Online Election System Based on Aadhar Authentication
نویسندگان
چکیده
منابع مشابه
On App-based Matrix Code Authentication in Online Banking
Since its introduction, German online banking has been following a two-factor authentication procedure marked by a steady increase in its security features. In the recent past, however, app-based authentication schemes have gained in popularity and begun to replace established schemes like chipTAN. Unlike chipTAN, which uses dedicated hardware to securely legitimize transactions, authentication...
متن کاملBiometric Authentication System based on Iris Patterns
In the present age of digital impersonation, biometric techniques are being used increasingly to prevaricate against identity thefts. Iris recognition is a proven, accurate means to identify people. Iris is regarded as the most reliable biometric feature in terms of its uniqueness and robustness. The objective of this work is to present a biometric authentication system for high security physic...
متن کاملVeins based Authentication System
Biometric system such as finger, face, iris, ear, voice, DNA etc. is used for personal identification. Authentication based on vein pattern is an approach that uses the vast network of blood vessels that lie underneath a skin on back of the hand. Vein pattern are unique and also difficult to duplicate. In this paper, we present an approach to identify the user using hand vein pattern and knuckl...
متن کاملElection Results Prediction System based on Fuzzy Logic
Election is very popular word in the universe. As per the definition, Election is a process to select suitable from a group of candidates. But the process and properties may vary for different sectors. It has different types. Like local election, legislative election, parliamentary election, presidential election, senate election or election in a small group / union. As election is very famous ...
متن کاملZero-Stop Authentication: Sensor-Based Real-Time Authentication System
This paper proposes “Zero-stop Authentication” system, which requires no intentional interactions between users and authentication applications. Our Zero-stop Authentication model simplifies the current complicated authentication process by automating detection of users and objects. Our challenge is to eliminate the necessity for users to wait for a moment to be authenticated without reducing s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal for Research in Applied Science and Engineering Technology
سال: 2017
ISSN: 2321-9653
DOI: 10.22214/ijraset.2017.3101