Mobile Voting System using Iris Recognition and Cryptography Techniques

K. Gopal*, S. Praveen**, N. Suthanthira Vanitha***
*,** BE. II-EEE, Knowledge Institute of Technology, Salem, India.
*** Professor, Department of EEE, Knowledge Institute of Technology, Salem, India.
Periodicity:January - March'2011
DOI : https://doi.org/10.26634/jee.4.3.1398

Abstract

With the advancement of electronics and computer science, mobile communication technology leads us to a fast moving entirely different world. In this scenario, we have lot of responsibilities, one of it is voting for our country, but even we don’t have time for it, and also our votes may not useful to our nation, because of fake votes and cheating process happened during the election. This problem is rectified by the latest voting system as “Mobile Voting System” which is discussed in this paper. The mobile voting system uses the efficient techniques, iris recognition and cryptography for the secured voting process. The iris recognition and cryptography avoids the fake votes and cheating process. The election commission spends lot of money, for each election unnecessarily, which will be minimized by this system. This system enables the voter to vote to the Nation from his place itself.

Keywords

Iris Recognition and Iris Code, Cryptography Techniques, Mobile and RSA Algorithm.

How to Cite this Article?

K. Gopal, S. Praveen and N. Suthanthira Vanitha (2011). Mobile Voting System Using IRIS Recognition And Cryptography Techniques. i-manager’s Journal on Electrical Engineering, 4(3), 38-42. https://doi.org/10.26634/jee.4.3.1398

References

[1]. John D. Woodward (Jr.), Nicholas M.Orlans, PeterT.Higgins (2003). “Biometrics” The Mc-Graw Hill Companies.
[2]. Anil K. Jain, Patrick Joseph Flynn, Arun Abraham Ross (2008). “Handbook of biometrics” Springer.
[3]. Kahate (2008). “Cryptography and network security”, Tata MGRAW hill Publication Copyright 2003.
[4]. William Stallings. (2010). “Cryptography and Network Security, Principles and Practice”, Pearson Publications.
[5].I.A.Dhotre V.S.Bagad “Information Security”, http://books.google.co.in/books.
[6].Paul Reid “Biometrics for network security”, http://books.google.co.in/books.
[7].Behrouz A. Forouzan,”Cryptography and network security” 2008 http://books.google.co.in/books.
[8]. S. Kami Makki, Peter Reiher, Kia Makki (2007). “ Mobile and wireless network security and privacy”- 2007.
[9]. Friedhelm Hillebrand, Finn Trosby, Kevin Holley, Ian Harris ( 2010). “Short Message Service (SMS): The Creation of Personal Global Text Messaging”
[10].Krzysztof Wesolowski (2002).“Mobile communication systems”. http://books.google.co.in/ books.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.