0% found this document useful (0 votes)
91 views

Bio-Metric Voting System: Jntu College of Engineering Nachupally, Karimnagar (Dist)

This document proposes a biometric voting system using thumb impressions to identify voters and prevent rigging. The system works as follows: 1. A database of thumb impressions is created for all eligible voters in a constituency. 2. During voting, a voter's thumb impression is scanned and compared to records in the database. If it matches, the voter can cast their ballot. 3. All voting machines are connected in a network to transfer voting data to a main host computer for instant counting and results. This system aims to make elections more accurate, fast and reduce costs compared to traditional paper-based voting. It uses biometric identification to authenticate voters and prevent multiple votes from the same person.
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
91 views

Bio-Metric Voting System: Jntu College of Engineering Nachupally, Karimnagar (Dist)

This document proposes a biometric voting system using thumb impressions to identify voters and prevent rigging. The system works as follows: 1. A database of thumb impressions is created for all eligible voters in a constituency. 2. During voting, a voter's thumb impression is scanned and compared to records in the database. If it matches, the voter can cast their ballot. 3. All voting machines are connected in a network to transfer voting data to a main host computer for instant counting and results. This system aims to make elections more accurate, fast and reduce costs compared to traditional paper-based voting. It uses biometric identification to authenticate voters and prevent multiple votes from the same person.
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

BIO-METRIC

VOTING SYSTEM
JNTU COLLEGE OF ENGINEERING
NACHUPALLY,KARIMNAGAR(DIST).
CH.DEVARAJU

2ND-INFORMATION TECHNOLOGY

08JJ1A1253

e-mail:[email protected]

cell:9963457744

abstract: It has always been a tedious


task for the Election
commission to conduct free
and fair polls in our record, access to cast a vote
country, the largest is granted. But in case the
democracy in the world. pattern doesn’t match with
the records of the Database
Crores of rupees or in case of repetition,
have been spent on this to access to cast a vote is
make sure that the elections denied or the vote gets
are riot free. But, now- a rejected. All the voting
-days it has become common machines are connected in a
for some forces to indulge in network, through which data
rigging which may eventually transfer takes place to the
lead to a result contrary to main host. The result is
the actual verdict given by instantaneous and counting is
the people. done finally at the main host
This paper aims to itself.
present a new voting system The overall cost for
employing Biometrics in order conducting elections gets
to avoid Vote-rigging and to reduced and so does the
enhance the accuracy and maintenance cost of the
speed of the process. systems.
The system uses thumb
impression for voter
identification as we know
that the thumb impression of
every human being has a
unique pattern. Thus it would
have an edge over the present
day voting systems.As a pre-
poll procedure, a Database
consisting of the Thumb
impressions of all the
eligible voters in a
Constituency is created.
During Elections, the Thumb
impression of a voter is
entered as input to the
system. This is then compared
with the available records in

the Database. If the


particular pattern matches INTRODUCTION:
with anyone in the available
Biometrics is the term given
to the use of biological 1. Scanning- using DSP
traits or behavioral Processor
characteristics to identify 2. Searching- based on the
an individual. The traits may principle of GOOGLE SEARCH
be fingerprints, hand 3. Networking- all the
geometry, facial geometry, election booths are connected
retina patterns,voice in a network
recognition, and handwriting 4. Data transfer– using
recognition. telephone lines.The only pre-
In this paper we requisite for the use of this
have used thumb impression finger print scanner is a
for the purpose of voter personal identification card.
identification or We hope that this system
authentication. As the thumb proves to be efficient and
impression of every enables the people to be
individual is unique,it helps smarter in choosing their
in maximizing the accuracy. leaders.
A database is
created containing the thumb
impressions of all the voters
in the constituency. Illegal SUMMARY OF DESIGN
votes and repetition of votes
is checked for in this The main aim in designing
system. Hence if this system this product is to provide
is employed the elections the concept of the personal
would be fair and free from identity for each individual.
rigging. Thanks to this This is extended to a special
system that conducting case of electronic voting
elections would no longer be machine concept. The summary
a tedious and expensive job. of the design can be briefly
explained diagrammatically as
follows.
As a pre-poll procedure the
DESIGN finger prints of all the
voters are collected and
The design of the system stored in a database
consists of the following initially at time of
important parameters distributing
voting cards. At the time of
voting, the option of the
voter is taken along with the
finger print. The finger
print taken by the scanner is
sent to the DSP chip through
an in-built A/D converter.
The processed image is
transferred to hard disk with VOTING SYSTEM is given below.
biasing of SDRAM. It can be divided in to the
The option entered by the following
voter is transferred to chip main categories.
through DEMUX and is stored FINGER PRINT SCANNER:
in the memory. If the The finger print scanner
transferred image is matched consists of the following
with any of the records in parts:
the data base, then the 1. FINGER PRINT SENSOR:
interrupt is given by the This is used to scan the
HARD DISK to DSP chip. Then thumb impression.
the option is considered in The data obtained from this
the count. After the is analog in nature. This is
acquisition of the count this transferred
is transmitted to the HOST to the A/D converter for
computer or central server further processing.
using telephone lines .As the
2. A/D CONVERTER: This is
count of each party is
used to convert the analog
transmitted to the HOST from
data from the
all the VOTING MACHINES
SENSOR into the digital data
present in the constituency,
and transfer it to the
the HOST will add parallel
processor.
count of particular party and
makes the final count of each 3. FLASH ROM: This is for
party in ascending order. The the storage of the data
final count is transferred to temporarily in the
the main HOST (head quarters) DSP processor. This will work
using either telephone lines until the data is transferred
or radio waves. to the
main memory of the HOST.
4. DSP CHIP: This is used to
receive the data and process
it. This is
connected to the USB port for
DESCRIPTION OF THE further transfer of the data.
5. USB PORT: The sole
VOTING MACHINE purpose of the USB port is to
establish a
BLOCK DIAGRAM FOR THE communication link between
the DSP processor and the
WHOLE PROCESS IN MEMORY(DATABASE).
BRIEF:
The detailed description of
each and every internal unit
in the EXTRACTION OF THUMB
IMPRESSION:-
transferred in parallel to
The next step in the process the HARD DISK for searching
is the extraction of the process. The
thumb impression from the BIOS language of the HARD
memory. The features of the DISK is stored in SDRAM which
finger print are stored in is also interfaced in
the form of pixels. This is parallel with the chip. This
further sent for pattern helps the chip to transfer
matching where the finger the image to the HARD DISK
print is then compared with for further process. The
the records in the database. image transferred to the HARD
If the pattern matches with DISK is compared with that of
any one of he records then the DATA BASE. The circuit
the vote is accepted. If the connections for the process
feature doesn’t match with explained are as shown below.
any one of the finger prints A DE-MULTIPLEXER is connected
stored in the data base then to the inputs in parallel to
the vote is rejected. the chip.
The option which is given is
transferred to the chip in
FEATURE EXTRACTION AND binary form.
E.g.:
COMPARISON 1. Party one, 2. Party two,
SCANNING AND 3. Party three, 4. Party
PROCESSING: four.
Suppose if the option is two
The biometric sensor scans then the binary data transfer
the image. This so scanned to the
data is in the analog form. ports is 0010.DE-MULTIPLEXER
This is converted into is designed according to the
digital form by using an A/D number of parties present in
converter. Since the image is the constituency. The
to be transferred quickly to transferred data is stored
the converter, it is in a 16-bit register
interfaced in parallel with according to their option.
the DSP chip. The data After counting takes place
received from the parallel in the count of each party is
ports is further processed in transferred to
the chip. the transmitter. A
Parallel interfacing is done transmitter is interfaced
to have a quick performance. serially to the DSP
TRANSFER OF PROCESSED DATA TO chip. The transmitter data is
THE HARD DISK: transferred through the
The data which is processed telephone lines
in the DSP chip (finger to the HOST. The counts of
print) is similar parties are added at
the host and
the data is transferred to After the person gets the
the STATE HEAD QUARTERS (main PROCEED symbol from the
HOST) to display the result voting machine,
of the particular there appears a screen on
constituency. which all the parties names
along with the
BLOCK DIAGRAMS FOR symbols are present. The
person should select any one
VARIOUS PROCESSES of the party by
VERIFICATION OF VOTERS giving the number allotted to
that particular party as
Here the identity of a person input through
is checked whether he\she the keypad. After the option
belongs to is selected the voter is
the particular constituency prompted for a
or not. The machine which confirmation. In case the
takes the voter enters an invalid
finger print of the person number, the screen
checks it with the data base reappears and he\she is
already prompted to cast the vote
stored in it. If the finger again. Then
print matches it will give according to the option
access to the selected, the vote count of
person to cast his vote and the particular
if it doesn’t match any of party gets incremented by
the finger one. Finally, at the end of
prints stored in the data the day, the
base then it will reject the position of the parties in
voter. Thus terms of the total votes cast
this method will enable the can be known. A very simple
members of that particular flow chart for the above
constituency process is as shown below:
only to vote. This can be REJECTION OF VOTER
taken as the first step to
avoid rigging. REPETITION
To have a faster performance
the searching technique is After we have emerged out
implemented with a solution to check
on the basis of GOOGLE voter’s identity in a
SEARCH. The process in the constituency, our next task
form of a flow is to see that a particular
chart is as given below. person cannot vote more than
once i.e. to avoid multiple
votes. This task can be
PROCESSING AND accomplished by simple
COUNTING: software technique employed.
It consists of two folders
namely searched and FORMATION OF THE
unsearched. Initially the
searched folder consists of NETWORK
no images. The thumb
impression images of all the The voting machines present
voters of a constituency will in a town are interlinked in
be present in the unsearched the form of
folder. As and when a vote is a highly secure LAN. This
cast, the image of the network is formed with the
particular voter gets help of the
transferred to the searched telephone lines. All the data
folder. The searched folder collected in the voting
is programmed such that an system is first
image cannot be present more stored in the voting machine
than once in this folder. So itself. Then it is sent to
when a voter casts multiple the HOST
votes the exception is which will be located at
generated and an alarm is headquarters of the town. All
raised and even the police the data is
can be informed about the collected there and it is
identity of the intruder transferred to the main HOST.
indulging in this illegal The purpose
activity. This is shown in of saving the data in the
the block diagram given below voting machine at first is
The scanned vote is first that even if
checked with the there is loss of data by some
acceptability of the voter means then it can be easily
as explained in the first retrieved
flow chart. If the finger from the machine again. In
print is accessible then the this way all the things are
data of the specified person bought into a network.These
is taken into account. The hosts are again grouped into
voter’s thumb impression is network through radio waves
verified with the previously or again telephone lines.
cast votes. If there is no Host is a device which
match then the vote is consists of a PROCESSOR
accepted and the count is and a RAM. It will accept the
increased by one. If the vote data from all the voting
matches with any of the machines through telephone
previous votes then the vote lines and it will store the
is rejected and the person’s data in RAM (count of all
identity is stored and it is parties). Then it will add
given to the police for the count of similar parties
further enquiry. There is a and store the count in
flash ROM in which these ascending or descending order
details can be stored. and display the result
whenever it is necessary.
Thus all the voting machines
in the state can be formed
into a network. The network
can make use of RADIO waves
or TELEPHONE lines for the
data transfer.

ADVANTAGES:
1. The system is highly
reliable and secure.
2. In the long run the
maintenance cost is very less
when compared to
the present systems.
3. Illegal practices like
rigging in elections can be
checked for.
4. It is possible to get
instantaneous results and
with high
accuracy.
CONCLUSION:
Thus the advent of this
biometric thumb impression
voting system
would enable hosting of fair
elections in India. This will
preclude
the illegal practices like
rigging. The citizens can be
sure that
they alone can choose their
leaders, thus exercising
their right in
the democracy.

You might also like