Open Access   Article Go Back

A Survey on Secured Online Voting System Using Face Recognition

Fugat Ashlesha G.1 , Gaikwad Shital S.2 , Gangurde Jyoti P.3 , Sawant Aishwarya S.4

Section:Review Paper, Product Type: Journal Paper
Volume-3 , Issue-9 , Page no. 214-216, Sep-2015

Online published on Oct 01, 2015

Copyright © Fugat Ashlesha G., Gaikwad Shital S., Gangurde Jyoti P. , Sawant Aishwarya S. . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Fugat Ashlesha G., Gaikwad Shital S., Gangurde Jyoti P. , Sawant Aishwarya S., “A Survey on Secured Online Voting System Using Face Recognition,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.9, pp.214-216, 2015.

MLA Style Citation: Fugat Ashlesha G., Gaikwad Shital S., Gangurde Jyoti P. , Sawant Aishwarya S. "A Survey on Secured Online Voting System Using Face Recognition." International Journal of Computer Sciences and Engineering 3.9 (2015): 214-216.

APA Style Citation: Fugat Ashlesha G., Gaikwad Shital S., Gangurde Jyoti P. , Sawant Aishwarya S., (2015). A Survey on Secured Online Voting System Using Face Recognition. International Journal of Computer Sciences and Engineering, 3(9), 214-216.

BibTex Style Citation:
@article{G._2015,
author = {Fugat Ashlesha G., Gaikwad Shital S., Gangurde Jyoti P. , Sawant Aishwarya S.},
title = {A Survey on Secured Online Voting System Using Face Recognition},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2015},
volume = {3},
Issue = {9},
month = {9},
year = {2015},
issn = {2347-2693},
pages = {214-216},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=672},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=672
TI - A Survey on Secured Online Voting System Using Face Recognition
T2 - International Journal of Computer Sciences and Engineering
AU - Fugat Ashlesha G., Gaikwad Shital S., Gangurde Jyoti P. , Sawant Aishwarya S.
PY - 2015
DA - 2015/10/01
PB - IJCSE, Indore, INDIA
SP - 214-216
IS - 9
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2531 2291 downloads 2485 downloads
  
  
           

Abstract

Now a day, voting for any social issue is important for modern democratic societies. The manual voting system is implemented for election from many years in our country. We are using face recognition to secure the system. The image captured at the time of registration as well as login phase is stored into the cloud database. The converted images are then matched by applying matching criteria which will be we decide. If match is found then and then only the user can proceed for voting Otherwise, the user is considered as invalid user or voter. For confirmation of voting, SMS will send to the voter from server to indicate voting is done successfully.

Key-Words / Index Term

Face Recognition, Cloud Database, Web-Cam, Security

References

[1] Roddick, John F., and Myra Spiliopoulou. "A bibliography of temporal, spatial and spatio-temporal data mining research." ACM SIGKDD Explorations Newsletter 1.1 (1999): 34-38
[2] Face Base Online Voting System using Steganography (Volume 3, Issue 10, and October 2013).
[3] Kevin Daimi and et al. University of Detroit Mercy, Detroit, Michigan 48219, USA.
[4] Kirti Autade and et al., “E-voting on Android System”, International Journal of Emerging Technology and Advanced Engineering ,Volume 2, Issue 2, PP 242-245, February 2012 .
[5] William Stallings(2007),”Cryptography And Network Security ”. Edition 5,Pearson publications.
[6] Smita S. Mudholkar , Pradnya M. Shende , Milind V. Sarode , “Biometrics Authentication Technique” , International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012.
[7] Lingyan Bi, Weining Wang, HaobinZhong, Wenxuan Liu, "Design and Application of Remote Control System Using Mobile Phone with JNI Interface", The 2008 International Conference of Embedded Software and Systems Symposia (ICESS2008), ,pp.416-419,2008.
[8] Radovan Murin, “Mobile Voting for Android”, “Czech Technical University in Prague Faculty of Electrical Engineering, - GUI design, implementation and testing”, Thesis, May 6, 2011.[9]. A. B. Rajendra and H. S. Sheshadri (2012), Study on Visual Secret Sharing Schemes Using Biometric Authentication Techniques, AJCST, Vol 1, pp.157-160.
[9]. C. Neuman and Ts'o. Theodore, “Kerberos: An Authentication Service for Computer Networks”. IEEE Communications Magazine. September 1994.

[10] Anusha M N and Srinivas B K (2012), “Remote Voting System for Corporate Companies using Visual Cryptography,” vol. 2, pp. 250–251.
[11] Rajendra Basavegowda, Sheshadri Seenappa (2013) “Electronic Medical Report Security Using Visual Secret Sharing Scheme”, IEEE UKSim 15th International Conference on Computer Modeling and Simulation Proceedings, pp, 78-83.
[12] Hussein Khalid Abd-alrazzq1, Mohammad S. Ibrahim2 and Omar Abdurrahman Dawood (2012), “Secure Internet Voting System based on Public Key Kerberos”, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 2, No 3, pp. 428-434.
[13] Kosala, Raymond, and Hendrik Blockeel. "Web mining research: A survey."ACMSigkdd Explorations Newsletter 2.1 (2000): 1-15.
[14] S. Stubblebine and V. Gligor. “On message integrity in cryptographic protocols”. In Symposium on Security and Privacy ’92. IEEE, 1992.
[15] Unnati A. Patel and Dr. Swamynarayan Priya, “Development of a Student Attendance Management System Using RFID and Face Recognition”, IJARCSMS, Volume 2, Issue 8, August 2014.
[16] P. N. Huu, V. Tran-Quang, and T. Miyoshi, “Image compression algorithm considering energy balance on wireless sensor networks,” in IEEE Int. Conf. Industrial Informatics (INDIN), Osaka, Japan, Jul. 13–16, 2010, pp. 1005–1010.
[17] M. Bishop and D. Wagner, “Risks of e-voting”, Community ACM, vol.50, no. 11, pp. 120–120, 2007.