Vous êtes sur la page 1sur 1






*,** BE. II-EEE, Knowledge Institute of Technology, Salem, India.

*** Professor, Department of EEE, Knowledge Institute of Technology, Salem, India.

With the advancement of electronics and computer science, mobile communication technology leads us to a fast
moving entirely different world. In this scenario, we have lot of responsibilities, one of it is voting for our country, but even
we don't have time for it, and also our votes may not useful to our nation, because of fake votes and cheating process
happened during the election. This problem is rectified by the latest voting system as Mobile Voting System which is
discussed in this paper. The mobile voting system uses the efficient techniques, iris recognition and cryptography for the
secured voting process. The iris recognition and cryptography avoids the fake votes and cheating process. The election
commission spends lot of money, for each election unnecessarily, which will be minimized by this system. This system
enables the voter to vote to the Nation from his place itself.
Keywords: Iris Recognition and Iris Code, Cryptography Techniques, Mobile and RSA Algorithm.

picture of a person's iris.

Mobile voting system use the iris recognition and

With near-infrared light, a person's pupil is very black,

cryptography techniques, for voting purpose, the

making it easy for the computer to isolate the pupil and

encryption algorithm is uploaded in the mobile phone. As

iris[1],[2][6]. On look into an iris scanner, either the cameras

like the eye scanner which scans the iris is fixed in the

focuses automatically or use a mirror or audible feedback

mobile, so the mobile phone having camera is preferred

from the system to make sure that eye is positioned

for that. To obtain the voting the voters eye iris is

correctly as shown in Figure1. Iris scanner is actually not a

recognized. During the transmission from the source

scanning device, but it is a digital camera with iris

(mobile) to destination (election database system) the

scanning software. Usually, eye should be 20 to 25 cm

data is encrypted using the encryption algorithm. The

from the camera. When the camera takes a picture, the

data sending and receiving is doing with the help of the

computer locates: shown in Figure 2.

mobile networks.

1. Iris Recognition

Everyone in the world has the uniqueness of their own;

such uniqueness cannot be imitated/remake by anyone.

The center of the pupil

The edge of the pupil

Such uniqueness is used for a security purpose. As an iris

technology produces a very low false rate when
compared to other biometrics results are very preferable
in our mobile voting system.[1],[2]

The edge of the iris

The eyelids and eyelashes

It then analyzes the patterns in the iris and translates them

into a code. Iris scanners are becoming more common in
high-security applications because people's eyes are so
unique (the chance of mistaking one iris code for another

1.1 Iris Scanning

is 1 in 10 to the 78th power they also allow more than 200

Iris scanning can seem very futuristic, but at the heart of

points of reference for comparison, as opposed to 60 or

the system is a simple CCD digital camera. It uses both

70 points in fingerprints. The iris is a visible but protected

visible and near-infrared light to take a clear, high-contrast

structure, and it does not usually change over time,


January - March 2011

i-managers Journal on Electrical Engineering, Vol. 4 l
No. 3 l