ONLINE ANDROID VOTING SYSTEM

Slides:



Advertisements
Similar presentations
Study On Intelligent E-Shopping System Based On Data Mining
Advertisements

Digital Certificate Installation & User Guide For Class-2 Certificates.
Mini Project Seminar on Pizza Ordering Application for Android
Daniel & Stephen SKH St. Mary’s Church Mok Hing Yiu College 1.
Abstract Load balancing in the cloud computing environment has an important impact on the performance. Good load balancing makes cloud computing more.
A Survey of Mobile Cloud Computing Application Models
Daniel, Stephen & Thomson 1. » Easy for learners to create mobile apps for Android smart phones » Visually fitting together puzzle piece-shaped "programming.
DATA DYNAMICS AND PUBLIC VERIFIABILITY CHECKING WITHOUT THIRD PARTY AUDITOR GUIDED BY PROJECT MEMBERS: Ms. V.JAYANTHI M.E Assistant Professor V.KARTHIKEYAN.
Easwari Engineering College Department of Computer Science and Engineering IDENTIFICATION AND ISOLATION OF MOBILE REPLICA NODES IN WSN USING ORT METHOD.
Address Verification Service (AVS). Introduction Introduction o The internet Address Verification System (I-AVS) is a business service for resolving the.
Improving Network I/O Virtualization for Cloud Computing.
Process by which a system verifies the identity of a user wishes to access it. Authentication is essential for effective security.
ABOUT THE TEAM DHARMENDRA YADAV ANKUR VERMA DEEPAK YADAV SHASHANK KUMAR.
EKT 422 Computer Architecture
MOBILITY BILL DEFRAYMENT
Android architecture & setting up. Android operating system comprises of different software components arranges in stack. Different components of android.
© Paradigm Publishing Inc. 4-1 OPERATING SYSTEMS.
Two Factor Authentication Using Mobile Phones. Abstract In our project security and authentication plays a major role. It can be mainly used in online.
Participatory Privacy: Enabling Privacy in Participatory Sensing
A Project Report On Hostel Management System
Electronic Analog Computer Dr. Amin Danial Asham by.
Collaborator Revolutionizing the way you communicate and understand
ELECTROSOFT VOTING SYSTEM FOR REAL TIME APPLICATION 1 Presented By A. Ravindiran. M.E. (PhD) S.Nethaji. B.E Assistant Professor- II Research and Development.
Data Leakage Detection by R.Kartheek Reddy 09C31D5807 (M.Tech CSE)
Cryptographic Anonymity Project Alan Le
Privacy-Preserving and Content-Protecting Location Based Queries.
We wish to place on our record our deep sense of gratitude to our project guide, Mrs. RUPALI CHOWDHURY, for his constant motivation and valuable help.
A Project Report ON ONLINE AUCTION PORTAL A project report Submitted in Partial Fulfillment Award of degree Master of Computer Application [Batch ]
Virtual Machines Module 2. Objectives Define virtual machine Define common terminology Identify advantages and disadvantages Determine what software is.
Property Search Application System Requirement Specification Prepared By : Tausif F. Saiyad (M.C.A.- 6) Developed at : Indies Services, Bhavnagar.
Guided By: Prof. Rajarshree Karande JSPM’S IMPERIAL COLLEGE OF ENGINEERING & RESEARCH WAGHOLI, PUNE Group MemberRoll No. Abhijeet Aralgundkar03.
CAPTCHA AS GRAPHICAL PASSWORDS—A NEW SECURITY PRIMITIVE BASED ON HARD AI PROBLEMS ASHWINI B.
APARTMENT MAINTENANCE SYSTEM M.Tech( Ph.D) HOD of C.S.E & I.T Dept.
GRADUATE SEMINAR – CPSC 8985 FUTURE SMS BY Suresh Kurapati Varun Chowdhary Enjum Umakanth Vellanki Under the guidance of Dr. Soon-Ok-Park.
UNIVERSITY MANAGEMENT SYSTEM
  ONLINE DORMITORY RESERVATION SYSTEM By RAMYA VAKITY KOUSHIK KUMAR SURAGONI MOTHE ADITHYA    GRADUATE CAPSTONE SEMINAR PROJECT    Submitted in partial.
Presentation on Online Shopping
ONLINE DETECTION AND PREVENTION PHISHING ATTACKS
Group Member: 1. Nguyen Tuan Minh Nguyen Huy Hoang Tran Van Huynh Le Dinh Son Supervisor: Phan Truong Lam.
RATION CARD MANAGEMENT SYSTEM
ANDROID APPLICATION FOR ONLINE VOTING SYSTEM
Fragile Watermarking Scheme for Relational Database Fragile Watermarking Scheme for Relational Database.
DEVELOPMENT OF WEB BASED ONLINE POLLING Presented by P.SHASHANK GANDHI (09QA1A0546) BABLU KUMAR PRASAD (09QA1A0506) G.RANVITHA (09QA1A0519) Under the guidance.
BY S.S.SUDHEER VARMA (13NT1D5816)
Online Civil Pensioner’s Medical Services
Polymorph Technologies Pte Ltd “ The Leader in Information Technology”
INFORMATION TECHNOLOGY NEW USER ORIENTATION
Under the Guidance of V.Rajashekhar M.Tech Assistant Professor
Authentication Schemes for Session Passwords using Color and Images
INFORMATION RETRIEVAL AND KNOWLEDGE MANAGEMENT SYSTEM
Sri Venkateswara College of Engineering (SVCE), Tirupati
Hacker Detection in Wireless sensor network
ROBUST FACE NAME GRAPH MATCHING FOR MOVIE CHARACTER IDENTIFICATION
NAME:NASHTE AJAYKUMAR KALYAN
Online Civil Pensioner’s Medical Services
Development-Introduction
Department Of Computer Science Engineering
Knut Kröger & Reiner Creutzburg
Online Shopping APP.
Shri VN Shukla DIR (IT) Election Commission Of India, New Delhi
A Presentation on online voting system
Preliminary Design Review
What are the steps to activate serial key of Avast antivirus? Avast Customer Service USA (425)
ONLINE ANDROID VOTING SYSTEM
Swipe to Donate Life.
Smartphone with Android OS Android OS 4.2 (Jellybean) or above
Architecture Competency Group
INFORMATION TECHNOLOGY NEW USER ORIENTATION
INFORMATION TECHNOLOGY NEW USER ORIENTATION
To Brihaspathi. Aadhar Enabled Biometric Devices
Presentation transcript:

ONLINE ANDROID VOTING SYSTEM VALLIAMMAI ENGINEERING COLLEGE DEPARTMENT OF COMPUTER SCIENCE ENGINEERING ONLINE ANDROID VOTING SYSTEM PROJECT MEMBERS K.JOTHI ANNAMALAI (412813104039) H.SHAHUL HAMEED (412813104319) M.AJITH KUMAR (412813104002) GUIDED BY Mr.S.VENKATESH.,ME.,(AP).,(OG) ASSISTANT PROFESSOR DEPARTMENT OF CSE VALLIAMMAI ENGINEERING COLLEGE

ABSTRACT This project is to propose a real time capturing of a system using a Quick Response code in an android smart phone. In this method the concept of e-voting application is created using an android phone. The authentication is done through the scanning of QR code via the mobile scanner application. In this method the voter has to register using the application and the QR code was scanned to store the details in aadhar card to the database. In this method the voter details are made to hide in the QR code, using multiplexing and DE multiplexing process encode and decode the information from single QR code with special symbols and split the data back to their QR code pattern. In this method we concentrate on the cases where the memory entries and their associations form a binary hamming space or an infinite square grid particularly, we focus on minimizing the number of input clues needed to retrieve information with small uncertainty. The main purpose of implementing this concept is to increase the voting percentage.

Continue… So that the voter is not required to visit the voting center to cast the voter. In the proposed method the concept of e-voting application is created using android. The authentication is done through the scanning of QR-Code through the mobile scanner application. In this method the voter has to register using the application and the QR-Code will be provided once the registration is successful. On scanning the QR-Code the voter will be asked for the password. Once the authentication is done the voter is made to proceed with the voting process. The main purpose of implementing this concept is to increase the voting percentage. So that the voter is not required to visit the voting Centre to cast their vote and also to avoid fake voting.

Disadvantage of Existing System System is little bit complex Less security. Hacking voter results. Time Delay. Cost Effective. Time consumption is high.

Proposed System System resides in the new concept of QR-Code and Scanner Application. Candidate details made to hide in the QR-Code. Through scanner application the QR-Code is scanned and details are retrieved. Here there is no chance of increasing the vote count. Then the voting is performed. In the proposed system, we are using QR code for recognizes image codes using smart phones to provide various services that can recognize the authenticity of any voter details. QR code verifies voter_id no by capturing it through the smart phone, then decodes and sends it to the server for authentication. This forwards the selected voter_id number list to the server and the response received from the server enables the consumer to decide based on the voter authenticity. Finally the election server, administrator will sort out the final result by checking the given information with already desired information.

Advantage of Proposed System Highly secured and there is no chance to revote. Scanning recognition. Real time tracking of results. Time consumption is less. No chance for hacking the votes.

System Architecture

Use case Diagram . LOGIN SCAN ACTIVITY CHECK SCAN XML FORMAT VERIFY PAGE

HOME SCREEN

LOGIN…

SCAN PAGE

SCANNING…

XML VERSION OF SCAN

VERIFYING PAGE

Database

SYSTEM REQUIREMENTS: SOFTWARE REQUIREMENTS Operating system : Windows XP. Technology Used : Android 2.2. IDE : Android Studio. Emulators : AVD or any mobile device. Plug-in : ADT plug-in. Tools used : Android SDK. HARDWARE REQUIREMENTS Processor : Pentium P4. Motherboard : Genuine Intel. RAM : Min 1 GB. Hard Disk : 80 GB.

Reference Papers: [1].E. Yaakobi and J. Bruck, “On the uncertainty of information retrieval in associative memories,” in Proc. IEEE Int. Symp. Inf. Theory, Jul. 2012, pp. 106–110. [2].Sartid Vongpradhip and Suppat Rungraungsilp, "QR Code Using Invisible Watermarking in Frequency Domain", 9th International conference on ICT and Knowledge Engineering, pp. 47-52, 2012.   [3] G. Exoo, T. Laihonen, and S. Ranto, “New bounds on binary identifying codes,” Discrete Appl. Math., vol. 156, no. 12, pp. 2250–2263, 2008. [4].J. Fridrich, T. Pevný, and J. Kodovský, “Statistically undetectable JPEG steganography: Dead ends challenges, and opportunities,” in Proc. 9th ACM Workshop Multimedia Security, Dallas, TX, USA, Sep. 2007, pp. 3–14. [5].T. Filler, J. Judas, and J. Fridrich, “Minimizing additive distortion in steganography using syndrome-trellis codes,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 920–935, Sep. 2011.