of the voter in the latter stages of the election process.
6) Receiving this user will decrypt the PIN with his/her symmetric key. User should
securely keep their PIN from disclosing to others because its disclosing will compromised
confidentiality.
7) When Mobile phone user got PIN then Mobile phone user will send acknowledgement
message to election commission server .Mobile phone user will become certified as mobile
phone voter. Here online registration phase will be completed.
8) This is offline registration phase which will be used in case someone registers
his/herself on genuine user credentials.
7

www.SeminarsTopics.com

9) When the genuine user registering his/herself with election commission server, ECS
will send registration problem message of cant be register through online registration phase and
will requested his/her to come to ECO for correction of their registration as someone already
register his/herself on genuine user credentials.
10) In this case user should go to election commission Office. The previous registration
will be canceled and genuine user will be register.
11) Election commission office (ECO).
B. Voting Phase:
1) In this phase, ECS will send candidate list to authenticated voter according to their
constituency via SMS encrypted with voter symmetric key. This will ensure that the candidate list
message only send to the authenticated voter list. This method also prevents unauthorized voter
to cast their vote...
2) After that voter will receive the SMS of candidate list on voting day.
3) In this step voter will select their candidate from the candidate list. After selecting their
candidate voter will then send the message to ECS with public key, candidate PIN encrypt both
with user symmetric key and again concatenate NIC number and send to ECS via SMS.
4) ECS will find user symmetric key using NIC number. Then it will decrypt the
remaining SMS part with user symmetric key. ECS will mark only the PIN part of the message
for the record purposes and to avoid double voting. The remaining encrypted candidate list
message will be forwarded to the vote collecting and result phase server.

Fig.3.Voting phase

www.SeminarsTopics.com

Fig.4. Flowchart for voting phase


C. Vote Collecting and Result Phase Server
1) Before the start of the election, we used time lock mechanism which will not accept vote after
time end on VCRPS. It will keep the vote in encrypted form until the official time of the election
ended. Implementing this restriction on this server, the decryption of the votes will be started
after the end of the election time. The third party will not see the result before the official time
ends, thus it prevents to seeing of the election results.
2) After ending of voting phase, vote will be decrypt by using ECS private key.
3) At end of the process, votes will be counted and the results will be officially display to the
public.

www.SeminarsTopics.com

Fig.5.Vote Collecting and Result Phase Server

Fig.6.Flowchart for result phase

10

www.SeminarsTopics.com

2.2 SECURITY ALGORITHAM:


Security is provided to our proposed system by using RSA algorithm. RSA stands for the
names of the three men who made the algorithm public. These men's names are Ron Rivets, Adi
Shamir, and Leonard Adleman. A simple explanation of the RSA algorithm is that it was made for
public-key cryptography, which is based on factoring large integers, which is the factoring
problem. There are three steps to the RSA algorithm. These steps are key generation, encryption,
and decryption working with a public-key encryption system has mainly three phases:
A. Key Generation: Whoever wants to receive secret messages creates a public key
(which is published) and a private key (kept secret). The keys are generated in a way that
conceals their construction and makes it 'difficult' to find the private key by only knowing the
public key.
B. Encryption: A secret message to any person can be encrypted by his/her public key
(that could be officially listed like phone numbers).
C. Decryption: Only the person being addressed can easily decrypt the secret message

using the private key.


Fig. 7 Structure of RSA Algorithm Structure

3.

Mobile Voting Systems:


Mobile Voting System (MVS) is a system that will operate in parallel with the existing

manual and automated voting processes. It will enable legitimate voters to cast their vote from
wherever they please using their mobile devices unlike other means that require the voter to
appear at the polling station. This will help alleviate the nuisance of long queues at poll-sites
which waste a lot of time. It will also ease the vote-counting process which will be done
11

www.SeminarsTopics.com

instantly as the voting progresses and a graphical display will be available on a site (attached to
the system) for all stakeholders to view progress, hence ensuring transparency.
Mobile voting falls under a category of voting called e-voting, which is short for electronic
voting, and refers to the option of using electronic means to vote in referendums and elections.
There are systems such as DRE (Direct Electronic Recording) voting machines that record the
vote without that vote being transmitted over the Internet or another network. The interface of a
DRE machine can be a touch screen or a scanner that scans the ballot paper where the voter
marked the vote.
The vote is then registered and stored in the voting machine. Then there is voting over the
Internet that uses a PC with an Internet-connection to cast the vote and send it to be stored in
another remote computer. Personal Digital Assistants (PDAs), telephones or mobile phones can
also be used to cast a vote electronically.
Besides its hype and advantages over traditional voting systems, MVS reliability, security and
transparency are still issues that limit its deployment in many countries.
Mobile Voting still faces a number of risks and challenges. These include;
Risks
1. Third parties: Unauthorized intervention of third parties in the voting process. Given the
current state of information technology, there is no guarantee, that a programmed would
not be manipulated to allow the storage and printing of a form or document different from
the one appearing on the screen.
2. Errors and technical malfunctions: More difficult to detect and identify the source of
errors and technical malfunctions than with conventional procedures.
3. Unreliability: Possibility that fully digitized system would fail to produce results and
lack physical back-up records, making a public recount difficult or impossible.

Challenges
1. Security: In the context of remote e-voting, special attention should be given to the
process guaranteeing a free and secret vote. Only entitled voters are allowed to cast a vote
and this requires that every voter be authenticated (e.g. by using a PIN -Personal
12

www.SeminarsTopics.com

Identification Number or TAN -Transaction Number or by the use of digital signature)


and their right to vote verified. In order to prevent multiple votes being cast or other
misuse, a record must be made and checked in order to establish whether the voter has
already cast a vote. There must be an electronic separation between the vote and the
identification of the voter.
2. Reliability: Mobile Voting Systems have to interact with some database server, or some
other server, over a network. There might be instances when this network goes down
during the voting process which may cause a potential voter to miss out on casting his/her
vote, especially when he/she planned to use the system with no aim of going to the pollsite. Keeping the network stable and available during the voting process is a challenge
that MVS application developers need to consider.
3. Skepticism: Networks have been widely used all around the world in a number of sectors
due to their benefits. The internet is the worlds largest network, with billions of dollars in
transactions being carried out over it per fiscal year. Nevertheless, a large number of
people, especially in developing countries where internet technologies are beginning to
gain ground, still doubt the power that it brings into speeding up communication and
information sharing. As governments begin to adopt e-voting, Mobile Voting for that
matter, people doubt the security and transparency of such schemes just as they do for the
internet.

Mobile Voting Systems are composed of several interacting agents, the Vote Collector, the
Vote Manager, the Vote Authority, the Candidate, and the Voters. The Vote Authority (VA) is
responsible for registering candidates for elections and commissioning Vote Managers. The Vote
Collector (VC) is a mobile agent mandated by a stationary Vote Manager (VM) agent to collect
votes from stationary voting agents (VOs). The arrangement of the system in such components
can ensure a stable system suitable for voting.

Usage of Mobile Voting Systems:


13

www.SeminarsTopics.com

Citizens around the world recognize and embrace the benefits of e-Government services
such as online tax filing, license renewal, and benefits claims. Now governments are initiating
strategies that support e-democracy and in doing so, engaging more citizens in democratic
processes. This briefly addresses the highly formal processes of e-democracy, e-voting in
particular, to offer governments and democratic-based entities worldwide the infrastructures,
applications, and services necessary to implement and manage reliable, secure e-voting systems.
Today, the development and widespread use of information technologies is changing the
way people view voting processes and, ultimately, the way they vote.
Mobile Voting Systems offer multiple advantages over traditional paper-based voting
systems-advantages that increase citizen access to democratic processes and encourage
participation. explains these advantages as below;
Reduced costs - E-voting systems reduce the materials required for printing and distributing
ballots. Internet based voting, in particular, offers superior economies of scale in regard to the
size of the electoral roll.
Increased participation and voting options - E-voting offers increased convenience to the voter
encourages more voters to cast their votes remotely, and increases the likelihood of participation
for mobile voters. Additionally, it permits access to more information regarding voting options.
Greater speed and accuracy placing and tallying votes -E-voting's step-by-step processes help
minimize the number of miscast votes. The electronic gathering and counting of ballots reduces
the amount of time spent tallying votes and delivering results.
Greater accessibility for the disabled and the sick - Because they support a variety of
interfaces and accessibility features, e-voting systems allow citizens with disabilities-especially
the visually impaired-to vote independently and privately.

14

www.SeminarsTopics.com

Flexibility - E-voting can support multiple languages, and the flexible design allows up-to-theminute ballot modifications.
According to Lumu (2011), an article on the aftermath of 18 th February 2011 presidential
elections in Uganda, invalid votes accounted for 4% of the votes. This makes the issue of invalid
votes in manual voting systems a big problem. However, with a mobile voting system, there will
be little or no invalid votes due to the use of option buttons on the electronic ballots to represent
candidates.
The Current Voting Process
According to the Electoral Commission Board (2006), Constitutionalism, rule of law and
good governance are the fundamental pillars of democracy. Democracy, irrespective of whatever
form it takes in different national domains must not lose its universal sense of a government of
the people, by the people and for the people. This is why democratic leadership in any country
should only be accessed through a free and fair electoral process which is the foundation of true
democracy.
Lists the steps used in the manual electoral process as follows;
1. Formulating legislation, through Parliament, that will guide and support any election
process.
2. Calling of elections,
3. Registration of candidates,
4. Preparation and display of voters register at polling stations
5. Voting at polling stations
6. Counting and tallying of votes,
7. Declaration of results by the Electoral Body
A citizen of Uganda of or above 18 years who is registered has the right to vote in a parish or
ward where he or she is registered as a voter for public elections and a referenda. That person
cannot be compelled to vote in any election in Uganda under the present constitution. A person,
however, is not qualified to vote at an election if he/she is not a registered voter.

15

www.SeminarsTopics.com

Example of Mobile Phone Voting System:

Phone to Phone voting system requirements:


1. Voter can send short text message from his/her smart phone to specific smart phone
running voting software A (Android version).
2. Upon receipt of the short text message containing the ID number of the best poster (only
one should be selected), the said ID number will be entered in a Tally Table with
attributes Candidate ID, count.
3. The phone number of the voter will be remembered in a Voter Table with attributes Voter
Phone No, Candidate ID, so that no voter can use the same phone to vote twice.
4. The administrator at the smart phone running voting software A can issue a special
command, which will terminate the voting. The voting software A will display the Tally
Table in decreasing number of votes so that the first winner will be displayed first and so
on. At the end the Voter Table will be eliminated.

Phone to PC voting system requirements:

16

www.SeminarsTopics.com

1. Voter can send email from his/her smart phone to specific PC running voting software X
(Linux version).
2. Upon receipt of the email containing the ID number of the best poster (only one should be
selected), the said ID number will be entered in a Tally Table with attributes Candidate
ID, count.
3. The phone number of the voter will be remembered in a Voter Table with attributes Voter
Phone No, Candidate ID, so that no voter can use the same phone to vote twice.
4. The administrator at the PC running voting software X can issue a special command,
which will terminate the voting. The voting software X will display the Tally Table in
decreasing number of votes so that the first winner will be displayed first and so on. At
the end the Voter Table will be eliminated.

Phone to Phone or PC voting system requirements:


1. An integration of the above two approaches, so that a voter can either vote by sending
short text message to a specific smart phone, or by sending email to a PC.
2. The voting software A on the smart phone will forward e-mail to PC, so that the PC will
receive all the votes.
3. The final tally will be done by voting software X, which will display the final results.
4. Both voting software A and voting software X will eliminate its Voter Table at the end.

4. IRIS RECOGNITION:
Iris

recognition is

an

automated

method

of biometric identification

that

uses

mathematical pattern-recognition techniques on video images of one or both of the irises of an


17

www.SeminarsTopics.com

individual's eyes, whose complex random patterns are unique, stable, and can be seen from some
distance.
Retinal scanning is a different, ocular-based biometric technology that uses the unique
patterns on a person's retina blood vessels and is often confused with iris recognition. Iris
recognition uses video camera technology with subtle near infrared illumination to acquire
images of the detail-rich, intricate structures of the iris which are visible externally. Digital
templates encoded from these patterns by mathematical and statistical algorithms allow the
identification of an individual or someone pretending to be that individual. Databases of enrolled
templates are searched by matcher engines at speeds measured in the millions of templates per
second per (single-core) CPU, and with remarkably low false match rates.
Several hundred millions of persons in several countries around the world have been enrolled
in iris recognition systems for convenience purposes such as passport-free automated bordercrossings, and some national ID programs. A key advantage of iris recognition, besides its speed
of matching and its extreme resistance to false matches is the stability of the iris as an internal
and protected, yet externally visible organ of the eye.

IRIS ACQUISITION:
Contrary to popular belief, iris biometrics systems do not use laser-scans to capture the
image of the human eye. Instead, an infrared photo or video camera is used at a set distance to
capture a high quality image of the iris. Working in the infrared range provides many advantages
when compared to the visible range: iris ridges, nerves, and crypts are more evident the border
between the iris and the pupil is more pronounced; and users are not exposed to annoying flashes.
Currently, most of the work performed in this area has been dedicated to improving user-system
interaction by developing cameras where the focusing system is automatic, such that users are not
required to remain steady at a fixed point in front of the camera.

IRIS SEGMENTATION:
The main purpose of this process is to locate the iris on the image and isolate it from the rest
of the eye image for further processing. Some other important tasks that are also performed in
18

www.SeminarsTopics.com

this iris segmentation block include image quality enhancement, noise reduction, and emphasis of
the ridges of the iris. Several proposals have been made by different authors for iris location and
segmentation, wherein most consider iris detections finding two circumferences that model the
iris boundaries.Daugman has proposed an integro differencial operator, which works by
examining the difference in pixel levels between circles drawn in the image. Sanchez-Avila has
used a similar operator, but search for the maximum difference in lines drawn crossing the entire
image. Other authors use the Hough transforms for circle detection. Recently, Daugman has
proposed a new method for seeking the iris boundary by using active contour models Here, the
iris location varies depending on preset external and internal forces until an equilibrium state is
reached. Similar solutions have also been used by Ritter and Ross.
FEATURE EXTRACTION:
In the feature extraction block, different authors have presented a wide variety of
proposals. The majority of these begin with a normalization of the segmented iris image. This
normalization becomes necessary when considering that the pupil varies in size for different light
intensities. The normalization method varies from changes to the polar coordinate system, as
Daugman proposed, to only considering a virtual line drawn around the pupil, known as the iris
signature. After normalization, Daugman has studied the phase information by applying different
Gabor filters. This was followed by the codification of this information in terms of the quadrant
where the phase belongs however, Wilds, performs the extraction using Laplacian or Gaussian
filters by obtaining several images of different scales for posterior comparison . SanchezAvila et
al. have proposed in two different feature extraction approaches: one using Gabor filters
weighting for small portions of the segmented iris image and another one based on the use of
dyadic wavelet transformations and their zero crossing representation. Li Ma have proposed a
similar approach, but applies the dyadic wavelet transformation on a 1-D intensity signal instead
of the iris signature approach used by SanchezAvila. Boles have also based their proposal on the
dyadic wavelet transform, but on a normalized iris image (as proposed by Daugman), i.e., by
using a 2-D wavelet transform on the polar scale representation of the iris, as opposed to the two
previous algorithms that work in 1-D.

MATCHING:
Although some authors have studied other matching algorithms the most employed
matching algorithm has been the Hamming distance, as was initially proposed by Daugman. The
19

www.SeminarsTopics.com

Hamming distance is described by the following equation: where is the vector length and are the
component of the template and sample vector, respectively, which are XOR in the equation. If the
distance obtained is below a predefined threshold level, the studied sample is considered to
belong to the user whose template is being studied. Selection of the threshold level usually
depends on the final application.

ANATOMY OF THE HUMAN IRIS:


The iris is a thin circular diaphragm, which lies between the cornea and the lens of the
human eye. The iris is perforated close to its center by a circular aperture known as the pupil. The
function of the iris is to control the amount of light entering through the pupil, and this is done by
the sphincter and the dilator muscles, which adjust the size of the pupil. The average diameter of
the iris is 12 mm, and the pupil size can vary from 10% to 80% of the iris diameter. The iris
consists of a number of layers; the lowest is the epithelium layer, which contains dense
pigmentation cells. The stromal layer lies above the epithelium layer, and contains blood vessels,
pigment cells and the two iris muscles. The density of stromal pigmentation determines the
colour of the iris. The externally visible surface of the multi-layered iris contains two zones,
which often differ in colour. An outer ciliary zone and an inner pupillary zone, and these two
zones are divided by the collarette which appears as a zigzag pattern.

Fig 1.1:A front-on view of the human eye


Formation of the iris begins during the third month of embryonic life. The unique pattern
on the surface of the iris is formed during the first year of life, and pigmentation of the stroma
takes place for the first few years. Formation of the unique patterns of the iris is random and not
20

www.SeminarsTopics.com

related to any genetic factors. The only characteristic that is dependent on genetics is the
pigmentation of the iris, which determines its color. Due to the epigenetic nature of iris patterns,
the two eyes of an individual contain completely independent iris patterns, and identical twins
possess uncorrelated iris patterns.

2.2History and development of IRIS:


The human iris begins to form during the third month of gestation. The structures creating
its distinctive pattern are completed by the eighth month of gestation hut pigmentation continues
in the first years after birth. The layers of the iris have both ectodermic and embryological origin,
consisting of: a darkly pigmented epithelium, pupillary dilator and sphincter muscles, heavily
vascularized stroma and an anterior layer chromataphores with a genetically determined density
of melanin pigment granules. The combined effect is a visible pattern displaying various distinct
features such as arching ligaments, crypts, ridges and zigzag collaratte. Iris color is determined
mainly by the density of the stroma and its melanin content, with blue irises resulting from an
absence of pigment: long wavelengths are penetrates and is absorbed by the pigment epithelium,
while shorter wavelengths are reflected and scattered by the stroma. The heritability and
ethnographic diversity of iris color have long been studied. But until the present research, little
attention had been paid to the achromatic pattern complexity and textural variability of the iris
among individuals.
A permanent visible characteristic of an iris is the trabecular mesh work, a tissue which
gives the appearance of dividing the iris in a radial fashion. Other visible characteristics include
the collage nous tissue of the stroma, ciliary processes, contraction furrows, crypts, rings, a
corona and pupillary frill coloration and sometimes freckle. The striated anterior layer covering
the trabecular mesh work creates the predominant texture with visible light.

2.3 STAGES INVOLVED IN IRIS DETECTION


It includes Three Main Stages
21

www.SeminarsTopics.com

2.3.1) Image Acquisition and Segmentation


2.3.2) Image Normalization
2.3.3) Feature Coding and Matching

5. CRYPTOGRAPHIC TECHNIQUES:
Cryptography is one of the essential technologies used in building a secure VPN.
Different applications of the same basic algorithms can provide both encryptions that keep data
secret and authentication that ensures the two security peers in a VPN are who they claim to be.
This chapter introduces some basic concepts in cryptography and demonstrates how they can be
used in practice to provide data confidentiality. The next chapter continues this theme with a
discussion of mutual authentication using cryptographic algorithms.
Data confidentiality may be provided by one of two categories of encryption algorithm,
namely symmetric cryptography and asymmetric cryptography. Symmetric, or conventional,
cryptography requires that the sender and receiver share a key, which is an item of secret
information used to encrypt and decrypt data. The process by which two peers agree upon a key
over an insecure medium can be problematic as, until the key is agreed, the peers have no way to
communicate in secret. Asymmetric, or Public Key, cryptography solves the key exchange
problem by using two keys, either of which may be used to encrypt a message. The encrypted
data may then only be decrypted by means of the other key. Messages may be received securely
by publishing one of the keys (for example, in the footer of an e-mail message) as a Public Key
and keeping the second, the Private Key, secret. Anyone wishing to send a secure communication
may then encrypt the message with the recipients Public Key and, providing the Private Key has
not been disclosed, only the intended recipient will be able to decrypt the encrypted text and
recover the original message.
Cryptography or cryptology; from Greek, "hidden, secret"; and "writing", or "study",
respectively is the practice and study of techniques for secure communication in the presence of
third parties called adversaries.[2]These adversaries are often referred to as Eve in cryptography,
while the sender and recipient of messages are called Alice and Bob respectively. More generally,
cryptography is about constructing and analyzing protocols that prevent third parties or the public
22

www.SeminarsTopics.com

from

reading

private

messages;[4] various

aspects

in information

security such

as

data confidentiality, data integrity, authentication, and non-repudiation[5] are central to modern
cryptography. Modern cryptography exists at the intersection of the disciplines of mathematics,
computer science, and electrical engineering. Applications of cryptography include ATM
cards, computer passwords, and electronic commerce.
Cryptography prior to the modern age was effectively synonymous with encryption, the
conversion of information from a readable state to apparent nonsense. The originator of an
encrypted message (Alice) shared the decoding technique needed to recover the original
information only with intended recipients (Bob), thereby precluding unwanted persons (Eve)
from doing the same. Since World War I and the advent of the computer, the methods used to
carry out cryptology have become increasingly complex and its application more widespread.
Modern cryptography is heavily based on mathematical theory and computer science
practice; cryptographic algorithms are designed around computational hardness assumptions,
making such algorithms hard to break in practice by any adversary. It is theoretically possible to
break such a system, but it is infeasible to do so by any known practical means. These schemes
are therefore termed computationally secure; theoretical advances, e.g., improvements in integer
factorization algorithms, and faster computing technology require these solutions to be
continually adapted. There exist information-theoretically secure schemes that provably cannot
be broken even with unlimited computing poweran example is the one-time padbut these
schemes are more difficult to implement than the best theoretically breakable but
computationally secure mechanisms.
The growth of cryptographic technology has raised a number of legal issues in the
information age. Cryptography's potential for use as a tool for espionage and sedition has led
many governments to classify it as a weapon and to limit or even prohibit its use and export. [6] In
some jurisdictions where the use of cryptography is legal, laws permit investigators to compel the
disclosure of encryption keys for documents relevant to an investigation. Cryptography also
plays a major role in digital rights management and piracy of digital media.

5. SCOPE:

23

www.SeminarsTopics.com

In our proposed system registration process done through website which minimize time,
energy and cost. Voting done through the SMS only so it provides mobility option to the voter.
Because of RSA security double voting will prevented dandy offer choice to the public to cast
their vote through their cell phone? This system used for government election if we used this
system in cloud computing then it will give more benefit. It has more scope for small election to
government election process.

6. CONCLUSION:
This paper proposes mobile phone voting system avoid double voting in case of casting
ballots first from mobile phone and then from pooling booth. Proposed system is more useful,
efficient and reliable in mobile phone voting process. This system does not require any internet
facility, thus this proposed system is decreased expensive hardware cost. Proposed mobile phone
voting System required mobile phone and SIM card.

24

Вам также может понравиться