Assess the awareness level of people on Aadhaar Card as public wellbeing

Similar documents
VISION IAS

Online Voting System Using Aadhar Card and Biometric

Smart Voting System using UIDAI

Government of Pakistan NADRA Headquarters, Islamabad

BIOMETRICS - WHY NOW?

SMART VOTING. Bhuvanapriya.R#1, Rozil banu.s#2, Sivapriya.P#3 Kalaiselvi.V.K.G# /17/$31.00 c 2017 IEEE ABSTRACT:

SECURE REMOTE VOTER REGISTRATION

Supreme Court Verdict on Aadhaar - I

January Caux Initiatives for Business Global Secretariat Asia Plateau Panchgani India

M-Vote (Online Voting System)

Hong Kong General Chamber of Commerce Roundtable Luncheon 13 April 2016 Collection and Use of Biometric Data

Novel E-Voting System with Biometric Authentication and Distributed Server System

PRIVACY IMPLICATIONS OF BIOMETRIC DATA. Kevin Nevias CISSP, CEH, CHFI, CISA, CISM, CRISC, CGEIT, CCNA, G /20/16

Why Biometrics? Why Biometrics? Biometric Technologies: Security and Privacy 2/25/2014. Dr. Rigoberto Chinchilla School of Technology

Training Module on UIDAI and Aadhaar UIDAI. Unique Identification Authority of India. Version: 1.4_ Release date:

International Journal of Research and Review E-ISSN: ; P-ISSN:

Biometrics: primed for business use

Case Study. MegaMatcher Accelerator

Biometrics in Border Management Grand Challenges for Security, Identity and Privacy

AADHAAR BASED VOTING SYSTEM USING FINGERPRINT SCANNER

Introduction-cont Pattern classification

1/12/12. Introduction-cont Pattern classification. Behavioral vs Physical Traits. Announcements

Attachment 1. Workflow Designs. NOTE: These workflow designs are for reference only and should not be considered exact specifications or requirements.

SMS based Voting System

6. Presentation of Pakistan. Economic Cooperation Organization - ECO. Syed Mushabir Hussain, 15th April, Registration initiatives

Implementation of aadhar based voting machine using

SUMMARY INTRODUCTION. xiii

TWELFTH SESSION OF THE FACILITATION DIVISION THE MALAYSIAN ELECTRONIC PASSPORT

5/6/2009. E toll Database. Census Database. Database. Database. Consumer Balance and Bill Subscriptions. Mobile Connections.

for fingerprint submitting agencies and contractors Prepared by the National Crime Prevention and Privacy Compact Council

fraud prevention done right

MARYLAND Maryland MVA Real ID Act - Impact Analysis

E- Voting System [2016]

M-Polling with QR-Code Scanning and Verification

This tutorial also provides a glimpse of various security issues related to biometric systems, and the comparison of various biometric systems.

Policy Framework for the Regional Biometric Data Exchange Solution

1/10/12. Introduction. Who are you?? Person Identification. Identification Problems. How are people identified?

Aadhaar Based Voting System Using Android Application

Biometrics & Accessibility

CPSC 467b: Cryptography and Computer Security

LEGISLATION. The "BIOMETRIC AND SOCIAL SECURITY NUMBER RELIGIOUS EXEMPTION ACT"

AADHAR BASED ELECTRONIC VOTING SYSTEM USING BIOMETRIC AUTHENTICATION AND IOT

4/2/14. Who are you?? Introduction. Person Identification. How are people identified? People are identified by three basic means:

Biometrics Technology for Human Recognition

(c) 2009, Government of Pakistan

The Angola National ID Card

Achieving Interoperability

Research Article. ISSN (Print)

London Oct 16 th, Tariq Malik Chairman NADRA

Opinion 3/2012 on developments in biometric technologies

Secure Voter Registration and Eligibility Checking for Nigerian Elections

International Biometrics & Identification Association

German Federal Ministry of the Interior 20 August / 6

Identity Verification in Passport Issuance

e-passports: Uses, Limitations, and Impact on Simplifying Passenger Travel Initiatives

General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia

Machine Readable Travel Documents: Biometrics Deployment. Barry J. Kefauver

ONLINE VOTING SYSTEM POWERED BY AADHAR AUTHENTICATION

Audits: an in-depth review of Venezuela s automatic voting

Biometric Authentication

Recommended Practice 1701 l

DESIGN AND ANALYSIS OF SECURED ELECTRONIC VOTING PROTOCOL

1. Delete the words and registration. 3. Delete the word person and substitute therefor the word individual.

Using Identification for Development: Some Guiding Principles

Enhanced Driver s Licence (EDL) and Enhanced Identification Card (EIC) Program

The Case for implementing a Bio-Metric National ID for Voting and/or to replace the Social Security Card

TECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG-MRTD)

VUSUMUZI MKHIZE 16 January 2017

IDEMIA Identity & Security. Providing identity assurance to. secure & simplify lives N.A.

Bali Process Ad Hoc Group Workshop on Biometrics for Identity Integrity in Immigration India April 2012

The purchase of new voting equipment

E-Voting, a technical perspective

Electronic Voting For Ghana, the Way Forward. (A Case Study in Ghana)

Position Paper IDENT Implementation for U.S. VISIT

Compendium of Good Practices in Identity Management

MINISTRY OF INTERIOR AND COORDINATION OF NATIONAL GOVERNMENT Department of Immigration Services. East African Community e-passport: Kenyan Journey

CHAPTER 2 LITERATURE REVIEW

SECURITY, ACCURACY, AND RELIABILITY OF TARRANT COUNTY S VOTING SYSTEM

Towards One Person, One Vote via Real-Time Voter s Registration and Identification

FastPass and EasyPASS ABC from science to solution

Ad-Hoc Query on Implementation of Council Regulation 380/2008. Requested by FI EMN NCP on 10 th September 2009

Secured Electronic Voting Protocol Using Biometric Authentication

CRS Report for Congress

The Manitoba Identification Card. Secure proof of age, identity and Manitoba residency

International Organization for Migration (IOM) Identity Management and Biometrics

City of Toronto Election Services Internet Voting for Persons with Disabilities Demonstration Script December 2013

CIN (if applicable): Organization PAN (if applicable): Address: City: Pin code: District: Fax: State:

Comparative Study of Indian UID Aadhar and other Biometric Identification Techniques in Different Countries

A REPORT BY THE NEW YORK STATE OFFICE OF THE STATE COMPTROLLER

The Manitoba Identification Card. Secure proof of age, identity and Manitoba residency

Biometrics how to put to use and how not at all?

A unique digital identity from birth and for a lifetime Civil registration as the foundation for digital identification systems

Mykonos Ports EU FastPass Project IISA 2014 Chania

JUDICIARY OF GUAM ELECTRONIC FILING RULES 1

Biometrics how to put to use and how not at all?

Acceptance of Biometrics: Things That Matter That We Are Ignoring

[To be published in THE GAZETTE OF INDIA, EXTRAORDINARY, Part II, Section 3, Sub-section (i) of dated the , 2011]

Biometric voting Machine using UID(Aadhar)

College Voting in the 2018 Midterms: A Survey of US College Students. (Medium)

(Approved December 30, 2010) AN ACT

Transcription:

International Journal of Interdisciplinary and Multidisciplinary Studies (IJIMS), 2015, Vol 2, No.5, 88-95. 88 Available online at http://www.ijims.com ISSN: 2348 0343 Assess the awareness level of people on Aadhaar Card as public wellbeing Abstract: Nimesh P. Bhojak Researcher, Hemchandracharya North Gujarat University, India Unique Identification Numbers issued by UIDAI carry many wonderful advantages. Firstly they do create a trustworthy social identity of a citizen, whom everybody can trust. This kind of identity is very helpful while making applications for bank loans, phone connections, passports, visas and admissions at educational institutions. These identity cards are voluntary but they are being recommended by UID Authority of India. This paper shows the awareness level of the Indian people on usability of Aadhaar Card through the use of the survey approach. People aware about the Adhaar Card but the many people do not have the Aadhaar Card because of their knowledge is poor related the usability of the Aadhaar Card. There is really need to intimate the actual usability of the Aadhaar Card by the government and also how it is useful to people for the identity and some government process. Because compulsory of Aadhaar Card in government scheme is really loophole for the people because they do not aware about it. This research is also helpful to encourage the people to issue the Aadhaar card for the support of different government activities etc which is helpful to the public wellbeing. Key Words: Aadhaar Card, Unique Identification Number, Usability Introduction: The UID Adhaar is one of the prestigious projects in India where Biometric Card with Unique Identification Number will be issued to every citizen, as it require registering all the 10 Fingerprints of the person, Fingerprint Registration is the most important part of the process and requiring quality Fingerprint Scanner for fast and better registration. Bioenable Technologies has launched Bioscan10 fingerprint reader for UID Aadhaar Project which is STQC certified. AADHAAR is a 12-digit number issued by the government as proof of identity and residence in India, verifiable by means of a biometric identification system. Demographic data: is data about the resident that is related to Name, Address, Gender, Date of Birth, Relationship, Mobile Number and Email. Biometric data: is data about the resident that is related to face (photo), IRIS and Fingerprints. The primary goal of Authority of India is to create an easy medium to trace real and unquestionable identity for Indian citizens. The card or Aadhaar numbers are powerful innovations of Authority of India to facilitate smooth functioning of government welfare programs. UID cards contain a 12 digit identity number that maintains a unique social identity. The identity card issued by collects and stores information of an Indian resident like photographs, iris and prints of his ten fingers Features of the AADHAAR The Aadhaar will only provide identity: The UIDAI's purview will be limited to the issuance of unique identification numbers (Aadhaar) linked to a person's demographic and biometric information. Enrolment of residents with proper verification: Existing identity databases in India are fraught with problems of fraud and duplicate/ghost beneficiaries. To prevent this from

International Journal of Interdisciplinary and Multidisciplinary Studies (IJIMS), 2015, Vol 2, No.5, 88-95. 89 seeping into the UIDAI database, the Authority plans to enroll residents into its database with proper verification of their demographic and biometric information A partnership model: The UIDAI will be the regulatory authority managing a Central ID Repository (CIDR), which will issue Aadhaar, update resident information and authenticate the identity of the residents as required. Process to ensure no duplicates: Registrars will send the applicant's data to the CIDR for de-duplication. The CIDR will perform a search on key demographic fields and on the biometrics for each new enrolment, to minimize/eliminate duplicates in the database Online authentication: The Authority will offer a strong form of online authentication, where agencies can compare demographic and biometric information of the resident with the record stored in the central database. The Authority will support Registrars and Agencies in adopting the Aadhaar authentication process, and will help defining the infrastructure and processes they need The UIDAI will not share resident data: The Authority envisions a balance between 'privacy and purpose' when it comes to the information it collects on residents. The agencies may store the information of the residents they enroll if they are authorized to do so, but will not have access to the information in the Aadhaar database. Data Transparency: The authority will place all the aggregated data for public to access under RTI. However Personal Identity Information (PII) will NOT be accessible by any entity Literature Review: - (Akhil Mittal, Anish Bhart, Sanjoy Sahoo, Tapan K Giri, 2011) suggested that Aadhar Card is unique for person which have person s finger print and retina scan. It can used to identify person anywhere in the country. (Velapure et al., 2015)(Velapure et al., 2015) found that the distinctiveness with registration through aadhar number and face recognition will offer very strong security for the secret information about vote. (Deepu & Dr. Vijay Singh, 2012)(Knowlton & Whittemore, 2008) suggested that the government will use the information to issue identity cards the word which is generally known as AADHAR CARD. (Tiwari, 2013)described that the user logins to the account using his aadhar card number and the password provided him at the time of registration and giving vote. (Gupta & Dhyani, 2013)found that e- Voting model has been integrated with AADHAR CARD or Unique Identification (UID) card data base using cloud. By integrating e-voting model with cloud infrastructure and ADHAAR CARD record, percentage of polling would raise and can supply authentic electoral voting mechanism to satisfy the need of the voters. (Kale & E, 2014) told that the growth in the electronic transaction scheme has resulted in a greater demand for accurate & fast user identification and authentication. An embedded fingerprint biometric authentication scheme for ATM banking systems is proposed in this paper. Along with AADHAARCARD authentication for more security (Vijay M. Kumbhar, 2013)(Nitin, Zajariya, Sutar, Desai, & Bamane, 2014) hoped that an idea of Multifunctional All-in-One Personal Utility Card will helps to users and service providers to solve issue and problems of multiple card. (K. Baskar, 2014)(Philip, n.d.)suggested that In India, voting system is being done by electronic voting by means of ballot; the personal identification has been made by way of Aadhar card. In aadhar card the identification is done by iris recognition, fingerprint, and finger vein recognition system. (Sekhon, 2013) described that Age was ascertained from the office of the village Panchayat, as well as valid documents like birth certificate/ ration card/ passport/ aadhar card. (Supriya & Manjunatha,

International Journal of Interdisciplinary and Multidisciplinary Studies (IJIMS), 2015, Vol 2, No.5, 88-95. 90 2014)found that since computer speed, media storage and network bandwidth have seen big improvements of their performances, biometric systems has gained even more importance along with security, privacy and rational property defense, recent one being its usage in the Aadhar card or the Unique Identification card for the citizens of India. (Roy, 2014)found that the demand for security mechanisms is increasing day- by day. With the steps of Indian government, Aadhar card has taken its part in the country to solve numerous issues. (Malpure et al., 2014) described that Government of India has come up with Aadhaar card a unique identification for a person. All documents can be issued using aadhar card. The major drawback of Aadhaar card is that the barcode system is used and any person can get aadhar number and can issue document from government offices. (Chopra, Ghadge, Padwal, Punjabi, & Gurjar, 2014) explained that There can be improvements made when the image is captured using a camera, as it decreases the resolution factor of the images and thus, degrade their quality. The project can be extended for recognition of handwritten characters as well as its application in various fields of recognition of diverse cards. Thus, the system has achieved the clarification for automatic reading of Aadhar Card with a good accuracy. (Kumari, 2014)Pradhanmantri Jandhan scheme is going to cover poor and underprivileged not only from rural areas but also from urban areas and all the accounts opened under this scheme will be linked to the Aadhar card and provided the facility of debit card under the Ru-pay scheme.(shah & Shah, 2014)(Goel & Singh, 2014) described that National Bureau of Investigation in Philippines, India's most recent Aadhaar card includes QR code implementation. Based on the all information we should consider the government consider only one card for the identity card of the person as Aadhaar card which is also helpful to provide the different government activities like to take subsidy and also take advantages of the different governments scheme. Objective of research This research paper main objective is finding the awareness level of people on the usability of UIDAI Number/Aadhaar card. There is some other objective is assess the problem to issue & collect the Aadhaar card from the government. Research Methodology Sample Method: Random Sampling Sample Size: 100 respondents Sampling design: Probability sampling Data source: Primary as well as secondary data Research instrument: Questionnaire is used as research instrument. Research territory: Gujarat Research Approach: Survey Approach Data analysis: The following different charts show the details about the respondents characteristics. The mainly respondents are between the age of 30 to 40 and the proportion of male is higher than the female respondents.

International Journal of Interdisciplinary and Multidisciplinary Studies (IJIMS), 2015, Vol 2, No.5, 88-95. 91

International Journal of Interdisciplinary and Multidisciplinary Studies (IJIMS), 2015, Vol 2, No.5, 88-95. 92 H 0 : P=0.70 (respondents are aware about Aadhaar no ) H 1: P 0.70 (respondents are not aware about Aadhaar no) n=100, x=89, p=0.70, q= 1-p =1-0.70 =0.30 =0.89 = = Zcal = 4.13 Significant level is 0.05 for two tail so, α= =0.25 so, 0.5-0.025=0.475 so, table value

International Journal of Interdisciplinary and Multidisciplinary Studies (IJIMS), 2015, Vol 2, No.5, 88-95. 93 Here Zcal=4.13 is greater than =1.96 and Zcal= 4.13 is falling in rejected area so our null hypothesis is rejected. So we can say that respondents are not totally aware about Aadhaar card. H 0 : P=0.60 (respondents are agree the uidai no / adhaar card record use the government for the different schemes like Food & Nutrition,employment,education, Inclusion & Social Security,Healthcare) H 1: P 0.60 ( respondents are not agree the uidai no / Aadhaar card record use the government for the different schemes like Food & Nutrition,employment,education, Inclusion & Social Security,Healthcare) n=100, x=42, p=0.60, q= 1-p = 1-0.60 =0.40 =0.42 = = Zcal = -0.12 Significant level is 0.05 for two tail so, α= =0.25 so, 0.5-0.025=0.475 so, table value Here Zcal=4.13 is less than =1.96 and Zcal= 4.13 is falling in accepted area so our null hypothesis is accepted. So we can say that respondents are agree the uidai no / Aadhaar card record use the government for the different yognas,food & Nutrition,employment,education, Inclusion & Social Security,Healthcare. Findings and suggestions The 89% people are aware about Aadhaar card and 11 % people are not aware and 58% respondents have uid card 42% respondents mostly agree for the uidai no / Aadhaar card record use the government for the different schemes like Food & Nutrition,employment,education, Inclusion & Social Security,Healthcare etc. 78% respondents say they are aware process of Aadhaar 73 % respondent are know the test of eyes and fingerprints test process is safe it is not harmful

International Journal of Interdisciplinary and Multidisciplinary Studies (IJIMS), 2015, Vol 2, No.5, 88-95. 94 2 %people say that they have problem Information related 22 %people say that they have problem Registration process related 15% people say that they have problem Time related 37% people say that they have problem Large no of the documents 29% people say that they have problem Waiting related 27% people say that they have problem Some confusion among to the tests 8% people say that they have problem Agency related 38% people say that they have problem Card delver related 71% people know Aadhaar is a clear proof of identity and also unchangeable 51% people have questions difficulty related privacy of information 71%people know government v will be use the personal programs related for the privacy of the information As per this data analysis for UIDAI / Aadhaar Card is used by the government for the different subsidy related food, LPG, Health, and Education etc. but there is really requirement first to aware the people about it and try to provide the each and every nation people the Aadhaar Card because many of the people face problem at the time of the issue the Aadhaar Card. Conclusion This research paper shows that Aadhaar Card is not much more time to introducing, in this analysis the people have some problems related to the information Aadhaar Card and some people find difficulty to issue the Aadhaar Card. The Aadhaar Card is not only identity card but it is used by the government as wellbeing tool to provide the subsidy. But Many people do not aware about it so they cannot take advantage of the subsidy provided by the government because of the lack of Information so the government must provide the proper information. Bibliography Akhil Mittal, Anish Bhart, Sanjoy Sahoo, Tapan K Giri, B. S. G. (2011). Denture Labelling- significance & description of some commonly used method (pp. 1 7). Chopra, S. A., Ghadge, A. A., Padwal, O. A., Punjabi, K. S., & Gurjar, P. G. S. (2014). Aadhar Card Reader using Optical Character Recognition. International Journal of Research in Information Technology, 2(5), 586 592. Deepu, S., & Dr. Vijay Singh, R. (2012). Biometrics Identity Authentication in Secure Electronic Transactions. International Journal of Computer Science and Management Studies, 12(June), 76 79. Retrieved from http://capella.summon.serialssolutions.com/2.0.0/link/0/elvhcxmwy2bqme01t00bjhzzrang9zdmawkk2iodjorkzbm ty_absyjzxkts3e2igsk1t5tbzc01xnldf7q8ll4acuzcpoguzlaabl1yvfmyyvksyajzmrghqyv5qngaqbk5rtkwfjjjsza2te41f gpgtqstes8rae8msweavacpqa Goel, S., & Singh, A. K. (2014). Cost Minimization by QR Code Compression. International Journal of Computer Trends and Technology (IJCTT), 15(4), 157 161. Gupta, A., & Dhyani, P. (2013). Cloud based e-voting : One Step Ahead for Good Governance in India. International Journal of Computer Applications (0975 8887), 67(6), 29 32.

International Journal of Interdisciplinary and Multidisciplinary Studies (IJIMS), 2015, Vol 2, No.5, 88-95. 95 K. Baskar, R. K. and D. J. S. P. (2014). A Novel Classifier Algorithm for EEG Signal Based Person Authentication from Cz Channel with 2D-Wavelet Compression for the Online Voting System Using Touch Panel. Australian Journal of Basic and Applied Sciences, 8(April), 399 409. Kale, A. S., & E, M. (2014). A Review Paper on Design of Highly Secured Automatic Teller Machine System by using Aadhaar card and Fingerprint. International Journal of Advance Research in Computer Science and Management Studies Research, 2(1), 320 322. Knowlton, F. F., & Whittemore, S. L. (2008). A Survey of Privacy-Handling Techniques and Algorithms for Data Mining Vivek. HCTL Open Int. J. of Technology Innovations and Research, 29(March), 239 244. Kumari, J. (2014). Ojas Expanding Knowledge Horizon. International Journal of Research in Management, 3(1), 16 23. Malpure, V., Mate, G., Pawar, A., Narwade, V., Patel, H., & Kadam, V. (2014). Automated Village Council System Using RFID. Nternational Journal of Advanced Research in Computer and Communication Engineering, 3(4), 6151 6154. Nitin, A., Zajariya, A., Sutar, M., Desai, M., & Bamane, K. D. (2014). A Groundwork for Troubleshooting IP Based Booking with Subjection of Multiple User IDs by Blacklisting. International Journal of Emerging Technology and Advanced Engineering, 4(3). Philip, S. (n.d.). Attachment for Aadhar card authentication on Aakash Preliminary project report Roy, S. S. (2014). India Card for Securing and Estimating the. International Journal of Computer Science and Engineering Communications, 2(1), 67 70. Sekhon, H. (2013). Psychosocial Determinants Of Morbidity In The Aged In A Rural Area Of Punjab, India Abstract : International Journal of Innovative Research & Development, 2(11), 63 66. Shah, D., & Shah, Y. (2014). QR Code and its Security Issues. International Journal of Computer Sciences and Engineering, 2(11), 22 26. Supriya, V. G., & Manjunatha, S. R. (2014). Chaos based Cancellable Biometric Template Protection Scheme-A Proposal. International Journal of Engineering Science Invention, 3(11), 14 24. Tiwari, A. (2013). I-VOTING :DEMOCRACY COMES HOME International Journal of Research in Advent Technology. International Journal of Research in Advent Technology, 1(4), 42 50. Velapure, H., Rai, S., Sharma, S., Naiknavre, P., Jadhav, P., & Bamane, K. (2015). Android Based E-Voting. International Journal of Advance Foundation and Research in Computer (IJAFRC), 2(January), 33 39. Vijay M. Kumbhar. (2013). A Conceptual Design of Multifunctional Utility Card. Indian Streams Research Journal, 3(6), 1 3. Retrieved from http://www.isrj.net/uploadeddata/2598.pdf Websites http://uidai.gov.in/index.php