3
3
Abstract
Among the issues with the current Face Verification provides sufficient
manual voting mechanism are the security, reducing the number of
following: incorrect votes.
Expensive and time consuming: The findings are gathered from the
The process of collecting data and stored data on the blocks via the
entering this data into the database considerable organisation of the
takes too long and is costly to nodes in the block chain.
conduct. For example, time and
money are spent on printing data Architecture Diagram:
capture forms, preparing registration
stations with human resources, and
then advertising the days set for
registration process, including
sensitising voters on the importance
of registration, as well as time spent
on entering this data into the
database.
registered Face, the voter can vote successfully save the vote in the
for the correct candidate. KNN is system, all nodes must adhere to
the source. To compare two faces, the smart contracts. When a user
an algorithm for human face completes the voting procedure,
recognition is utilised. Voting the votes are saved in the Block
transactions are routed to a pool, chain. As a result, the voter can be
where miners examine them and confident that his votes saved in the
eliminate malicious requests by block chain cannot be modified. A
obtaining consensus from other pie chart retrieved from the block
nodes before adding them to the chain can be used by the user to
chain. A cryptographic hash is used view his or her vote.The SHA256
to completely safeguard the votes. method was used to hash the data.
Each vote made results in the After the election process is done,
addition of a new block to the chain. the administrator can publish the
When a voting transaction is results for each constituency.
completed and a node is
successfully added to the Vote HARDWARE
Chain, the voter is alerted through REQUIREMENTS
SMS to his registered email. The
voter has supplied with a unique ➢ Hard Disk :
transaction hash by which he can 80GB and Above
validate his vote through a web
➢ RAM : 4GB
portal and upon successfully
and Above
completion of transaction the vote
has been counted in the total voting ➢ Processor : P IV
activity. and Above
Publish Result:
SOFTWARE
While executing a transaction
REQUIREMENTS
in the chain, smart contracts
provide a safe connection between
the user and the network. These are ➢ Windows 10 and above
the rules that apply to the entire ➢ JDK 1.8
Block chain and cannot be ignored ➢ Python 3.6.3
under any circumstances. To
➢ XAMPP
➢ GanaChe
SCREEN SHOTS
Execution starting of
our application
User login
CONCLUSION:
[3] F. P. Hjálmarsson, G. K.
Hreiòarsson, M. Hamdaqa, and G.
Hjálmtýsson, ``Blockchain-based E- [6] T. Dimitriou, ``Ef_cient,
Voting system,'' in Proc. IEEE 11th coercion-free and universally
Int. Conf. Cloud . (CLOUD), Jul. veri_able blockchain-based voting,''
2018, pp. 983_986. Comput. Netw., vol. 174, Jun. 2020,
Art. no. 107234, doi:
10.1016/j.comnet.2020.107234.