外文翻译小区物业报修管理系统的设计与实现

上传人:无*** 文档编号:65557024 上传时间:2022-03-24 格式:DOC 页数:11 大小:59KB
返回 下载 相关 举报
外文翻译小区物业报修管理系统的设计与实现_第1页
第1页 / 共11页
外文翻译小区物业报修管理系统的设计与实现_第2页
第2页 / 共11页
外文翻译小区物业报修管理系统的设计与实现_第3页
第3页 / 共11页
点击查看更多>>
资源描述
1外文资料翻译译文学习使用生物识别技术和隐写术的在线投票技术的安全性摘要:对于提高投票系统的安全是非常重要的,特别是在线系统。在本文中我们为通过生物识别及密码安全来认证用户安全的在线投票系统提供安全保障选民账户。基本的想法就是将密钥和覆盖在关键的基础图像上的图像结合起来。结果这种新的图像是由系统调用的和封面图像非常相似的隐秘图像产生的。关键的图像是一种生物措施,就像指纹图像。隐秘图像的提取时在发生在执行选民认证的服务器端。该系统最大限度地减少了危险因素例如黑客不仅需要找到模板还需要找到密钥,但这是不可能的。它使选举程序能够抵抗各种各样的欺诈行为。为了使用哈希算法提高SHA 256的速度来替代MD5。关键词:生物,在线投票,隐秘图像,信息隐藏。介绍:选举过程的完整性将有助于确定民主本身的完整性。所以整个系统选举必须是安全的和强大的来对抗各种各样的欺诈行为。系统应该是透明的和能理解的,这样选民和候选人才能介绍选举的结果。但是现在对于一些队伍沉迷于操纵这可能最终导致结果和人们真实的裁决相反。此外,投票的传统方式将需要一个长期的过程和时间,所以这个新的在线投票系统将成为问题的最佳解决方案;同时提供更简单的方式进行投票。当我们将它和现有的投票系统进行比较,电子投票系统有这几个优点,如:电子投票系统能够节省大量的印刷文具和大量选举材料的运输。这是很容易来运输,储存,和维护的。它完全排除了无效票的机会。在一个在线投票系统中,无论是电子或使用传统的纸质选票,这个系统必须满足某些重要的标准,例如唯一性,准确性,完整性,可验证性,可靠性,保密性,灵活,方便,透明性,和成本效益。其中,身份验证可以看作是最关键的问题。在线投票系统:这是一个基于Web设施的选举的运行和网上调查,发展背后的目的是该系统简化了组织选举的过程,而且使选民更容易地在他们家中的电脑进行远程投票同时考虑到更好的安全性、匿名性和提供试听功能。基本上,用户是通过web浏览器和系统进行交互的个人。生物是试图获取一个自动化的机器来鉴别或识的基本的科学。生物识别系统试图与个体特征的交换知识,例如指纹。A. 必要性在印度使用的电子投票机,打卡系统,或是用于其他国家的全球管理系统都缺乏模糊的或不正确的选举结果,所以我们对现在的在线投票系统提出生物识别技术和速记式加密技术,来避免舞弊和提高精准度以及提高进程的速度,这样每个人可以不论位置的进行投票。B.优点(1) 节约成本(2) 降低管理(3) 创建并快速地实施投票和计票的完整性(4) 无需放弃(5) 更好的性能投票过程:一旦通过真实性标准的任何个人,他/她将被记录到他/她的投票帐户。你可以更容易地限制投票人在投票期间不止一次登录他/她的投票账户,一旦某个特定的选民被系统认证,安全通道将建立使用HTTPS,那么他/她就可以投票了。投票将保持秘密,即,用户将票投给了谁将不会反映在数据库的任何地方。最后,账户将被关闭而且禁止用户以任何方式再次登录。这就完成了投票的过程。投票过程背后的方法是在图2的解释。生物识别技术它是基于他们的行为和生物特征自动识别个人。生物识别通过在识别查询中探究个人的行为和生物特征并且将这些数据与在学习过程中被存储的生物参考数据进行比较,这种方法确定特定用户的身份。因为很难错位、伪造或共享生物标识符,它们都被认为相较于传统的令牌或基于知识的方法是更可靠的识别。生物特征识别的主要目标是用户的方便、安全和更高的效率。指纹对于每个人来说都是独一无二的包括同卵双胞胎,人脸识别是人通过他们的面部图像进行识别的过程。这些技术可以使用指纹和人的面部图像进行身份验证进入一个安全的系统,因此电子投票系统需要在现在的技术生物识别技术的基础上进行改进。身份验证是入学前的一个先决条件,在其中生物特征被保存。 投票可以通过互联网实现隐写术的概念和生物识别技术。选民销和密钥发送到服务器安全地使用隐写术。隐写术是隐藏私人或某些不正常的敏感数据的概念。如果一个人看到数字对象,他/她不会知道有任何隐藏信息,因此他/她不会试图解密这些信息。隐写术的基本模型表明如果您想要发送一些私人信息然后选择封面图片,发现它的冗余比特和替换这些比特的信息数据位。这些信息可以在另一端做一些操作方便提取。最低有效位插入是将信息嵌入在封面图像的一种常用方法,这种方法覆盖LSB的像素值的一个信息点。如果我们选择一个24位的封面图片,它在每个像素中会变得容易存储3位。人将无法找到在任何情况下的差异。不幸的是,这种LSB方法变化的封面图像的一些性质,所以黑客可以检测得到的隐秘的扭曲图像。这是完全可行的,我们不能以这种方式让任何的个人信息嵌入。所以我们可以做的是在嵌入之前加密信息, 或者我们可以在同一时间提供强大的加密技术。指纹图像被选择作为加密的密钥,指纹识别无论是在民事和刑事程序中都是用于用户认证最部署的生物识别技术,因为其高成熟度和成本效益的获取与处理。一些选民应收集信息来支持这样的一个系统。首先每一个人在国家应该有一个个人识别号码。这是为了维护在数据库中账户选民的需要。其次,我们需要拇指印象(指纹图像)的所有人。第三,当我们创建一个帐户,每个人都将提供一个系统生成的密钥,他/她应该不透露给任何人。这将需要投票。相关的工作Subba Rao等人在2011提出了基于随机序列密码位信息隐藏技术。这种技术的优点是在文本和图像之间没有一对一的映射。Constantinos Patsakis和Evangelos Fountas在2010年为了更多的整数基地提出Fibonacci的LSB数据隐藏技术,在这项工作中,一个推广了Fibonacci分解思想的新的嵌入方法,使得提出了更多的数据被嵌入在具有良好的统计特性的图像。Namita Tiwari和Dr.Madhu Shandilya在2010年以gif文件格式评估基于LSB的图像隐写术的方法,本文着重对GIF图像的像素的颜色的最低有效位信息进行隐藏。Hanan Mahmoud Hanan等人在2010年提出了一种新的指纹图像的信息隐藏技术。本文介绍了设计和实现一个项目的信息包含图像的隐藏信息特别是指纹图像。这个项目的政策是保持隐藏在指纹图谱中的机密消息。Sanjay Saini and Dr. Joydip Dhar在2008年提出了一个防窃听的安全的在线投票模型。本文提出了一种在线投票框架来确保投票人能够不被别人窃听地在公共场所投票。E.S. Shameem Sulthana 和Dr.S.Kanmani在2011年提出了基于web服务使用多安全方案的访问控制的证据。本文介绍了通过互联网投票,人脸检测和指纹检测的综合认证和自动负载平衡与信息隐藏的安全性融合。阿洛克库马尔维什瓦卡玛和阿图库马尔在2011年提出了椭圆曲线密码信息隐藏方案结合使用生物安全移动投票的新方法。本文介绍了一种使用加密和隐写术的安全的移动投票系统。Nabin Ghoshal 和J. K. Mandal 在2011年提出了隐写的彩色图像认证方案。本文论述了一种新的隐写技术,演示了基于离散傅里叶变换的频率域的彩色图像认证变换技术(DFT)。实验结果证实,该算法的性能优于以离散余弦变换(DCT),傅立叶变换(QFT)和时空色DFT(scdft)为基础的方案。Masoud Afrakhteh 和 Subariah Ibrahim 在2010年提出了一个增强的LSB算法抵抗卡方攻击。在隐写术中,尤其是在传统的最低有效位(LSB)的插入方法,这是一项具有挑战性的问题,是如何通过一种方法不被人看到地将所需的秘密位嵌入在一个覆盖介质中,本文提供一种利用更多的周围像素而不是像使用每个像素的最后3或4的近邻的BPCS、PVD和MBNS的方法。最后,这证明了这个方法强烈反对卡方攻击。林国祥等人在2010提出了一个用图像质量优化和基于模拟退火算法的抗隐写分析来增强图像的隐写术的框架,在本文中,提出了一个封闭环的计算框架,迭代搜索并适当地修改像素/系数提高基地隐方案优化的图像质量和较高的抗隐写的能力。结论在本文中,我们使用通过信息隐藏与加密相结合的技术概念来为一个在线投票系统提供安全保障。信息隐藏和加密一起使用为选民提供了安全保障的帐户。所以这个图像和键在第一时间被组合使用。2. 外文原文Learning using biometric technology and steganographySecurity of online voting technologyAbstract: It is very important to provide security to voting system and mostly which is online one. In this paper we provide security to online voting system with secure user authentication by providing biometric as well as password security to voter accounts. Basic idea behind this is to combine secret key with cover image on the basis of key image. As a result such new image is produced by system called stego image which is quite same as cover image. The key image is a biometric measure, such as a fingerprint image. Extraction of stego image is take place at server side to perform the voter authentication. The system minimizes the risk factor as hacker needs to find not only the template but also secret key and it is not possible. It makes election procedure to be secure against a variety of fraudulent behaviors. To improve speed SHA 256 used for hashing is replaced with MD5. Keywords: Biometric, Online Voting, Stego image, Steganography. . Introduction Integrity of the election process will help in determining the integrity of democracy itself. So the whole system of election must be secure and robust against a variety of fraudulent behaviors. System should be transparent and comprehensible so that voters and candidates can accept the results of an election 11. But, now- a-days it has become common for some forces to indulge in rigging which may eventually lead to a result contrary to the actual verdict given by the people. Furthermore, the traditional way of voting will take a long process and time. So, the novel online voting will become the best solution for the matters; besides provide easier way of voting. When we compared it with existing voting system the Electronic voting has several advantages 11 like: Electronic voting system is capable of saving considerable printing stationery and transport of large volumes of electoral material. It is very easy to transport, store, and maintain. It completely rules out the chance of votes which are not valid. In a voting system, whether electronic or using traditional paper ballots, the system should meet the certain important criteria such eligibility and authentication, uniqueness, accuracy, integrity, verifiability, reliability, secrecy, flexibility, convenience, transparency, and cost effectiveness. Among these, authentication can be viewed as the most critical issue. Online voting system It is a web based that facilities the running of elections and surveys online. Obj ective behind the development of this system is to simplify the process of organizing elections and make it easy for voters to vote remotely from their home computers while taking into consideration better security, anonymity and providing auditioning capabilities. Basically ,Users are individuals who interact with the system through web browsers. Biometrics is basically science that tries to fetch human biological features with an automated machine either to authentication or identification. Biometric systems try to exchange Knowledge with feature of an individual, e.g. finger print. A. Necessity Electronic voting machines use in India , punch card systems, Global Election Management System used in other countries have lack of indecisive or incorrect election results. So, we have present Online Voting System with Biometric and Steganography, to avoid rigging and to increase the accuracy and the speed of the process so that, everyone can cast his vote irrespective of his location. B. Advantages 1) Cost saving 2) Reduced administration 3) Create and deploy ballot very quickly and with integrity of the vote counting. 4) No need for renounces 5) Greater performance Voting Procedure Once any individual go through the authenticity criteria, he/she will be logged into his/her voting account. You can easily restrict a voter from logging into his/her voting account more than once during elections. Once any particular voter is authenticated by the system, a secure channel will be established using https and then he/she will be able to cast the vote. The vote will remain secret, i.e., this will not be reflected anywhere in the database that which user has voted for whom. At last, the account will be closed and that disabling user to log back in by any means again. This completes the voting process. The methodology behind the voting process is explained in the fig 2. Biometrics It is the automated recognition of individuals based on their behavioral and biological characteristics. Biometric recognition means by measuring behavioral and biological characteristics of an individual in a recognition inquiry and comparing these data with the biometric reference data which had been stored during a learning procedure, in this way the identity of a specific user is determined. Because it is difficult to misplaced, forged, or shared biometric identifiers, they all are considered more reliable for recognition of person than traditional token or knowledge based methods. The main obj ectives of biometric recognition are user convenience, security and higher efficiency. Fingerprints are unique for each finger of a person including identical twins. Face Recognition is the process of identification of a person by their facial image. These techniques makes it possible to use the fingerprint and facial images of a person to authenticate him into a secure system, So the Electronic voting system has to be improved based on the current technologies viz., biometric system. A pre requisite for authentication is enrollment, in which the biometric features are saved. Concept of Steganography Voting can be done through internet with the concept of Steganography and biometrics. Voter PIN and the secret key are send to the server securely by using Steganography. Steganography is the concept of hiding private or sensitive data within something that seems to be nothing out of the normal. If a person sees the digital obj ect, he or she will have no idea that there is any hidden information, and therefore the person will not try to decrypt the information. The basic model of Steganography says if you want to send some private information then choose a cover image, find its redundant bits and replace these bits with data bits of the information. The information can be easily extracted by doing some operations on the other end. Least significant bit insertion is a common way to embed information in a cover image. This method overwrites the LSB of a pixel value with a message bit. If we choose a 24-bit cover image, it will become easy to store 3 bits in each pixel. Person will not be able to find the difference in any case. Unfortunately, this method of LSB modification changes some properties of the cover image, so hacker can detect the distortions in the resulting stego image. This is quite viable that we cant embed anybodys personal information in this manner. So, what we can do is that, we can encrypt the information before embedding, or we can do Steganography providing strong encryption at the same time. Fingerprint images are chosen as keys for encrypting the secret key. Fingerprint recognition is used for user authentication because it is the most deployed biometric technique, both in civil and criminal applications, because of its high maturity and cost-effective capture and processing. Some information about the voter should be collected to support such a system. Firstly, each and every individual in the country should be provided with a Personal Identification Number. This is needed for maintenance of voter accounts in the database. Secondly, we need Thumb Impressions (fingerprint images) of all the individuals. Thirdly, when we create an account every person will be provided with a system generated Secret key which he/she should not reveal to anybody. That will be needed to cast the vote. Related Work Subba Rao et al., 1 in 20 11 proposed a Steganography technique that is based on randomizing the sequence of cipher bits. Advantage of this technique is there is no one-to-one mapping between a given cipher text and an image. Constantinos Patsakis and Evangelos Fountas 2 in 20 10 proposed Fibonacci LSB Data Hiding Technique to more integer bases. In this work, a new embedding method, which generalizes the idea of Fibonacci decomposition, enabling more data to be embedded in an image with good statistical properties was presented. Namita Tiwari and Dr.Madhu Shandilya 3 in 20 10 evaluated the LSB based Methods of Image Steganography on GIF File Format. This paper focused on hiding the message in the least significant bits of the colors of the pixels of a GIF image. Hanan Mahmoud Hanan et al., 4 in 20 10 proposed a Novel Technique for Steganography in Fingerprints Images. This paper describes the design and implementations of a proj ect concerning the hiding of messages in images specifically fingerprint images. The policy of this proj ect is to keep the confidential messages hidden inside the drawing of the fingerprints. Sanj ay Saini and Dr. Joydip Dhar 5 in 2008 proposed an eavesdropping proof secure online voting model. In this paper an online voting framework was formulated which ensures that the voter is able to vote in a public environment without his vote being eavesdropped on by a neighbor. E.S. Shameem Sulthana and Dr.S.Kanmani 6 in 20 11 presented the Evidence based Access Control over Web Services scheme using Multi Security. This paper explains about voting through internet, with facial detection integrated with finger print authentication and automated load balancing, fused with data hiding security. Alok Kumar Vishwakarma and Atul Kumar 7 in 2011 proposed a Novel Approach for Secure Mobile-Voting using Biometrics in Conj unction with Elliptic Curve Crypto-Stegano Scheme. This paper describes a secure mobile-voting system using cryptography and Steganography. Nabin Ghoshal and J. K. Mandal 8 in 20 11 proposed a Steganographic Scheme for Colour Image Authentication. This paper deals with a novel steganographic technique which demonstrates the colour image authentication technique in frequency domain based on the Discrete Fourier Transform (DFT). Experimental results confirmed that this algorithm performs better than discrete cosine transformation (DCT), Quaternion Fourier Transformation (QFT) and Spatio Chromatic DFT (SCDFT) based schemes. Masoud Afrakhteh and Subariah Ibrahim 9 in 20 10 presented an Enhanced Least Significant Bit Scheme robust against Chi-Squared attack. Among the steganographic techniques and particularly in conventional least significant bit (LSB) insertion method, there is a challenging issue and that is how to embed desired secret bits in a cover medium in a way not to be seen by human vision. This paper proposes a method that utilizes more surrounding pixels unlike BPCS, PVD and MBNS methods which use 3 or 4 immediate neighbors of each pixel and finally, it is finally, it is proved that the method is robust against Chi-squared attack. Guo-Shiang Lin et al., 10 in 20 10 proposed a framework for Enhancing Image Steganography with Picture Quality Optimization and Anti-Steganalysis based on Simulated Annealing Algorithm. In this paper, a closed-loop computing framework was proposed which iteratively searches proper modifications of pixels/coefficients to enhance a base steganographic scheme with optimized picture quality and higher anti-steganalysis capability. Conclusion In this paper we use a technique to provide security to an online voting system by combining concept of Steganography with Cryptography. Steganography and Cryptography is used together to provide security to voter account. So for this images and keys get used in combination first time. Here main obj ect for Steganography is image and for cryptography it is keys. New idea is basically to replace SHA 256 with MD5 hashing to improve speed. Security level is enhanced by random cover image generation for each voter .The voter authentication process of system is improved by combining both biometric and password security. As a future work, multi-biometrics measure can also be used to implement online voting system.
展开阅读全文
相关资源
正为您匹配相似的精品文档
相关搜索

最新文档


当前位置:首页 > 压缩资料 > 基础医学


copyright@ 2023-2025  zhuangpeitu.com 装配图网版权所有   联系电话:18123376007

备案号:ICP2024067431-1 川公网安备51140202000466号


本站为文档C2C交易模式,即用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。装配图网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知装配图网,我们立即给予删除!