Documente Academic
Documente Profesional
Documente Cultură
Abstract A Voting is common in our daily life, from electing president to electing committee. A complete electronic voting scheme suitable
for all kinds of voting with safe guaranty where the voters privacy can be protected. Fingerprint system security have been investigated,
including the use of fake fingerprints for masquerading identity, the problem of fingerprint alteration or obfuscation has received very little
attention. Fingerprint image quality assessment software (e.g., NFIQ) cannot always detect altered fingerprints since the implicit image quality
due to alteration may not change significantly. The main contributions of this Research are-1.Compiling case studies of incidents where
individuals were found to have altered their fingerprints for circumventing AFIS.2.Identifying the damages of fingerprint alteration on the
accuracy of a commercial fingerprint matcher.3.Classifying the alterations into three major categories and suggesting possible
countermeasures.4.Developing a technique to automatically detect altered fingerprints based on analyzing orientation field and minutiae
distribution.5.Evaluating the proposed technique and the NFIQ algorithm on a big database of altered fingerprints provided by a law
enforcement agency. Experimental results show the feasibility of the proposed approach in detecting altered fingerprints and highlight the need
to further pursue this problem.
Keywords:IRIS,AFIS,NFIQ.
_________________________________________________*****_________________________________________________
V.REFERENCES
375
IJRITCC | March 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 3 372 376
_______________________________________________________________________________________________
[2] Xuejun Tan, BirBhanu by Fingerprint matching by
genetic algorithms Center for Research in Intelligent
SystemUniversity of California, Riverside, CA 92521,
USA Received 24 February 2004; accepted 6 September
2005.
[3] Fredrik Valeur, And Giovanni Vigna by An Experience
In Testing The Security Of Real-World Electronic
Voting Systems Ieee Transactions On
SoftwareEngineering, Vol. 36, No. 4, July/August 2010.
[4] D. Ashok Kumar, T. UmmalSariba Begum A Novel by
Design of Electronic Voting System Using Fingerprint
International Journal Of InnovativeTechnology &
Creative Engineering (Issn: 2045-8711) Vol.1 No.1
January 2011.
[5] Feras A. Haziemeh, mutazKh. Khazaaleh, Khairall M.
Al-Talafha by New Applied E-Voting System Journal
Of Theoretical And Applied Information31st March
2011.
[6] HongkaiXiong, Yang Xu,Yuan F. Zheng Wen Chen,
Fellow BY With Tensor Voting Projected Structure In
Video Compression Ieee Transactions OnCircuits And
Systems For Video Technology, Vol. 21, No. 8, August
2011.
[7] KashifHussainMemon, Dileep Kumar and Syed
Muhammad Usman by Next Generation A Secure E-
Voting System Based On Biometric Fingerprint Method
International Conference On Information And
IntelligentComputingIPCSIT Vol.18 (2011).
[8] KalaichelviVisvalingam, R. M. Chandrasekaran by
Secured Electronic Voting Protocol Using Biometric
Authentication Advances In Internet Of Things, 2011
Received June 16, 2011; Revised July 5, 2011; Accepted
July 11, 2011.
[9] ShivendraKatiyar, Kullai Reddy Meka, Ferdous A.
Barbhuiya, Sukumar Nandi by Online Voting System
Powered By Biometric Security Using Steganography
International Conference On Emerging Applications
OfInformation Technology,Dec2011.
[10] Scott Wolchok, Eric Wustrow, Dawn Isabel, and
J.AlexHalderman byAttacking the
Washington,D.C.Internet Voting System In
Proc16thConference on Financial Cryptography & Data
Security, Feb. 2012.
[11] Tai-Pang Wu, ,Sai-Kit, Yeung,JiayaJia, Chi-Keung
Tang, AndGe RardMedioni by Closed-Form Solution
To Tensor Voting:Theory And ApplicationsTransactions
On Pattern Analysis And Machine Intelligence Vol.34,
No. 8, August 2012.
[12] JossyP.GeorgeSaleem,R.Tevaramani And
K.B.RajaPerformance by Comparison Of Face
Recognition Using Transform Domain Techniques
World Of Computer Science And Information
Technology Journal (WCSIT)ISSN: 2221-0741 Vol. 2,
No. 3, 82-89, September2012.
376
IJRITCC | March 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________