SECURE VOTER AUTHENTICATION FOR RELIABLE VOTING PROCESS USING RFID AND BIOMETRIC

被引:0
|
作者
Bharath, S. [1 ]
Tharun, S. [1 ]
Kalanandhini, G. [1 ]
机构
[1] Prince Shri Venkateshwara Padmavathy Engn Coll, Dept Elect & Commun Engn, Chennai 127, Tamil Nadu, India
关键词
Voting; IoT(Internet of Things); Wireless; WIND TURBINE; VIBRATION;
D O I
10.9756/INTJECSE/V14I5.27
中图分类号
G76 [特殊教育];
学科分类号
040109 ;
摘要
Voting machines are the entire aggregate of mechanical, electromechanical, or digital equipment (including software, firmware, and documentation required to application manipulate and assist equipment), this is used to outline ballots to solid and rely votes to document or show election effects and to preserve and convey any audit path information. The first vote casting machines had been mechanical however it's far an increasing number of not unusual place to use digital vote casting machines. Moreover, it's also vital that a fake access must now no longer be made so for this one of the maximum stable techniques for vote casting is the usage of a biometric sensor like a fingerprint reader. In this project, a Fingerprint reader is getting used for presenting get entry to to the voter in addition to creating a log if the individual has voted or now no longer.
引用
收藏
页码:286 / 294
页数:9
相关论文
共 50 条
  • [21] Multi-biometric cryptosystem using graph for secure cloud authentication
    Rajan, R. Ashoka
    Kumaran, P.
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 38 (05) : 6437 - 6444
  • [22] A Secure and Compact Multimodal Biometric Authentication Scheme using Deep Hashing
    Sivakumar, P.
    Rathnam, B. Ruthu
    Divakar, S.
    Teja, M. Anil
    Prasad, R. Rajendra
    2021 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS, SMART AND GREEN TECHNOLOGIES (ICISSGT 2021), 2021, : 27 - 31
  • [23] Security, usability, and biometric authentication scheme for electronic voting using multiple keys
    Ahmad, Masood
    Rehman, Ateeq Ur
    Ayub, Nighat
    Alshehri, M. D.
    Khan, Muazzam A.
    Hameed, Abdul
    Yetgin, Halil
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (07)
  • [24] Secure Behavioral Biometric Authentication with Leap Motion
    Xiao, Grady
    Milanova, Mariofanna
    Xie, Mengjun
    2016 4TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2016, : 112 - 118
  • [25] Secure biometric authentication for weak computational devices
    Atallah, MJ
    Frikken, KB
    Goodrich, MT
    Tamassia, R
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2005, 3570 : 357 - 371
  • [26] Incremental Design of Secure Biometric Identification and Authentication
    Zhou, Linghui
    Oechtering, Tobias J.
    Skoglund, Mikael
    2021 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2021, : 3196 - 3201
  • [27] Private Eyes: Secure Remote Biometric Authentication
    Syta, Ewa
    Fischer, Michael J.
    Wolinsky, David
    Silberschatz, Abraham
    Gallegos-Garcia, Gina
    Ford, Bryan
    2015 12TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (ICETE), VOL 4, 2015, : 243 - 250
  • [28] ECG BASED BIOMETRIC FOR DOUBLY SECURE AUTHENTICATION
    Safie, Sairul I.
    Soraghan, John J.
    Petropoulakis, Lykourgos
    19TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO-2011), 2011, : 2274 - 2278
  • [29] Securing biometric templates for reliable identity authentication
    Khan, MK
    Zhang, JS
    ADVANCES IN INTELLIGENT COMPUTING, PT 2, PROCEEDINGS, 2005, 3645 : 723 - 732
  • [30] A Secure and Efficient RFID Authentication Protocol
    Yang, Xin
    Yang, Rui-ke
    INTERNATIONAL CONFERENCE ON COMPUTER, NETWORK SECURITY AND COMMUNICATION ENGINEERING (CNSCE 2014), 2014, : 417 - 421