Under the guidance of
Dr. Sheena Mathew
GLOBAL WIRELESS
E-VOTING
SYSYTEM
PRESENTED By,
JAYESH J
12110031
S7 CS-A
SOE,CUSAT
CONTENTS
 INTRODUCTION
 PRESENT SYSTEM
 PROPOSED SYDTEM
 VOTING MACHINE
 EYE RETINA SCANNING
 INTERFACE DEVICE
CONTENTS
 WORKING OF WHOLE SYSTEM
 HURDLES IN PATH OF IMPLEMENTATION
 FUTURE ENHANCEMENT
 CONCLUSION
 REFERENCES
INTRODUCTION
 “Global Wireless E-Voting” is an intelligent voting
system which can determine the eligibility of the
voter by scanning the eye pattern .
 Vote count is not kept into the same machine itself
instead of it is stored in the remote server .
 More secure than conventional voting system
PRESENT SYSTEM
 In present system each and every booth is given an
electronic machine which stores the votes of the
people.
 Control of present system is given to the incharge
officer who checks the eligibility of the candidates
for voting.
 Finally incharge collect all the voting machine at a
place and go for counting.
G.L ABHISHEK RGIT,BANGALORE
DISADVANTAGES OF
PRESENT SYSTEM
 The machine is not able to recognize the eligibility
of a candidate, so the corrupted officers may
misguide the people
 The corrupted officers may increase the count of
the voting.
 After voting if any technical problems or damage
occurs with the machines it may leads to the re
election
CONTINUED…
 During transportation of the machines, the person
in charge can change the status of machines and
even may destroy.
 This system is not a cost effective one. Since we
need security, in charge officers, secured place for
counting and election place.
 The voting take place where the machine is
located.
PROPOSED SYSTEM
 In this system we trying to keep counting of votes
in to a remote secured system.
 Our machine can check the eligibility of the
candidate by itself, so there is no question of
corruption.
 In this system we are using an electronic circuit
which enable the voter to vote and transfer this
vote to the remote system using mobile tower.
CONTINUED..
 A error in a vote does not affect the remaining
system, there by reducing the risk of re-election.
 Cost for an election is comparatively less than
current system
 A person even can vote from a mobile system and
also from Internet
EXPLANATION
1. Radio waves representing scanned retina pattern and
vote to Mobile tower.
2. Radio waves representing scanned retina pattern and
vote to remote server.
3. Acknowledgement (+ve or –ve) from the server to
mobile tower.
CONTINUED..
4. Acknowledgement (+ve or –ve) from mobile
tower to Interface device.
5. Ready signal if retina is scanned properly to
voting machine. And if –ve signal then alert
alarm will be activated.
6. Accepted vote is made to flow to the interface
device.
VOTING MACHINE
 The voting machine is actually a device which
generates the different voltages for different votes.
 These voltages are fed to the (ADC) which is then
converted to digital bits then can be converted to
radio waves.
BLOCK DIAGRAM OF CLIENT
SIDE CIRCUIT
EYE RETINA SCANNING
 A biometric identifier known as a retinal scan is used
to map the unique patterns of a person's retina.
 These eye retina machine can be a high quality web
cam or device which can capture the images effectively.
 A retinal scan is performed by casting an unperceived
beam of low-energy infrared light into a person’s eye as
they look through the scanner's eyepiece.
CONTINUED…
 This beam of light traces a standardized path on the retina.
Because retinal blood vessels are more absorbent of this
light than the rest of the eye, the amount of reflection
varies during the scan. The pattern of variations is
converted to computer code and stored in a database
INTERFACE DEVICE
This is an electronic kit which converts the
input digital signals such as (retina pattern
+ votes+ secure bits) to radio waves.
WORKING OF THE WHOLE
SYSTEM
 Whenever voters enter to voting booth then he will be
instructed to directly look at retina scanning machine and
the machine scans the retina.
 Once retina scanning properly confirmed then voter is
made to vote
 Now the whole data including the retina pattern is sent to
interfacing device which converts it into radio waves and
these radio waves are sent to mobile tower
 And then to the remote server, where the authentication
and voters identification is stored into a secured database.
CONTINUED…
 The received data is first converted into digital format
from the radio waves through the interface device kept at
the server side, and from the encrypted data retina pattern
and vote separated.
 Next the retina pattern is matched against the existing
database .
 If match is found then flag is checked which indicates its
voting status i.e. +ve ack.
 This ack is recognized by the receiver kept at the voter side
and machine is made to scan next retina pattern and vote,
otherwise if –ve ack then alert alarm is made to ring
HURDLES IN THE PATH OF
IMPLEMENTATION
 Security
 Efficiency
 Geographical problem
SECURITY
 Uses Key Complex Encryption algorithm
 First it finds the length of the string
 Generate the random numbers equal to the length
of the string
 Add the corresponding Characters from the given
string and random values
EXPLANATION
 E.g. KSHITIJ
 8 12 34 4 11 9 26
 The ASCII value for KSHITIJ are
 75 83 72 73 84 73 74
 Add corresponding A) and B) values as
 8+75 12+83 34+72 4+73 11+84 9+73 26+74
CONTINUED….
 The corresponding ASCII characters for these are
 S _ j M _ R d
 The corresponding characters for random values
 À J q © ¨ « y
 Finally encrypted data as
 SÀ _J jq M© _ ¨ R« dy
EFFICIENCY
 Applying compression Algorithms
 Using distributed Operating system environment with
multiple servers.
 CDMA technique
CONTINUED..
Example of CDMA
GEOGRAPHICAL PROBLEMS
 It occurs where the technical facilities like
mobile tower or Internet service is not present.
 In this case will have to store the vote and retina
pattern in a external memory location
 And pass it when we reach the area where the
technical facilities like internet or mobile tower is
available.
 Here the eye scanner will be web cam.
FUTURE ENHANCEMENTS
CONCLUSION
 Provides high level of security, authentication,
reliability, and corruption-free mechanism.
 By this we can get result with in minute after the
completion of voting.
 Minimum manpower Utilization, hence mechanism is
error free.
REFERENCE
 Boylestead “Electronic Devices and Circuit
Theory” 10/e Pearson Education, June 2012
 Herbert Taub and Donald Schilling “Digital
Integrated Electronics” McGraw-Hill Internatinoal
Editions, 01-Jan-1977

GLOBAL WIRELESS E_VOTING(JAYESH J)

  • 1.
    Under the guidanceof Dr. Sheena Mathew GLOBAL WIRELESS E-VOTING SYSYTEM PRESENTED By, JAYESH J 12110031 S7 CS-A SOE,CUSAT
  • 2.
    CONTENTS  INTRODUCTION  PRESENTSYSTEM  PROPOSED SYDTEM  VOTING MACHINE  EYE RETINA SCANNING  INTERFACE DEVICE
  • 3.
    CONTENTS  WORKING OFWHOLE SYSTEM  HURDLES IN PATH OF IMPLEMENTATION  FUTURE ENHANCEMENT  CONCLUSION  REFERENCES
  • 4.
    INTRODUCTION  “Global WirelessE-Voting” is an intelligent voting system which can determine the eligibility of the voter by scanning the eye pattern .  Vote count is not kept into the same machine itself instead of it is stored in the remote server .  More secure than conventional voting system
  • 5.
    PRESENT SYSTEM  Inpresent system each and every booth is given an electronic machine which stores the votes of the people.  Control of present system is given to the incharge officer who checks the eligibility of the candidates for voting.  Finally incharge collect all the voting machine at a place and go for counting.
  • 6.
  • 7.
    DISADVANTAGES OF PRESENT SYSTEM The machine is not able to recognize the eligibility of a candidate, so the corrupted officers may misguide the people  The corrupted officers may increase the count of the voting.  After voting if any technical problems or damage occurs with the machines it may leads to the re election
  • 8.
    CONTINUED…  During transportationof the machines, the person in charge can change the status of machines and even may destroy.  This system is not a cost effective one. Since we need security, in charge officers, secured place for counting and election place.  The voting take place where the machine is located.
  • 9.
    PROPOSED SYSTEM  Inthis system we trying to keep counting of votes in to a remote secured system.  Our machine can check the eligibility of the candidate by itself, so there is no question of corruption.  In this system we are using an electronic circuit which enable the voter to vote and transfer this vote to the remote system using mobile tower.
  • 10.
    CONTINUED..  A errorin a vote does not affect the remaining system, there by reducing the risk of re-election.  Cost for an election is comparatively less than current system  A person even can vote from a mobile system and also from Internet
  • 12.
    EXPLANATION 1. Radio wavesrepresenting scanned retina pattern and vote to Mobile tower. 2. Radio waves representing scanned retina pattern and vote to remote server. 3. Acknowledgement (+ve or –ve) from the server to mobile tower.
  • 13.
    CONTINUED.. 4. Acknowledgement (+veor –ve) from mobile tower to Interface device. 5. Ready signal if retina is scanned properly to voting machine. And if –ve signal then alert alarm will be activated. 6. Accepted vote is made to flow to the interface device.
  • 14.
    VOTING MACHINE  Thevoting machine is actually a device which generates the different voltages for different votes.  These voltages are fed to the (ADC) which is then converted to digital bits then can be converted to radio waves.
  • 15.
    BLOCK DIAGRAM OFCLIENT SIDE CIRCUIT
  • 16.
    EYE RETINA SCANNING A biometric identifier known as a retinal scan is used to map the unique patterns of a person's retina.  These eye retina machine can be a high quality web cam or device which can capture the images effectively.  A retinal scan is performed by casting an unperceived beam of low-energy infrared light into a person’s eye as they look through the scanner's eyepiece.
  • 17.
    CONTINUED…  This beamof light traces a standardized path on the retina. Because retinal blood vessels are more absorbent of this light than the rest of the eye, the amount of reflection varies during the scan. The pattern of variations is converted to computer code and stored in a database
  • 18.
    INTERFACE DEVICE This isan electronic kit which converts the input digital signals such as (retina pattern + votes+ secure bits) to radio waves.
  • 19.
    WORKING OF THEWHOLE SYSTEM  Whenever voters enter to voting booth then he will be instructed to directly look at retina scanning machine and the machine scans the retina.  Once retina scanning properly confirmed then voter is made to vote  Now the whole data including the retina pattern is sent to interfacing device which converts it into radio waves and these radio waves are sent to mobile tower  And then to the remote server, where the authentication and voters identification is stored into a secured database.
  • 20.
    CONTINUED…  The receiveddata is first converted into digital format from the radio waves through the interface device kept at the server side, and from the encrypted data retina pattern and vote separated.  Next the retina pattern is matched against the existing database .  If match is found then flag is checked which indicates its voting status i.e. +ve ack.  This ack is recognized by the receiver kept at the voter side and machine is made to scan next retina pattern and vote, otherwise if –ve ack then alert alarm is made to ring
  • 21.
    HURDLES IN THEPATH OF IMPLEMENTATION  Security  Efficiency  Geographical problem
  • 22.
    SECURITY  Uses KeyComplex Encryption algorithm  First it finds the length of the string  Generate the random numbers equal to the length of the string  Add the corresponding Characters from the given string and random values
  • 23.
    EXPLANATION  E.g. KSHITIJ 8 12 34 4 11 9 26  The ASCII value for KSHITIJ are  75 83 72 73 84 73 74  Add corresponding A) and B) values as  8+75 12+83 34+72 4+73 11+84 9+73 26+74
  • 24.
    CONTINUED….  The correspondingASCII characters for these are  S _ j M _ R d  The corresponding characters for random values  À J q © ¨ « y  Finally encrypted data as  SÀ _J jq M© _ ¨ R« dy
  • 25.
    EFFICIENCY  Applying compressionAlgorithms  Using distributed Operating system environment with multiple servers.  CDMA technique
  • 26.
  • 27.
    GEOGRAPHICAL PROBLEMS  Itoccurs where the technical facilities like mobile tower or Internet service is not present.  In this case will have to store the vote and retina pattern in a external memory location  And pass it when we reach the area where the technical facilities like internet or mobile tower is available.  Here the eye scanner will be web cam.
  • 28.
  • 29.
    CONCLUSION  Provides highlevel of security, authentication, reliability, and corruption-free mechanism.  By this we can get result with in minute after the completion of voting.  Minimum manpower Utilization, hence mechanism is error free.
  • 30.
    REFERENCE  Boylestead “ElectronicDevices and Circuit Theory” 10/e Pearson Education, June 2012  Herbert Taub and Donald Schilling “Digital Integrated Electronics” McGraw-Hill Internatinoal Editions, 01-Jan-1977