ONLINE ANDROID VOTING SYSTEM

Slides:



Advertisements
Similar presentations
Study On Intelligent E-Shopping System Based On Data Mining
Advertisements

DATA PROCESSING SYSTEMS
Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
Mini Project Seminar on Pizza Ordering Application for Android
Daniel & Stephen SKH St. Mary’s Church Mok Hing Yiu College 1.
Abstract Load balancing in the cloud computing environment has an important impact on the performance. Good load balancing makes cloud computing more.
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.
A Survey of Mobile Cloud Computing Application Models
Daniel, Stephen & Thomson 1. » Easy for learners to create mobile apps for Android smart phones » Visually fitting together puzzle piece-shaped "programming.
Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment.
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
Security Evaluation of Pattern Classifiers under Attack.
DATA DYNAMICS AND PUBLIC VERIFIABILITY CHECKING WITHOUT THIRD PARTY AUDITOR GUIDED BY PROJECT MEMBERS: Ms. V.JAYANTHI M.E Assistant Professor V.KARTHIKEYAN.
Easwari Engineering College Department of Computer Science and Engineering IDENTIFICATION AND ISOLATION OF MOBILE REPLICA NODES IN WSN USING ORT METHOD.
Address Verification Service (AVS). Introduction Introduction o The internet Address Verification System (I-AVS) is a business service for resolving the.
Improving Network I/O Virtualization for Cloud Computing.
Setting Up The Android SDK (Software Development Kit) A basic step by step guide leading to set up and your first Hello World App.
ABOUT THE TEAM DHARMENDRA YADAV ANKUR VERMA DEEPAK YADAV SHASHANK KUMAR.
Android architecture & setting up. Android operating system comprises of different software components arranges in stack. Different components of android.
© Paradigm Publishing Inc. 4-1 OPERATING SYSTEMS.
Participatory Privacy: Enabling Privacy in Participatory Sensing
Electronic Analog Computer Dr. Amin Danial Asham by.
Collaborator Revolutionizing the way you communicate and understand
ELECTROSOFT VOTING SYSTEM FOR REAL TIME APPLICATION 1 Presented By A. Ravindiran. M.E. (PhD) S.Nethaji. B.E Assistant Professor- II Research and Development.
Data Leakage Detection by R.Kartheek Reddy 09C31D5807 (M.Tech CSE)
Cryptographic Anonymity Project Alan Le
A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud.
Privacy-Preserving and Content-Protecting Location Based Queries.
ONLINE INTRUSION ALERT AGGREGATION WITH GENERATIVE DATA STREAM MODELING.
A Project Report ON ONLINE AUCTION PORTAL A project report Submitted in Partial Fulfillment Award of degree Master of Computer Application [Batch ]
Virtual Machines Module 2. Objectives Define virtual machine Define common terminology Identify advantages and disadvantages Determine what software is.
Property Search Application System Requirement Specification Prepared By : Tausif F. Saiyad (M.C.A.- 6) Developed at : Indies Services, Bhavnagar.
Vishnu Vardhan Reddy Mukku Mav ID : Under the guidance of.
CAPTCHA AS GRAPHICAL PASSWORDS—A NEW SECURITY PRIMITIVE BASED ON HARD AI PROBLEMS ASHWINI B.
Prepared by K.Phani Kumar.  Introduction:  This project is aimed at developing a system by which the employees in the organization submit the bills.
GRADUATE SEMINAR – CPSC 8985 FUTURE SMS BY Suresh Kurapati Varun Chowdhary Enjum Umakanth Vellanki Under the guidance of Dr. Soon-Ok-Park.
UNIVERSITY MANAGEMENT SYSTEM
A PROJECT ON TECH-FEST MANAGEMENT SYSTEM
  ONLINE DORMITORY RESERVATION SYSTEM By RAMYA VAKITY KOUSHIK KUMAR SURAGONI MOTHE ADITHYA    GRADUATE CAPSTONE SEMINAR PROJECT    Submitted in partial.
ONLINE DETECTION AND PREVENTION PHISHING ATTACKS
Group Member: 1. Nguyen Tuan Minh Nguyen Huy Hoang Tran Van Huynh Le Dinh Son Supervisor: Phan Truong Lam.
RATION CARD MANAGEMENT SYSTEM
ANDROID APPLICATION FOR ONLINE VOTING SYSTEM
Cooperative Caching in Wireless P2P Networks: Design, Implementation And Evaluation.
Fragile Watermarking Scheme for Relational Database Fragile Watermarking Scheme for Relational Database.
DEVELOPMENT OF WEB BASED ONLINE POLLING Presented by P.SHASHANK GANDHI (09QA1A0546) BABLU KUMAR PRASAD (09QA1A0506) G.RANVITHA (09QA1A0519) Under the guidance.
BY S.S.SUDHEER VARMA (13NT1D5816)
INFORMATION TECHNOLOGY NEW USER ORIENTATION
Under the Guidance of V.Rajashekhar M.Tech Assistant Professor
Authentication Schemes for Session Passwords using Color and Images
Hiba Tariq School of Engineering
INFORMATION RETRIEVAL AND KNOWLEDGE MANAGEMENT SYSTEM
Sri Venkateswara College of Engineering (SVCE), Tirupati
EXTRACTING SPREAD-SPECTRUM HIDDEN DATA FROM DIGITAL MEDIA
Hacker Detection in Wireless sensor network
ROBUST FACE NAME GRAPH MATCHING FOR MOVIE CHARACTER IDENTIFICATION
APARTMENT MAINTENANCE SYSTEM
Department Of Computer Science Engineering
Byung Joon Park, Sung Hee Kim
Knut Kröger & Reiner Creutzburg
Online Shopping APP.
A Presentation on online voting system
Source: IEEE Transactions on Information Forensics and Security, Vol
What are the steps to activate serial key of Avast antivirus? Avast Customer Service USA (425)
ONLINE ANDROID VOTING SYSTEM
Architecture Competency Group
INFORMATION TECHNOLOGY NEW USER ORIENTATION
INFORMATION TECHNOLOGY NEW USER ORIENTATION
Online Practice and On the Move Registration tutorial
Presentation transcript:

ONLINE ANDROID VOTING SYSTEM VALLIAMMAI ENGINEERING COLLEGE DEPARTMENT OF COMPUTER SCIENCE ENGINEERING ONLINE ANDROID VOTING SYSTEM PROJECT MEMBERS K.JOTHI ANNAMALAI (412813104039) H.SHAHUL HAMEED (412813104319) M.AJITH KUMAR (412813104002) GUIDED BY Mr.S.VENKATESH.,ME.,(AP).,(OG) ASSISTANT PROFESSOR DEPARTMENT OF CSE VALLIAMMAI ENGINEERING COLLEGE

ABSTRACT This project is to propose a real time capturing of a system using a Quick Response code in an android smart phone. In this method the concept of e-voting application is created using an android phone. The authentication is done through the scanning of QR code via the mobile scanner application. In this method the voter has to register using the application and the QR code will be provided when the admin has to accept the voter based on the voter details. In this method the voter details are made to hide in the QR code, using multiplexing and DE multiplexing process encode and decode the information from single QR code with special symbols and split the data back to their QR code pattern. In this method we concentrate on the cases where the memory entries and their associations form a binary hamming space or an infinite square grid particularly, we focus on minimizing the number of input clues needed to retrieve information with small uncertainty. The main purpose of implementing this concept is to increase the voting percentage.

Continue… So that the voter is not required to visit the voting center to cast the voter. In the proposed method the concept of e-voting application is created using android. The authentication is done through the scanning of QR-Code through the mobile scanner application. In this method the voter has to register using the application and the QR-Code will be provided once the registration is successful. On scanning the QR-Code the voter will be asked for the password. Once the authentication is done the voter is made to proceed with the voting process. The main purpose of implementing this concept is to increase the voting percentage. So that the voter is not required to visit the voting Centre to cast their vote and also to avoid fake voting.

Disadvantage of Existing System System is little bit complex Less security. Hacking voter results. Time Delay. Cost Effective. Time consumption is high.

Proposed System System resides in the new concept of QR-Code and Scanner Application. Candidate details made to hide in the QR-Code. Through scanner application the QR-Code is scanned and details are retrieved. Here there is no chance of increasing the vote count. Then the voting is performed. In the proposed system, we are using QR code for recognizes image codes using smart phones to provide various services that can recognize the authenticity of any voter details. QR code verifies voter_id no by capturing it through the smart phone, then decodes and sends it to the server for authentication. This forwards the selected voter_id number list to the server and the response received from the server enables the consumer to decide based on the voter authenticity. Finally the election server, administrator will sort out the final result by checking the given information with already desired information.

Advantage of Proposed System Highly secured and there is no chance to revote. Scanning recognition. Real time tracking of results. Time consumption is less. No chance for hacking the votes.

SYSTEM REQUIREMENTS: SOFTWARE REQUIREMENTS Operating system : Windows XP. Technology Used : Android 2.2. IDE : Eclipse 3.4 (min). Emulators : AVD. Plug-in : ADT plug-in. Tools used : Android SDK. HARDWARE REQUIREMENTS Processor : Pentium P4. Motherboard : Genuine Intel. RAM : Min 1 GB. Hard Disk : 80 GB.

System Architecture

Reference Papers: [1].E. Yaakobi and J. Bruck, “On the uncertainty of information retrieval in associative memories,” in Proc. IEEE Int. Symp. Inf. Theory, Jul. 2012, pp. 106–110. [2].Sartid Vongpradhip and Suppat Rungraungsilp, "QR Code Using Invisible Watermarking in Frequency Domain", 9th International conference on ICT and Knowledge Engineering, pp. 47-52, 2012.   [3] G. Exoo, T. Laihonen, and S. Ranto, “New bounds on binary identifying codes,” Discrete Appl. Math., vol. 156, no. 12, pp. 2250–2263, 2008. [4].J. Fridrich, T. Pevný, and J. Kodovský, “Statistically undetectable JPEG steganography: Dead ends challenges, and opportunities,” in Proc. 9th ACM Workshop Multimedia Security, Dallas, TX, USA, Sep. 2007, pp. 3–14. [5].T. Filler, J. Judas, and J. Fridrich, “Minimizing additive distortion in steganography using syndrome-trellis codes,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 920–935, Sep. 2011.