Академический Документы
Профессиональный Документы
Культура Документы
com
Seminar Report
On
MOBILE VOTING SYSTEM USING IRIS RECOGNITION
AND CRYPTOGRAPHY TECHNIQUES
www.SeminarsTopics.com
ABSTRACT
With the advancement of electronics and computer science, mobile communication
technology leads us to a fast moving entirely different world. In this scenario, we have lot of
responsibilities, one of it is voting for our country, but even we don't have time for it, and also
our votes may not useful to our nation, because of fake votes and cheating process happened
during the election. This problem is rectified by the latest voting system as Mobile Voting
System which is discussed in this paper. The mobile voting system uses the efficient techniques,
iris recognition and cryptography for the secured voting process. The iris recognition and
cryptography avoids the fake votes and cheating process. The election commission spends lot of
money, for each election unnecessarily, which will be minimized by this system. This system
enables the voter to vote to the Nation from his place itself.
www.SeminarsTopics.com
1. INTRODUCTION:
Mobile voting system use the iris recognition and cryptography techniques, for voting
purpose, the encryption algorithm is uploaded in the mobile phone. As like the eye scanner which
scans the iris is fixed in the mobile, so the mobile phone having camera is preferred for that. To
obtain the voting the voters eye iris is recognized. During the transmission from the source
(mobile) to destination (election database system) the data is encrypted using the encryption
algorithm. The data sending and receiving is doing with the help of the mobile networks.
As democracies across the globe fight challenges related to electronic voting systems,
here a mobile phone-based voting system that incorporated into the current large-scale election
process, gives the promising research. Traditionally, voting process is organized in centralized or
distributed manner called voting booths. The earlier process of election is quite complex and time
consuming. People were waiting in queue for long time. To reduce this problem mobile voting
system is introduced. This mobile voting system provide many benefits like we dont need to go
to polling booths, no need to use paper ballots and we have time and cost efficiency and it also
avoid tiredness and violence . In our system there is no expensive hardware is used. For the
different reasons, voters may not able to come to the voting booths physically, but now with the
use of this new system he can vote remotely. For example, he can vote from home or while
travelling abroad or sitting in the Office. Thats why there is more demand for remote voting. In
this system procedures are easy, transparent and most secure.
Today the most common way for remote voting is postal voting, where voters cast their
votes by cell Phones...Internet voting was introduced to provide more flexibility. Because of the
inherited security vulnerabilities Of the Internet and computerized systems. In general, Phone
Voting System (MPVS) provides mobility feature. Internet voting there is awide range of
criticism. Mobile However this technology accesses certain security threats for its successful
implementation in election. Without eliminating these security threats like buying a vote and
Coercion, online registration, secrecy of ballot, anonymity of voter and double voting this latest
technology cant be allowed. An efficient and reliable system is essential for the trustworthy and
successful implementation of this technology. In our system we design mobile application for evoting (electronic voting) process. The proposed system uses mobile phone device having: small
3
www.SeminarsTopics.com
in size, low power, low-price as compared to computers and Direct Recording Electronic voting
System, Electronic Voting Machines, provide mobility feature and security. Proposed system
uses Global System for Mobile Communication technology which is a secure and globally used
mobile technology in the current situation. Mobile phone also uses Subscriber Identity Module
technology which provides user identity privacy, user identity verification and subscriber data
secrecy providing more security to the proposed system.
The key features of our proposed Mobile Phone Voting System is:
1. Eligibility: only authorized voter can cast their vote.
2. Uniqueness: Each user can cast their only one vote.
3. Integrity: Valid vote should not be modified or deleted.
4. Fairness: The election result should not be accessible before the official time ended.
5. Secrecy: No one should be able to find how voter cast their vote.
6. Cost-effectiveness: Election system should be efficient and affordable.
2. LITERATURE REVIEW:
Voting through the mobile phone it is the new and advanced area of research. We take the
review of some IEEE papers which presented in past.
[1] Proposes mobile phone voting system developed on modular square root and blind signature
system. System uses confidentiality of voter, secrecy of ballot, voter anonymity and no
computation cost and communication overhead. CA (certificate authority) involves as third party
that is distribution of certificates to voters is the responsibility of CA for authentication purposes,
delayed occurred which make the process slow.
[2] Proposes mobile phone voting system using Global System for Mobile communication
technology. In the system voter authentication is occurred through GSM mobile operator. user
validation is done through GSM challenge-response protocol. System contain of four parts:
mobile phone; authentication server; verification server and result counting server. Proposed
system contain three levels: pre voting level; voting level and post voting level. For keeping
Voter secrecy using blind signature system. Because of GSM authentication setup public key
overhead is mostly decreased. More work is required to deal with the trust retained on
authentication server, end user device (ME) and application security.
www.SeminarsTopics.com
[3] Proposes mobile phone intermediate e-voting system uses the extended Pillars encryptions
system. This system is used to enforce the cut-of-the choose method to exclude the computational
zero knowledge evidences and show the effectiveness of the system. Proposed system is probably
safe in simulation-based prototype.
[4] Propose GSM based mobile phone voting system is used to cast vote without registering for
voting in advance and going to polling booths. System prevents repetition voting but It has big
disadvantage to security, proposes system does not used any cryptographic algorithm.
[5] Proposed mobile phone voting system based on public key encryption algorithm RSA.
Proposed system contains three parts: access control; voting and election administrator server.
First part holds validation and identification for the voters. Voting part done by ciphering voter
data using RSA algorithm And last part is the election administrator server classifies ending
result using decryption RSA private key for received encrypted data. System has disadvantages
like there is no any online registration and more expensive computational cost and
communication overhead due to RSA algorithm.
www.SeminarsTopics.com
www.SeminarsTopics.com
1) In the first step user will send their National Identity Card No + SIM Card No +
Symmetric Key which encrypt with public key of ECS to ECS server.
2) When ECS receiving data they will decrypt this data with his private key.
3) ECS will verify the users NIC and SIM card number with its two latest databases, one
consist public NIC numbers and other database consist SIM card numbers.
4) If ECS verified that user is authentic then,
5) ECS will send PIN encrypted with user symmetric key to the user. This PIN will be
used for the authenticity of the voter in the latter stages of the election process.
6) Receiving this user will decrypt the PIN with his/her symmetric key. User should
securely keep their PIN from disclosing to others because its disclosing will compromised
confidentiality.
7) When Mobile phone user got PIN then Mobile phone user will send acknowledgement
message to election commission server .Mobile phone user will become certified as mobile
phone voter. Here online registration phase will be completed.
8) This is offline registration phase which will be used in case someone registers
his/herself on genuine user credentials.
7
www.SeminarsTopics.com
9) When the genuine user registering his/herself with election commission server, ECS
will send registration problem message of cant be register through online registration phase and
will requested his/her to come to ECO for correction of their registration as someone already
register his/herself on genuine user credentials.
10) In this case user should go to election commission Office. The previous registration
will be canceled and genuine user will be register.
11) Election commission office (ECO).
B. Voting Phase:
1) In this phase, ECS will send candidate list to authenticated voter according to their
constituency via SMS encrypted with voter symmetric key. This will ensure that the candidate list
message only send to the authenticated voter list. This method also prevents unauthorized voter
to cast their vote...
2) After that voter will receive the SMS of candidate list on voting day.
3) In this step voter will select their candidate from the candidate list. After selecting their
candidate voter will then send the message to ECS with public key, candidate PIN encrypt both
with user symmetric key and again concatenate NIC number and send to ECS via SMS.
4) ECS will find user symmetric key using NIC number. Then it will decrypt the
remaining SMS part with user symmetric key. ECS will mark only the PIN part of the message
for the record purposes and to avoid double voting. The remaining encrypted candidate list
message will be forwarded to the vote collecting and result phase server.
Fig.3.Voting phase
www.SeminarsTopics.com
www.SeminarsTopics.com
10
www.SeminarsTopics.com
3.
manual and automated voting processes. It will enable legitimate voters to cast their vote from
wherever they please using their mobile devices unlike other means that require the voter to
appear at the polling station. This will help alleviate the nuisance of long queues at poll-sites
which waste a lot of time. It will also ease the vote-counting process which will be done
11
www.SeminarsTopics.com
instantly as the voting progresses and a graphical display will be available on a site (attached to
the system) for all stakeholders to view progress, hence ensuring transparency.
Mobile voting falls under a category of voting called e-voting, which is short for electronic
voting, and refers to the option of using electronic means to vote in referendums and elections.
There are systems such as DRE (Direct Electronic Recording) voting machines that record the
vote without that vote being transmitted over the Internet or another network. The interface of a
DRE machine can be a touch screen or a scanner that scans the ballot paper where the voter
marked the vote.
The vote is then registered and stored in the voting machine. Then there is voting over the
Internet that uses a PC with an Internet-connection to cast the vote and send it to be stored in
another remote computer. Personal Digital Assistants (PDAs), telephones or mobile phones can
also be used to cast a vote electronically.
Besides its hype and advantages over traditional voting systems, MVS reliability, security and
transparency are still issues that limit its deployment in many countries.
Mobile Voting still faces a number of risks and challenges. These include;
Risks
1. Third parties: Unauthorized intervention of third parties in the voting process. Given the
current state of information technology, there is no guarantee, that a programmed would
not be manipulated to allow the storage and printing of a form or document different from
the one appearing on the screen.
2. Errors and technical malfunctions: More difficult to detect and identify the source of
errors and technical malfunctions than with conventional procedures.
3. Unreliability: Possibility that fully digitized system would fail to produce results and
lack physical back-up records, making a public recount difficult or impossible.
Challenges
1. Security: In the context of remote e-voting, special attention should be given to the
process guaranteeing a free and secret vote. Only entitled voters are allowed to cast a vote
and this requires that every voter be authenticated (e.g. by using a PIN -Personal
12
www.SeminarsTopics.com
Mobile Voting Systems are composed of several interacting agents, the Vote Collector, the
Vote Manager, the Vote Authority, the Candidate, and the Voters. The Vote Authority (VA) is
responsible for registering candidates for elections and commissioning Vote Managers. The Vote
Collector (VC) is a mobile agent mandated by a stationary Vote Manager (VM) agent to collect
votes from stationary voting agents (VOs). The arrangement of the system in such components
can ensure a stable system suitable for voting.
www.SeminarsTopics.com
Citizens around the world recognize and embrace the benefits of e-Government services
such as online tax filing, license renewal, and benefits claims. Now governments are initiating
strategies that support e-democracy and in doing so, engaging more citizens in democratic
processes. This briefly addresses the highly formal processes of e-democracy, e-voting in
particular, to offer governments and democratic-based entities worldwide the infrastructures,
applications, and services necessary to implement and manage reliable, secure e-voting systems.
Today, the development and widespread use of information technologies is changing the
way people view voting processes and, ultimately, the way they vote.
Mobile Voting Systems offer multiple advantages over traditional paper-based voting
systems-advantages that increase citizen access to democratic processes and encourage
participation. explains these advantages as below;
Reduced costs - E-voting systems reduce the materials required for printing and distributing
ballots. Internet based voting, in particular, offers superior economies of scale in regard to the
size of the electoral roll.
Increased participation and voting options - E-voting offers increased convenience to the voter
encourages more voters to cast their votes remotely, and increases the likelihood of participation
for mobile voters. Additionally, it permits access to more information regarding voting options.
Greater speed and accuracy placing and tallying votes -E-voting's step-by-step processes help
minimize the number of miscast votes. The electronic gathering and counting of ballots reduces
the amount of time spent tallying votes and delivering results.
Greater accessibility for the disabled and the sick - Because they support a variety of
interfaces and accessibility features, e-voting systems allow citizens with disabilities-especially
the visually impaired-to vote independently and privately.
14
www.SeminarsTopics.com
Flexibility - E-voting can support multiple languages, and the flexible design allows up-to-theminute ballot modifications.
According to Lumu (2011), an article on the aftermath of 18 th February 2011 presidential
elections in Uganda, invalid votes accounted for 4% of the votes. This makes the issue of invalid
votes in manual voting systems a big problem. However, with a mobile voting system, there will
be little or no invalid votes due to the use of option buttons on the electronic ballots to represent
candidates.
The Current Voting Process
According to the Electoral Commission Board (2006), Constitutionalism, rule of law and
good governance are the fundamental pillars of democracy. Democracy, irrespective of whatever
form it takes in different national domains must not lose its universal sense of a government of
the people, by the people and for the people. This is why democratic leadership in any country
should only be accessed through a free and fair electoral process which is the foundation of true
democracy.
Lists the steps used in the manual electoral process as follows;
1. Formulating legislation, through Parliament, that will guide and support any election
process.
2. Calling of elections,
3. Registration of candidates,
4. Preparation and display of voters register at polling stations
5. Voting at polling stations
6. Counting and tallying of votes,
7. Declaration of results by the Electoral Body
A citizen of Uganda of or above 18 years who is registered has the right to vote in a parish or
ward where he or she is registered as a voter for public elections and a referenda. That person
cannot be compelled to vote in any election in Uganda under the present constitution. A person,
however, is not qualified to vote at an election if he/she is not a registered voter.
15
www.SeminarsTopics.com
16
www.SeminarsTopics.com
1. Voter can send email from his/her smart phone to specific PC running voting software X
(Linux version).
2. Upon receipt of the email containing the ID number of the best poster (only one should be
selected), the said ID number will be entered in a Tally Table with attributes Candidate
ID, count.
3. The phone number of the voter will be remembered in a Voter Table with attributes Voter
Phone No, Candidate ID, so that no voter can use the same phone to vote twice.
4. The administrator at the PC running voting software X can issue a special command,
which will terminate the voting. The voting software X will display the Tally Table in
decreasing number of votes so that the first winner will be displayed first and so on. At
the end the Voter Table will be eliminated.
4. IRIS RECOGNITION:
Iris
recognition is
an
automated
method
of biometric identification
that
uses
www.SeminarsTopics.com
individual's eyes, whose complex random patterns are unique, stable, and can be seen from some
distance.
Retinal scanning is a different, ocular-based biometric technology that uses the unique
patterns on a person's retina blood vessels and is often confused with iris recognition. Iris
recognition uses video camera technology with subtle near infrared illumination to acquire
images of the detail-rich, intricate structures of the iris which are visible externally. Digital
templates encoded from these patterns by mathematical and statistical algorithms allow the
identification of an individual or someone pretending to be that individual. Databases of enrolled
templates are searched by matcher engines at speeds measured in the millions of templates per
second per (single-core) CPU, and with remarkably low false match rates.
Several hundred millions of persons in several countries around the world have been enrolled
in iris recognition systems for convenience purposes such as passport-free automated bordercrossings, and some national ID programs. A key advantage of iris recognition, besides its speed
of matching and its extreme resistance to false matches is the stability of the iris as an internal
and protected, yet externally visible organ of the eye.
IRIS ACQUISITION:
Contrary to popular belief, iris biometrics systems do not use laser-scans to capture the
image of the human eye. Instead, an infrared photo or video camera is used at a set distance to
capture a high quality image of the iris. Working in the infrared range provides many advantages
when compared to the visible range: iris ridges, nerves, and crypts are more evident the border
between the iris and the pupil is more pronounced; and users are not exposed to annoying flashes.
Currently, most of the work performed in this area has been dedicated to improving user-system
interaction by developing cameras where the focusing system is automatic, such that users are not
required to remain steady at a fixed point in front of the camera.
IRIS SEGMENTATION:
The main purpose of this process is to locate the iris on the image and isolate it from the rest
of the eye image for further processing. Some other important tasks that are also performed in
18
www.SeminarsTopics.com
this iris segmentation block include image quality enhancement, noise reduction, and emphasis of
the ridges of the iris. Several proposals have been made by different authors for iris location and
segmentation, wherein most consider iris detections finding two circumferences that model the
iris boundaries.Daugman has proposed an integro differencial operator, which works by
examining the difference in pixel levels between circles drawn in the image. Sanchez-Avila has
used a similar operator, but search for the maximum difference in lines drawn crossing the entire
image. Other authors use the Hough transforms for circle detection. Recently, Daugman has
proposed a new method for seeking the iris boundary by using active contour models Here, the
iris location varies depending on preset external and internal forces until an equilibrium state is
reached. Similar solutions have also been used by Ritter and Ross.
FEATURE EXTRACTION:
In the feature extraction block, different authors have presented a wide variety of
proposals. The majority of these begin with a normalization of the segmented iris image. This
normalization becomes necessary when considering that the pupil varies in size for different light
intensities. The normalization method varies from changes to the polar coordinate system, as
Daugman proposed, to only considering a virtual line drawn around the pupil, known as the iris
signature. After normalization, Daugman has studied the phase information by applying different
Gabor filters. This was followed by the codification of this information in terms of the quadrant
where the phase belongs however, Wilds, performs the extraction using Laplacian or Gaussian
filters by obtaining several images of different scales for posterior comparison . SanchezAvila et
al. have proposed in two different feature extraction approaches: one using Gabor filters
weighting for small portions of the segmented iris image and another one based on the use of
dyadic wavelet transformations and their zero crossing representation. Li Ma have proposed a
similar approach, but applies the dyadic wavelet transformation on a 1-D intensity signal instead
of the iris signature approach used by SanchezAvila. Boles have also based their proposal on the
dyadic wavelet transform, but on a normalized iris image (as proposed by Daugman), i.e., by
using a 2-D wavelet transform on the polar scale representation of the iris, as opposed to the two
previous algorithms that work in 1-D.
MATCHING:
Although some authors have studied other matching algorithms the most employed
matching algorithm has been the Hamming distance, as was initially proposed by Daugman. The
19
www.SeminarsTopics.com
Hamming distance is described by the following equation: where is the vector length and are the
component of the template and sample vector, respectively, which are XOR in the equation. If the
distance obtained is below a predefined threshold level, the studied sample is considered to
belong to the user whose template is being studied. Selection of the threshold level usually
depends on the final application.
www.SeminarsTopics.com
related to any genetic factors. The only characteristic that is dependent on genetics is the
pigmentation of the iris, which determines its color. Due to the epigenetic nature of iris patterns,
the two eyes of an individual contain completely independent iris patterns, and identical twins
possess uncorrelated iris patterns.
www.SeminarsTopics.com
5. CRYPTOGRAPHIC TECHNIQUES:
Cryptography is one of the essential technologies used in building a secure VPN.
Different applications of the same basic algorithms can provide both encryptions that keep data
secret and authentication that ensures the two security peers in a VPN are who they claim to be.
This chapter introduces some basic concepts in cryptography and demonstrates how they can be
used in practice to provide data confidentiality. The next chapter continues this theme with a
discussion of mutual authentication using cryptographic algorithms.
Data confidentiality may be provided by one of two categories of encryption algorithm,
namely symmetric cryptography and asymmetric cryptography. Symmetric, or conventional,
cryptography requires that the sender and receiver share a key, which is an item of secret
information used to encrypt and decrypt data. The process by which two peers agree upon a key
over an insecure medium can be problematic as, until the key is agreed, the peers have no way to
communicate in secret. Asymmetric, or Public Key, cryptography solves the key exchange
problem by using two keys, either of which may be used to encrypt a message. The encrypted
data may then only be decrypted by means of the other key. Messages may be received securely
by publishing one of the keys (for example, in the footer of an e-mail message) as a Public Key
and keeping the second, the Private Key, secret. Anyone wishing to send a secure communication
may then encrypt the message with the recipients Public Key and, providing the Private Key has
not been disclosed, only the intended recipient will be able to decrypt the encrypted text and
recover the original message.
Cryptography or cryptology; from Greek, "hidden, secret"; and "writing", or "study",
respectively is the practice and study of techniques for secure communication in the presence of
third parties called adversaries.[2]These adversaries are often referred to as Eve in cryptography,
while the sender and recipient of messages are called Alice and Bob respectively. More generally,
cryptography is about constructing and analyzing protocols that prevent third parties or the public
22
www.SeminarsTopics.com
from
reading
private
messages;[4] various
aspects
in information
security such
as
data confidentiality, data integrity, authentication, and non-repudiation[5] are central to modern
cryptography. Modern cryptography exists at the intersection of the disciplines of mathematics,
computer science, and electrical engineering. Applications of cryptography include ATM
cards, computer passwords, and electronic commerce.
Cryptography prior to the modern age was effectively synonymous with encryption, the
conversion of information from a readable state to apparent nonsense. The originator of an
encrypted message (Alice) shared the decoding technique needed to recover the original
information only with intended recipients (Bob), thereby precluding unwanted persons (Eve)
from doing the same. Since World War I and the advent of the computer, the methods used to
carry out cryptology have become increasingly complex and its application more widespread.
Modern cryptography is heavily based on mathematical theory and computer science
practice; cryptographic algorithms are designed around computational hardness assumptions,
making such algorithms hard to break in practice by any adversary. It is theoretically possible to
break such a system, but it is infeasible to do so by any known practical means. These schemes
are therefore termed computationally secure; theoretical advances, e.g., improvements in integer
factorization algorithms, and faster computing technology require these solutions to be
continually adapted. There exist information-theoretically secure schemes that provably cannot
be broken even with unlimited computing poweran example is the one-time padbut these
schemes are more difficult to implement than the best theoretically breakable but
computationally secure mechanisms.
The growth of cryptographic technology has raised a number of legal issues in the
information age. Cryptography's potential for use as a tool for espionage and sedition has led
many governments to classify it as a weapon and to limit or even prohibit its use and export. [6] In
some jurisdictions where the use of cryptography is legal, laws permit investigators to compel the
disclosure of encryption keys for documents relevant to an investigation. Cryptography also
plays a major role in digital rights management and piracy of digital media.
5. SCOPE:
23
www.SeminarsTopics.com
In our proposed system registration process done through website which minimize time,
energy and cost. Voting done through the SMS only so it provides mobility option to the voter.
Because of RSA security double voting will prevented dandy offer choice to the public to cast
their vote through their cell phone? This system used for government election if we used this
system in cloud computing then it will give more benefit. It has more scope for small election to
government election process.
6. CONCLUSION:
This paper proposes mobile phone voting system avoid double voting in case of casting
ballots first from mobile phone and then from pooling booth. Proposed system is more useful,
efficient and reliable in mobile phone voting process. This system does not require any internet
facility, thus this proposed system is decreased expensive hardware cost. Proposed mobile phone
voting System required mobile phone and SIM card.
24