SlideShare a Scribd company logo
BIOMETRIC VOTING
SYSTEM
BY
P. Aakash chandar
ECE –A (IV Year)
BIOMETRICS – A BRIEF IDEA.
Biometrics is thetermgivento theuseof biological traits or behavioral
characteristicsto identifyan individual.
It can be categorized on the basis of Physiological and Behavioural
characteristics.
Traditional means of access control include token-based
identification system such as Driver license, Passport, etc.
WHY NOT EVM ?
Allegations of EVM’s favouring one party in recent local body UP
elections.
Vote rigging.
Lack of transparency.
Banned in England, Germany, Netherlands, Republic of Ireland ,etc.
WHY BIOMETRICS IN VOTING
SYSTEM ?
 Governed by Corruption, Injustice & Lack of Fairplay
 Democratic Principles becoming unprotected
 Election Integrity can’t be established
 Demoting faith from Citizens
 All these problems have raised the demand for a new accurate,
secured & reliable form of Voting System
BIOMETRIC VOTING MACHINE
WHOLE OPERATION
STEPS INVOLVED
Scanning and processing.
Verification of votes.
Counting.
Formation of Network(Preliminary step)
SCANNING & PROCESSING -
FINGERPRINT
 The fingerprint scanner scans the impression of the thumb.
It is digitally processed to form a digital template
which contains all the extracted information.
Stored in the database.
VERIFICATION OF VOTES
REJECTION OF MULTIPLE VOTES
PROCESS AND COUNTING
FORMATION OF NETWORK
 The voting machines present in a town are interlinkedintheform of a
highly secureLAN.
 Thisnetwork is formed withthehelpof the telephone lines.
 All thedata collected inthe voting system is firststored inthevoting
machineitself.
 Thenit is sent to theHOST whichwillbe located at headquarters of
thetown.
FORMATION OF NETWORK
ADVANTAGES
 Secure
Prevents rigging.
Automated and accurate system.
Manipulating figures is difficult.
Accountability.
DISADVANTAGES
Illegal usage of private biometric information.
Huge load on the telecom/connectivity.
Huge cost of additional hardware/finger print scanners/iris cameras.
Increases the time to vote for individuals since authenticating will
consume some time.
People with disabilities.
CONCLUSION
 Thustheadventofthisbiometricthumb impression voting system would
enable hostingoffairelectionsinIndia.
 Thiswillprecludetheillegalpracticeslike rigging.
 Thecitizenscanbesurethattheyalonecan choose their leaders, thus exercising
their right in thedemocracy.

More Related Content

What's hot

Electronic Voting Machine
Electronic Voting MachineElectronic Voting Machine
Electronic Voting Machine
Vijayalakshmi Joger
 
fingerprint based electronic voting machine
fingerprint based electronic voting machinefingerprint based electronic voting machine
fingerprint based electronic voting machine
santhu652
 
E-Voting Technology
E-Voting TechnologyE-Voting Technology
E-Voting Technology
Gautam Kumar
 
synopsis report on BIOMETRIC ONLINE VOTING SYSTEM
synopsis report on BIOMETRIC ONLINE VOTING SYSTEMsynopsis report on BIOMETRIC ONLINE VOTING SYSTEM
synopsis report on BIOMETRIC ONLINE VOTING SYSTEM
Nitesh Dubey
 
Fingerprint voting system
Fingerprint voting systemFingerprint voting system
Fingerprint voting system
jannatul haque
 
Online Voting System
Online Voting SystemOnline Voting System
Online Voting Systemstudent
 
Online voting system
Online voting systemOnline voting system
Online voting system
Pooja Jain
 
Electronic Voting System
Electronic Voting SystemElectronic Voting System
Electronic Voting System
Afolabi B. OluwaGbenga
 
kgec-projectnew-150802134711-lva1-app6892.pdf
kgec-projectnew-150802134711-lva1-app6892.pdfkgec-projectnew-150802134711-lva1-app6892.pdf
kgec-projectnew-150802134711-lva1-app6892.pdf
ShubhamGour29
 
online E-voting system
online E-voting systemonline E-voting system
online E-voting system
shubham patil
 
11 e voting-proposal_it_project_management10may12
11 e voting-proposal_it_project_management10may1211 e voting-proposal_it_project_management10may12
11 e voting-proposal_it_project_management10may12
Traitet Thepbandansuk
 
Secure e voting system
Secure e voting systemSecure e voting system
Secure e voting systemMonira Monir
 
Online Voting System
Online Voting SystemOnline Voting System
Online Voting System
apolama
 
Final project report on evm 16.04.2019
Final project report on evm 16.04.2019Final project report on evm 16.04.2019
Final project report on evm 16.04.2019
mhjit
 
Online election tools
Online election toolsOnline election tools
Online election tools
uclagovinfolibrarian
 
Smart Voting System with Face Recognition
Smart Voting System with Face RecognitionSmart Voting System with Face Recognition
Smart Voting System with Face Recognition
Nikhil Katte
 
E.V.M MACHINE.pptx
E.V.M MACHINE.pptxE.V.M MACHINE.pptx
E.V.M MACHINE.pptx
Rinki41
 
Documentation work online voting
Documentation work  online votingDocumentation work  online voting
Documentation work online voting
Thenmozhi Divya
 

What's hot (20)

Electronic Voting Machine
Electronic Voting MachineElectronic Voting Machine
Electronic Voting Machine
 
fingerprint based electronic voting machine
fingerprint based electronic voting machinefingerprint based electronic voting machine
fingerprint based electronic voting machine
 
Online voting
Online votingOnline voting
Online voting
 
E-Voting Technology
E-Voting TechnologyE-Voting Technology
E-Voting Technology
 
synopsis report on BIOMETRIC ONLINE VOTING SYSTEM
synopsis report on BIOMETRIC ONLINE VOTING SYSTEMsynopsis report on BIOMETRIC ONLINE VOTING SYSTEM
synopsis report on BIOMETRIC ONLINE VOTING SYSTEM
 
Fingerprint voting system
Fingerprint voting systemFingerprint voting system
Fingerprint voting system
 
Online Voting System
Online Voting SystemOnline Voting System
Online Voting System
 
Online voting system
Online voting systemOnline voting system
Online voting system
 
Electronic Voting System
Electronic Voting SystemElectronic Voting System
Electronic Voting System
 
kgec-projectnew-150802134711-lva1-app6892.pdf
kgec-projectnew-150802134711-lva1-app6892.pdfkgec-projectnew-150802134711-lva1-app6892.pdf
kgec-projectnew-150802134711-lva1-app6892.pdf
 
online E-voting system
online E-voting systemonline E-voting system
online E-voting system
 
11 e voting-proposal_it_project_management10may12
11 e voting-proposal_it_project_management10may1211 e voting-proposal_it_project_management10may12
11 e voting-proposal_it_project_management10may12
 
Secure e voting system
Secure e voting systemSecure e voting system
Secure e voting system
 
Online Voting System
Online Voting SystemOnline Voting System
Online Voting System
 
Final project report on evm 16.04.2019
Final project report on evm 16.04.2019Final project report on evm 16.04.2019
Final project report on evm 16.04.2019
 
Online election tools
Online election toolsOnline election tools
Online election tools
 
Smart Voting System with Face Recognition
Smart Voting System with Face RecognitionSmart Voting System with Face Recognition
Smart Voting System with Face Recognition
 
Online E-Voting System
Online E-Voting SystemOnline E-Voting System
Online E-Voting System
 
E.V.M MACHINE.pptx
E.V.M MACHINE.pptxE.V.M MACHINE.pptx
E.V.M MACHINE.pptx
 
Documentation work online voting
Documentation work  online votingDocumentation work  online voting
Documentation work online voting
 

Similar to Biometric voting system

Online voting system project by bipin bhardwaj
Online voting system project by bipin bhardwajOnline voting system project by bipin bhardwaj
Online voting system project by bipin bhardwaj
PT Bipin Bhardwaj
 
O017658697
O017658697O017658697
O017658697
IOSR Journals
 
Design and Development of Secure Electronic Voting System Using Radio Frequen...
Design and Development of Secure Electronic Voting System Using Radio Frequen...Design and Development of Secure Electronic Voting System Using Radio Frequen...
Design and Development of Secure Electronic Voting System Using Radio Frequen...
iosrjce
 
Biometrics using electronic voting system with embedded security
Biometrics using electronic voting system with embedded securityBiometrics using electronic voting system with embedded security
Biometrics using electronic voting system with embedded security
Remya R
 
electoral technology - peter wolf
 electoral technology - peter wolf electoral technology - peter wolf
electoral technology - peter wolf
Cecep Husni Mubarok, S.Kom., M.T.
 
How can technology help enhance transparency and integrity of elections - oyu...
How can technology help enhance transparency and integrity of elections - oyu...How can technology help enhance transparency and integrity of elections - oyu...
How can technology help enhance transparency and integrity of elections - oyu...
Cecep Husni Mubarok, S.Kom., M.T.
 
A review of the underlying concepts of electronic voting
A review of the underlying concepts of electronic votingA review of the underlying concepts of electronic voting
A review of the underlying concepts of electronic voting
Alexander Decker
 
11.a review of the underlying concepts of electronic voting
11.a review of the underlying concepts of electronic voting11.a review of the underlying concepts of electronic voting
11.a review of the underlying concepts of electronic votingAlexander Decker
 
A SECURITY BASED VOTING SYSTEMUSING BIOMETRIC
A SECURITY BASED VOTING SYSTEMUSING BIOMETRICA SECURITY BASED VOTING SYSTEMUSING BIOMETRIC
A SECURITY BASED VOTING SYSTEMUSING BIOMETRIC
IJERA Editor
 
IRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
IRJET - Smart E-Voting System with Fingerprint Authentication using ArduinoIRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
IRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
IRJET Journal
 
Secured and transperant voting system using biometics
Secured and transperant voting system using biometicsSecured and transperant voting system using biometics
Secured and transperant voting system using biometics
SYEDBABJI
 
IRJET- Digitized Election Voting System : An Innovative Approach
IRJET-  	  Digitized Election Voting System : An Innovative ApproachIRJET-  	  Digitized Election Voting System : An Innovative Approach
IRJET- Digitized Election Voting System : An Innovative Approach
IRJET Journal
 
EVM.pptx
EVM.pptxEVM.pptx
EVM.pptx
BohtyarKhan
 
Online votinh
Online votinh Online votinh
Online votinh
Richa Pandey
 
IRJET- Biometric Voting Machine
IRJET- Biometric Voting MachineIRJET- Biometric Voting Machine
IRJET- Biometric Voting Machine
IRJET Journal
 
E017222736
E017222736E017222736
E017222736
IOSR Journals
 
Mobile, Secure E - Voting Architecture for the Nigerian Electoral System
Mobile, Secure E - Voting Architecture for the Nigerian Electoral SystemMobile, Secure E - Voting Architecture for the Nigerian Electoral System
Mobile, Secure E - Voting Architecture for the Nigerian Electoral System
iosrjce
 
Project synopsis on online voting system
Project synopsis on online voting systemProject synopsis on online voting system
Project synopsis on online voting systemLhakpa Yangji
 
Captiosus Voting System
Captiosus Voting SystemCaptiosus Voting System
Captiosus Voting System
IJMTST Journal
 

Similar to Biometric voting system (20)

Online voting system project by bipin bhardwaj
Online voting system project by bipin bhardwajOnline voting system project by bipin bhardwaj
Online voting system project by bipin bhardwaj
 
O017658697
O017658697O017658697
O017658697
 
Design and Development of Secure Electronic Voting System Using Radio Frequen...
Design and Development of Secure Electronic Voting System Using Radio Frequen...Design and Development of Secure Electronic Voting System Using Radio Frequen...
Design and Development of Secure Electronic Voting System Using Radio Frequen...
 
Biometrics using electronic voting system with embedded security
Biometrics using electronic voting system with embedded securityBiometrics using electronic voting system with embedded security
Biometrics using electronic voting system with embedded security
 
electoral technology - peter wolf
 electoral technology - peter wolf electoral technology - peter wolf
electoral technology - peter wolf
 
How can technology help enhance transparency and integrity of elections - oyu...
How can technology help enhance transparency and integrity of elections - oyu...How can technology help enhance transparency and integrity of elections - oyu...
How can technology help enhance transparency and integrity of elections - oyu...
 
A review of the underlying concepts of electronic voting
A review of the underlying concepts of electronic votingA review of the underlying concepts of electronic voting
A review of the underlying concepts of electronic voting
 
11.a review of the underlying concepts of electronic voting
11.a review of the underlying concepts of electronic voting11.a review of the underlying concepts of electronic voting
11.a review of the underlying concepts of electronic voting
 
A SECURITY BASED VOTING SYSTEMUSING BIOMETRIC
A SECURITY BASED VOTING SYSTEMUSING BIOMETRICA SECURITY BASED VOTING SYSTEMUSING BIOMETRIC
A SECURITY BASED VOTING SYSTEMUSING BIOMETRIC
 
IRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
IRJET - Smart E-Voting System with Fingerprint Authentication using ArduinoIRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
IRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
 
Secured and transperant voting system using biometics
Secured and transperant voting system using biometicsSecured and transperant voting system using biometics
Secured and transperant voting system using biometics
 
IRJET- Digitized Election Voting System : An Innovative Approach
IRJET-  	  Digitized Election Voting System : An Innovative ApproachIRJET-  	  Digitized Election Voting System : An Innovative Approach
IRJET- Digitized Election Voting System : An Innovative Approach
 
EVM.pptx
EVM.pptxEVM.pptx
EVM.pptx
 
Online votinh
Online votinh Online votinh
Online votinh
 
IRJET- Biometric Voting Machine
IRJET- Biometric Voting MachineIRJET- Biometric Voting Machine
IRJET- Biometric Voting Machine
 
E017222736
E017222736E017222736
E017222736
 
Mobile, Secure E - Voting Architecture for the Nigerian Electoral System
Mobile, Secure E - Voting Architecture for the Nigerian Electoral SystemMobile, Secure E - Voting Architecture for the Nigerian Electoral System
Mobile, Secure E - Voting Architecture for the Nigerian Electoral System
 
Project synopsis on online voting system
Project synopsis on online voting systemProject synopsis on online voting system
Project synopsis on online voting system
 
Captiosus Voting System
Captiosus Voting SystemCaptiosus Voting System
Captiosus Voting System
 
1002evot
1002evot1002evot
1002evot
 

Recently uploaded

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 

Recently uploaded (20)

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 

Biometric voting system

  • 1. BIOMETRIC VOTING SYSTEM BY P. Aakash chandar ECE –A (IV Year)
  • 2. BIOMETRICS – A BRIEF IDEA. Biometrics is thetermgivento theuseof biological traits or behavioral characteristicsto identifyan individual. It can be categorized on the basis of Physiological and Behavioural characteristics. Traditional means of access control include token-based identification system such as Driver license, Passport, etc.
  • 3. WHY NOT EVM ? Allegations of EVM’s favouring one party in recent local body UP elections. Vote rigging. Lack of transparency. Banned in England, Germany, Netherlands, Republic of Ireland ,etc.
  • 4. WHY BIOMETRICS IN VOTING SYSTEM ?  Governed by Corruption, Injustice & Lack of Fairplay  Democratic Principles becoming unprotected  Election Integrity can’t be established  Demoting faith from Citizens  All these problems have raised the demand for a new accurate, secured & reliable form of Voting System
  • 7. STEPS INVOLVED Scanning and processing. Verification of votes. Counting. Formation of Network(Preliminary step)
  • 8. SCANNING & PROCESSING - FINGERPRINT  The fingerprint scanner scans the impression of the thumb. It is digitally processed to form a digital template which contains all the extracted information. Stored in the database.
  • 12. FORMATION OF NETWORK  The voting machines present in a town are interlinkedintheform of a highly secureLAN.  Thisnetwork is formed withthehelpof the telephone lines.  All thedata collected inthe voting system is firststored inthevoting machineitself.  Thenit is sent to theHOST whichwillbe located at headquarters of thetown.
  • 14. ADVANTAGES  Secure Prevents rigging. Automated and accurate system. Manipulating figures is difficult. Accountability.
  • 15. DISADVANTAGES Illegal usage of private biometric information. Huge load on the telecom/connectivity. Huge cost of additional hardware/finger print scanners/iris cameras. Increases the time to vote for individuals since authenticating will consume some time. People with disabilities.
  • 16. CONCLUSION  Thustheadventofthisbiometricthumb impression voting system would enable hostingoffairelectionsinIndia.  Thiswillprecludetheillegalpracticeslike rigging.  Thecitizenscanbesurethattheyalonecan choose their leaders, thus exercising their right in thedemocracy.