BIOMETRIC VOTING SYSTEM

Slides:



Advertisements
Similar presentations
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Advertisements

Commercial Data Processing Lesson 2: The Data Processing Cycle.
BIOMETRICS: Libraries have begun to see the value of biometrics. M.G. SELVI Technical Officer Center of Advanced Study in Crystallography and Biophysics,
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
(Biometrics Consortium)
Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System.
Development of Fingerprint and Iris Authentication Systems in Thailand Dr. Sarun Sumriddetchkajorn Electro-Optics Section, NECTEC Dr. Vutipong Areekul.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
Iris Recognition By Mohammed, Ashfaq Ahmed. Introduction Iris Recognition is a Biometric Technology which deals with identification based on the human.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Marjie Rodrigues
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Karthiknathan Srinivasan Sanchit Aggarwal
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
Authentication Approaches over Internet Jia Li
Alternative Input Devices Part B There will be a test on this information (both part a & b).
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
SEMINAR TOPIC ON GLOBAL WIRELESS E-VOTING
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
Identification and Biometrics By Jay Eichler. Introduction What is biometrics? What is biometrics? Types of biometrics Types of biometrics Controversy.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Biometrics.
By: Kirti Chawla. Definition Biometrics utilize ”something you are” to authenticate identification. This might include fingerprints, retina pattern, iris,
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
 Biometrics refers to the identification of humans by their characteristics or traits. Biometrics is used in computer science as a form of identification.
PRESENTATION ON BIOMETRICS
Biometric Technologies
BIOMETRICS.   technology/9742-1_ html.
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
WELCOME.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
BIOMETRICS.
Biometric Technology Jordan Seaton CIS 320 WKU. Essay Questions Which industries would find biometric technology the most useful? Why?
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
INDUSTRIAL-PROJECT ON “ Finger Print Based Time attendance system ” Presented By:- Shaikh Shahzad Adil Dyanand Lawty Waghmare Sachin Atul Tamsekar Amar.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
BIOMETRIC VOTING SYSTEM ( A novel way to vote ). INTRODUCTION :  It has always been an arduous task for the election commission to conduct free and fair.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
Biometrics Security in Banking Systems Image processing in ATM
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Challenge/Response Authentication
Authentication.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometric technology.
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
BY: Michael Etse and Maverick Fermill
Presentation transcript:

BIOMETRIC VOTING SYSTEM PRESENTED BY :- ANJALI YADAV 08IT518

What is biometrics?? Biometrics is the science that tries to fetch human biological features with an automated machine either to identify or authenticate. The traits may be fingerprints, hand geometry, facial geometry, retina patterns, voice recognition, and handwriting recognition. Biometric products remove the need for passwords and Personal Identification Numbers or PINs. It makes it comfortable and fast to record features.

Need for biometric voting system It has always been an arduous task for the election commission to conduct free and fair polls in our country. Now- a -days it has become common for some forces to indulge in rigging which may eventually lead to a result contrary to the actual verdict given by the people. So there is need for a new voting system employing biometrics in order to avoid rigging and to enhance the accuracy and speed of the process.

Biometric Features Fingerprint :-Fingerprint scanners are probably the most commonly used biometric system.Similar systems include hand geometry or palmprints Iris :-Another static property of individuals are eyes. One can either use pictures of the person’s iris or use a retina scanner that scans blood vessels to create an individual data set. Face :-Human face recognition by analyzing the size and position of different facial features is being pushed for use at several airports to increase security.

Biometric Features Voice :-A more behavioral individual aspect of humans are their voices. Everybody has a special mode and tone while speaking. Voice recognition tries to analyze these features and use them to identify a person. DNA analysis :-This is a rather more theoretical idea for biometric identification. Imagine a DNA reader that can create a full DNA analysis within seconds from just a few cells of a person’s body. Such a device would surely be a match to, e.g. a finger print reader, when comparing the quality of the results. Multi-Biometric Systems :-As a final approach to biometric data gathering, one can combine two or more actual biometric analyses and combine their results.

Block Diagram of the process

Design 1. Scanning- using DSP Processor 2. Searching- the thumb impression of a voter is entered as input and compared with the available records in the database. 3. Networking- all the election booths are connected in a network 4. Data transfer– using telephone lines

Finger print scanner 1. FINGER PRINT SENSOR: Scan the thumb impression. The data obtained from this is analog in nature. 2. A/D CONVERTER: Converts the analog data from the SENSOR into the digital data 3. FLASH ROM: This is for the storage of the data temporarily in the DSP processor. This will work until the data is transferred to the main memory of the HOST. 4. DSP CHIP: This is used to receive the data and process it. This is connected to the USB port for further transfer of the data. 5. USB PORT: The sole purpose of the USB port is to establish a communication link between the DSP processor and the MEMORY (DATABASE).

Extraction of thumb impression The features of the finger print are stored in the form of pixels. This is further sent for pattern matching where the finger print is then compared with the records in the database.

Scanning…Processing…Transfer The biometric sensor scans the image. This so scanned data is in the analog form. This is converted into digital form by using an A/D converter. The data received from the parallel in ports is further processed in the chip. The data which is processed in the DSP chip (finger print) is transferred in parallel to the HARD DISK for searching process. The HARD DISK is also interfaced in parallel with the chip. This helps the chip to transfer the image to the HARD DISK for further process. The image transferred to the HARD DISK is compared with that of the DATA BASE.

Example… 1. Party one, 2. Party two, 3. Party three, 4. Party four. Selected option2 Binary data transferred to port0010 After counting ,count of each party transferred to the transmitter. The transmitter data is transferred through the telephone lines to the HOST. The counts of similar parties are added at the host and the data is transferred to the STATE HEAD QUARTERS (main HOST) to display the result of the particular constituency.

Verification of Voters

Processing and Counting

Rejection of Voter Repetition

Formation of a Network

Advantages… The system is highly reliable and secure. In the long run the maintenance cost is very less when compared to the present systems. Illegal practices like rigging in elections can be checked for. Also the police station nearby to the election poll booth is informed about the identity of the imposter. It is possible to get instantaneous results and with high accuracy.

Conclusion… Thus the advent of this biometric thumb impression voting system would enable hosting of fair elections in India. This will preclude the illegal practices like rigging. The citizens can be sure that they alone can choose their leaders, thus exercising their right in the democracy.