IJIEEB Vol. 13, No. 5, 8 Oct. 2021
Cover page and Table of Contents: PDF (size: 656KB)
Full Text (PDF, 656KB), PP.24-37
Views: 0 Downloads: 0
Security, Electronic, Voting System, Fingerprint and Visual Semagram
An election is a formal procedure through which a group of individuals decides on an individual or multiple individual to be in a position of authority using mechanical, paper-based and electronic methods. Despite the measures to secure the voting systems from fraudulent activities among corrupt politicians and election officers, attackers have been compromising the security measures thereby, providing illegitimate opportunities for unwanted contestants to win elections. This research was on the development of an electronic voting system using fingerprint and visual semagram techniques. The proposed e-voting model had six modules for effectiveness in the e-voting system. It was implemented using Java in Android Studio and C-Sharp (C#) in Microsoft Visual Studio, and was tested in an official deanship election of five faculties in a tertiary institution. Every illegible staff was enrolled and presented with a voter identification number (VIN) card. The voter's fingerprint and VIN were the fundamental credentials required for authentication and to poll a legitimate vote to a preferred contestant at a designated polling centre. The sensitive results were firstly encrypted and secondly concealed in an image to produce "Vimago" using the visual semagram technique. The "Vimago" was subjected to steganalysis and concealed results were not detected. An Equal Error Rate of 0.0019, a sensitivity of 0.9962 and an accuracy of 99.81% were obtained from the experiment. Based on the experimental results, the proposed e-voting model is highly recommended for use by various electoral commissions for voting and security agencies for the dissemination of sensitive information through the public network, the manufacturers of electronic voting machines are hereby offered a model for use in the development and securing of a fingerprint-based platform for a voting system were made among other recommendations.
Adewale Olumide S., Boyinbode Olutayo K., Salako E. Adekunle, "An Innovative Approach in Electronic Voting System Based on Fingerprint and Visual Semagram", International Journal of Information Engineering and Electronic Business(IJIEEB), Vol.13, No.5, pp. 24-37, 2021. DOI:10.5815/ijieeb.2021.05.03
[1]Adewale, O. S., Boyinbode, O. K., & Salako, E. A. (2020b). An enhanced computational fusion technique for the security of authentication of electronic voting systems. International Journal of Smart Security Technologies, Vol. 7, No. 2, pp. 22–37.
[2]Adewale, O. S., Boyinbode, O. K., & Salako, E. A. (2020c). A review of electronic voting systems: a strategy for a novel. International Journal of Information Engineering and Electronic Business (IJIEEB), Vol. 12, No.1, pp. 19–29.
[3]Akhil, S., Nishita, S., Shruti, S., Soumi, B., & Madhuri, C. (2020). Blockchain enabled online-voting system. A paper of ITM Web of Conferences 32, 03018 (2020), International Conference and Expo on Advanced Ceramics and Composites. https://doi.org/10.1051/itmconf/20203203018
[4]Aman, J., Yojna, A., Jitendra, P., Sachin, Y., & Konark, S. (2020). Design and development of biometric enabled advanced voting system. International Journal of Innovative Research in Computer Science & Technology (IJIRCST), Vol. 8, No. 3, pp. 50-53.
[5]Annadate, M. N., Shreyans, S. G., Nivita, R. K., & Pushkar, S. N. (2017). Online voting system using biometric verification. International Journal of Advanced Research in Computer and Communication Engineering, Vol. 6, No.4, pp. 276 –281.
[6]Atul, M., Divyansh, Y., Ankit, C., Deepak, P., & Shubham, G. (2018). A secured electronic voting machine using biometric. International Journal of Electronics, Electrical and Computational System, Vol. 7, No. 4, pp. 105–108.
[7]Bhavneet, K., Pooja, N., & Harish, K. (2013). Steganography techniques: Concepts and overview. International Journal of Computer Science and Communication Engineering, Vol. 2, No. 4, pp. 33–38.
[8]Catalin, L. (2010). Car access using multimodal biometrics. The annals of the "Ştefancel Mare" University of Suceava. Fascicle of the Faculty of Economics and Public Administration, Vol. 10, pp. 368–377.
[9]Divyank, M., Aaditya, S., & Saurabh, G. (2018). Android voting system using facial recognition. International Journal of Advanced Research in Computer and Communication Engineering, Vol. 7, No. 3, pp. 288–291.
[10]Firas, I. H., Seifedine, K., & Oussama, K. Z. (2017). Web-based voting system using fingerprint: design and implementation. International Journal of Computer Applications in Engineering Sciences, Vol. 2, No. 4, pp. 404-409.
[11]Lichun, C. (2018). Trust and security in the e-voting system. Electronic Government: An International Journal, Vol. 6, No. 4, pp. 343-351.
[12]Jaison, I. P., Kishoritha, K. R., Ganesh, B., Gokulprashanth, P., & Udhayakumar, G. (2018). Electronic voting machine with facial recognition and fingerprint sensors. International Journal of Advance Research and Development, Vol. 3, No.3, pp. 165–170.
[13]Joseph, B. A. (2017). Automated voting system using bimodal identification and verification technique. Annals Computer Science Series, pp. 117–133.
[14]Olaniyan, O. M., Mapayi, T., & Adejumo, S. A. (2011). A multiple scan biometric-based system for electronic voting. African Journal of Computing & ICT, Vol. 4, No. 2, pp. 9-16.
[15]Olowookere, A., & Awode, T. (2014). Design of a secured electronic voting system using multimodal biometrics. International Journal of Innovative Research in Computer and Communication Engineering, Vol. 2, No. 12, pp. 7101 – 7106.
[16]Rajnikannan, M., & Ashok, K. D. (2016). Estimating the impact of fingerprint image enhancement algorithms for better minutia detection. International Journal of Computer Application, Vol. 1, No. 7, pp. 126 – 137.
[17]Razu, A., Javed, M. S., Asraf, A., Rajib, M., & Arifa, K. (2020). The future of electronic voting system using blockchain. International Journal of Scientific & Technology Research, Vol. 9, No. 2, pp. 4131-4134.
[18]Sanjay, K., & Manpret, S. (2017). Design a secure electronic voting system using fingerprint technique. International Journal of Computer Science Issues (IJCSI), Vol. 10, No. 4, pp. 201-218.
[19]Sathya, G., Jeevanantham, C., Sangeetha, K., Venmathi, V., & Ramya, P. (2017). Biometric authentication system based on aadhar card. International Journal of Pure and Applied Mathematics, Vol. 117, No. 9, pp. 7–10.
[20]Snega, S., Saundarya, S., & Balraj, R. (2018). Highly secured electronic voting machine using aadhaar in IOT platform. International Journal of Electrical and Electronics Research, Vol. 6, No. 2, pp. 41–47.
[21]Tamilarasu, P., Aadhithyan, S., Gowthaman, K., & Hariprakash, V. (2018). Fingerprint based electronic voting machine. International Journal of Current Engineering and Scientific Research (IJCESR), Vol. 5, No. 2, pp. 67–70.
[22]Varsha, N. G., Sangamesh, J., Shravya, R., & Shivaraja (2018). Aadhar based biometric voting system. International Journal of Advance Research, Ideas and Innovations in Technology, Vol. 4, No. 3, pp. 424–427.
[23]Ameh, I. A., Olayemi, M. O., & Olumide, S. A. (2016). Securing cardless automated teller machine transactions using bimodal authentication system. Journal of Applied Security Research, Vol. 11, No. 4, pp. 469-488.
[24]Kaur, N. S., & Patterh, M. S. (2017). A biometric fusion based on face and fingerprint Recognition using ANN. International Journal Recent Innovation Trends Computer Communication, Vol. 5, pp. 88–92.
[25]Milind, R. E., & Deshpande, P. P. (2018). Multimodal biometric recognition system using feature level fusion. In Proceedings of the 2018 IEEE Fourth International Conference on Computing Communication Control and Automation (ICCUBEA), Pune, India,16–18 August 2018, pp. 1–5.
[26]Arjona, R., Prada-Delgado, M.A., Baturone, I., & Ross, A. (2018). Securing minutia cylinder codes for fingerprints through physically unclonable functions: an exploratory study. In Proceedings of the 2018 International Conference on Biometrics (ICB), Gold Coast, Australia, 20–23.
[27]Huadi, Z., Wenqiang, J., Mingyan, X., Srinivasan, M., & Ming, L. (2020). Blinkey: A two-factor user authentication method for virtual reality devices. Proceeding ACM Interact. Mob. Wearable Ubiquitous Technol, Vol. 4, No. 164, pp. 29 https://doi.org/10.1145/3432217
[28]Rohit, S. (2020). A Score Level Fusion approach for multimodal biometric fusion. International Journal of Scientific & Technology Research, Vol. 9, No. 1, pp. 4241-4245.
[29]Yaseen, M., Anton, D. K., Gugulethu, M. H., Cynthia, S. N., Norman, N., & Portia, K. (2021). Biometric recognition of infants using fingerprint, iris, and ear biometrics. Institute of Electrical and Electronics Engineers (IEEE) Access, Vol. 9, pp. 38269-38286.
[30]Tajinder, K., Shashi, B., & Surender, J. (2021). An improved biometric fusion system of fingerprint and face using whale optimization. International Journal of Advanced Computer Science and Applications (IJACSA), Vol. 12, No. 1, pp. 664-671.
[31]Leghari, M., Memon, S., Dhomeja, L. D., Jalbani, A. H., & Chandio, A. A. (2021). Deep feature fusion of fingerprint and online signature for multimodal biometrics. Computers, 10, 21. https://doi.org/10.3390/computers10020021
[32]Salako, E. A. (2021). Design and Implementation of a Fingerprint-Based Platform for Securing Electronic Voting System. A Thesis in the Department of Computer Science, School of Computing, Submitted to the School of Postgraduate Studies in Partial Fulfilment of the Requirements for the Award of Doctor of Philosophy (Phd) in Computer Science of the Federal University of Technology, Akure, Nigeria.
[33]Adewale, O. S., Boyinbode, O. K., & Salako, E. A. (2020). Visual semagram: An enhanced technique for confidentiality requirement of electronic voting system. International Journal of Computer Network and Information Security (IJCNIS), Vol.12, No.4, pp.51-59, 2020. DOI: 10.5815/ijcnis.2020.04.05
[34]Olayemi, M. O., Taliha, A. F., Aliyu, A., and Olugbenga, J. (2016). Design of secure electronic voting system using fingerprint biometrics and crypto- watermarking approach. International Journal of Information Engineering and Electronic Business (IJIEEB), Vol. 8, No. 5, pp. 9–17, DOI: 10.5815/ijieeb.2016.05.02.