Preview

E-Voting by Using Biometrics

Best Essays
Open Document
Open Document
2584 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
E-Voting by Using Biometrics
Majan College
MSC. In Computer Science
Secure Data Communication

E-Voting by using biometrics

Study of using Fingerprints and Iris in e-voting

Presented by: Muna Al-Busaidi.
Student ID:1032796

Presented to: Mr.Ramalingam D.

Answer for question (1) section (A):
Introduction
Biometrics is a technique to verify identity based on the unique physiological characteristic (physical and behavior) of human body such as finger print, iris, voice, DNA, face and signature, that can be identified using computer system where it can be stored in database.
The benefits of using biometrics are listed –but not limited to- the below points: 1. Providing security. 2. Speed in verification of identity. 3. Avoiding/minimizing fraud. 4. High availability.(Ahmed, 2010)
In gulf country the suitable methods for e-voting are: Fingerprint and Iris. “Fingerprint is the cheapest, fastest, most suitable and most reliable way to identify someone. And the tendency, due to scale, easiness and the existing foundation, is that the use of fingerprint will only increase”(Sul, 2011).
Fingerprint scanners are the most commonly used biometric system in the World. It is impossible to duplicate another person 's fingerprint in a form that the scanner will recognize. Fingerprint scanner works as follow: the client scan his finger in the scanner. The scanner automatically read the fingerprint and identifies it by comparing the original fingerprint image with stored templates image in the database. The metrics used in fingerprint-based authentication rely on the relative positions found for the minutiae. There are two facts about fingerprints, first fingerprints never change, second No two fingerprints are identical (Gaensslen, 2001).
“Obviously, iris is a high reliable biometric technology for its stability and the high variation degree between individuals. It has enormous pattern of variability among its different individuals. Unlike DNA and fingerprint, iris is



Bibliography: A.Forouzan, B., 2008. Cryptography & Network Security. new delhi: Tata Mc Graw. Hill campanies. Ahmed, f., 2010. biometrics & infomation security. In 6th annual confeence for saudi library and information association. riyadh , 2010. saudi library and information association. Al-Raisi, A.N. & Al-Khouri, A.M., 2006. Iris recognition and the challenge of homeland and border control security in UAE. Abu Dhabi: Elsevier Ltd. BILAL, M.B., 2000. ‘FAIR’ BPEL PROCESSES TRANSACTION USING NON-REPUDIATION PROTOCOLS. Lahore: University of Engineering & Technology University of Engineering & Technology. Components, i., 2011. OCR Components ICR Components & OMR Components. [Online] [Accessed 30 April 2011]. Gaensslen, H.C.L.a.R.E., ed., 2001. Advances of Fingepint Technology. second edition ed. Boca Raton: CRC Press. imaging components, 2011. OCR Components, ICR Components & OMR Components. [Online] Available at: HYPERLINK "www.imaging-components.com/Imaging-Components" www.imaging-components.com/Imaging-Components [Accessed 30 April 2011]. King, D.S., 2002. Testing Iris and Face Recognition in a Personnel Identification Application. Office of the Deputy Under Secretary of Defense. Kremer, O.M.a.S., n.d. An Optimistic Non-Repudiation Protocol with Transparent Trusted Third Party. 1050 Bruxelles Belgium: Universit¶e Libre de Bruxelles. Microsoft, 2011. Threats and Countermeasures for Web Services. [Online] Available at: HYPERLINK "http://msdn.microsoft.com/en-us/library/cc949001.aspx" http://msdn.microsoft.com/en-us/library/cc949001.aspx [Accessed 12 May 2011]. Sul, S., 2011. Classification-based Automatic Fingerprint Identification System for Large Distributed Fingerprint Database. Biometrics & Biostatistics, p.3. Vigneron, L., 2007. Optimistic Non-Repudiation Protocol Analysis. presentation. Heraklion: LORIA LORIA, Nancy-Universit.

You May Also Find These Documents Helpful

  • Good Essays

    IAFIS is the largest biometric database in the world. This system houses on average more than 70 million criminal files of subject along and around 34 million if not more civil prints. This system has more than 73,000 known terrorist that are suspected terrorist crimes against the United States. ("The fbi: Federal,2008”).…

    • 1081 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 4577 Words
    • 19 Pages

    When converting the biometric input, the software identifies specific points of data as match points. The match points are processed using an algorithm into a value that can be compared with biometric data in the database. The biometric feature must have the following characteristics:-(a) Universality, which means that every person should have the characteristic,(b) Uniqueness, two persons should not have the same term or measurement of Characteristic.(c) Permanence, the characteristic should be invariant with time.(d) Measurability, the characteristic can be quantified that is the origin of the Cameras used in biometric systems are generally either CCD (charge couple device) or CMOS(combined metal oxide semiconductor) image sensors. CCD is comparatively more costly than…

    • 4577 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    Biometric Devices Paper

    • 301 Words
    • 2 Pages

    Nadeer, Aisha Sati and Jonathon Richard White. Biometric Security. Chicago: Windy City Press, 2014. Print.…

    • 301 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Biometrics technologies are becoming a revolutionary role in which we identify individuals, and protect personal and national assets. This automated process of verifying a human being based on physiological or behavioral characteristics. Biometrics is increasingly being taken into consideration in solutions to improve our Homeland Security, effectively securing the United States national borders, law enforcement, corporate offices, and congressional offices. As well as, incorporating biometrics in an effort to prevent identity when using travel document, visas and other financial transactions.…

    • 537 Words
    • 3 Pages
    Good Essays
  • Good Essays

    There is a massive disagreement in the present day concerning the biometric identification technology which is used to boost the security through travel. The research inside these technologies has been used to extend ways in how the individuals identify faces for detection and develop the similar strategy in a replicated mechanical system that will scan faces and conclude their likeness with those in a database.…

    • 990 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Research Paper

    • 271 Words
    • 2 Pages

    In the 1800’s Francis Henry Galton undertook the first definitive study of fingerprints. He developed a methodology of classifying them for filing. In 1892 Galton published a book called “Fingerprints”. The book contained the first statistical proof supporting the uniqueness of his method of personal identification. Galton’s work went on to describe the basic principles of the present fingerprinting identification system that we use today.…

    • 271 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The global biometric systems industry is highly competitive, with large numbers of suppliers catering to the requirements of countries around the globe. North American and European countries, which are among the leading defense spenders, have well-developed domestic biometric systems industries, making them self-reliant.…

    • 634 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Evaluating Biometric System

    • 5288 Words
    • 22 Pages

    n the basis of media hype alone, you might conclude that biometric passwords will soon replace their alphanumeric counterparts with versions that cannot be stolen, forgotten, lost, or given to another person. But what if the performance estimates of these systems are far more impressive than their actual performance? To measure the real-life performance of biometric systems—and to understand their strengths and weaknesses better—we must understand the elements that comprise an ideal biometric system. In an ideal system • all members of the population possess the characteristic that the biometric identifies, like irises or fingerprints; • each biometric signature differs from all others in the controlled population; • the biometric signatures don’t vary under the conditions in which they are collected; and • the system resists countermeasures. Biometric-system evaluation quantifies how well biometric systems accommodate these properties. Typically, biometric evaluations require that an independent party design the evaluation, collect the test data, administer the test, and analyze the results. We designed this article to provide you with sufficient information to know what questions to ask when evaluating a biometric system, and to assist you in determining if performance levels meet the requirements of your application. For example, if you plan to use a biometric to reduce—as opposed to eliminate— fraud, then a low-performance biometric system may be sufficient. On the other hand, completely replacing…

    • 5288 Words
    • 22 Pages
    Better Essays
  • Good Essays

    As we select biometric based system enrolment of every individual is essential. This database development phase consists of image capture of every personage and extracting the bio-metric attribute, in our case it is face, and later it is improved using pre-processing techniques and stored in the database.…

    • 710 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Biometrics

    • 2828 Words
    • 12 Pages

    A PAPER ON Biometrics Submitted By MR. TAPSE PRAVINKUMAR NARSING T.E.(ENTC) Email:- tapse_pravinkumar@rediffmail.com & MR.…

    • 2828 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Jain, A.K., Hong, L. and Pankanti S. "Biometric Identification," Communications of the ACM, Vol. 43, No.2, pp. 90 – 98, February 2000.…

    • 1900 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Biometrics Term Paper

    • 733 Words
    • 3 Pages

    handwriting, the way that you walk, etc. There are also two categories for the use of this…

    • 733 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Fingerprint Security

    • 5677 Words
    • 23 Pages

    These days, hot products like mobile phones, GPS and computers can be secured at the touch of a fingerprint. Designing in security at the start of a new product development process is more effective than adding it on later. Unlocking your mobile phone by scanning your fingerprint is not a thing of science fiction. It’s an everyday reality for millions of mobile phone users, the greatest proportion of who live in Asia. But designing-in security to mobile phones can be difficult. PIN codes and passwords take too long to enter and users often disable them. Since everyone has a unique fingerprint, biometric technology companies have shown that security at the touch of a fingerprint can be an alternative for portable electronic products. Fingerprint recognition can be implemented in essentially all mobile devices and has the right combination of security, cost and convenience for the end-user. It has the potential to be the single personal identifier that can work with every element of your IT security solution, from the mobile device to the PC, the network, servers, applications and whatever else might be required today, or tomorrow. Fingerprint recognition technology for mobile devices is poised to become the preferred user authentication solution mobile device security. Fingerprint tech is a standard security feature around the world. It works because no - two people not even identical twins have the same fingerprints. Believe it or not, fingerprinting is actually pretty old. It began in eighth-century in Japan. But this ancient approach to security is about to get a big upgrade. Since many smartphones have touch-sensitive screens, by definition, they work with your fingertips. All we need to do is convert that screen into a scanner that takes the place of a password. That way, it only works for you. If you lose your phone or someone steals it, the device goes dead.…

    • 5677 Words
    • 23 Pages
    Powerful Essays
  • Powerful Essays

    Fingerprint Recognition

    • 1219 Words
    • 5 Pages

    • Applications • Advantages • Disadvantages • Fingerprint patterns and features • Techniques used for fingerprint recognition  Hybrid matching technique  Minutiae score matching technique…

    • 1219 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Nowadays a lot of security devices were introduced like alarms, codes detectors, and biometric systems that we can use but biometrics system is the most effective and is the highest level of security system in our generation. Biometrics system refers to an automated system that can identify an individual by measuring their physical and behavioral uniqueness or patterns, and comparing it to those on record. It can identify fingerprints, face, iris, palm prints, signature, DNA, or retinas of an individual for easy and convenient verification ( www.ex-sight.com ). This system was first used by the Chinese in 14th century where merchants used children’s palm and footprints to distinguish them from one another.…

    • 336 Words
    • 2 Pages
    Good Essays

Related Topics