Secured_Voting_System_based_on_Multilayered_Biometric_Authentication
Secured_Voting_System_based_on_Multilayered_Biometric_Authentication
Biometric Authentication
Abstract— The right to vote is a crucial aspect of a system that In the current era of fast-growing technology, using
is democratic and allows people to select the leader or people manual election procedures is an old-fashioned method,
they prefer. The traditional offline voting system is time- especially since online platforms are much faster, more
consuming, costly and requires lot of manpower, making it accurate, and more effective. A nation's democracy is based
prevalent to frauds and human errors. There is a need to on an open electoral system that allows individuals to pick
upgrade and develop efficient methods for voting ensuring their representatives. The current manual voting system in
system authenticity and voter verification. In the proposed work India overloads voters and the government, and an online
a multi-layered approach based voting system using biometric counterpart is urgently required [4]. The idea is to use an
features is developed. The voter verification is performed using online voting system to facilitate a rapid process of
facial recognition, thumbprint and Aadhaar number validation. registration, casting, counting, and the announcement of
The use of unique biometric features and user details, results. In the proposed work a secured voting system with
strengthen voting system security and ensure authenticity while facial recognition, and thumb detection is developed.
decreasing the chances of fraudulent activities during the voting Additionally, Aadhaar card verification for voters is also
process. A web application through three-step verification using
included, which increases system robustness and lowers
biometric features and Aadhaar card is developed that
facilitates a user-friendly and cost-effective voting environment
sensitivity to fraud and duplicate votes. A comprehensive
under administrative guidance. Furthermore, this work creates three-step verification system to address prevalent challenges
a secured model by eliminating fraudulent or duplicate votes in traditional voting methods, including accessibility issues,
cast during elections and also displays user votes cast so they security vulnerabilities, and logistical constraints is devised.
may be verified more efficiently for faster counting procedures Employing cutting-edge biometric technologies and modern
allowing admin to release results more promptly. web development methodologies, the proposed work
integrates facial recognition, thumb detection and Aadhaar
card number authentication to ensure robust authentication
Keywords— Voting system, Aadhaar Number, Face protocols. By providing voters with a multi-layered
Recognition, Thumb detection, Biometric.
verification process, the proposed method aims to promote the
voting system's security and integrity.
503
Authorized licensed use limited to: VTU Consortium. Downloaded on October 23,2024 at 09:38:44 UTC from IEEE Xplore. Restrictions apply.
in the database. Face recognition is performed using IV. TECHNIQUES USED
the OpenCV library in Python. Various techniques used in the proposed model for
iv. View Party Details: Admin can view all available developing the proposed model are explained in this section.
party details at any time. Fig. 3 demonstrates the complete mechanism of proposed
v. View Votes: The Admin can view all vote counts secured voting.
received by candidates.
The flow of the proposed System from the Voter (or)
user login page is depicted in Fig. 2. The major components
of the proposed system from the user login page are detailed
below:
i. User Login Page: This is where users start the
process of logging into an application or system.
ii. Username: To access the system, the user must
enter their name which is already given by the
admin.
iii. Password: The user then inputs their password,
which is a private word or code that only they know.
The user’s identity is verified at this phase.
iv. Aadhaar Number: Here the user has to scan their
Aadhaar card the system will scan the Aadhaar
number and verify it with the number given by the
admin. Fig. 3. Mechanism of proposed system
v. Fingerprint Image: The user is asked to upload
their fingerprint images. This picture is utilized for A. MySQL for Database Management: In the proposed
biometric authentication, in which the device work MySQL is used for the collection of the details of the
confirms the user's identification through the user (voter) casting the vote and also for adding the party
distinctive pattern of their fingerprints. details who are contesting in the elections. MySQL is an
vi. Face-verification (Face Recognition): Lastly, the open-source relational database management system
user's face image is captured by the system using a (RDBMS) that is widely used for building web-based
webcam. The user's identification is then confirmed applications and managing data. The MySQL command line
by utilizing facial recognition, a technique that is used for the execution of the SQL code. MySQL 5.5
analyzes the user's facial traits using the image. command line interface allows users to interact with the
MySQL database system directly by typing commands.
B. Django, HTML and CSS for Web Application
development: The web application in the proposed work is
developed using the Django framework with the front end
created using HTML, and CSS. Only Admin can add
candidates and positions for the elections using the Django
inbuilt Admin module. Django is a high-level Python web
framework that encourages rapid development and clean,
pragmatic design. HTML stands for Hyper Text Markup
Language. It is used to design the front-end portion of web
pages using markup language. It acts as a skeleton for a
website since it is used to make the structure of a website [12].
Cascading Style Sheets fondly referred to as CSS is a simply
designed language intended to simplify the process of making
web pages presentable. It is used to style the website.
C. OpenCV and Haar Cascade algorithm for Face
Detection: OpenCV offers extensive libraries and tools for
image processing and computer vision tasks, enabling us to
achieve superior results in facial recognition. In the proposed
work, Haar feature-based cascade classifiers from OpenCV
are used to perform facial recognition [13]. To identify the
features in the face training data is used. The images are
converted into gray scale and then features include distance
between forehead and nose etc. computed using haar filters
shown in Fig. 4. The pixel value [14] is obtained as follows:
Fig.2 Working stages of the system from User login page
ܵݏ݈݁ݔ݅ܲ݇ݎܽܦ݂݉ݑ
ܲ݅ ݁ݑ݈ܸ݈ܽ݁ݔൌ
ܰݏ݈݁ݔ݅݇ݎ݂ܽ݀ݎܾ݁݉ݑ
504
Authorized licensed use limited to: VTU Consortium. Downloaded on October 23,2024 at 09:38:44 UTC from IEEE Xplore. Restrictions apply.
ܵݏ݈݁ݔ݅ݐ݄݃݅ܮ݂݉ݑ
െ
ܰݏ݈݁ݔ݅ݐ݄݈݂݃݅ݎܾ݁݉ݑ
505
Authorized licensed use limited to: VTU Consortium. Downloaded on October 23,2024 at 09:38:44 UTC from IEEE Xplore. Restrictions apply.
home page of the web application is shown in Fig. 7,
comprising of Admin login and user login options. The
"Admin Login" option is illustrated in Fig. 8.
506
Authorized licensed use limited to: VTU Consortium. Downloaded on October 23,2024 at 09:38:44 UTC from IEEE Xplore. Restrictions apply.
Fig.13 User image on webcam for registration
The user login screen is shown in Fig. 18. It asks the user to
log in with the username, password and thumb image used at
the time of registration. Also, the user will be asked to capture
Fig.15 Face capturing through webcam failed
their face and Aadhaar card using a webcam. If the valid
details are not entered the error message as shown in Fig. 18
will appear. If any of the details are not matched while
logging to cast the vote. It will show invalid login details.
507
Authorized licensed use limited to: VTU Consortium. Downloaded on October 23,2024 at 09:38:44 UTC from IEEE Xplore. Restrictions apply.
Fig.18 User login screen Fig.21 Face Recognition and Verification Stage
508
Authorized licensed use limited to: VTU Consortium. Downloaded on October 23,2024 at 09:38:44 UTC from IEEE Xplore. Restrictions apply.
After the voting procedure is completed the admin can view accuracy and reliability of the voting system but also greater
the vote count for authenticated voters and announce the confidence among voters in the fairness and transparency of
election results. the electoral process. Overall, the incorporation of these
authentication highlights the commitment to conducting free,
fair, and secure elections in the digital age. The future scope
of this work includes adding the Chatbot to the web
application which can help users during registration process
or while casting vote.
REFERENCES
[1] M. Mochta, C. Lesschaeve, J. Glaurdić, “Voting and winning:
perceptions of electoral integrity in consolidating democracies,”
Democratization, 2021 Nov, 17; vol. 28(8), pp. 1423-41.
[2] S.A. Sheikh, A. Syed, O. Saleh, M. A. Khan, A. Bali A., “Online
Voting System,” International Journal of Advanced Research in
Science, Communication and Technology (IJARSCT). 2023. vol. 3(2),
pp. 477-483.
[3] M. Daud, I.R. Khan, “Issues & Vulnerabilities Related to Online
Voting and Its Mitigation,” International Journal of Advanced
Research in Computer Science, 2017 May, vol. 8(5).
[4] G. Kumar, S. Gupta, D. Agarwal D, A. Tiwari, “Virtual Voting
System,” International Journal of Informatics, Information System and
Computer Engineering (INJIISCOM), 2021, vol. 2(1), pp. 77-82.
[5] S. Duth, B. Amulya, “Recognition of hand written and printed text of
cursive writing utilizing optical character recognition”. In 2020 4th
international conference on intelligent computing and control systems
Fig. 24 Admin view for vote count (ICICCS), 2020 May 13, pp. 576-581. IEEE.
[6] P. Sirenjeevi, C. Preethi, S. Shaminee, J. Gayathri, “Smart Voting
System using Deep Learning Techniques and Facial Authentication,”
In comparison to existing systems [6-9] the proposed International Journal Of Engineering Research & Technology (IJERT)
multilayered voting system based on biometric analysis is ICONNECT. 2022, vol. 10(09).
secure, cost-effective, consumes less time and maintains [7] S. Abimanyu, R.Anbarasan, S. Dhinakaran, M. K. Abhirami, “Iris
Detection based Authentication for Secure Voting System”.
voters' authenticity. In the model presented by Abhimanyu et
[8] R. Govindaraj, P. Kumaresan, “Online voting system using cloud,” In
al.[7] and Rajesh and Priyanka [9] based on Iris and 2020 International Conference on Emerging Trends in Information
fingerprint detecion, voter verification is performed but there Technology and Engineering (ic-ETITE), 2020 Feb 24, pp. 1-4. IEEE.
is no provision to check duplicate votes. However, the [9] M. G. Rajesh and S. Priyanka, “Online Voting System,” International
proposed model carried out multistage voter verification Research Journal of Engineering and Technology (IRJET),2017, vol.
adding additional security and also doesn’t allow duplicate 4(12), pp. 1411-1413.
votes to caste vote. The proposed system does not require any [10] E. Gangadurai, R. Divakaran, U. Aruneshwaran, “Fingerprint-Based
Voting System,” Journal of Telecommunication Study, 2023, vol. 8(2),
OTP for voter and admin verification as used in model pp 30-38.
developed by Sirenjeevi et al.[6], thus making the voting [11] C. M. Nalayini, K. Vishnupriya, A. Dhivyabharathi, H.Yuvapriya,
system more secure. The cloud based system developed by “Biometric based Mobile Voting Application,” Journal of Information
Govindaraj and Kumaresan[8] permits users to caste vote Technology and Digital World, 2023, pp.159-171.
online using email and no additional authentication of voters [12] M. Gupta, S. V. Amirishetty, B. Nithin, H. Kurakula, “Mind Frame
Music and Movie Recommendations to uplift the current mood using
identity is performed. The proposed model allow only the Deep Learning,” In: 2021 International Conference on System,
voters who are verified through biometric features and Computation, Automation and Networking (ICSCAN), 2021 Jul 30,
Aadhar card details to caste vote, the users with non-matching pp. 1-6. IEEE.
features are not allowed to cast the votes. Thus providing a [13] S. M. Cheruvu, D. Sesank, K.S. Sandilya, M. Gupta, “Vituperative
secure and authenticated voting system using the unique high Content Detection: A Multidomain Architecture Using OpenCV,” In:
International Conference on Advances and Applications of Artificial
precision features of the voters. Intelligence and Machine Learning, 2022 Sep 16, pp. 409-421.
Singapore: Springer Nature Singapore.
VI. CONCLUSION AND FUTURE SCOPE [14] A. B. Shetty and J. Rebeiro, J, “Facial recognition using Haar cascade
This research concluded that it ensures the security and and LBP classifiers,” Global Transitions Proceedings, 2021, vol. 2(2),
integrity of the electoral process. By leveraging biometric pp.330-335.
authentication methods namely thumb and face recognition, [15] A.K. Al Tamimi, A. Qasaimeh and K. Qaddoum, “Offline signature
recognition system using oriented FAST and rotated BRIEF,”
along with Aadhaar Number validation, this system enhances International Journal of Electrical and Computer Engineering (IJECE),
voter verification and reduces the risk of fraudulent activities. 2021, vol. 11(5), pp.4095-4103.
Moreover, this multi-layered approach not only enhances the
509
Authorized licensed use limited to: VTU Consortium. Downloaded on October 23,2024 at 09:38:44 UTC from IEEE Xplore. Restrictions apply.