A Survey on Secured Online Voting System Using Face Recognition

Authors

  • Fugat Ashlesha G Dept. of Computer Engineering, Savitribai Phule Pune University, India
  • Gaikwad Shital S Dept. of Computer Engineering, Savitribai Phule Pune University, India
  • Gangurde Jyoti P Dept. of Computer Engineering, Savitribai Phule Pune University, India
  • Sawant Aishwarya S Dept. of Computer Engineering, Savitribai Phule Pune University, India

Keywords:

Face Recognition, Cloud Database, Web-Cam, Security

Abstract

Now a day, voting for any social issue is important for modern democratic societies. The manual voting system is implemented for election from many years in our country. We are using face recognition to secure the system. The image captured at the time of registration as well as login phase is stored into the cloud database. The converted images are then matched by applying matching criteria which will be we decide. If match is found then and then only the user can proceed for voting Otherwise, the user is considered as invalid user or voter. For confirmation of voting, SMS will send to the voter from server to indicate voting is done successfully.

References

Roddick, John F., and Myra Spiliopoulou. "A bibliography of temporal, spatial and spatio-temporal data mining research." ACM SIGKDD Explorations Newsletter 1.1 (1999): 34-38

Face Base Online Voting System using Steganography (Volume 3, Issue 10, and October 2013).

Kevin Daimi and et al. University of Detroit Mercy, Detroit, Michigan 48219, USA.

Kirti Autade and et al., “E-voting on Android System”, International Journal of Emerging Technology and Advanced Engineering ,Volume 2, Issue 2, PP 242-245, February 2012 .

William Stallings(2007),”Cryptography And Network Security ”. Edition 5,Pearson publications.

Smita S. Mudholkar , Pradnya M. Shende , Milind V. Sarode , “Biometrics Authentication Technique” , International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012.

Lingyan Bi, Weining Wang, HaobinZhong, Wenxuan Liu, "Design and Application of Remote Control System Using Mobile Phone with JNI Interface", The 2008 International Conference of Embedded Software and Systems Symposia (ICESS2008), ,pp.416-419,2008.

Radovan Murin, “Mobile Voting for Android”, “Czech Technical University in Prague Faculty of Electrical Engineering, - GUI design, implementation and testing”, Thesis, May 6, 2011.[9]. A. B. Rajendra and H. S. Sheshadri (2012), Study on Visual Secret Sharing Schemes Using Biometric Authentication Techniques, AJCST, Vol 1, pp.157-160.

. C. Neuman and Ts'o. Theodore, “Kerberos: An Authentication Service for Computer Networks”. IEEE Communications Magazine. September 1994.

Anusha M N and Srinivas B K (2012), “Remote Voting System for Corporate Companies using Visual Cryptography,” vol. 2, pp. 250–251.

Rajendra Basavegowda, Sheshadri Seenappa (2013) “Electronic Medical Report Security Using Visual Secret Sharing Scheme”, IEEE UKSim 15th International Conference on Computer Modeling and Simulation Proceedings, pp, 78-83.

Hussein Khalid Abd-alrazzq1, Mohammad S. Ibrahim2 and Omar Abdurrahman Dawood (2012), “Secure Internet Voting System based on Public Key Kerberos”, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 2, No 3, pp. 428-434.

Kosala, Raymond, and Hendrik Blockeel. "Web mining research: A survey."ACMSigkdd Explorations Newsletter 2.1 (2000): 1-15.

S. Stubblebine and V. Gligor. “On message integrity in cryptographic protocols”. In Symposium on Security and Privacy ’92. IEEE, 1992.

Unnati A. Patel and Dr. Swamynarayan Priya, “Development of a Student Attendance Management System Using RFID and Face Recognition”, IJARCSMS, Volume 2, Issue 8, August 2014.

P. N. Huu, V. Tran-Quang, and T. Miyoshi, “Image compression algorithm considering energy balance on wireless sensor networks,” in IEEE Int. Conf. Industrial Informatics (INDIN), Osaka, Japan, Jul. 13–16, 2010, pp. 1005–1010.

M. Bishop and D. Wagner, “Risks of e-voting”, Community ACM, vol.50, no. 11, pp. 120–120, 2007.

Downloads

Published

2025-11-10

How to Cite

[1]
G. Fugat Ashlesha, G. S. Gaikwad Shital, P. Gangurde Jyoti, and S. Sawant Aishwarya, “A Survey on Secured Online Voting System Using Face Recognition”, Int. J. Comp. Sci. Eng., vol. 3, no. 9, pp. 214–216, Nov. 2025.