Abstract
The secured web-based voting framework is the need of the present time. We propose another secure authentication for the online voting framework by utilizing face recognition and hashing algorithm. A simple verification process is accomplished during the initial registration process via email and phone. The voter is asked to give a unique identification number (UIN) provided by the election authority and face image at the time of main registration. This UIN is converted into a secret key using the SHA algorithm. The face image that is saved in the Amazon web service (AWS) acts as an authentication mechanism which enables people to cast their vote secretly. The voters, who cast numerous votes amid the way toward voting is guaranteed to be counteracted by encrypted UIN. The election organizers can see the election parallelly as the voting is saved in the real-time database. The privacy of the voter is maintained as the details are converted into the key. In this system, an individual can vote from outside of his/her allocated constituency.
Highlights
These days, election process assumes an imperative part in the democratic country
The encrypted unique identification number (UIN) and pin are used during the authentication followed by face recognition
The face will be captured by the server and it will be matched by the object made by the bucket in Amazon web service (AWS) during the registration process
Summary
These days, election process assumes an imperative part in the democratic country. The election is a process for selection of a candidate who will lead the country. As of late in India, the electronic voting framework is utilized. In this framework, voter accessibility at in the city is necessary. Voter accessibility at in the city is necessary This is a noteworthy downside of an electronic voting framework. A webbased voting framework is an answer for voter can vote from anyplace. The critical issue in an online voting framework is security. We have suggested a solution for authenticity and confidentiality of voter‟s data and non-traceability of a casted vote. For the casted vote the voter is kept secret using a hash algorithm
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Engineering & Technology
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.