International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 17 - Number 3 |
Year of Publication: 2011 |
Authors: E. S. Shameem Sulthana, S.Kanmani |
10.5120/2204-2798 |
E. S. Shameem Sulthana, S.Kanmani . Evidence based Access Control over Web Services using Multi Security. International Journal of Computer Applications. 17, 3 ( March 2011), 1-7. DOI=10.5120/2204-2798
In previous research the proposed system has determined the identity proof for the voters using hashing algorithms (MD5 and SHA1) through internet. From those results it founds that the security is not sufficient for the data. To protect the election accuracy, different methods have been proposed for hiding information. In this paper the proposed system embedded the information. The embedding is typically parameterized by a separate key. Without Knowledge about this key, it is difficult for a third party to detect or remove the embedded material. In this paper we are proposing a single text or a binary image is automatically scattered and embedded in video frames with BPCS method, genetic distortion audio tracks and text image with automated dynamic key for every transaction. The Dynamic key is generated by the calculation of the time stamp and efficient key is classified by the RSA cryptographic algorithm and managed in wireless networks. Here a single key is compressed of all the three keys make the user to be more convenient to encrypt and decrypt. According to the third party, a single packet is transfer for every transaction, but it has the fused format. This paper explains on voting through internet, with facial detection integrated with finger print authentication and automated load balancing, fused with data hiding security. A data hiding method, which is applicable through steganography, and the biometric concepts provide full security for data that is passed through the network from different places. The main goal of this work is it supports a remote voter registration scheme that increases the accuracy of the current systems. In this scheme the voter identification is carried out by biometric systems. This work evaluates how to take advantage from the most usable biometrics to carry out the voter registration process in a more effective way. Biometrics is also used to prevent impersonation, detect multiple registrations from the same person and protect from alterations of the registration information. This modification ensures higher payload and security.