A Survey on Secured Online Voting System Using Face Recognition
Fugat Ashlesha G.1 , Gaikwad Shital S.2 , Gangurde Jyoti P.3 , Sawant Aishwarya S.4
Section:Review Paper, Product Type: Journal Paper
Volume-3 ,
Issue-9 , Page no. 214-216, Sep-2015
Online published on Oct 01, 2015
Copyright © Fugat Ashlesha G., Gaikwad Shital S., Gangurde Jyoti P. , Sawant Aishwarya S. . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Citation
IEEE Style Citation: Fugat Ashlesha G., Gaikwad Shital S., Gangurde Jyoti P. , Sawant Aishwarya S., “A Survey on Secured Online Voting System Using Face Recognition,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.9, pp.214-216, 2015.
MLA Citation
MLA Style Citation: Fugat Ashlesha G., Gaikwad Shital S., Gangurde Jyoti P. , Sawant Aishwarya S. "A Survey on Secured Online Voting System Using Face Recognition." International Journal of Computer Sciences and Engineering 3.9 (2015): 214-216.
APA Citation
APA Style Citation: Fugat Ashlesha G., Gaikwad Shital S., Gangurde Jyoti P. , Sawant Aishwarya S., (2015). A Survey on Secured Online Voting System Using Face Recognition. International Journal of Computer Sciences and Engineering, 3(9), 214-216.
BibTex Citation
BibTex Style Citation:
@article{G._2015,
author = {Fugat Ashlesha G., Gaikwad Shital S., Gangurde Jyoti P. , Sawant Aishwarya S.},
title = {A Survey on Secured Online Voting System Using Face Recognition},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2015},
volume = {3},
Issue = {9},
month = {9},
year = {2015},
issn = {2347-2693},
pages = {214-216},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=672},
publisher = {IJCSE, Indore, INDIA},
}
RIS Citation
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=672
TI - A Survey on Secured Online Voting System Using Face Recognition
T2 - International Journal of Computer Sciences and Engineering
AU - Fugat Ashlesha G., Gaikwad Shital S., Gangurde Jyoti P. , Sawant Aishwarya S.
PY - 2015
DA - 2015/10/01
PB - IJCSE, Indore, INDIA
SP - 214-216
IS - 9
VL - 3
SN - 2347-2693
ER -
![]() |
![]() |
![]() |
2578 | 2332 downloads | 2575 downloads |




Abstract
Now a day, voting for any social issue is important for modern democratic societies. The manual voting system is implemented for election from many years in our country. We are using face recognition to secure the system. The image captured at the time of registration as well as login phase is stored into the cloud database. The converted images are then matched by applying matching criteria which will be we decide. If match is found then and then only the user can proceed for voting Otherwise, the user is considered as invalid user or voter. For confirmation of voting, SMS will send to the voter from server to indicate voting is done successfully.
Key-Words / Index Term
Face Recognition, Cloud Database, Web-Cam, Security
References
[1] Roddick, John F., and Myra Spiliopoulou. "A bibliography of temporal, spatial and spatio-temporal data mining research." ACM SIGKDD Explorations Newsletter 1.1 (1999): 34-38
[2] Face Base Online Voting System using Steganography (Volume 3, Issue 10, and October 2013).
[3] Kevin Daimi and et al. University of Detroit Mercy, Detroit, Michigan 48219, USA.
[4] Kirti Autade and et al., “E-voting on Android System”, International Journal of Emerging Technology and Advanced Engineering ,Volume 2, Issue 2, PP 242-245, February 2012 .
[5] William Stallings(2007),”Cryptography And Network Security ”. Edition 5,Pearson publications.
[6] Smita S. Mudholkar , Pradnya M. Shende , Milind V. Sarode , “Biometrics Authentication Technique” , International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012.
[7] Lingyan Bi, Weining Wang, HaobinZhong, Wenxuan Liu, "Design and Application of Remote Control System Using Mobile Phone with JNI Interface", The 2008 International Conference of Embedded Software and Systems Symposia (ICESS2008), ,pp.416-419,2008.
[8] Radovan Murin, “Mobile Voting for Android”, “Czech Technical University in Prague Faculty of Electrical Engineering, - GUI design, implementation and testing”, Thesis, May 6, 2011.[9]. A. B. Rajendra and H. S. Sheshadri (2012), Study on Visual Secret Sharing Schemes Using Biometric Authentication Techniques, AJCST, Vol 1, pp.157-160.
[9]. C. Neuman and Ts'o. Theodore, “Kerberos: An Authentication Service for Computer Networks”. IEEE Communications Magazine. September 1994.
[10] Anusha M N and Srinivas B K (2012), “Remote Voting System for Corporate Companies using Visual Cryptography,” vol. 2, pp. 250–251.
[11] Rajendra Basavegowda, Sheshadri Seenappa (2013) “Electronic Medical Report Security Using Visual Secret Sharing Scheme”, IEEE UKSim 15th International Conference on Computer Modeling and Simulation Proceedings, pp, 78-83.
[12] Hussein Khalid Abd-alrazzq1, Mohammad S. Ibrahim2 and Omar Abdurrahman Dawood (2012), “Secure Internet Voting System based on Public Key Kerberos”, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 2, No 3, pp. 428-434.
[13] Kosala, Raymond, and Hendrik Blockeel. "Web mining research: A survey."ACMSigkdd Explorations Newsletter 2.1 (2000): 1-15.
[14] S. Stubblebine and V. Gligor. “On message integrity in cryptographic protocols”. In Symposium on Security and Privacy ’92. IEEE, 1992.
[15] Unnati A. Patel and Dr. Swamynarayan Priya, “Development of a Student Attendance Management System Using RFID and Face Recognition”, IJARCSMS, Volume 2, Issue 8, August 2014.
[16] P. N. Huu, V. Tran-Quang, and T. Miyoshi, “Image compression algorithm considering energy balance on wireless sensor networks,” in IEEE Int. Conf. Industrial Informatics (INDIN), Osaka, Japan, Jul. 13–16, 2010, pp. 1005–1010.
[17] M. Bishop and D. Wagner, “Risks of e-voting”, Community ACM, vol.50, no. 11, pp. 120–120, 2007.