Professional Documents
Culture Documents
CHAPTER 1
INTRODUCTION
The system reads the data from the Finger print and verifies this data with the
already stored data in its database. If the details present in the data base it matches with
the stored data, the system allows the person to enter into and poll his vote. If the details
of the Finger do not match with the stored data, the system immediately activates the
display and the security authorities can come and take the further action. This project is a
device that collects data from the tag and codes the data into a format that can be
understood by the controlling section. This system also collects information from the
master device and implements commands that are directed by the master. The objective
of the project is to develop a microcontroller based security and alert system. It consists
of a Finger print reader, microcontroller, the interfacing unit to allow the communication
between the microcontroller and Finger print module, and the LCD
The software application and the hardware implementation help the
microcontroller in the aurdino read the data from the Finger print verify the data with the
already stored data and take the next action. The system is totally designed using Finger
print module and embedded systems technology. The Controlling unit has an application
program to allow the aurdino interface with the Finger print module, the reader reads the
data from the tag, passes the data to the aurdino and the controller verifies this data with
the already existing data in the controller’s memory and then implement the commands
directed by the controller section. The performance of the design is maintained by
controlling unit.
CHAPTER 2
LITERATURE SURVEY
[13]. Hanady Hussien, Hussien Aboelnaga, IEEE 2013. “Design of secured E-voting
systems.” is able to desire with the widespread use of computers and embedded systems.
Security is the essential problem should be considered in such systems. This paper
proposes a new e-voting system that fulfils the security requirements of e-voting. It is
based on homomorphic property and blind signature plan. The suggest system is executed
on an embedded system which serves as a voting machine. The system employees RFID to
store all conditions that comply with the rule of the government to check voter eligibility.
[3]. Daniel petcu, Dan Alexandru stoichescu, The International Symposium on Advanced
topics in electrical engineering; May 7-9, 2015. “A Hybrid mobile Biometric- based E-
voting system.” Information technology changes and gives shape to networked society all
over the world today & its solutions are becoming main drivers in almost all field of
human life activity. Although the acceptance rate of e- government applications is
increasing e-voting is hardly accepted as main tool in its field because it shortages in
offering good solutions to common problems like fraud, bribery, anonymous character of
the vote and absence of good independent monitoring.
[14]. Urmila Shrawankar Dr. Vilas Thakare, “techniques for feature extraction in speech
recognition system” The time domain waveform of a speech signal carries all of the
auditory information. From the phonological point of view, very little can be said on the
basis of the waveform itself. However, past research in mathematics, acoustics, and speech
technology have provided many methods for converting data that can be considered as
information if interpreted correctly. In order to find some statistically relevant information
from incoming data, it is important to have mechanisms for reducing the information of
each segment in the audio signal into a relatively small number of parameters, or features.
These features should describe each segment in such a characteristic way that other similar
segments can be grouped together by comparing their features. There are enormous
interesting and exceptional ways to describe the speech signal in terms of parameters.
Though, they all have their strengths and weaknesses, we have presented some of the most
used methods with their importance.
[7]. Steven J.Anderson, A.C.M Fong, senior member, IEEE, Jie Tang, member, IEEE,
“Robust Tri-Model Automatic Speech Recognition for consumer Applications.” IEEE
Transactions on Consumer Electronics, Vol. 59, No. 2, May 2013. Commercial automatic
speech recognition (ASR) started to appear in the late 1980‟s and can proposal a more
natural means of receiving user inputs than methods such as typing on keyboards or touch
screens. This is a especially eventful consideration for small consumer devices such as
smart phones. In many practical circumstances, however, presentation of ASR can be
significantly. Compromised due to ambient noise and variable lighting circumstances.
Prior research has shown that adding visual signals to standard ASR can mitigate the
effects of ambient noise. ASR using adaptations of established techniques such as MT,
DCT and MFCC.
[4]. M.Venkata Rao, Venugopal Rao Ravula, Pavani Pala. “Development Of Antirigging
Voting System Using Biometrics Based On Adharcard Numbering”. Now a day‟s voting
process is exercised by using EVM (Electronic voting machine). In this paper we present
and use implementation is to execute the progress of anti rigging voting system using
finger print .The purpose of the project and implementation is to provide a safety and good
environment to the customers is to electing the candidates by using the intelligent
electronic voting machine by providing a rival naming to every user using the FINGER
PRINT identification technology. Here in this project and satisfy we are going supply the
at most security since it is taking the FINGER PRINTS as the authentication for EVM.
Brilliant EVM is an Embedded based project and implementation. It involves
microcontroller and interfaces. Intelligent EVM has been particularly designed to collect,
record, store, count and display cent percent accurately.
[15]. Firas I. Hazzaa, Seifedine Kadr, This paper deals with the design and development of
a “Web-Based Voting System Using Fingerprint Design and Implementation”, in order to
provide a high performance with high security to the voting system also we use web
technology to make the voting system more practical. The new design is proposed an
election for a university for selecting the president of the university. The proposed EVS
allows the voters to scan their fingerprint, which is then matched with an already saved
image within a database. Developed Web-based Voting System using Fingerprint
Recognition.
CHAPTER 3
In this process there can be error in counting of votes or in some cases voters find
ways to vote more than once. Sometimes votes are even manipulated to distort the results
of an election in favour of certain candidates .With the advent of technology, ballot papers
have been replaced by EVM (Electronic Voting Machine) to overcome drawbacks
associated with ballot papers like stealing of ballot boxes, tearing of ballot papers, massive
rigging, and physical damage to the ballot papers by pouring fluids etc. Electronic Voting
Machines ("EVM"), Idea mooted by the Chief Election Commissioner in 1977. The EVMs
were devised and designed by Election Commission of India in collaboration with Bharat
Electronics Limited (BEL), Bangalore and Electronics Corporation of India Limited
(ECIL), Hyderabad. The EVMs are now manufactured by the above two undertakings. An
EVM consists of two units.
i. Control Unit
ii. Balloting Unit
The two units are joined by a five-meter cable. The Control Unit is with the Presiding
Officer or a Polling Officer and the Balloting Unit is placed inside the voting
compartment. The interfacing of control unit with Balloting unit is shown in the Fig 3.1
There are many types of problems with EVM which is currently in use they are:
1. Accuracy: It is not possible for a vote to be altered eliminated the invalid vote cannot be
counted from the finally tally.
2. Democracy: It permits only eligible voters to vote and, it ensures that eligible voters
vote only once.
3. Security Problems: One can change the program installed in the EVM and tamper the
results after the polling. By replacing a small part of the machine with a look-alike
component that can be silently instructed to steal a percentage of the votes in favor of a
chosen candidate. These instructions can be sent wirelessly from a mobile phone.
4. Illegal Voting (Rigging): The very commonly known problem rigging which is faced in
every electoral procedure. One candidate cast the votes of all the members or few
amounts of members in the electoral list illegally. This results in the loss of votes for the
other candidates participating and also increases the number votes to the candidate who
performs this action. This can be done externally at the time of voting.
5. Privacy: Neither authority nor anyone else can link any ballot to the voter
6. Verifiability: Independently verification of that all votes have been counted correctly.
7. Resistance: No electoral entity (any server participating in the election) or group of
entities, running the election can work in a conspiracy to introduce votes or to prevent
voters from voting.
8. Availability: The system works properly as long as the poll stands and any voter can
have access to it from the beginning to the end of the poll.
9. Resume Ability: The system allows any voter to interrupt the voting process to resume
it or restart it while the poll stands. The existing elections were done in traditional way,
using ballot, ink and tallying the votes later. But the proposed system prevents the
election from being accurate.
3.3. Related Work
4. Madan Mohan Reddy proposed a method for voting purpose. One more advantage of
this paper is, if an alcoholic person enters into polling booth, buzzer will alert
authorized persons or constables who are in election duty. Because of Alcoholic
sensor, we can provide peaceful environment at polling booth. If an unauthorized
person enters into polling booth to cast his vote, buzzer will alert booth level officer.
If already vote casted person enters into booth with his RFID tag for 2nd time
voting, then also buzzer will alert booth level officer.
CHAPTER 4
PROPOSED SYSTEM
The proposed system is a secured e-voting system that uses Unique Identification
Authority of India. (UIDAI) or aadhar database as its backend. The system ensures
authentication of an individual by matching fingerprints and eligibility is checked by
calculating the age of the voter thus making the existing voting cards redundant. The
proposed system contains two databases. One is Central database and another is Local
database of the polling booth. Central database called Central Identities Data Repository
(CIDR) which forms the backbone of the system. It contains all the demographic and
biometric data of every citizen of India. In order to reduce load on the central database
there are local databases that will be located along side the servers which will contain
cached copies of data of the inhabitants that fall under its zone. These zones are decided on
the basis of population density, area and other factors. All the local databases retrieve data
from CIDR of only those people who come under its scope. This data is periodically
updated and is stored in volatile form so that it can be erased if and when necessary such
as during security attacks, natural calamities, maintenance works, etc. The local databases
will retrieve only the data that is pertaining to the voting process and exclude all other
irrelevant information. These databases will be used for generating statistics and results of
the electoral process. These databases make it possible to allow voting from anywhere
provided that the voter is within electoral circuits. The flow chart of the proposed system is
shown in the Fig 4.1.
Identification (UID) number/Aadhar number. The number will be checked in the local
database records first. If it is not found then it will search the central repository. It involves
one-to-many match. If the person’s number is not found in the central database then of
course he/she will be avoid of taking part in the voting process. On the other hand if the
number is present in the central database then the data of that person will be cached to the
local database. This record is extracted from the local database and sent to authenticating
servers for further processing. For verification the person’s fingerprint will be scanned at
the client-side and matched one-to-one at the servers with the data extracted from the local
database. This process puts less stress on the local database and improves data traffic. We
use fingerprints for authentication because processing fingerprints is faster and better than
other biometric data. Moreover aadhar details would be insufficient to establish the true
identity of a person since they can be easily faked but by using fingerprints it is ensured
that such fake entries are blocked right at the very beginning. In very situations, if the
fingerprint identification is not working then the authentication of voter is verified through
his/her iris pattern which is unique for every person.
The first and the foremost thing to ensure proper voting is by accurately authenticating
every voter. It is necessary to identify that every person coming to vote is unique otherwise
it will violate the very principle of voting. Any person would be voting on behalf of others.
Fingerprint matching ensures the authentication that the system requires. However in order
to improve accuracy it is important to keep false reject rate (FRR) and false accept rate
(FAR) as low as possible; practically close to zero. This can be achieved by using best
finger method. Using 2 best fingers can improve the accuracy to 98% (FRR2%) with a
single attempt and above 99 % (FRR – 1%) with up to 3-attempts. To prevent underage
individuals from voting, the system calculates person’s age from the birth date present in
the database records. If the calculated age is above permissible limit the person is allowed
to vote and prevented otherwise. To prevent voters from voting two or multiple times we
implement voting flags in the local databases. This flag is initially set to false. After the
voter has cast the vote, his/her vote flag will be set to true. This will prevent the same
person from voting again. These flags are temporary and can be reset after the election has
completed so that the voter can participate in the next election
Whenever a voter casts a vote in favour of the candidate of choice, the vote count of
that candidate gets incremented in the local database. The votes from all the local
databases are summed up to get the final figure that the candidate has received. Thus this
system provides instantaneous results and prevents unnecessary use of manpower and
wastage of time. Since this is an electronic system and uses digital data it has several
advantages. Statistics can be generated from the obtained data for e.g. we could answer
how many people have voted from a certain region, how many females voted, which age
group voted the most, the highest turnouts, comparisons from previous years, etc. all that
was not possible from traditional voting methods not even from EVMs. It would provide
important insights into the election results and help improve the system even further.
CHAPTER 5
BLOCK DIAGRAM
Working of this biometric voting system for election is a little bit complex for
beginners. First of all, user needs to enroll finger or voters (in this code max limit of the
voter is 25)with the help of push buttons/keys. To do this user needs to press ENROLL
key and then LCD asks for entering location/ID where finger will be a store. So now user
needs to enter ID (location) by using UP/DOWN keys. After selecting location /ID user
needs to put his finger over finger print module. Then LCD will ask to remove the finger
from finger print module. And again ask for placing the finger. Now user needs to put his
finger again over finger print module. Now finger print module takes an image and
converts it into templates and stores it by selected ID in to the finger print module’s
memory. Now voter will be registered into the system. Now if the user wants to remove or
delete any of stored ID then he/she needs to press DEL key, after pressing DEL KEY,
LCD will ask for select location means select ID that to be deleted. Now user needs to
select ID and press OK key (same DEL key).Now LCD will let you know that finger has
been deleted successfully.
Now when user wants to vote then he/she needs to press match key and then buzzer
will beep and LED will also glow and LCD will ask for place over fingerprint module.
Now Arduino no will give you three attempts to put your finger. After placing a finger
over fingerprint module fingerprint module captures finger image find its Ids is present in
the system. If finger ID detected then LCD will show authorized voter. It means the user is
authorized to vote. And then the system moves to next stage for voting. Now Green LED
will glow it means now voter can vote for their candidates by pressing by a reflected key
(from RED bread board in this demonstration). Now if the same voter wants to vote again
then the system will show it ‘Already Voted’. Means same voter can’t vote again and
buzzer will beep for 5 seconds. If any Non-registered user wants to vote then finger print
module will not detect its ID into the system and LCD will show ‘No Fingerprint Found’.
CHAPTER 6
HARDWARE COMPONENTS
This chapter briefly explains about the Hardware Implementation of the project. It
discusses the design and working of the design with the help of block diagram and circuit
diagram and explanation of circuit diagram in detail.
Transformer
Usually, DC voltages are required to operate various electronic equipment and
these voltages are 5V, 9V or 12V. But these voltages cannot be obtained directly. Thus the
a.c input available at the mains supply i.e., 230V is to be brought down to the required
voltage level. This is done by a transformer. Thus, a step down transformer is employed to
decrease the voltage to a required level.
The output from the transformer is fed to the rectifier. It converts A.C. into pulsating D.C.
Rectifier
The rectifier may be a half wave or a full wave rectifier. In this project, a bridge
rectifier is used because of its merits like good stability and full wave rectification.
Filter
Capacitive filter is used in this project. It removes the ripples from the output of
rectifier and smoothens the D.C. Output received from this filter is constant until the mains
voltage and load is maintained constant. However, if either of the two is varied, D.C.
voltage received at this point changes. Therefore a regulator is applied at the output stage.
Voltage regulator
As the name itself implies, it regulates the input applied to it. A voltage regulator is
an electrical regulator designed to automatically maintain a constant voltage level. In this
project, power supply of 5V and 12V are required. In order to obtain these voltage levels,
7805 and 7812 voltage regulators are to be used. The first number 78 represents positive
supply and the numbers 05, 12 represent the required output voltage levels
Bridge type full wave rectifier is used to rectify the ac output of secondary of 230/12V step
down transformer.
Features
Dimension 55*32*21.5mm
Principle of Operation
Fingerprint processing includes two parts: fingerprint enrollment and fingerprint
matching (the matching can be 1:1 or 1: N). When enrolling, user needs to enter the finger
two times. The system will process the two time finger images, generate a template of the
finger based on processing results and store the template. When matching, user enters the
finger through optical sensor and system will generate a template of the finger and
compare it with templates of the finger library. For 1:1 matching, system will compare the
live finger with specific template designated in the Module; for 1:N matching, or
searching, system will search the whole finger library for the matching finger. In both
circumstances, system will return the matching result, success or failure. LCD.
6.3. Arduino Uno:
Arduino is open source physical processing which is base on a microcontroller
board and an incorporated development environment for the board to be programmed.
Arduino gains a few inputs, for example, switches or sensors and control a few multiple
outputs, for example, lights, engine and others. Arduino program can run on Windows,
Macintosh and Linux operating systems (OS) opposite to most microcontrollers’
frameworks which run only on Windows. Arduino programming is easy to learn and apply
to beginners and amateurs. Arduino is an instrument used to build a better version of a
computer which can control, interact and sense more than a normal desktop computer. It's
an open- source physical processing stage focused around a straightforward
microcontroller board, and an environment for composing programs for the board.
Arduino can be utilized to create interactive items, taking inputs from a diverse collection
of switches or sensors, and controlling an assortment of lights, engines, and other physical
outputs.
A liquid crystal display (LCD) is a thin, flat display device made up of any number
of color or monochrome pixels arrayed in front of a light source or reflector. Each pixel
consists of a column of liquid crystal molecules suspended between two transparent
electrodes, and two polarizing filters, the axes of polarity of which are perpendicular to
each other. Without the liquid crystals between them, light passing through one would be
blocked by the other. The liquid crystal twists the polarization of light entering one filter
to allow it to pass through the other.
A program must interact with the outside world using input and output devices that
communicate directly with a human being. One of the most common devices attached to
an controller is an LCD display. Some of the most common LCDs connected to the
controllers are 16X1, 16x2 and 20x2 displays. This means 16 characters per line by 1 line
16 characters per line by 2 lines and 20 characters per line by 2 lines, respectively.
LCD screen
LCD screen consists of two lines with 16 characters each. Each character consists
of 5x7 dot matrix. Contrast on display depends on the power supply voltage and whether
messages are displayed in one or two lines. For that reason, variable voltage 0-Vdd is
applied on pin marked as Vee. Trimmer potentiometer is usually used for that purpose the
connections are as shown in figure 6.4. Some versions of displays have built in backlight
(blue or green diodes). When used during operating, a resistor for current limitation should
be used (like with any LE diode).
A very simple circuit to experiment with AT90S2313, 2x16 LCD display and 3x4
keypad. The clock based on 4 MHz crystal, but you can use anyone crystal between 1-4
MHz The keys with the name "A", "B" ... "F" are typed to the LCD with numbers 10-16.
The circuit board consists of 7 digital I/O lines on a ‘downstream’ 9-way D-type plug.
This route each bit to a particular line of the keypad. Columns 1, 2 and 3 and routed to bits
0, 1, and 2 respectively. Rows 1, 2, 3 and 4 and routed to bits 5, 6, 7 and 8 respectively.
These values were chosen to enable the use of interrupts when connecting the keypad to
Port B. The Matrix keypad is shown in the Fig 6.6
Essex Keypads are weather proof and extremely rugged. They use piezo-electric
technology for sensing key depressions. Since there are no moving parts, the unit can
withstand millions of keystrokes. Output from the unit is 26 Bit Wiegand and interfaces to
Keri Systems' PXL-250W Tiger Controller (Wiegand capable). Red and green LEDs as
well as a beeper provide user feedback to indicate if access is granted or denied. There is
one jumper to set for keypad installation – setting the operating voltage for the keypad (+5
VDC or +12 VDC). For complete instructions on working with an access control system,
consult the PXL- 250 Tiger Controller Technical Reference that is shipped with the PXL-
250.
After uploading the program in Arduino, Aadhar number is entered and fingerprint is
asked to scan. When the fingerprint is registered an id of the person is produced in the
serial port.
CHAPTER 7
The circuit of this Fingerprint Based Voting Machine Project is very simple
contains Arduino for controlling whole the process of the project, push button for
enrolling, deleting, selecting Ids and voting purpose, a buzzer for alert,LEDs for indication
and 16x2 LCD for instruct Voter and showing the result as well. Yellow LED indicates
that fingerprint module is ready to take an image of the finger and Green LED indicates
that system is ready to take a vote or see results.
CHAPTER 8
Fig: 8.1. displays the welcome note for the voter. This welcome note alerts the voter
and the voter is directed to follow the remaining steps in order.
Fig: 8.2.displays the following note “ENTER AADHAR NO” therefore the voter is
requested to give the UID number.
When the UID number is given by voter, then the number is verified in the Local
Database and if it matches the voter is requested to give his/her biometric as shown in
Fig: 8.3.
Now the voter is requested to give the biometric and the given biometric is cross
checked with the database which is stored. If both the fingerprint and the UID number
matches then the age of the voter is verified and if he/she is eligible then the Fig: 8.4. is
displayed
If the eligibility criterion is satisfied then the ballot is opened and the voter is allowed
to cast his/her vote to a single party of his/her own choice as shown in Fig: 8.5.
If the biometric and the UID number does not match with Local Database the Fig: 8.6.is
displayed.
If the UID number entered by the voter is not present in the Local Database then it goes
for Central Database to check as shown in Fig: 8.7
Fig: 8.7. Displays the AADHAR number provided by the central database
Checks whether the UID number is present in the Central Database or not as shown in the
Fig: 8.8.
Fig: 8.8. UID number given by the voter is present in the central database
If the UID number is present in Central Database then it requests the voter to give his/her
fingerprint as shown in Fig: 8.9.
Fig: 8.9. Displays the request for the voter’s fingerprint in central database
Now if the fingerprint and the UID number match with the Central Database then the
ballot box appears as shown in Fig: 8.10
Now the person is allowed to cast his/her vote according to their choice. The casted votes
of the voters are also stored and displayed in the Central Database. The votes casted for a
particular party are also displayed and the count is also updated automatically.
CHAPTER 9
9.1. Advantages
Cost effective
Low power consumption
It is economical
Less manpower required
Time conscious, as less time required for voting & counting
Avoids invalid voting
Saves transportation cost due to its compact size
Convenient on the part of voter
faster tabulation of results
improved accessibility
greater accuracy
9.2. Applications
This project can be used as an voting machine that can prevent rigging during the
elections in the polling booths.
Fast track voting which could be used in small scale elections, like resident
welfare association, “panchayat” level election and other society level elections.
It could also be used to conduct opinion polls during annual share holders
meeting.
It could also be used to conduct general assembly elections where number of
candidates are less than or equal to eight in the current situation
CHAPTER 10
FUTURE SCOPE
CHAPTER 11
CONCLUSION
The implementation of Finger print based voting machine using Arduino is done
successfully. The communication is properly done without any interference between
different modules in the design. Design is done to meet all the specifications and
requirements. Software tools like Keil Vision Simulator, Flash Magic to dump the source
code into the Arduino, Orcad Lite for the schematic diagram have been used to develop the
software code before realizing the hardware. The performance of the system is more
efficient. Reading the Data and verifying the information with the already stored data and
perform the specified task is the main job of the microcontroller. The mechanism is
controlled by the Arduino. Circuit is implemented in Orcad and implemented on the
arduino board. The performance has been verified both in software simulator and hardware
design. The total circuit is completely verified functionally and is following the application
software. It can be concluded that the design implemented in the present work provide
portability, flexibility and the data transmission is also done with low power consumption.
The proposed voting system had many advantages over the traditional method of voting.
This system affords additional security by allowing voter to vote only once by imparting
unique identification along with biometric information. This system avoids fraudulent
voting and illegal practices during the elections which is the key issue in the traditional
voting system. This system provides transparency in the counting process Information
about the casted vote can be sent to the voter through the messaging system.
REFERENCES
[1] Ch.Jaya Lakshmi, S.Kalpana (2018) . A Biometric- Secure e-Voting System for
Election Process. Proceeding of the 2nd International conference on Inventive systems and
control (ICISC 2018).
[2] Madam Mohan Reddy, D. Sridhar, (April 2015), RFID Based Biometric Voting
Machine Linked to Aadhaar for Safe and Secure Voting.
[3] Daniel petcu, Dan Alexandru stoichescu, The International Symposium on Advanced
topics in electrical engineering; May 7-9, 2015. “A Hybrid mobile Biometric- based E-
voting system.”
[7] Steven J. Anderson, A. C. M. Fong, Senior Member, IEEE, Jie Tang, Member, IEEE,”
Robust Tri-Modal Automatic Speech Recognition for Consumer Applications.” IEEE
Transactions on Consumer Electronics, Vol. 59, No. 2, May 2013.
[10] Khasawneh .M, Malkawi. M , & Al-Jarrah .O (2008). A Biometric- Secure e-Voting
System for Election Process. Proceeding of the 5th International Symposium on
Mechatronics and its Applications (ISMA08). Amman Jordan.
[11] N.Ansari, P. Sakarindr, E. Haghani, C. Zhang, A.K. Jain, and Y.Q.Shi, “Evaluating
electronic voting systems equipped with voter verified paper records” , IEEE Security and
Privacy, vol. 6, no.3, May 2008
[14] Urmila Shrawankar Dr. Vilas Thakare,” techniques for feature extraction in speech
recognition system” Research Student, (Computer Science & Egg.), Professor & Head,
PG Dept. of Computer Science, SGB Amravati University, Amravati.
urmilas@rediffmail.com
[15] Firas I. Hazzaa, Seifedine Kadry, Oussama Kassem Zein,“Web-Based Voting System
Using Fingerprint Design and Implementation”,International Journal of Computer
Applications In Engineering Sciences ISSN: 2231-4946.