SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3995
Real Time Face Recognition in Electronic Voting System using RFID and
OpenCV
E.Vetrimani1, J.Akash2, C.Rishi3, P.Raveena4
1Asst. Professor, Computer Science and Engineering, RVS College of Engineering and Technology, Coimbatore-641402,
Tamil Nadu
2,3,4 Final year B.E., Computer Science and Engineering, RVS College of Engineering and Technology, Coimbatore-
641402, Tamil Nadu
-----------------------------------------------------------------------------***-------------------------------------------------------------------------
Abstract: In this concept, the system is using most advanced
and secure way of e-voting. In this, system actually use two
steps for verification of the voters during the voting session,
one is RFID data verification of voters and followed by
successful face authentication will allow the voters to vote
for their desired candidate using Haar Cascade Algorithm.
These two authentication process will definitely reduce the
piracy issues of voters and counterfeit vote. In India, there
are two types of voting in practice. They are secret Ballet
paper and Electronic Voting Machines (EVM), but both of
the process has some limitation or demerits. The current
voting system is not secure and time consuming as well. The
people who are not eligible to vote can also cast their votes
by unwanted means, which may cause various problems. In
India, Computerized voting system has not yet been
implemented. So, initiating this system we are proposing a
way for voting which will be more effective. Here we have
two level of security in voting process. The first level is the
verification of RFID number and second level is face
recognition. The security level of our system has been highly
improved by the use of new method for each voter. The
authentication of the user in the system is improved by using
face recognition in the application, which will be able to
identify whether the user is authenticated user or not.
Keywords: RFID, Haar Cascade Algorithm, Unique
number, aunthentication, counterfeit vote.
1. INTRODUCTION
Electronic voting machine has already been developed
and widely used in many developed countries. But during
the election time, verification process takes a lot more time
and there is possible to occur counterfeit vote.
In India, they are using two types of method for voting.
The first method is secret ballot paper, in which many
papers are used and second method is EVM (electronic
voting machine) which is in use since 2003. We need to
propose a computerised voting system which is more
secure than the existing one. In this, face recognition is
used which will used to detect the right person that is
stored in database. In our proposed system, we are using
two types of verification for voters. The first one is RFID
number verification, if your election commission id
number is correct in RFID Data Verification then you have
to go for Second level of security which is the main security
level where the system recognize the face of the real voter
from the current database of face images given by the
election commission which is already connected with
RFID. Finally, the images taken is matched with the images
stored in the database, then the voters can cast their voting
in the election. As you know that in the existing system
there is no much secure in voting because here the only
source of security level is the voter id which can easily be
accessed by the other person by getting their voter id card.
By keeping this in mind we are proposing new level of
security which is much more secure than the existing
system.
2. LITERATURE SURVEY
1) DIP BASED SMART ELECTRONIC VOTING MACHINE
With the inclusion of biometric fingerprint sensor, each
voter is entered into the system only after being
recognized and checked with the given database of
enlisted voters. Once the corresponding fingerprint is
matched with the information provided, the voter will be
allowed to proceed for choosing their preferred candidate
from the panel of buttons. The final vote is then displayed
onto a LCD for the satisfaction of voters. The disadvantage
of this was current method of the voting system was easily
hacked.
2) DESIGN AND IMPLEMENTATION OF
MICROPROCESSOR BASED ELECTRONIC VOTING
SYSTEM
The vote casting system is almost similar to traditional
system, only ballot box will be replaced by the device. The
machine uses voter ID that is to identify a valid voter and
restrict multiple vote casting. The main disadvantage of
this is that image is not clearly recognised.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3996
3) SMART VOTING SYSTEM USING BIOMETRIC
SENSORS
At the time of voting, the user can specify their id and
password. To ensure more security, finger prints of the
voter is used as the main authentication resource. Since
the finger pattern of each human being is different, the
voter can be easily authenticated. The systems allow the
voter to vote through his fingerprint. Finger print is used
to uniquely identify the user. The finger print minutiae
features are different for each human being. Finger print is
used as a authentication of the voters. The negative part of
this system is that they were be used to the Counterfeit
vote.
4) DESIGNING AN ENERGY MONITORING, ANALYSING
AND SOLUTION PROVIDING SYSTEM FOR ENERGY
AUDITING
This can be viewed as a network of different devices
which connects devices such as computers and smart
phones and enables these devices to collect, monitor and
exchange data. The system is remotely accessible through
internet and is available in 24x7.This also includes Data
acquisition and transferring, Data storing and processing,
Web application development and report generation,
Emergency situation detection. The main drawback is that
this system makes a problem of counterfeit vote.
3. STUDY OF VOTING SYSTEM
I. PROPOSED SYSTEM
In this project we are working with three different stages
1) Level 1: RFID number. At the time of voter registration,
system will request for the unique id from the voter.
Unique id is verified from the database provided by the
election commission.
2) Level 2: Face recognition with respective election
commission id number. In this level, Haar Cascade
algorithm is used to verify the facial image of the voters
from the database provided by the election commission.
3) Level 3: If the Face recognition is successful then face
authentication will allow to vote for their desired
candidate.
II. IMPLEMENTATION OF THE MODEL
1. Every New User in the India will first register for Voting.
So, our first step will be registration.
2. At that time of Registration, System Capture the Face of
the user by using Web Camera and Store the Face sample
with RFID (Adhaar) in the Server Database for Security
Purpose.
3. At the time of election, we will use two level of security
first one is RFID id verification and voter id verification
and second one is face recognition.
4. System will be checking whatever unique id and voter
id entered by the voter is correct or not.
5. If unique (RFID) id or voter id is correct, then system
will take the image of voter and compare with the
respective image with database or server.
6. If the image in database is matched with the captured
image of the voter, then he/she is allowed to cast their
vote.
7. On the voting page, all the party whatever party contest
in the election symbols /buttons will be there. Voter can
cast his /her vote in the election.
8. As soon as voter will fetch their vote, the id of voter
logout automatically so we can say that a voter can give
only one vote (Auto refresh).
9. On counting form only election commission authorized,
user can login with the secure id and password. If both id
and password is correct then voting process will be
continued.
III. DESIGN / METHODOLOGY
This proposed concept is a web-based system so basic
features related with web-based technologies such as
client-server, database, image processing properties
determine the software requirement of the system.
The software product is a standalone system and it is not
the part of larger system. The system will be made up of
two parts. Before the Election Day the application is used
for general purposes such as viewing candidates profile
and election results in past years. The voter is verified
using face recognition technology used. These votes are
accepted by the system on the server. The Election
Commission Authority arranges the whole system
according to its requirements on the server where the
system is running.
IV. FACE DETECTION USING HAAR CASCADES
Object Detection using Haar feature-based cascade
classifiers is an effective object detection method proposed
by Paul Viola and Michael Jones in their paper, “Rapid
Object Detection using a Boosted Cascade of Simple
Features” in 2001. It is a machine learning based approach
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3997
where a cascade function is trained from a lot of positive
and negative images. It is then used to detect objects in
other images.
Here we will work with face detection. Initially, the
algorithm needs a lot of positive images (images of faces)
and negative images (images without faces) to train the
classifier. Then we need to extract features from it. For
this, haar features shown in below image are used. They
are just like our convolutional kernel. Each feature is a
single value obtained by subtracting sum of pixels under
white rectangle from sum of pixels under black rectangle.
Now all possible sizes and locations of each kernel is used
to calculate plenty of features. (Just imagine how much
computation it needs? Even a 24x24 window results over
160000 features).For each feature calculation, we need to
find sum of pixels under white and black rectangles. To
solve this, they introduced the integral images. It simplifies
calculation of sum of pixels, how large may be the number
of pixels, to an operation involving just four pixels. Nice,
isn’t it? It makes things super-fast.
But among all these features we calculated, most of them
are irrelevant. For example, consider the image below. Top
row shows two good features. The first feature selected
seems to focus on the property that the region of the eyes
is oen darker than the region of the nose and cheeks. The
second feature selected relies on the property that the eyes
are darker than the bridge of the nose. For this, we apply
each and every feature on all the training images. For each
feature, it finds the best threshold which will classify the
faces to positive and negative. But obviously, there will be
errors or misclassifications. We select the features with
minimum error rate, which means they are the features
that best classifies the face and non-face images.
For this, we apply each and every feature on all the
training images. For each feature, it finds the best
threshold which will classify the faces to positive and
negative. But obviously, there will be errors or
misclassifications. We select the features with minimum
error rate, which means they are the features that best
classifies the face and non-face images. The process is not
as simple as this. Each image is given an equal weight in
the beginning. After each classification, weights of
misclassified images are increased. Then again same
process is done. New error rates are calculated. Also new
weights. The process is continued until required accuracy
or error rate is achieved or required number of features
are found.
Final classifier is a weighted sum of these weak classifiers.
It is called weak because it alone can’t classify the image,
but together with others forms a strong classifier. The
paper says even 200 features provide detection with 95%
accuracy. Their final setup had around 6000 features.
V. RESULTS AND DISCUSSIONS
As we see that existing voting system has many defects
such as lengthy process, time taking, not secure, bogus
voting, no security level but now we can say that our
approach is more useful and secure from the existing
system. Highly secured because in this project we have to
use face recognition and face comparison so false user
can’t give votes. We can access result (counting) faster
than existing system. Because ballet system takes much
more time in counting process. But this computerized
voting system increases the trust in voting system as well
as Election Commission. Still there remains some
limitations and drawbacks in this voting System.
4. CONCLUSION
As we see that existing voting system has many defects
such as lengthy process, time taking, not secure, bogus
voting, no security level but now we can say that our
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3998
approach is more useful and secure from the existing
system. Since, we are using three level of security in this
proposed system the false voters can be easily identified.
The facial authentication technique is very much useful in
identifying the fraud voters, so we can avoid the bogus
votes during election commission. As every operation is
performed through internet connectivity so, it is onetime
investment for government. As data is stored in centralized
repository so, data is accessible at any time as well as
backup of the data is possible. Smart voting system
provides updated result at each and every minute. Also
requires less man power and resources. The database
needs to be updated every year or before election so that
new eligible citizens may be enrolled and those who are
dead are removed from the voter list.
REFERENCES
[1] Edy Winarno, Wiwien Hadikurniawati, Imam Husni Al
Amin, Muji Sukur"Anti-Cheating Presence System Based on
3WPCADual Vision Face Recognition:Proc. EECSI 2017,
Yogyakarta, Indonesia, 19-21 September 2017",
Issue:September 2017, Pages:121-124.
[2] Amish Basal, Utkarsh Raina, Vaibhavi Pujari, Roushan
Kumar "E-Smart Voting System with Secure Data
Identification using Cryptography:2018 3rd International
Conference for Convergence in Technology (I2CT) The
Gateway Hotel, XION Complex, Wakad Road, Pune, India.
Issue:Apr 06-08, 2018,Pages:1-4.
[3] Swetha M S, Thungamani M, Shreejwol Disti, Raman
Shah “Smart Voting System Support through Face
Recognition” IJIRST –International Journal for Innovative
Research in Science & Technology| Volume 5 | Issue 11 |
April 2019.
[4] Vikas Kumar, MS Swetha, MS Muneshwara, S Prakash,
“Cloud computing: towards case study of data security
mechanism,” vol-2 issue-4 page no-1-8 2011.
[5] MS Muneshwara, MS Swetha, M Thungamani, GN Anil,
“Digital genomics to build a smart franchise in real time
applications,” IEEE International Conference on Circuit,
Power and Computing Technologies (ICCPCT),IEEE page
no 1-4 2017 .
[6] MS Muneshwara, A Lokesh, MS Swetha, M Thungamani,
“Ultrasonic and image mapped path finder for the blind
people in the real time system,” IEEE International
Conference on Power, Control, Signals and
Instrumentation Engineering (ICPCSI) IEEE, page no 964-
969 2017.

More Related Content

What's hot

Captiosus Voting System
Captiosus Voting SystemCaptiosus Voting System
Captiosus Voting SystemIJMTST Journal
 
Biometric System Based Electronic Voting Machine Using Arm9 Microcontroller
Biometric System Based Electronic Voting Machine Using Arm9 MicrocontrollerBiometric System Based Electronic Voting Machine Using Arm9 Microcontroller
Biometric System Based Electronic Voting Machine Using Arm9 MicrocontrollerIOSR Journals
 
IRJET- A Survey on: Aadhar Based Dual Authentication Secured E-Voting System
IRJET- A Survey on: Aadhar Based Dual Authentication Secured E-Voting SystemIRJET- A Survey on: Aadhar Based Dual Authentication Secured E-Voting System
IRJET- A Survey on: Aadhar Based Dual Authentication Secured E-Voting SystemIRJET Journal
 
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIABIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIAchandu namani
 
IRJET- Design and Development of Security based Voting System
IRJET- Design and Development of Security based Voting SystemIRJET- Design and Development of Security based Voting System
IRJET- Design and Development of Security based Voting SystemIRJET Journal
 
Aadhar based fully Automated EVM with High End Security Network using ARM7 an...
Aadhar based fully Automated EVM with High End Security Network using ARM7 an...Aadhar based fully Automated EVM with High End Security Network using ARM7 an...
Aadhar based fully Automated EVM with High End Security Network using ARM7 an...IRJET Journal
 
IRJET- Online Election Management System
IRJET- Online Election Management SystemIRJET- Online Election Management System
IRJET- Online Election Management SystemIRJET Journal
 
RFID Based Smart Class Attendance System with Absentees using Face verification
RFID Based Smart Class Attendance System with Absentees using Face verificationRFID Based Smart Class Attendance System with Absentees using Face verification
RFID Based Smart Class Attendance System with Absentees using Face verificationAssociate Professor in VSB Coimbatore
 
IRJET-An Interline Dynamic Voltage Restorer (IDVR)
IRJET-An Interline Dynamic Voltage Restorer (IDVR)IRJET-An Interline Dynamic Voltage Restorer (IDVR)
IRJET-An Interline Dynamic Voltage Restorer (IDVR)IRJET Journal
 
IRJET - Enhanced Driving License using NFC
IRJET - Enhanced Driving License using NFCIRJET - Enhanced Driving License using NFC
IRJET - Enhanced Driving License using NFCIRJET Journal
 
IRJET- Securing E-Medical Documents using QR Code
IRJET-  	  Securing E-Medical Documents using QR CodeIRJET-  	  Securing E-Medical Documents using QR Code
IRJET- Securing E-Medical Documents using QR CodeIRJET Journal
 
Fingerprint voting system
Fingerprint voting systemFingerprint voting system
Fingerprint voting systemjannatul haque
 
Web Based Electronic Voting System Using Finger Print Authentication and GSM ...
Web Based Electronic Voting System Using Finger Print Authentication and GSM ...Web Based Electronic Voting System Using Finger Print Authentication and GSM ...
Web Based Electronic Voting System Using Finger Print Authentication and GSM ...ijtsrd
 
IRJET- Online Voting System using Fingerprint Scanner
IRJET-  	  Online Voting System using Fingerprint ScannerIRJET-  	  Online Voting System using Fingerprint Scanner
IRJET- Online Voting System using Fingerprint ScannerIRJET Journal
 
E voting system using mobile sms
E voting system using mobile smsE voting system using mobile sms
E voting system using mobile smseSAT Journals
 
Biometric voting system_by_vinodh
Biometric  voting system_by_vinodhBiometric  voting system_by_vinodh
Biometric voting system_by_vinodhVinodh Kumar
 

What's hot (20)

Referendum Using Android Application
Referendum Using Android ApplicationReferendum Using Android Application
Referendum Using Android Application
 
Captiosus Voting System
Captiosus Voting SystemCaptiosus Voting System
Captiosus Voting System
 
Biometric System Based Electronic Voting Machine Using Arm9 Microcontroller
Biometric System Based Electronic Voting Machine Using Arm9 MicrocontrollerBiometric System Based Electronic Voting Machine Using Arm9 Microcontroller
Biometric System Based Electronic Voting Machine Using Arm9 Microcontroller
 
IRJET- A Survey on: Aadhar Based Dual Authentication Secured E-Voting System
IRJET- A Survey on: Aadhar Based Dual Authentication Secured E-Voting SystemIRJET- A Survey on: Aadhar Based Dual Authentication Secured E-Voting System
IRJET- A Survey on: Aadhar Based Dual Authentication Secured E-Voting System
 
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIABIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
 
IRJET- Design and Development of Security based Voting System
IRJET- Design and Development of Security based Voting SystemIRJET- Design and Development of Security based Voting System
IRJET- Design and Development of Security based Voting System
 
Convenient voting machine
Convenient voting machineConvenient voting machine
Convenient voting machine
 
Aadhar based fully Automated EVM with High End Security Network using ARM7 an...
Aadhar based fully Automated EVM with High End Security Network using ARM7 an...Aadhar based fully Automated EVM with High End Security Network using ARM7 an...
Aadhar based fully Automated EVM with High End Security Network using ARM7 an...
 
Implementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting SystemImplementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting System
 
IRJET- Online Election Management System
IRJET- Online Election Management SystemIRJET- Online Election Management System
IRJET- Online Election Management System
 
RFID Based Smart Class Attendance System with Absentees using Face verification
RFID Based Smart Class Attendance System with Absentees using Face verificationRFID Based Smart Class Attendance System with Absentees using Face verification
RFID Based Smart Class Attendance System with Absentees using Face verification
 
IRJET-An Interline Dynamic Voltage Restorer (IDVR)
IRJET-An Interline Dynamic Voltage Restorer (IDVR)IRJET-An Interline Dynamic Voltage Restorer (IDVR)
IRJET-An Interline Dynamic Voltage Restorer (IDVR)
 
IRJET - Enhanced Driving License using NFC
IRJET - Enhanced Driving License using NFCIRJET - Enhanced Driving License using NFC
IRJET - Enhanced Driving License using NFC
 
IRJET- Securing E-Medical Documents using QR Code
IRJET-  	  Securing E-Medical Documents using QR CodeIRJET-  	  Securing E-Medical Documents using QR Code
IRJET- Securing E-Medical Documents using QR Code
 
Fingerprint voting system
Fingerprint voting systemFingerprint voting system
Fingerprint voting system
 
Web Based Electronic Voting System Using Finger Print Authentication and GSM ...
Web Based Electronic Voting System Using Finger Print Authentication and GSM ...Web Based Electronic Voting System Using Finger Print Authentication and GSM ...
Web Based Electronic Voting System Using Finger Print Authentication and GSM ...
 
Biometrics for e-voting
Biometrics for e-votingBiometrics for e-voting
Biometrics for e-voting
 
IRJET- Online Voting System using Fingerprint Scanner
IRJET-  	  Online Voting System using Fingerprint ScannerIRJET-  	  Online Voting System using Fingerprint Scanner
IRJET- Online Voting System using Fingerprint Scanner
 
E voting system using mobile sms
E voting system using mobile smsE voting system using mobile sms
E voting system using mobile sms
 
Biometric voting system_by_vinodh
Biometric  voting system_by_vinodhBiometric  voting system_by_vinodh
Biometric voting system_by_vinodh
 

Similar to Real Time Face Recognition Voting

ONLINE FINGERPRINT VOTING SYSTEM
ONLINE FINGERPRINT VOTING SYSTEMONLINE FINGERPRINT VOTING SYSTEM
ONLINE FINGERPRINT VOTING SYSTEMIRJET Journal
 
Presentation of smart voting system.pptx
Presentation of smart voting system.pptxPresentation of smart voting system.pptx
Presentation of smart voting system.pptxSony235240
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMijcax
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMijcax
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMijcax
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMijcax
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMijcax
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMijcax
 
Online Voting System
Online Voting SystemOnline Voting System
Online Voting SystemIRJET Journal
 
SECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoT
SECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoTSECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoT
SECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoTIRJET Journal
 
IEEE_paper_work11_2015_12_03_20_49_47_415
IEEE_paper_work11_2015_12_03_20_49_47_415IEEE_paper_work11_2015_12_03_20_49_47_415
IEEE_paper_work11_2015_12_03_20_49_47_415Shubham Jadhav
 
IRJET- Digitized Election Voting System : An Innovative Approach
IRJET-  	  Digitized Election Voting System : An Innovative ApproachIRJET-  	  Digitized Election Voting System : An Innovative Approach
IRJET- Digitized Election Voting System : An Innovative ApproachIRJET Journal
 
FINGERPRINT BASED SECURED VOTING
FINGERPRINT BASED SECURED VOTINGFINGERPRINT BASED SECURED VOTING
FINGERPRINT BASED SECURED VOTINGIRJET Journal
 
A Usable Android Application Implementing Distributed Cryptography for Electi...
A Usable Android Application Implementing Distributed Cryptography for Electi...A Usable Android Application Implementing Distributed Cryptography for Electi...
A Usable Android Application Implementing Distributed Cryptography for Electi...IRJET Journal
 
VIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTP
VIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTPVIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTP
VIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTPIRJET Journal
 
IRJET - A Survey on Biometric Voting System using Iris Recognition
IRJET - A Survey on Biometric Voting System using Iris RecognitionIRJET - A Survey on Biometric Voting System using Iris Recognition
IRJET - A Survey on Biometric Voting System using Iris RecognitionIRJET Journal
 
IRJET- Deployment of Nanosat at Low Altitude for Atmospheric Parameter Analysis
IRJET- Deployment of Nanosat at Low Altitude for Atmospheric Parameter AnalysisIRJET- Deployment of Nanosat at Low Altitude for Atmospheric Parameter Analysis
IRJET- Deployment of Nanosat at Low Altitude for Atmospheric Parameter AnalysisIRJET Journal
 
Efficacious electronic voting using biometry
Efficacious electronic voting using biometryEfficacious electronic voting using biometry
Efficacious electronic voting using biometryIAEME Publication
 

Similar to Real Time Face Recognition Voting (20)

ONLINE FINGERPRINT VOTING SYSTEM
ONLINE FINGERPRINT VOTING SYSTEMONLINE FINGERPRINT VOTING SYSTEM
ONLINE FINGERPRINT VOTING SYSTEM
 
F1802024245
F1802024245F1802024245
F1802024245
 
Presentation of smart voting system.pptx
Presentation of smart voting system.pptxPresentation of smart voting system.pptx
Presentation of smart voting system.pptx
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
 
Online Voting System
Online Voting SystemOnline Voting System
Online Voting System
 
SECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoT
SECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoTSECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoT
SECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoT
 
IEEE_paper_work11_2015_12_03_20_49_47_415
IEEE_paper_work11_2015_12_03_20_49_47_415IEEE_paper_work11_2015_12_03_20_49_47_415
IEEE_paper_work11_2015_12_03_20_49_47_415
 
IRJET- Digitized Election Voting System : An Innovative Approach
IRJET-  	  Digitized Election Voting System : An Innovative ApproachIRJET-  	  Digitized Election Voting System : An Innovative Approach
IRJET- Digitized Election Voting System : An Innovative Approach
 
eVoting.pptx
eVoting.pptxeVoting.pptx
eVoting.pptx
 
FINGERPRINT BASED SECURED VOTING
FINGERPRINT BASED SECURED VOTINGFINGERPRINT BASED SECURED VOTING
FINGERPRINT BASED SECURED VOTING
 
A Usable Android Application Implementing Distributed Cryptography for Electi...
A Usable Android Application Implementing Distributed Cryptography for Electi...A Usable Android Application Implementing Distributed Cryptography for Electi...
A Usable Android Application Implementing Distributed Cryptography for Electi...
 
VIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTP
VIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTPVIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTP
VIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTP
 
IRJET - A Survey on Biometric Voting System using Iris Recognition
IRJET - A Survey on Biometric Voting System using Iris RecognitionIRJET - A Survey on Biometric Voting System using Iris Recognition
IRJET - A Survey on Biometric Voting System using Iris Recognition
 
IRJET- Deployment of Nanosat at Low Altitude for Atmospheric Parameter Analysis
IRJET- Deployment of Nanosat at Low Altitude for Atmospheric Parameter AnalysisIRJET- Deployment of Nanosat at Low Altitude for Atmospheric Parameter Analysis
IRJET- Deployment of Nanosat at Low Altitude for Atmospheric Parameter Analysis
 
Efficacious electronic voting using biometry
Efficacious electronic voting using biometryEfficacious electronic voting using biometry
Efficacious electronic voting using biometry
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 

Recently uploaded (20)

young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 

Real Time Face Recognition Voting

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3995 Real Time Face Recognition in Electronic Voting System using RFID and OpenCV E.Vetrimani1, J.Akash2, C.Rishi3, P.Raveena4 1Asst. Professor, Computer Science and Engineering, RVS College of Engineering and Technology, Coimbatore-641402, Tamil Nadu 2,3,4 Final year B.E., Computer Science and Engineering, RVS College of Engineering and Technology, Coimbatore- 641402, Tamil Nadu -----------------------------------------------------------------------------***------------------------------------------------------------------------- Abstract: In this concept, the system is using most advanced and secure way of e-voting. In this, system actually use two steps for verification of the voters during the voting session, one is RFID data verification of voters and followed by successful face authentication will allow the voters to vote for their desired candidate using Haar Cascade Algorithm. These two authentication process will definitely reduce the piracy issues of voters and counterfeit vote. In India, there are two types of voting in practice. They are secret Ballet paper and Electronic Voting Machines (EVM), but both of the process has some limitation or demerits. The current voting system is not secure and time consuming as well. The people who are not eligible to vote can also cast their votes by unwanted means, which may cause various problems. In India, Computerized voting system has not yet been implemented. So, initiating this system we are proposing a way for voting which will be more effective. Here we have two level of security in voting process. The first level is the verification of RFID number and second level is face recognition. The security level of our system has been highly improved by the use of new method for each voter. The authentication of the user in the system is improved by using face recognition in the application, which will be able to identify whether the user is authenticated user or not. Keywords: RFID, Haar Cascade Algorithm, Unique number, aunthentication, counterfeit vote. 1. INTRODUCTION Electronic voting machine has already been developed and widely used in many developed countries. But during the election time, verification process takes a lot more time and there is possible to occur counterfeit vote. In India, they are using two types of method for voting. The first method is secret ballot paper, in which many papers are used and second method is EVM (electronic voting machine) which is in use since 2003. We need to propose a computerised voting system which is more secure than the existing one. In this, face recognition is used which will used to detect the right person that is stored in database. In our proposed system, we are using two types of verification for voters. The first one is RFID number verification, if your election commission id number is correct in RFID Data Verification then you have to go for Second level of security which is the main security level where the system recognize the face of the real voter from the current database of face images given by the election commission which is already connected with RFID. Finally, the images taken is matched with the images stored in the database, then the voters can cast their voting in the election. As you know that in the existing system there is no much secure in voting because here the only source of security level is the voter id which can easily be accessed by the other person by getting their voter id card. By keeping this in mind we are proposing new level of security which is much more secure than the existing system. 2. LITERATURE SURVEY 1) DIP BASED SMART ELECTRONIC VOTING MACHINE With the inclusion of biometric fingerprint sensor, each voter is entered into the system only after being recognized and checked with the given database of enlisted voters. Once the corresponding fingerprint is matched with the information provided, the voter will be allowed to proceed for choosing their preferred candidate from the panel of buttons. The final vote is then displayed onto a LCD for the satisfaction of voters. The disadvantage of this was current method of the voting system was easily hacked. 2) DESIGN AND IMPLEMENTATION OF MICROPROCESSOR BASED ELECTRONIC VOTING SYSTEM The vote casting system is almost similar to traditional system, only ballot box will be replaced by the device. The machine uses voter ID that is to identify a valid voter and restrict multiple vote casting. The main disadvantage of this is that image is not clearly recognised.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3996 3) SMART VOTING SYSTEM USING BIOMETRIC SENSORS At the time of voting, the user can specify their id and password. To ensure more security, finger prints of the voter is used as the main authentication resource. Since the finger pattern of each human being is different, the voter can be easily authenticated. The systems allow the voter to vote through his fingerprint. Finger print is used to uniquely identify the user. The finger print minutiae features are different for each human being. Finger print is used as a authentication of the voters. The negative part of this system is that they were be used to the Counterfeit vote. 4) DESIGNING AN ENERGY MONITORING, ANALYSING AND SOLUTION PROVIDING SYSTEM FOR ENERGY AUDITING This can be viewed as a network of different devices which connects devices such as computers and smart phones and enables these devices to collect, monitor and exchange data. The system is remotely accessible through internet and is available in 24x7.This also includes Data acquisition and transferring, Data storing and processing, Web application development and report generation, Emergency situation detection. The main drawback is that this system makes a problem of counterfeit vote. 3. STUDY OF VOTING SYSTEM I. PROPOSED SYSTEM In this project we are working with three different stages 1) Level 1: RFID number. At the time of voter registration, system will request for the unique id from the voter. Unique id is verified from the database provided by the election commission. 2) Level 2: Face recognition with respective election commission id number. In this level, Haar Cascade algorithm is used to verify the facial image of the voters from the database provided by the election commission. 3) Level 3: If the Face recognition is successful then face authentication will allow to vote for their desired candidate. II. IMPLEMENTATION OF THE MODEL 1. Every New User in the India will first register for Voting. So, our first step will be registration. 2. At that time of Registration, System Capture the Face of the user by using Web Camera and Store the Face sample with RFID (Adhaar) in the Server Database for Security Purpose. 3. At the time of election, we will use two level of security first one is RFID id verification and voter id verification and second one is face recognition. 4. System will be checking whatever unique id and voter id entered by the voter is correct or not. 5. If unique (RFID) id or voter id is correct, then system will take the image of voter and compare with the respective image with database or server. 6. If the image in database is matched with the captured image of the voter, then he/she is allowed to cast their vote. 7. On the voting page, all the party whatever party contest in the election symbols /buttons will be there. Voter can cast his /her vote in the election. 8. As soon as voter will fetch their vote, the id of voter logout automatically so we can say that a voter can give only one vote (Auto refresh). 9. On counting form only election commission authorized, user can login with the secure id and password. If both id and password is correct then voting process will be continued. III. DESIGN / METHODOLOGY This proposed concept is a web-based system so basic features related with web-based technologies such as client-server, database, image processing properties determine the software requirement of the system. The software product is a standalone system and it is not the part of larger system. The system will be made up of two parts. Before the Election Day the application is used for general purposes such as viewing candidates profile and election results in past years. The voter is verified using face recognition technology used. These votes are accepted by the system on the server. The Election Commission Authority arranges the whole system according to its requirements on the server where the system is running. IV. FACE DETECTION USING HAAR CASCADES Object Detection using Haar feature-based cascade classifiers is an effective object detection method proposed by Paul Viola and Michael Jones in their paper, “Rapid Object Detection using a Boosted Cascade of Simple Features” in 2001. It is a machine learning based approach
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3997 where a cascade function is trained from a lot of positive and negative images. It is then used to detect objects in other images. Here we will work with face detection. Initially, the algorithm needs a lot of positive images (images of faces) and negative images (images without faces) to train the classifier. Then we need to extract features from it. For this, haar features shown in below image are used. They are just like our convolutional kernel. Each feature is a single value obtained by subtracting sum of pixels under white rectangle from sum of pixels under black rectangle. Now all possible sizes and locations of each kernel is used to calculate plenty of features. (Just imagine how much computation it needs? Even a 24x24 window results over 160000 features).For each feature calculation, we need to find sum of pixels under white and black rectangles. To solve this, they introduced the integral images. It simplifies calculation of sum of pixels, how large may be the number of pixels, to an operation involving just four pixels. Nice, isn’t it? It makes things super-fast. But among all these features we calculated, most of them are irrelevant. For example, consider the image below. Top row shows two good features. The first feature selected seems to focus on the property that the region of the eyes is oen darker than the region of the nose and cheeks. The second feature selected relies on the property that the eyes are darker than the bridge of the nose. For this, we apply each and every feature on all the training images. For each feature, it finds the best threshold which will classify the faces to positive and negative. But obviously, there will be errors or misclassifications. We select the features with minimum error rate, which means they are the features that best classifies the face and non-face images. For this, we apply each and every feature on all the training images. For each feature, it finds the best threshold which will classify the faces to positive and negative. But obviously, there will be errors or misclassifications. We select the features with minimum error rate, which means they are the features that best classifies the face and non-face images. The process is not as simple as this. Each image is given an equal weight in the beginning. After each classification, weights of misclassified images are increased. Then again same process is done. New error rates are calculated. Also new weights. The process is continued until required accuracy or error rate is achieved or required number of features are found. Final classifier is a weighted sum of these weak classifiers. It is called weak because it alone can’t classify the image, but together with others forms a strong classifier. The paper says even 200 features provide detection with 95% accuracy. Their final setup had around 6000 features. V. RESULTS AND DISCUSSIONS As we see that existing voting system has many defects such as lengthy process, time taking, not secure, bogus voting, no security level but now we can say that our approach is more useful and secure from the existing system. Highly secured because in this project we have to use face recognition and face comparison so false user can’t give votes. We can access result (counting) faster than existing system. Because ballet system takes much more time in counting process. But this computerized voting system increases the trust in voting system as well as Election Commission. Still there remains some limitations and drawbacks in this voting System. 4. CONCLUSION As we see that existing voting system has many defects such as lengthy process, time taking, not secure, bogus voting, no security level but now we can say that our
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3998 approach is more useful and secure from the existing system. Since, we are using three level of security in this proposed system the false voters can be easily identified. The facial authentication technique is very much useful in identifying the fraud voters, so we can avoid the bogus votes during election commission. As every operation is performed through internet connectivity so, it is onetime investment for government. As data is stored in centralized repository so, data is accessible at any time as well as backup of the data is possible. Smart voting system provides updated result at each and every minute. Also requires less man power and resources. The database needs to be updated every year or before election so that new eligible citizens may be enrolled and those who are dead are removed from the voter list. REFERENCES [1] Edy Winarno, Wiwien Hadikurniawati, Imam Husni Al Amin, Muji Sukur"Anti-Cheating Presence System Based on 3WPCADual Vision Face Recognition:Proc. EECSI 2017, Yogyakarta, Indonesia, 19-21 September 2017", Issue:September 2017, Pages:121-124. [2] Amish Basal, Utkarsh Raina, Vaibhavi Pujari, Roushan Kumar "E-Smart Voting System with Secure Data Identification using Cryptography:2018 3rd International Conference for Convergence in Technology (I2CT) The Gateway Hotel, XION Complex, Wakad Road, Pune, India. Issue:Apr 06-08, 2018,Pages:1-4. [3] Swetha M S, Thungamani M, Shreejwol Disti, Raman Shah “Smart Voting System Support through Face Recognition” IJIRST –International Journal for Innovative Research in Science & Technology| Volume 5 | Issue 11 | April 2019. [4] Vikas Kumar, MS Swetha, MS Muneshwara, S Prakash, “Cloud computing: towards case study of data security mechanism,” vol-2 issue-4 page no-1-8 2011. [5] MS Muneshwara, MS Swetha, M Thungamani, GN Anil, “Digital genomics to build a smart franchise in real time applications,” IEEE International Conference on Circuit, Power and Computing Technologies (ICCPCT),IEEE page no 1-4 2017 . [6] MS Muneshwara, A Lokesh, MS Swetha, M Thungamani, “Ultrasonic and image mapped path finder for the blind people in the real time system,” IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI) IEEE, page no 964- 969 2017.