You are on page 1of 29

Secured And Transparent Voting System Using Biometrics

CHAPTER 1

INTRODUCTION

As Abraham Lincoln famously quoted democracy as “Democracy is for the


people, by the people, of the people”. Having an elected representative is the utmost
feature of the democracy. Elections play a crucial part in choosing the capable leader
which in-turn can impact the entire nation. As the largest democracy in the world, India
has become a role model to other countries. Election Commission of India is the
autonomous and statutory body which is responsible to conduct of free and fair elections.
India is the largest democratic country in the world. Elections are conducted at various
levels to choose their representatives by the people of the nation. The elections should be
conducted in a right manner to ensure that the term “Democracy” should not lose its
value.
This project examines policy regarding the electronic approaches and
developments towards electronic data storage and transmission. Finger print devices for
Voting machines and other existing identity documents are discussed and implemented
in this project. The user has to show his voter ID card whenever he goes to the polling
booth to poll his vote. This is a time consuming process as the person has to check the
voter ID card with the list he has, confirm it as an authorized card and then allow the
person to poll his vote. Thus, to avoid this kind of problems, we have designed a finger
print based voting machine where the person no needs to carry his ID which contains his
entire details. The person at the polling booth has to show his Finger. This Finger print
reader reads the details from the tag. This data is passed to the controlling unit for the
verification. The controller reads the data from the reader and compares this data with
the already existing data. If the data matches with the already stored information, the
person is allowed to poll his vote. If not, a message is displayed on LCD and the person
is not allowed to poll his vote. The polling mechanism carries out manually using the
switches. LCD is used to display the related messages.
The project demands the user to submit his Finger print at the polling booth. The
project uses the Finger print technology and Embedded Systems to design this
application. The main objective of this project is to design a system that asks the user to
show his Finger print as an identity proof.

Dept.of ECE Page 1


Secured And Transparent Voting System Using Biometrics

The system reads the data from the Finger print and verifies this data with the
already stored data in its database. If the details present in the data base it matches with
the stored data, the system allows the person to enter into and poll his vote. If the details
of the Finger do not match with the stored data, the system immediately activates the
display and the security authorities can come and take the further action. This project is a
device that collects data from the tag and codes the data into a format that can be
understood by the controlling section. This system also collects information from the
master device and implements commands that are directed by the master. The objective
of the project is to develop a microcontroller based security and alert system. It consists
of a Finger print reader, microcontroller, the interfacing unit to allow the communication
between the microcontroller and Finger print module, and the LCD
The software application and the hardware implementation help the
microcontroller in the aurdino read the data from the Finger print verify the data with the
already stored data and take the next action. The system is totally designed using Finger
print module and embedded systems technology. The Controlling unit has an application
program to allow the aurdino interface with the Finger print module, the reader reads the
data from the tag, passes the data to the aurdino and the controller verifies this data with
the already existing data in the controller’s memory and then implement the commands
directed by the controller section. The performance of the design is maintained by
controlling unit.

Dept.of ECE Page 2


Secured And Transparent Voting System Using Biometrics

CHAPTER 2

LITERATURE SURVEY

[13]. Hanady Hussien, Hussien Aboelnaga, IEEE 2013. “Design of secured E-voting
systems.” is able to desire with the widespread use of computers and embedded systems.
Security is the essential problem should be considered in such systems. This paper
proposes a new e-voting system that fulfils the security requirements of e-voting. It is
based on homomorphic property and blind signature plan. The suggest system is executed
on an embedded system which serves as a voting machine. The system employees RFID to
store all conditions that comply with the rule of the government to check voter eligibility.

[3]. Daniel petcu, Dan Alexandru stoichescu, The International Symposium on Advanced
topics in electrical engineering; May 7-9, 2015. “A Hybrid mobile Biometric- based E-
voting system.” Information technology changes and gives shape to networked society all
over the world today & its solutions are becoming main drivers in almost all field of
human life activity. Although the acceptance rate of e- government applications is
increasing e-voting is hardly accepted as main tool in its field because it shortages in
offering good solutions to common problems like fraud, bribery, anonymous character of
the vote and absence of good independent monitoring.

[14]. Urmila Shrawankar Dr. Vilas Thakare, “techniques for feature extraction in speech
recognition system” The time domain waveform of a speech signal carries all of the
auditory information. From the phonological point of view, very little can be said on the
basis of the waveform itself. However, past research in mathematics, acoustics, and speech
technology have provided many methods for converting data that can be considered as
information if interpreted correctly. In order to find some statistically relevant information
from incoming data, it is important to have mechanisms for reducing the information of
each segment in the audio signal into a relatively small number of parameters, or features.
These features should describe each segment in such a characteristic way that other similar
segments can be grouped together by comparing their features. There are enormous
interesting and exceptional ways to describe the speech signal in terms of parameters.
Though, they all have their strengths and weaknesses, we have presented some of the most
used methods with their importance.

Dept.of ECE Page 3


Secured And Transparent Voting System Using Biometrics

[7]. Steven J.Anderson, A.C.M Fong, senior member, IEEE, Jie Tang, member, IEEE,
“Robust Tri-Model Automatic Speech Recognition for consumer Applications.” IEEE
Transactions on Consumer Electronics, Vol. 59, No. 2, May 2013. Commercial automatic
speech recognition (ASR) started to appear in the late 1980‟s and can proposal a more
natural means of receiving user inputs than methods such as typing on keyboards or touch
screens. This is a especially eventful consideration for small consumer devices such as
smart phones. In many practical circumstances, however, presentation of ASR can be
significantly. Compromised due to ambient noise and variable lighting circumstances.
Prior research has shown that adding visual signals to standard ASR can mitigate the
effects of ambient noise. ASR using adaptations of established techniques such as MT,
DCT and MFCC.

[4]. M.Venkata Rao, Venugopal Rao Ravula, Pavani Pala. “Development Of Antirigging
Voting System Using Biometrics Based On Adharcard Numbering”. Now a day‟s voting
process is exercised by using EVM (Electronic voting machine). In this paper we present
and use implementation is to execute the progress of anti rigging voting system using
finger print .The purpose of the project and implementation is to provide a safety and good
environment to the customers is to electing the candidates by using the intelligent
electronic voting machine by providing a rival naming to every user using the FINGER
PRINT identification technology. Here in this project and satisfy we are going supply the
at most security since it is taking the FINGER PRINTS as the authentication for EVM.
Brilliant EVM is an Embedded based project and implementation. It involves
microcontroller and interfaces. Intelligent EVM has been particularly designed to collect,
record, store, count and display cent percent accurately.

[15]. Firas I. Hazzaa, Seifedine Kadr, This paper deals with the design and development of
a “Web-Based Voting System Using Fingerprint Design and Implementation”, in order to
provide a high performance with high security to the voting system also we use web
technology to make the voting system more practical. The new design is proposed an
election for a university for selecting the president of the university. The proposed EVS
allows the voters to scan their fingerprint, which is then matched with an already saved
image within a database. Developed Web-based Voting System using Fingerprint
Recognition.

Dept.of ECE Page 4


Secured And Transparent Voting System Using Biometrics

CHAPTER 3

EXISTING VOTING SYSTEM

3.1 .Voting Process


To permit the exercise of this right, the majority voting systems around the world
include the following steps: citizen identification and authentication, voting and recording
of votes cast, vote counting, publication of election results. Voter identification is needed
during two phases of the electoral process: first for voter registration so as to determine the
right to vote and subsequently, at voting time, to allow a citizen to exercise their right to
vote by verifying if the person satisfies all the necessities required to vote (authentication).
The election procedure dates back to ballot papers. Ballot papers had been used for almost
5-6 decades. In this paper- based election voters cast their votes by simply depositing their
ballots in sealed boxes distributed across the electoral centres around a given country.
When the election period ends, all these boxes are opened and votes are counted manually
in presence of the certified officials.

In this process there can be error in counting of votes or in some cases voters find
ways to vote more than once. Sometimes votes are even manipulated to distort the results
of an election in favour of certain candidates .With the advent of technology, ballot papers
have been replaced by EVM (Electronic Voting Machine) to overcome drawbacks
associated with ballot papers like stealing of ballot boxes, tearing of ballot papers, massive
rigging, and physical damage to the ballot papers by pouring fluids etc. Electronic Voting
Machines ("EVM"), Idea mooted by the Chief Election Commissioner in 1977. The EVMs
were devised and designed by Election Commission of India in collaboration with Bharat
Electronics Limited (BEL), Bangalore and Electronics Corporation of India Limited
(ECIL), Hyderabad. The EVMs are now manufactured by the above two undertakings. An
EVM consists of two units.

i. Control Unit
ii. Balloting Unit
The two units are joined by a five-meter cable. The Control Unit is with the Presiding
Officer or a Polling Officer and the Balloting Unit is placed inside the voting
compartment. The interfacing of control unit with Balloting unit is shown in the Fig 3.1

Dept.of ECE Page 5


Secured And Transparent Voting System Using Biometrics

Fig: 3.1. Interfacing of Control unit with Ballot Unit

3.2. Issues of Existing Voting System

There are many types of problems with EVM which is currently in use they are:

1. Accuracy: It is not possible for a vote to be altered eliminated the invalid vote cannot be
counted from the finally tally.
2. Democracy: It permits only eligible voters to vote and, it ensures that eligible voters
vote only once.
3. Security Problems: One can change the program installed in the EVM and tamper the
results after the polling. By replacing a small part of the machine with a look-alike
component that can be silently instructed to steal a percentage of the votes in favor of a
chosen candidate. These instructions can be sent wirelessly from a mobile phone.
4. Illegal Voting (Rigging): The very commonly known problem rigging which is faced in
every electoral procedure. One candidate cast the votes of all the members or few
amounts of members in the electoral list illegally. This results in the loss of votes for the
other candidates participating and also increases the number votes to the candidate who
performs this action. This can be done externally at the time of voting.
5. Privacy: Neither authority nor anyone else can link any ballot to the voter
6. Verifiability: Independently verification of that all votes have been counted correctly.
7. Resistance: No electoral entity (any server participating in the election) or group of
entities, running the election can work in a conspiracy to introduce votes or to prevent
voters from voting.
8. Availability: The system works properly as long as the poll stands and any voter can
have access to it from the beginning to the end of the poll.

Dept.of ECE Page 6


Secured And Transparent Voting System Using Biometrics

9. Resume Ability: The system allows any voter to interrupt the voting process to resume
it or restart it while the poll stands. The existing elections were done in traditional way,
using ballot, ink and tallying the votes later. But the proposed system prevents the
election from being accurate.
3.3. Related Work

1. Direct Recording Electronic(DRE) voting system by S.Hashimi, S. Komatineni, and


D. MacLean, it records votes by means of an electronic display provided with
mechanical or electro-optical components that can be activated by the voter, that
processes voter selections by means of a computer program, and that records that
processed voting data in memory components.

2. Shafii Muhammad Abdulhamid developed an electronic voting system, which will


solve manipulation of results to its barest minimum, this problem is mostly
associated with the manual system of voting. The implementation of electronic
voting system in Nigeria will boost the integrity of INEC and the result they
produce. The programs used to develop this system are PHP, MySQL, Java Query,
CSS and HTML.

3. Sahibzada Muhammad Ali proposed a “Micro- Controller Based Smart Electronic


Voting Machine System” which uses mechanical or electro-optical component like
touch screen to provide ballot display. This machine was programmed to record
voting data and then tabulates the voting data.

4. Madan Mohan Reddy proposed a method for voting purpose. One more advantage of
this paper is, if an alcoholic person enters into polling booth, buzzer will alert
authorized persons or constables who are in election duty. Because of Alcoholic
sensor, we can provide peaceful environment at polling booth. If an unauthorized
person enters into polling booth to cast his vote, buzzer will alert booth level officer.
If already vote casted person enters into booth with his RFID tag for 2nd time
voting, then also buzzer will alert booth level officer.

Dept.of ECE Page 7


Secured And Transparent Voting System Using Biometrics

CHAPTER 4

PROPOSED SYSTEM

The proposed system is a secured e-voting system that uses Unique Identification
Authority of India. (UIDAI) or aadhar database as its backend. The system ensures
authentication of an individual by matching fingerprints and eligibility is checked by
calculating the age of the voter thus making the existing voting cards redundant. The
proposed system contains two databases. One is Central database and another is Local
database of the polling booth. Central database called Central Identities Data Repository
(CIDR) which forms the backbone of the system. It contains all the demographic and
biometric data of every citizen of India. In order to reduce load on the central database
there are local databases that will be located along side the servers which will contain
cached copies of data of the inhabitants that fall under its zone. These zones are decided on
the basis of population density, area and other factors. All the local databases retrieve data
from CIDR of only those people who come under its scope. This data is periodically
updated and is stored in volatile form so that it can be erased if and when necessary such
as during security attacks, natural calamities, maintenance works, etc. The local databases
will retrieve only the data that is pertaining to the voting process and exclude all other
irrelevant information. These databases will be used for generating statistics and results of
the electoral process. These databases make it possible to allow voting from anywhere
provided that the voter is within electoral circuits. The flow chart of the proposed system is
shown in the Fig 4.1.

Dept.of ECE Page 8


Secured And Transparent Voting System Using Biometrics

Fig.4.1. Flowchart of Proposed voting system

4.1. Authentication and Verification of the Voter

Identification (UID) number/Aadhar number. The number will be checked in the local
database records first. If it is not found then it will search the central repository. It involves
one-to-many match. If the person’s number is not found in the central database then of
course he/she will be avoid of taking part in the voting process. On the other hand if the
number is present in the central database then the data of that person will be cached to the
local database. This record is extracted from the local database and sent to authenticating
servers for further processing. For verification the person’s fingerprint will be scanned at
the client-side and matched one-to-one at the servers with the data extracted from the local
database. This process puts less stress on the local database and improves data traffic. We
use fingerprints for authentication because processing fingerprints is faster and better than
other biometric data. Moreover aadhar details would be insufficient to establish the true
identity of a person since they can be easily faked but by using fingerprints it is ensured
that such fake entries are blocked right at the very beginning. In very situations, if the
fingerprint identification is not working then the authentication of voter is verified through
his/her iris pattern which is unique for every person.

Dept.of ECE Page 9


Secured And Transparent Voting System Using Biometrics

4.2. Preventing Fraudulent Voting

The first and the foremost thing to ensure proper voting is by accurately authenticating
every voter. It is necessary to identify that every person coming to vote is unique otherwise
it will violate the very principle of voting. Any person would be voting on behalf of others.
Fingerprint matching ensures the authentication that the system requires. However in order
to improve accuracy it is important to keep false reject rate (FRR) and false accept rate
(FAR) as low as possible; practically close to zero. This can be achieved by using best
finger method. Using 2 best fingers can improve the accuracy to 98% (FRR2%) with a
single attempt and above 99 % (FRR – 1%) with up to 3-attempts. To prevent underage
individuals from voting, the system calculates person’s age from the birth date present in
the database records. If the calculated age is above permissible limit the person is allowed
to vote and prevented otherwise. To prevent voters from voting two or multiple times we
implement voting flags in the local databases. This flag is initially set to false. After the
voter has cast the vote, his/her vote flag will be set to true. This will prevent the same
person from voting again. These flags are temporary and can be reset after the election has
completed so that the voter can participate in the next election

4.3. Generating Reports

Whenever a voter casts a vote in favour of the candidate of choice, the vote count of
that candidate gets incremented in the local database. The votes from all the local
databases are summed up to get the final figure that the candidate has received. Thus this
system provides instantaneous results and prevents unnecessary use of manpower and
wastage of time. Since this is an electronic system and uses digital data it has several
advantages. Statistics can be generated from the obtained data for e.g. we could answer
how many people have voted from a certain region, how many females voted, which age
group voted the most, the highest turnouts, comparisons from previous years, etc. all that
was not possible from traditional voting methods not even from EVMs. It would provide
important insights into the election results and help improve the system even further.

Dept.of ECE Page 10


Secured And Transparent Voting System Using Biometrics

CHAPTER 5

BLOCK DIAGRAM

Fig: 5.1. Block diagram of biometric voting system.

Working of this biometric voting system for election is a little bit complex for
beginners. First of all, user needs to enroll finger or voters (in this code max limit of the
voter is 25)with the help of push buttons/keys. To do this user needs to press ENROLL
key and then LCD asks for entering location/ID where finger will be a store. So now user
needs to enter ID (location) by using UP/DOWN keys. After selecting location /ID user
needs to put his finger over finger print module. Then LCD will ask to remove the finger
from finger print module. And again ask for placing the finger. Now user needs to put his
finger again over finger print module. Now finger print module takes an image and
converts it into templates and stores it by selected ID in to the finger print module’s
memory. Now voter will be registered into the system. Now if the user wants to remove or
delete any of stored ID then he/she needs to press DEL key, after pressing DEL KEY,
LCD will ask for select location means select ID that to be deleted. Now user needs to
select ID and press OK key (same DEL key).Now LCD will let you know that finger has
been deleted successfully.

Dept.of ECE Page 11


Secured And Transparent Voting System Using Biometrics

5.1. Voting Process

Now when user wants to vote then he/she needs to press match key and then buzzer
will beep and LED will also glow and LCD will ask for place over fingerprint module.
Now Arduino no will give you three attempts to put your finger. After placing a finger
over fingerprint module fingerprint module captures finger image find its Ids is present in
the system. If finger ID detected then LCD will show authorized voter. It means the user is
authorized to vote. And then the system moves to next stage for voting. Now Green LED
will glow it means now voter can vote for their candidates by pressing by a reflected key
(from RED bread board in this demonstration). Now if the same voter wants to vote again
then the system will show it ‘Already Voted’. Means same voter can’t vote again and
buzzer will beep for 5 seconds. If any Non-registered user wants to vote then finger print
module will not detect its ID into the system and LCD will show ‘No Fingerprint Found’.

Dept.of ECE Page 12


Secured And Transparent Voting System Using Biometrics

CHAPTER 6

HARDWARE COMPONENTS

This chapter briefly explains about the Hardware Implementation of the project. It
discusses the design and working of the design with the help of block diagram and circuit
diagram and explanation of circuit diagram in detail.

6.1. Power Supply


The input to the circuit is applied from the regulated power supply. The a.c. input
i.e., 230V from the mains supply is step down by the transformer to 12V and is fed to a
rectifier. The output obtained from the rectifier is a pulsating d.c voltage. So in order to get
a pure d.c voltage, the output voltage from the rectifier is fed to a filter to remove any a.c
components present even after rectification. Now, this voltage is given to a voltage
regulator to obtain a pure constant dc voltage. The block diagram of regulated power
supply is shown in the figure 6.1

Fig: 6.1. Components of power supply

Transformer
Usually, DC voltages are required to operate various electronic equipment and
these voltages are 5V, 9V or 12V. But these voltages cannot be obtained directly. Thus the
a.c input available at the mains supply i.e., 230V is to be brought down to the required

Dept.of ECE Page 13


Secured And Transparent Voting System Using Biometrics

voltage level. This is done by a transformer. Thus, a step down transformer is employed to
decrease the voltage to a required level.
The output from the transformer is fed to the rectifier. It converts A.C. into pulsating D.C.
Rectifier
The rectifier may be a half wave or a full wave rectifier. In this project, a bridge
rectifier is used because of its merits like good stability and full wave rectification.
Filter
Capacitive filter is used in this project. It removes the ripples from the output of
rectifier and smoothens the D.C. Output received from this filter is constant until the mains
voltage and load is maintained constant. However, if either of the two is varied, D.C.
voltage received at this point changes. Therefore a regulator is applied at the output stage.
Voltage regulator
As the name itself implies, it regulates the input applied to it. A voltage regulator is
an electrical regulator designed to automatically maintain a constant voltage level. In this
project, power supply of 5V and 12V are required. In order to obtain these voltage levels,
7805 and 7812 voltage regulators are to be used. The first number 78 represents positive
supply and the numbers 05, 12 represent the required output voltage levels

6.2. Biometric Module:


Firstly discussing about Biometrics concentration comes on Fingerprint scanner.
For this the R305 has high voltage module as a scanner. This module has in-built ROM,
DSP and RAM. This can store up to 100 users fingerprint. This module can operate in 2
modes they are Master mode and User mode. The Master mode is used to register the
fingerprints which will be stored in the ROM present on the scanner with a unique id. The
R305 fingerprint sensor module is shown in the Fig 3.When the module is interfaced to the
arduino, user mode is used. This mode verifies the scanned images with the stored images.
When coming to our application the images of the students will be stored in the module
with a unique id.
This scanner is interfaced to arduino through the cable enabling serial
communication. By using this controller we will be controlling the scanning process. After
the scanning has been completed the result is stored in the microcontroller. By simply
pressing a switch we can get the list of absentees for that day. This uses regulated 5V,
500mA power supply 7805 three terminal voltage regulator is used for voltage regulation.

Dept.of ECE Page 14


Secured And Transparent Voting System Using Biometrics

Bridge type full wave rectifier is used to rectify the ac output of secondary of 230/12V step
down transformer.

Fig: 6.2. R305 Fingerprint sensor

Features

 Fingerprint reader can conduct secondary development; can be embedded into a


variety of end products.
 Optical fingerprint sensors for reliability.
 Multiple module to select from as per your application needs.
 Full development support and reference designs.
 Quick development and product launches.
 Integrated image collecting and algorithm chip together, ALL-in-One.
 Low power consumption, low cost, small size, excellent performance.
 Good image processing capabilities can successfully capture image up to resolution
500 dpi.

Dept.of ECE Page 15


Secured And Transparent Voting System Using Biometrics

Table: 6.1. Specifications of R305 fingerprint module

Fingerprint sensor type Optical

Image Capture Surface 15-18(mm)

Static indicators 15KVBacklight: bright red

Interface USB1.1/UART(TTL logical


level)

Dimension 55*32*21.5mm

Template size 512 bytes

Verification Speed 0.3 sec

Scanning Speed 0.5 sec

Character file size 256 bytes

Principle of Operation
Fingerprint processing includes two parts: fingerprint enrollment and fingerprint
matching (the matching can be 1:1 or 1: N). When enrolling, user needs to enter the finger
two times. The system will process the two time finger images, generate a template of the
finger based on processing results and store the template. When matching, user enters the
finger through optical sensor and system will generate a template of the finger and
compare it with templates of the finger library. For 1:1 matching, system will compare the
live finger with specific template designated in the Module; for 1:N matching, or
searching, system will search the whole finger library for the matching finger. In both
circumstances, system will return the matching result, success or failure. LCD.
6.3. Arduino Uno:
Arduino is open source physical processing which is base on a microcontroller
board and an incorporated development environment for the board to be programmed.
Arduino gains a few inputs, for example, switches or sensors and control a few multiple
outputs, for example, lights, engine and others. Arduino program can run on Windows,
Macintosh and Linux operating systems (OS) opposite to most microcontrollers’
frameworks which run only on Windows. Arduino programming is easy to learn and apply
to beginners and amateurs. Arduino is an instrument used to build a better version of a
computer which can control, interact and sense more than a normal desktop computer. It's
an open- source physical processing stage focused around a straightforward
microcontroller board, and an environment for composing programs for the board.

Dept.of ECE Page 16


Secured And Transparent Voting System Using Biometrics

Arduino can be utilized to create interactive items, taking inputs from a diverse collection
of switches or sensors, and controlling an assortment of lights, engines, and other physical
outputs.

Fig: 6.3. Arduino Uno

6.4. Liquid Crystal Display (LCD):

A liquid crystal display (LCD) is a thin, flat display device made up of any number
of color or monochrome pixels arrayed in front of a light source or reflector. Each pixel
consists of a column of liquid crystal molecules suspended between two transparent
electrodes, and two polarizing filters, the axes of polarity of which are perpendicular to
each other. Without the liquid crystals between them, light passing through one would be
blocked by the other. The liquid crystal twists the polarization of light entering one filter
to allow it to pass through the other.

A program must interact with the outside world using input and output devices that
communicate directly with a human being. One of the most common devices attached to
an controller is an LCD display. Some of the most common LCDs connected to the
controllers are 16X1, 16x2 and 20x2 displays. This means 16 characters per line by 1 line
16 characters per line by 2 lines and 20 characters per line by 2 lines, respectively.

Fig: 6.4. LCD display

Dept.of ECE Page 17


Secured And Transparent Voting System Using Biometrics

LCD screen
LCD screen consists of two lines with 16 characters each. Each character consists
of 5x7 dot matrix. Contrast on display depends on the power supply voltage and whether
messages are displayed in one or two lines. For that reason, variable voltage 0-Vdd is
applied on pin marked as Vee. Trimmer potentiometer is usually used for that purpose the
connections are as shown in figure 6.4. Some versions of displays have built in backlight
(blue or green diodes). When used during operating, a resistor for current limitation should
be used (like with any LE diode).

Fig: 6.5. Power supply connection to LCD


6.5. Matrix Keypad

A very simple circuit to experiment with AT90S2313, 2x16 LCD display and 3x4
keypad. The clock based on 4 MHz crystal, but you can use anyone crystal between 1-4
MHz The keys with the name "A", "B" ... "F" are typed to the LCD with numbers 10-16.
The circuit board consists of 7 digital I/O lines on a ‘downstream’ 9-way D-type plug.
This route each bit to a particular line of the keypad. Columns 1, 2 and 3 and routed to bits
0, 1, and 2 respectively. Rows 1, 2, 3 and 4 and routed to bits 5, 6, 7 and 8 respectively.
These values were chosen to enable the use of interrupts when connecting the keypad to
Port B. The Matrix keypad is shown in the Fig 6.6

Dept.of ECE Page 18


Secured And Transparent Voting System Using Biometrics

Fig: 6.6. Matrix Keypad

Features and Function

Essex Keypads are weather proof and extremely rugged. They use piezo-electric
technology for sensing key depressions. Since there are no moving parts, the unit can
withstand millions of keystrokes. Output from the unit is 26 Bit Wiegand and interfaces to
Keri Systems' PXL-250W Tiger Controller (Wiegand capable). Red and green LEDs as
well as a beeper provide user feedback to indicate if access is granted or denied. There is
one jumper to set for keypad installation – setting the operating voltage for the keypad (+5
VDC or +12 VDC). For complete instructions on working with an access control system,
consult the PXL- 250 Tiger Controller Technical Reference that is shipped with the PXL-
250.

Table 6.2: Specifications of Keypad

Operating 100% Relative Humidity


Environment
Operating -40°C to +70°C (-40°F to
Temperature +160°F)
Current draw 20 A at 5 VDC or 12
VDC

After uploading the program in Arduino, Aadhar number is entered and fingerprint is
asked to scan. When the fingerprint is registered an id of the person is produced in the
serial port.

Dept.of ECE Page 19


Secured And Transparent Voting System Using Biometrics

CHAPTER 7

CIRCUIT DIAGRAM EXPLANATION

The circuit of this Fingerprint Based Voting Machine Project is very simple
contains Arduino for controlling whole the process of the project, push button for
enrolling, deleting, selecting Ids and voting purpose, a buzzer for alert,LEDs for indication
and 16x2 LCD for instruct Voter and showing the result as well. Yellow LED indicates
that fingerprint module is ready to take an image of the finger and Green LED indicates
that system is ready to take a vote or see results.

Fig:7.1. Circuit Diagram Of Biometric Voting System.

The push button is directly connected to pin A0(ENROL),A1(DEL),A2(UP),A3(DOWN)


and A4(Match),D5(Can1), D4(Can2), D3(Can3), D2(Reault) of Arduino with respect to
ground. Yellow LED is connected at Digital pin D7 of Arduino with respect to ground
through a 1k resistor and Green LED is connected to D6 of Arduino with the same method.
Fingerprint module’s RX and TX directly connected at serial pin TX and RX of Arduino.
5V supply is used for powering finger print module taken from Arduino board.A buzzer is
also connected A5.A 16x2 LCD is configured in 4-bit mode and its RS,EN,D4.D5,D6,and
D7 are directly connected at digital pin D13, D12, D11,D10,D9, and D8 of Arduino.

Dept.of ECE Page 20


Secured And Transparent Voting System Using Biometrics

CHAPTER 8

RESULTS AND DISCUSSIONS

8.1. Voter exist in Local Database

Fig: 8.1. displays the welcome note for the voter. This welcome note alerts the voter
and the voter is directed to follow the remaining steps in order.

Fig: 8.1. Displays the Welcome note

Fig: 8.2.displays the following note “ENTER AADHAR NO” therefore the voter is
requested to give the UID number.

Fig: 8.2. Request for AADHAR number in local database

When the UID number is given by voter, then the number is verified in the Local
Database and if it matches the voter is requested to give his/her biometric as shown in
Fig: 8.3.

Dept.of ECE Page 21


Secured And Transparent Voting System Using Biometrics

Fig: 8.3. Displays the AADHAR number of the voter

Now the voter is requested to give the biometric and the given biometric is cross
checked with the database which is stored. If both the fingerprint and the UID number
matches then the age of the voter is verified and if he/she is eligible then the Fig: 8.4. is
displayed

Fig: 8.4. Displays the eligibility criteria of the voter

If the eligibility criterion is satisfied then the ballot is opened and the voter is allowed
to cast his/her vote to a single party of his/her own choice as shown in Fig: 8.5.

Fig: 8.5. Ballot box is displayed in local database

Dept.of ECE Page 22


Secured And Transparent Voting System Using Biometrics

If the biometric and the UID number does not match with Local Database the Fig: 8.6.is
displayed.

Fig: 8.6.Displays the mismatch status of biometric info.

8.2. Voter Exist In Central Database

If the UID number entered by the voter is not present in the Local Database then it goes
for Central Database to check as shown in Fig: 8.7

Fig: 8.7. Displays the AADHAR number provided by the central database

Checks whether the UID number is present in the Central Database or not as shown in the
Fig: 8.8.

Fig: 8.8. UID number given by the voter is present in the central database

Dept.of ECE Page 23


Secured And Transparent Voting System Using Biometrics

If the UID number is present in Central Database then it requests the voter to give his/her
fingerprint as shown in Fig: 8.9.

Fig: 8.9. Displays the request for the voter’s fingerprint in central database

Now if the fingerprint and the UID number match with the Central Database then the
ballot box appears as shown in Fig: 8.10

Fig: 8.10. Displays the Ballot Box in central database

Now the person is allowed to cast his/her vote according to their choice. The casted votes
of the voters are also stored and displayed in the Central Database. The votes casted for a
particular party are also displayed and the count is also updated automatically.

Dept.of ECE Page 24


Secured And Transparent Voting System Using Biometrics

CHAPTER 9

ADVANTAGES AND APPLICATIONS

9.1. Advantages

 Cost effective
 Low power consumption
 It is economical
 Less manpower required
 Time conscious, as less time required for voting & counting
 Avoids invalid voting
 Saves transportation cost due to its compact size
 Convenient on the part of voter
 faster tabulation of results
 improved accessibility
 greater accuracy

9.2. Applications
This project can be used as an voting machine that can prevent rigging during the
elections in the polling booths.
 Fast track voting which could be used in small scale elections, like resident
welfare association, “panchayat” level election and other society level elections.
 It could also be used to conduct opinion polls during annual share holders
meeting.
 It could also be used to conduct general assembly elections where number of
candidates are less than or equal to eight in the current situation

Dept.of ECE Page 25


Secured And Transparent Voting System Using Biometrics

CHAPTER 10
FUTURE SCOPE

Number of candidates could be increased.


 It could be interfaced with printer to get the hard copy of the result almost instantly
from the machine itself.
 It could also be interfaced with the personal computer and result could be stored in the
central server and its backup could be taken on the other backend servers.
 Again, once the result is on the server it could be relayed on the network to various
offices of the election conducting authority. Thus our project could make the result
available any corner of the world in a matter of seconds

Dept.of ECE Page 26


Secured And Transparent Voting System Using Biometrics

CHAPTER 11

CONCLUSION

The implementation of Finger print based voting machine using Arduino is done
successfully. The communication is properly done without any interference between
different modules in the design. Design is done to meet all the specifications and
requirements. Software tools like Keil Vision Simulator, Flash Magic to dump the source
code into the Arduino, Orcad Lite for the schematic diagram have been used to develop the
software code before realizing the hardware. The performance of the system is more
efficient. Reading the Data and verifying the information with the already stored data and
perform the specified task is the main job of the microcontroller. The mechanism is
controlled by the Arduino. Circuit is implemented in Orcad and implemented on the
arduino board. The performance has been verified both in software simulator and hardware
design. The total circuit is completely verified functionally and is following the application
software. It can be concluded that the design implemented in the present work provide
portability, flexibility and the data transmission is also done with low power consumption.
The proposed voting system had many advantages over the traditional method of voting.
This system affords additional security by allowing voter to vote only once by imparting
unique identification along with biometric information. This system avoids fraudulent
voting and illegal practices during the elections which is the key issue in the traditional
voting system. This system provides transparency in the counting process Information
about the casted vote can be sent to the voter through the messaging system.

Dept.of ECE Page 27


Secured And Transparent Voting System Using Biometrics

REFERENCES

[1] Ch.Jaya Lakshmi, S.Kalpana (2018) . A Biometric- Secure e-Voting System for
Election Process. Proceeding of the 2nd International conference on Inventive systems and
control (ICISC 2018).

[2] Madam Mohan Reddy, D. Sridhar, (April 2015), RFID Based Biometric Voting
Machine Linked to Aadhaar for Safe and Secure Voting.

[3] Daniel petcu, Dan Alexandru stoichescu, The International Symposium on Advanced
topics in electrical engineering; May 7-9, 2015. “A Hybrid mobile Biometric- based E-
voting system.”

[4] M.Venkata Rao, Venugopal Rao Ravula, Pavani Pala.”Development of Antirigging


Voting System Using Biometrics Based on Adharcard Numbering”.Amrita sai Institute of
science and technology, Bathinapadu, Andhra Pradesh, INDIA. International journal of
science egg. and Advance Technology, IJSEAT, Vol 3, Issue 2ISSN 2321-6905 February-
2015.

[5] Sahibzada Muhammad Ali, Chaudhary Arshad Mehmood, Ahsan Khawja,Rahat


Nasim, Muhammad Jawad,Saeeda Usman, Sikandar Khan Saqib Salahuddin, Mian Atif
Ihsan. “Micro Controller Based Smart Electronic Voting Machine System”2014 IEEE.

[6] Shafi’í Muhammad Abdulhamid, Damian Oshomah Ugiomoh, Mohammed Danlami


Abdul Malik, (May 2013), The Design and Development of Real-Time E-Voting System
in Nigeria with Emphasis on Security and Result Veracity.

[7] Steven J. Anderson, A. C. M. Fong, Senior Member, IEEE, Jie Tang, Member, IEEE,”
Robust Tri-Modal Automatic Speech Recognition for Consumer Applications.” IEEE
Transactions on Consumer Electronics, Vol. 59, No. 2, May 2013.

[8] UIDAI. (2012). Role of Biometric Technology in Aadhaar Authentication

[9] UIDAI, Biometrics Design Standards For UID Applications, 2009.

Dept.of ECE Page 28


Secured And Transparent Voting System Using Biometrics

[10] Khasawneh .M, Malkawi. M , & Al-Jarrah .O (2008). A Biometric- Secure e-Voting
System for Election Process. Proceeding of the 5th International Symposium on
Mechatronics and its Applications (ISMA08). Amman Jordan.

[11] N.Ansari, P. Sakarindr, E. Haghani, C. Zhang, A.K. Jain, and Y.Q.Shi, “Evaluating
electronic voting systems equipped with voter verified paper records” , IEEE Security and
Privacy, vol. 6, no.3, May 2008

[12] The Biometric Consortium, “Introduction to Biometrics”,(http://www.biometrics.or),


2006.

[13] Hanady Hussien, Hussien Aboelnaga,. “Design of secured E-voting-voting system.”


Electronic and Communication Department. AAST, Cairo, Egypt 2013 IEEE.

[14] Urmila Shrawankar Dr. Vilas Thakare,” techniques for feature extraction in speech
recognition system” Research Student, (Computer Science & Egg.), Professor & Head,
PG Dept. of Computer Science, SGB Amravati University, Amravati.
urmilas@rediffmail.com

[15] Firas I. Hazzaa, Seifedine Kadry, Oussama Kassem Zein,“Web-Based Voting System
Using Fingerprint Design and Implementation”,International Journal of Computer
Applications In Engineering Sciences ISSN: 2231-4946.

Dept.of ECE Page 29

You might also like