Mobile Voting

Mobile Voting

 

Abstract

The daily reads

Polling disrupted by militants in J&K

43,732 Polling stations declared Sensitive

Ec seeks security plan from home ministry

Kalam urged to make voting disabled-friendly

Candidate escapes gunshots in TN

during the election times.

Can you imagine an election without the booth capture, without firing of polling stations, clashes between parties, voting without long standing queues, without the ferry service to vote, voter friendly, with an increased voting rate. Yes that day is not far from here.

Here in this paper we are going to simply the voting process. In this hi-tech era the mobile phones attached with the iris scanner has to be used to cast the votes. Of course this m-voting reduces the time, cost, risks. The Iris recognition technology will pace our thoughts with higher degree of authentication.

2004 elections

INDIA, WORLDS LARGEST DEMOCRACY GOES FULLY ELECTRONIC.

WHEN IT WILL BE MOBILISED?????

Introduction

M-voting is the technique of casting the votes through the cell phones .The iris scanner wills checks the person for the validity. The eye patterns will transmitted to the server. After getting the permission from the person can vote by pressing the keys. This m-voting can have access anywhere from the world with the help of satellite communications.

Current Scenario

Now a days,

Large troops of military and Para military forces are employed for security purposes. Its a drain to our economy. The main stress on Ec being the protection of ballot boxes, EVMs. On the day of counting, higher security is needed.

Todays voting practice

People have to stand in lengthy queues in hot sun some times in rains. Old age persons have to face more troubles. Remote area peoples have to travel by boats, horses, bulls and even elephants. These factors reduce the voting rate.

Hence the combination of mobile communication and the biometric techniques paves the way for new generation of voting. Hence we can expect GOOD DEMOCRACY can flourish in the country.

Mission Impossible?

The person who is going to vote has to call to Election commission office and then he/she has to show the eye for a fraction of second. The photographed eye will be transmitted to the office and it is processed for the validity, authentication. After getting the permission the person can vote to the desired candidate.

The figure shows the location of iris in the human eye

The voting process consists of

  • Enrollment of iris patterns
  • Iris scanning of individuals
  • Verification for the validity
  • Permission to vote
  • Voting

All these leads to the success of democracy.

Enrollment

On prior to the election the public has to enroll their iris pattern with the main server provided by the election commission. It may be at the district head quarters, municipal office, etc. This registration can be done once throughout the life. The database containing the iris pattern along with the personal data will has to be kept confidential. Here the camera takes a photograph and generates the iris code. The distance between the camera and the eye can be 4 to 24 inches. This stage alone needs the human work.

Biometrics

Biometrics technologies is defined as automated method of identifying or authenticating the identity of a person based on Physiological or behavioral characteristics

Physiological characteristics are more stable characteristics such as

  • Face recognition
  • Finger print recognition
  • Iris recognition
  • DNA recognition

Behavioral characteristics is the reflection of make up

  • Signatures
  • Voices

Iris Scanning

The person who is going to vote has to make a call to the number provided by EC with his iris scanner attached cell phones. Then they have to have an glance at the camera. To record an individual’s iris code, a black-and-white video camera uses 30 frames per second to zoom in on the eye and “grab” a sharp image of the iris

Iris Scanner & Image

A low-level incandescent light illuminates the iris so the video camera can focus on it, but the light is barely noticeable and used strictly to assist the camera. One of the frames is then digitized then transmitted and stored in a PC database of enrolled users. The whole procedure takes less than a few seconds, and can be fully computerized. Scanning is actually performed since the eye is simply photographed.

About Iris

An iris has a mesh-like texture to it, with numerous overlays and patterns that can measured by the computer. The iris-recognition software uses about 260 “degrees of freedom.

 

Fact Box

  • Probability of two irises producing exactly the same code: 1 in 10 to the 78th power (1/10^78)
  • Independent variables (degrees of freedom) extracted: 266
  • Iris Code record size: 512 bytes
  • Operating systems compatibility: DOS and Windows (NT/95/98/XP)
  • Average identification speed (database of 100,000 Iris Code records): one to two seconds
  • Patterns are formed by six months after birth.

Why Iris recognition?

Glasses and contact lenses, even colored ones, do not interfere with the process. In addition, recent medical advances such as refractive surgery; cataract surgery and cornea transplants do not change the iris’ characteristics. In fact, it is impossible to modify the iris without risking blindness. And even a blind person can participate. As long as a sightless eye has an iris, that eye can be identified by iris recognition. Even the best fingerprint technology uses about 60 to 70 degrees of freedom.

Iris code generation

The picture of an eye is first processed by software that localizes the inner and outer boundaries of the iris, and the eyelid contours, in order to extract just the iris portion. Eyelashes and reflections that may cover parts of the iris are detected and discounted. Sophisticated mathematical software then encodes the iris pattern by a process called Demodulation. This creates a phase code for the texture sequence in the iris, similar to a DNA sequence code. The Demodulation process uses functions called 2-D wavelets that make a very compact yet complete description of the iris pattern, regardless of its size and pupil dilation, in just 512 bytes. The stored file is only 512 bytes with a resolution of 640 x 480, allowing for massive storage on a computer’s hard drive.

The phase sequence is called an Iris Code template, and it captures the unique features of an iris in a robust way that allows easy and very rapid comparisons against large databases of other templates. The Iris Code template is immediately encrypted to eliminate the possibility of identity theft and to maximize security.

Verification

In less than a few seconds, even on a database of millions of records, the Iris Code template generated from a live image is compared to previously enrolled ones to see if it matches any of them. The decision threshold is automatically adjusted for the size of the search database to ensure that no false matches occur even when huge numbers of Iris Code templates are being compared with the live one.

Some of the bits in an Iris Code template signify if some data is corrupted (for example by reflections, or contact lens boundaries), so that it does not influence the process, and only valid data is compared. Decision thresholds take account of the amount of visible iris data, and the matching operation compensates for any tilt of the iris.

A key advantage of iris recognition is its ability to perform identification using a one-to-all search of a database, with no limitation on the number of Iris Code records and no requirement for a user first to claim an identity, for example with a card.

Permission

The server provided at the polling station will verify the iris code with the database and then it verifies whether they had already voted. If they are eligible to vote the server permits them to register their vote through their cell phone.

Flow diagram

This shows the path of sampling, verification, and permission for voting

Voting

The success of democracy lies here. After getting the permission from the Ec server the person can vote from his mobile by pressing the keys. The prerecorded voice message will help to select the candidate. The photographs of the candidates along with their symbols can be displayed in the camera. So that a right choice can be made.

Benefits

  • Easier to store the patterns, Time saving.
  • Patterns are extremely complex to make a duplicate.
  • Patterns differ between twins, triplets and etc.
  • Imitation is not possible. Pattern cannot be changed with risking the eye.
  • Election mal practices can be stopped.
  • Voting without pains.
  • Enables secured voting any where from the world.

Further,

This can be used for citizenship rights, border-crossing permissions, passports, and even for ATM services.

Conclusion

We have presented a newer approach to the voting process, which will surely bring a change. We can reach the dream day, the peaceful election in which everyone can participate without any discrimination, threats, and risks. Dream day is nearer

Tags:

Edward Ramamoorthy Avatar

Help Us Grow

If you like this post, please share it with your friends.

You are free to copy and redistribute this article in any medium or format, as long as you keep the links in the article or provide a link back to this page.

Subscribe to Newsletter




Privacy Settings

Privacy & Cookie Overview

Our website uses cookies to provide you with the best user experience possible. These cookies are stored in your browser and perform essential functions such as recognizing you when you return to our website, as well as helping us to understand which sections of the website you find most useful and engaging.

To learn more, you can read our Privacy & Cookie Policy or reach out through our Contact form.

Strictly Necessary Cookies

Strictly Necessary Cookies must always be enabled to ensure the proper functioning of this website and to allow us to provide you with excellent service. These cookies are also essential for saving your cookie preferences.

Google Adsense

We use Google AdSense to keep this site free by displaying relevant ads. AdSense requires essential cookies that cannot be disabled, but you can manage other cookies. We respect your privacy and provide options to control non-essential cookies.

For more details on how Google handles your data, visit Google's Data Usage Policy. Please review our Privacy Policy for more information on how we protect your data.

AddToAny

We use AddToAny for social sharing. It doesn’t store cookies, ensuring a privacy-friendly experience. AddToAny complies with GDPR and CCPA by default.

For more, see their Privacy Policy.

OneSignal

We use OneSignal to send notifications to users who opt in. OneSignal complies with GDPR and is certified under the EU-US and Swiss-US Privacy Shield frameworks.

For more, see their Privacy Policy.

3rd Party Cookies

This website utilizes third-party cookies, which can enhance your experience and support our ongoing efforts to improve our services.

Google Analytics

We use Google Analytics to collect anonymous data, such as visitor numbers and popular pages, to improve user experience and site performance. Keeping this cookie enabled helps us refine the site based on visitor activity.

For more information, see Google’s Privacy Policy.

Discover more from Prime Inspiration

Subscribe now to keep reading and get access to the full archive.

Continue reading