Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Secure and Transparent Voting Using Biometrics
1. FINAL YEAR TECHNICAL SEMINAR
Academic Year 2019-2020
Department of Electronics and Communication Engineering
K.S.R.M COLLEGE OF ENGINEERING
(Autonomous)
KADAPA
3. CONTENTS
INTRODUCTION
PRESENT SYSTEM
DISADVANTAGES OF PRESENT SYSTEM
PROPOSED SYSTEM
BLOCK DIAGRAM
AUTHENTICATION AND VERIFICATION OF THE VOTER
PREVENTING FRAUDULENT VOTING
HARDWARE
SOFTWARE
ADVANTAGES OF PROPOSED SYSTEM
FLOW CHART
RESULT
CONCLUSION
REFERENCES
4. INTRODUCTION
As Abraham Lincoln famously quoted democracy as “Democracy is for the
people, by the people, of the people”.
Elections play a crucial part in choosing the capable leader which in-turn can
impact the entire nation.
In Times of India (TOI) 24 Jan, 2009 11 lakhs fake voters in Delhi has found.
Election commission has found 30000 illegal voters in the constituency of Sheila
Dikshit.
The elections should be conducted in a right manner to ensure that the term
“Democracy” should not lose its value.
5. PRESENT SYSTEM
In a present system, each and every
system is given an electronic machine
which stores the votes of the people.
Control of present system is given to
the incharge officer who checks the
eligibility of the candidates for voting.
Finally we collect all the voting
machine at a place and go for
counting.
6. DISADVANTAGES OF PRESENT SYSTEM
Accuracy
Democracy
Security Problem
Illegal Voting
Resistance
Resume Ability
7. PROPOSED SYSTEM
The proposed system is a secured e-
voting system that uses Unique
Identification Authority of India
(UIDAI) or Aadhar database as its
backend.
The proposed system contains two
databases. One is Central database
and another is Local database of the
polling booth.
The local databases will retrieve only
the data that is pertaining to the
voting process and exclude all other
irrelevant information.
9. AUTHENTICATION AND
VERIFICATION OF THE VOTER
Authentication is the process of determining whether someone or
something is, in fact, who or what it is declared to be.
In order to authenticate a person we require them to have a valid Unique
Identification (UID) number/Aadhar number.
The number will be checked in the local database records first. If it is not
found then it will search the central repository.
10. PREVENTING FRAUDULENT VOTING
The first and the foremost thing to ensure proper voting is by accurately
authenticating every voter.
It is necessary to identify that every person coming to vote is unique otherwise it
will violate the very principle of voting.
Fingerprint matching ensures the authentication that the system requires.
However in order to improve accuracy it is important to keep false reject rate
(FRR) and false accept rate (FAR) as low as possible; practically close to zero.
12. SOFTWARE
After uploading the program in Arduino
Aadhar number is entered and fingerprint is
asked to scan. When the fingerprint is
registered an id of the person is produced in
the serial port. The Fig shows the registration
process and also generates id in the serial
monitor.
13. ADVANTAGES OF PROPOSED
SYSTEM
Rigging of votes can be avoided
Preserves Voting secrecy due to fingerprint
authentication
No scope of invalid and illegal votes
Highly tamper proof
Greater Accuracy
Lower risk of Human and mechanical errors
20. contd..
Now the person is allowed to cast his/her
vote according to their choice. The casted
votes of the voters are also stored and
displayed in the Central Database. The
votes casted for a particular party are also
displayed and the count is also updated
automatically
21. CONCLUSION
The proposed voting system had many advantages over the
traditional method of voting. This system affords additional
security by allowing voter to vote only once by imparting unique
identification along with biometric information. This system avoids
fraudulent voting and illegal practices during the elections which is
the key issue in the traditional voting system.
This system provides transparency in the counting process.
Database consisting of the details like age, biometric of the people
should be updated every time before election. Information about
the casted vote can be sent to the voter through the messaging
system.
22. REFERENCES
Khasawneh .M, Malkawi. M , & Al-Jarrah .O (2008). A Biometric Secure e-Voting
System for Election Process. Proceeding of the 5th International Symposium on
Mechatronics and its Applications (ISMA08). Amman, Jordan
UIDAI, Biometrics Design Standards For UID Applications, 2009.
The Biometric Consortium, “Introduction to Biometrics”,
(http://www.biometrics.or), 2006.
https://www.arduino.cc/en/Guide/Introduction