Sie sind auf Seite 1von 1

RESEARCH PAPERS

MOBILE VOTING SYSTEM USING IRIS RECOGNITION AND CRYPTOGRAPHY TECHNIQUES

By S. PRAVEEN **

K. GOPAL *

N. SUTHANTHIRA VANITHA ***

*,** BE. II-EEE, Knowledge Institute of Technology, Salem, India. *** Professor, Department of EEE, Knowledge Institute of Technology, Salem, India.

ABSTRACT

With the advancement of electronics and computer science, mobile communication technology leads us to a fast moving entirely different world. In this scenario, we have lot of responsibilities, one of it is voting for our country, but even we don't have time for it, and also our votes may not useful to our nation, because of fake votes and cheating process happened during the election. This problem is rectified by the latest voting system as “Mobile Voting System” which is discussed in this paper. The mobile voting system uses the efficient techniques, iris recognition and cryptography for the secured voting process. The iris recognition and cryptography avoids the fake votes and cheating process. The election commission spends lot of money, for each election unnecessarily, which will be minimized by this system. This system enables the voter to vote to the Nation from his place itself.

Keywords: Iris Recognition and Iris Code, Cryptography Techniques, Mobile and RSA Algorithm.

INTRODUCTION

Mobile voting system use the iris recognition and cryptography techniques, for voting purpose, the encryption algorithm is uploaded in the mobile phone. As like the eye scanner which scans the iris is fixed in the mobile, so the mobile phone having camera is preferred for that. To obtain the voting the voters eye iris is recognized. During the transmission from the source (mobile) to destination (election database system) the data is encrypted using the encryption algorithm. The data sending and receiving is doing with the help of the mobile networks.

1. Iris Recognition

Everyone in the world has the uniqueness of their own; such uniqueness cannot be imitated/remake by anyone. Such uniqueness is used for a security purpose. As an iris technology produces a very low false rate when compared to other biometrics results are very preferable in our mobile voting system.[1],[2]

1.1Iris Scanning

Iris scanning can seem very futuristic, but at the heart of the system is a simple CCD digital camera. It uses both visible and near-infrared light to take a clear, high-contrast

picture ofaperson's iris.

With near-infrared light, a person's pupil is very black, making it easy for the computer to isolate the pupil and iris[1],[2][6]. On look into an iris scanner, either the cameras focuses automatically or use a mirror or audible feedback from the system to make sure that eye is positioned correctly as shown in Figure1. Iris scanner is actually not a scanning device, but it is a digital camera with iris scanning software. Usually, eye should be 20 to 25 cm from the camera. When the camera takes a picture, the computer locates: shown in Figure 2.

l

l

l

l

The center ofthe pupil

The edge ofthe pupil

The edge ofthe iris

The eyelids andeyelashes

It then analyzes the patterns in the iris and translates them into a code. Iris scanners are becoming more common in high-security applications because people's eyes are so unique (the chance of mistaking one iris code for another is 1 in 10 to the 78th power they also allow more than 200 points of reference for comparison, as opposed to 60 or 70 points in fingerprints. The iris is a visible but protected structure, and it does not usually change over time,

38

i-manager’s J

ournal on Electrical Engineering

, Vol.

4

l

No. 3

l January - March 2011