Fingerprint-Based_Vote_Marking_System_for_Elector_Identification
Fingerprint-Based_Vote_Marking_System_for_Elector_Identification
E. PCB Design The second ESP32 (or Arduino Uno in some variants)
A custom-designed PCB consolidates all components handles the constituency-specific candidate image display.
into a compact layout, optimizing for portability, signal This microcontroller receives constituency data from the
integrity, and power efficiency. The board includes Master ESP32 via UART serial communication. It
clearly separated power and signal paths, integrated retrieves and renders the appropriate candidate images
connectors for modular component access, and on-board from an SD card and displays them on a TFT screen
BMS circuitry. Mounting provisions and compact (ILI9341). This allows each voter to see only the
routing ensure the design is suitable for enclosed and candidates relevant to their registered constituency,
mobile applications. improving clarity and user experience.
I2C 16x2 LCD 1 User feedback display The software implementation is designed to operate
efficiently across two microcontrollers while ensuring
TFT ILI9341 Display 1 Candidate image data integrity and system responsiveness. The firmware
display is developed using Arduino IDE, with structured
modules to separate concerns such as input handling,
Tactile Push Buttons 4 Navigation and vote
verification, communication, and display.
confirmation
Li-ion Battery (1S) 1 Portable power supply Upon system startup, the Master ESP32 initializes
all hardware components and displays a welcome
DW01A + 8205A BMS 1 set Battery protection message on the LCD. The system then enters idle
circuit mode, awaiting RFID input. When a voter scans their
RFID card, the system checks the UID against a pre-
Logic Level Converter 1 For safe UART defined list. If the UID is valid and the voter has not
previously voted, the system prompts for fingerprint • Vote logging was tested using simulated Wi-Fi
verification. disconnection and reconnection to check if vote data
persistence was maintained.
Upon successful fingerprint authentication, the
voter's constituency code is identified, and this Comprehensive testing sessions also involved stress testing
information is sent via UART to the Display Node. The over multiple iterations to observe stability and power
Display Node uses this code to fetch relevant candidate consumption behavior under continuous use.
images from its SD card and render them on the TFT
display. Meanwhile, the Master Node allows the user to
cycle through the displayed candidates using the NEXT Votes were successfully logged to Google Sheets with
button. Once the voter confirms their choice using the accurate timestamps and correct constituency-candidate
SELECT button, the vote is recorded and mapping. The system also displayed a high level of
simultaneously logged to a Google Sheet using HTTP resilience against invalid input and unauthorized access. All
POST requests. feedback mechanisms, including buzzer sounds, LCD
messages, and TFT visuals, functioned as intended to guide
The software ensures state management through the voter clearly throughout the process.
clear transitions: from system initialization to
enrollment, voting mode, and confirmation. Each action Overall, the implementation confirms that the system is
is time-stamped using the ESP32’s Network Time ready for deployment in small-scale elections such as
Protocol (NTP) for traceable logging. college student councils, club polls, or community
associations, with a focus on transparency, security, and
I. Test Cases real-time traceability.
• Valid Voter Test: A voter with a registered RFID The system architecture is based on a dual
and fingerprint should pass authentication and be microcontroller model utilizing two ESP32 boards to
allowed to vote once. separate the core voting operations from the user interface
• Duplicate Vote Test: A voter attempting to vote functionalities. This distributed architecture enhances
again should be denied and shown a “Vote Already modularity, performance, and scalability. The Master
Cast” message. ESP32 is responsible for the core logic of the system,
• Invalid RFID Test: If an unregistered RFID card is which includes RFID card reading, fingerprint
scanned, the system should block access authentication, candidate selection, and real-time vote
immediately. logging to Google Sheets via Wi-Fi. It also manages user
• Fingerprint Mismatch Test: When the fingerprint feedback through a 16x2 I2C LCD and auditory responses
does not match the stored template, the system using a buzzer.
should not proceed.
• Connectivity Test: If Wi-Fi is turned off or The Display Node, implemented using either a second
unavailable, the system should retry logging the ESP32 or an Arduino Uno, is dedicated to displaying
vote until successful. constituency-specific candidate images on a TFT screen.
• UART Communication Test: The constituency code Upon successful voter authentication, the Master Node
sent from the Master ESP32 should match the one sends the voter’s constituency code to the Display Node via
received by the Display Node and display the UART serial communication. The Display Node then
correct candidate images. accesses the SD card to retrieve and render the appropriate
images on the TFT display, enabling a personalized voting
Each test case was documented with expected and experience based on region or constituency.
actual results, and adjustments were made in software
logic wherever discrepancies were found. Communication between the two nodes is established
using UART protocol, ensuring fast and reliable data
transmission. The entire system is powered by a Li-ion
J. Testing Methodologies
battery supported by a Battery Management System (BMS)
circuit based on DW01A and 8205A ICs, providing
Testing was conducted in a staged manner using both unit protection against overcharge, over-discharge, and short
testing and integration testing approaches. circuits. This architectural design supports high security,
low power consumption, and user-friendly interaction,
• Unit testing was applied to verify each module making it ideal for secure, small-scale electronic voting
independently, such as fingerprint sensor accuracy, applications.
RFID scanning, and Google Sheets data logging.
• Integration testing ensured proper communication and
synchronization between the two ESP32s, particularly
in sending constituency codes and rendering the right
images.
• Edge cases, like multiple button presses, long idle
time, or sensor failure, were also tested to ensure
robustness.
• Debouncing techniques were implemented for tactile
buttons to avoid multiple unwanted inputs from a
single press.
V. DESCRIPTION OF THE SYSTEM VI. CONCLUSION
Voting Mode
REFERENCES
[1] ANVESHINI, D., REVATHI, V., ESWARI, A., MOUNIKA, P., MEGHANA, K.,
& APARNA, D. (2022). PATTERN RECOGNITION BASED FINGERPRINT
AUTHENTICATION FOR ATM SYSTEM. IN THE PROCEEDINGS OF
INTERNATIONAL CONFERENCE ON ELECTRONICS AND RENEWABLE SYSTEMS
(PP. 1708-1713). IEEE.
[3] SHAW, S. K., PODDAR, S., SINGH, V., & DOGRA, S. (2018). DESIGN AND
IMPLEMENTATION OF ARDUINO BASED VOTING MACHINE. IN THE
PROCEEDINGS OF IEEE ELECTRON DEVICES KOLKATA CONFERENCE, (PP.
450-454). IEEE.
[4] GUJANATTI, R. B., TOLANUR, S. N., NEMAGOUD, M. S., REDDY, S. S., &
NEELAGUND, S. (2015). A FINGER PRINT BASED VOTING SYSTEM.
INTERNATIONAL JOURNAL OF ENGINEERING RESEARCH & TECHNOLOGY,
4(5), 887-892.
[6] FARUK, M. J. H., ISLAM, M., ALAM, F., SHAHRIAR, H., & RAHMAN, A.
(2022). BIE VOTE: A BIOMETRIC IDENTIFICATION ENABLED BLOCKCHAIN-
BASED SECURE AND TRANSPARENT VOTING FRAMEWORK. IN THE
PROCEEDINGS OF FOURTH INTERNATIONAL CONFERENCE ON BLOCKCHAIN
COMPUTING AND APPLICATIONS (BCCA) (PP. 253-258). IEEE.
[7] HATSA, K., DATE, A., SHRIVASTAVA, A., JHADE, P., & SHELKE, S. N.
(2019). FINGERPRINT BASED SECURED VOTING. IN THE PROCEEDINGS OF
INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING,
COMMUNICATION AND CONTROL (ICAC3) (PP. 1-6). IEEE.
[8] SHINDE, S., SHEDME, M., SHAH, J., & SHELAR, H. (2020). AN APPROACH
FOR E-VOTING USING FACE AND FINGERPRINT VERIFICATION. IN THE
PROCEEDINGS OF IEEE PUNE SECTION INTERNATIONAL CONFERENCE
(PUNECON) (PP. 59-64). IEEE.
[9] TIWARI, R. S., & LINGALA, G. (2020). SECURED E-VOTING SYSTEM USING
TWO-FACTOR BIOMETRIC AUTHENTICATION. IN THE PROCEEDINGS OF FOURTH
INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND
COMMUNICATION (ICCMC) (PP. 245-248). IEEE.