Open Access Open Access  Restricted Access Subscription or Fee Access

High Secure Biometric Cipher Application for Online Ballots

Prabha Susy Mammen, S. Ramamoorthy

Abstract


Voters often find the postal ballots very inconvenient and time consuming as a result the voting response rates is often lower. Online voting system is considered to facilitate the central government’s new policy of giving voting rights to the Indians living abroad so that they can cast their vote using internet and to also increase voter responses. It could reduce the expenditure involved in setting up and staffing poll sites. The method for data hiding is based on the novel approach of using Steganography and cryptography together using images as cover objects for steganography and as keys for cryptography. Most of the traditional systems have adopted a secret key to authenticate the user information. The use of secret key may direct to undesirable circumstances when the secret key is lost, or forgotten. Biometric authentication systems are considered to be more useful since it involves no secret key that might be feared to be forgotten by the user or key to be lost and not just that a single biometric trait can be used to access several accounts without the need of remembering passwords for all those accounts. In this paper Eyebrow is used as a biometric measure to enhance the security aspect of the System. Here Active contour algorithm is used to get accurate Eyebrow contour, which makes this application a highly secured biometric cipher application.

Keywords


Active Contour Algorithm, Biometric, Cryptography, Cipher, Steganography.

Full Text:

PDF

References


Prabha Susy Mammen, S.Ramamoorthy “A Novel Data Hiding Technique Based Bio-Secure Online Voting System”

Shivendra Katiyar, Kullai Reddy Meka, Ferdous A. Barbhuiya, Sukumar Nandi “Online Voting System Powered By Biometric Security Using Steganography”

William Stallings,”Cryptography and Network Security, Principles and Practices”,

Bruce Schneier,”Applied Cryptography”, Second Edition: Protocols, Algorithms, and Source Code in C, John Wiley and Sons.

Athanasios Nikolaidis, Ioannis Pitas* “Facial feature extraction and pose determination”

Sutaone, M.S. and Khandare, M.V.,”Image based steganography using LSB insertion technique”, IEEE WMMN, pp. 146-151, January 2008.

Kalaivani Sundararajan and Ninad Pradhan” Level-Set Based Eyebrow Segmentation for a Periocular Image Database”

A. L. Yuille, P. W. Hallinan, and D. S. Cohen, "Feature extraction from faces using deformable templates,"

ohammed Khasawneh , Mohammad Malkawi , A Biometric-Secure e-Voting System for Election Processes, Proceeding of the 5th International Symposium on Mechatronics and its Applications (ISMA08).

Saurabh Singh, Gaurav Agarwal, Use of image to secure text message with the help of LSB replacement, international journal of applied engineering research, Volume 1, No1, 2010.

VenkataSubbaReddy Poli Nagaraja Arcot Jyothsna Charapanamjeri, Evaluation of Biometrics, IJCSNS International Journal of Computer Science and Network Security, VOL.9.

Q Chen, W Cham,k Leein Pattern Recognition”Extracting Eyebrow Contour and Chin Contour for face recognition”.

E. S. Shameem Sulthana ,Dr.S.Kanman “Evidence based Access Control over Web Services using Multi Security” International Journal of Computer Applications (0975 – 8887)

Volume 17– No.3, March 2011


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.