Abstract

The secured web-based voting framework is the need of the present time. We propose another secure authentication for the online voting framework by utilizing face recognition and hashing algorithm. A simple verification process is accomplished during the initial registration process via email and phone. The voter is asked to give a unique identification number (UIN) provided by the election authority and face image at the time of main registration. This UIN is converted into a secret key using the SHA algorithm. The face image that is saved in the Amazon web service (AWS) acts as an authentication mechanism which enables people to cast their vote secretly. The voters, who cast numerous votes amid the way toward voting is guaranteed to be counteracted by encrypted UIN. The election organizers can see the election parallelly as the voting is saved in the real-time database. The privacy of the voter is maintained as the details are converted into the key. In this system, an individual can vote from outside of his/her allocated constituency.

Highlights

  • These days, election process assumes an imperative part in the democratic country

  • The encrypted unique identification number (UIN) and pin are used during the authentication followed by face recognition

  • The face will be captured by the server and it will be matched by the object made by the bucket in Amazon web service (AWS) during the registration process

Read more

Summary

Introduction

These days, election process assumes an imperative part in the democratic country. The election is a process for selection of a candidate who will lead the country. As of late in India, the electronic voting framework is utilized. In this framework, voter accessibility at in the city is necessary. Voter accessibility at in the city is necessary This is a noteworthy downside of an electronic voting framework. A webbased voting framework is an answer for voter can vote from anyplace. The critical issue in an online voting framework is security. We have suggested a solution for authenticity and confidentiality of voter‟s data and non-traceability of a casted vote. For the casted vote the voter is kept secret using a hash algorithm

Voter Registration
Counted Vote and Final Result
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call