IRIS Detection in Voting System

Abstract

In this paper we are scanning individual’s iris and storing it in a voters database by giving appropriate AADHAR card no. If a person comes for voting then his or her iris is detected and this detected image is compared to image in voter’s database. When the iris is detected we get the information about the voter in our PC, then that information is compared to the voter’s ID. If both the details get matched then the person is allowed to vote. The current voting system is not secure, there are some individuals who give dummy votes or they are registered at more than one place. In this paper the Security of the voter is discussed and in general and the focus is on making the voting system more robust and reliable by eliminating dummy voters. By using Daughman’s algorithms will scan IRIS and check those details in our database for match.

Authors and Affiliations

Prof. Shital A Patil, Mr. Praveen G Kote

Keywords

Related Articles

slugDesign Formulation and Optimum Load Carrying Capacity of Hydrodynamic Journal Bearing By using Genetic Algorithm

The ever increasing demand of lower initial costs for bearing, to withstand competition, has prompted engineers to apply optimization methods in bearing design. The optimization scheme that optimizes load carrying capac...

Data Stream Classification Techniques to Find Novel Class – A Review

Data Stream Mining (DSM) is the way of retrieving useful knowledge from fast information records. Today, there are number of application that produce massive amount of stream data. Concept evolution, the phenomenon of c...

Changing Scenario of Doctor- Patient Relationship : A Consumerist approach

The doctor – patient relationship is very old and rapidly changing with the commercialization. Since 1991 several legal cases related to the medical negligence put a new picture of doctor – patient relationship & medica...

Location Based Privacy Preserving System for Smart Phones

This proposed system executed by efficiency privacy preserving based on location based service i.e., (LBS).The user identify specific location nearest user need to reach that location within time, accurate route etc. Lo...

A Review on Vampire Attacks in ad hoc Wireless Networks

A new class of resource consumption attacks is Vampire Attacks. Such attacks use different routing protocols to disable the ad hoc wireless networks by depleting the battery power of the node. Devices in ad hoc wireless...

Download PDF file
  • EP ID EP21222
  • DOI -
  • Views 202
  • Downloads 6

How To Cite

Prof. Shital A Patil, Mr. Praveen G Kote (2015). IRIS Detection in Voting System. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(8), -. https://www.europub.co.uk/articles/-A-21222