0% found this document useful (0 votes)
3 views

fingerprint based voting

The document proposes a fingerprint and Aadhaar card-based voting system to enhance security and reduce fraudulent voting in elections. It outlines the system's architecture, objectives, and advantages, including immediate vote storage and results publication. The system aims to provide a secure, efficient, and tamper-proof voting process leveraging biometric authentication.

Uploaded by

Tech Nest
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

fingerprint based voting

The document proposes a fingerprint and Aadhaar card-based voting system to enhance security and reduce fraudulent voting in elections. It outlines the system's architecture, objectives, and advantages, including immediate vote storage and results publication. The system aims to provide a secure, efficient, and tamper-proof voting process leveraging biometric authentication.

Uploaded by

Tech Nest
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 25

FINGERPRINT AND

AADHAAR CARD BASED


VOTING SYSTEM

SUBMITTED BY GUIDED BY
C. Praveen(962816104071) Mr. S. karthik,
N. Pravin(962816104072) Teaching Fellow,

C. Raju(962816104080) Department of CSE.


R. Rama Subramanian(962816104081)
ABSTRACT
Voting is a fundamental rights for every citizen that enable them
to choose the leader. Now a days fake voting is still major problem
in election. Authentication of voters, security of the voting process,
protecting voted data are the main challenges of current voting
system. This project attempts to solve this problem using existing
Aadhaar card database and fingerprint of voter. The fingerprint
sensor scans the fingerprint of voter. It checks whether the voter is
eligible to vote or not by checking with Aadhaar card database and
shows the voter’s details. After verifying details the polling system
shows the election candidate’s details for voting. The voter selects
the candidate and the polling system shows the confirmation step to
confirm the vote. Then the vote details are immediately stored in the
server. The polling system has fixed time for voting and after the
voting time, the polling system won’t allow the voter to vote. After
the voting time the polling system shows the polling details and the
results.
INTRODUCTION
 All voting systems around the world include the following
steps: voter identification and authentication, voting and
recording of votes, vote counting, publication of election
results.
 In modern times EVM machines are widely used for voting
procedure all around the world especially India.
 Security is a heart of e-voting process. Therefore the
necessity of designing a secure e-voting system is very
important.
 In order to overcome this drawbacks we propose a
fingerprint and Aadhaar card based voting system for
improved security and quick processing.
OBJECTIVE
 To implement a Aadhaar based E-Voting system for secured
voting.
 To store voting data on a webserver for easy and quick
processing
 To reduce fake voting issues and make it tamperproof
LITERATURE SURVEY
S.No Name of the Paper Name of the Author Year Methodology
Journal name

1 Security And IEEE Journal Stefania 2018  improve the


Cryptographic Of Computer Loredana Nita authentication
Challenges For Science, et al process by
Authentication Based Journal Of using a multi-
On Biometrics Data Computer factor
Science authentication
scheme.

2 Real-Time Multimodal IEEE Journal Sanjay Kumar 2017


Biometric User Of Computer et al  To increase the
Authentication For Science, security,
Web Application Journal Of biometric traits
Access In Wireless Computer is further
Lan Science encrypted
using AES
algorithm.
LITERATURE SURVEY
S.No Name of the Paper Name of the Author name Year Methodology
Journal

3 Finger Print Based International R.Akila 2016  Fingerprint and


Voting System Conference Mukesh et al voting system
On New method.
Scientific  provide easy
Creations In and accurate
Engineering counting with
And out and
Technology. troubles.

4 Biometric Based International Naveenraj M et 2019  highly secured


Electronic Voting Journal Of al secret key is
System Using Innovative affirmed in
Aadhar Technology advance to each
And individual.
Exploring
Engineering
LITERATURE SURVEY
S.No Name of the Name of the Author Year Methodology
Paper Journal name

5 Authentication And IEEE Mohamed 2018  Machine


Authorization For International Amine learning
Mobile Iot Devices Journal Of Ferrag et al Method.
Using Bio-Features: Innovative  High
Recent Advances Technology accuracy
And Future Trends for a binary
and multi-
class
classifier.

6 Comparative IEEE Aquino 2017  Blowfish


analysis of different International Valentim algorithm
techniques of conference on Mota, Sami  High secure
encryption for Power,Control,S Azam data
secured data ignals and transmissio
transmission Instrumentation n
Engineering
PROBLEM DEFINITION

 The current voting system in India is Electronic voting


system. The idea was established in 1977 by the Chief
Election Commissioner.
 There are numerous sorts of issues with EVM Some of
them are listed here
 Illicit Balloting : Without the knowledge of voter
another person can vote with fake identity.
 Misuse of votes: Either specialist or any other person can
change the vote from the voting machine.
 Delay of results: After the election, counting of votes and
announcing of results takes too much of time.
REQUIREMENTS

HARDWARE REQUIREMENTS:
 System : Pentium IV 2.4 GHz.
 Hard Disk : 200 GB.
 Ram : 1024 Mb.
 Fingerprint Sensor
SOFTWARE REQUIREMENTS:
 Operating system : Windows XP/7.
 Coding Language : JAVA
 IDE : Netbeans 7.3
 Database : MYSQL.
ARCHITECTURAL DESIGN
SYSTEM DESIGN
BLOWFISH CRYPTOGRAPHY
 Blowfish is a strong symmetric key cryptographic
algorithm
 Blowfish can execute in less than 5KB memory
 Blowfish uses only primitive operation such as
addition, XOR and table lookup making its design
and manipulation simple
 Blowfish has a variable key length up to a maximum
of 448 long ,making it both flexible and secure
BLOWFISH ENCRYPTION
BLOWFISH DECRYPTION
Function
BLOWFISH ALGORITHM
1.Divide X into two blocks XL and XR of equal sizes. Thus
both XL and XR will consist of 32 bit each
2.For i=1 to 16
XL = XL ⊕ Pi
XR = f(XL) ⊕ XR
Swap XL ,XR
(undo last swap)
XR = XR ⊕ P17
XL = XL ⊕ P18
3.Concatenate XL and XR back into X to get ciphertext CT
PATTERN MATCHING
PRINCIPLE COMPONENT ANALYSIS
 It is the technique to bring out strong pattern in a
dataset by suppressing variations
 It is used to clear data sets to make it easy to explore
and analyze
1.Get your data
2.Give your data a structure
3.Standardize your data
SUPPORT VECTOR MACHINE
ALGORITHM
 SVM is one of the most popular supervised learning
algorithm
 It is used for classification
 The goal of SVM algorithm is to create the best line or
decision boundary
 The best decision boundary is called as hyperplane
 Support vector used to create decision boundary between
past labeled data and new data
 On the basis of support vectors, It will classify the dataset
BLOCK DIAGRAM FOR SVM
EXPECTED OUTCOME
 Online voting portal development
 Registration page for enrollment
 Voting procedure using Fingerprint
ADVANTAGES
 It can't give any opportunity to invalid votes because
fingerprint is one of the unique identification.
 At the tallying focuses, it can give simple and exact
checking with no inconveniences.
 We can vote from any polling place in India.
 No need to carry the id proof for verification.
 Less spending money for the election.
 Reduce time and tide.
 Result will be produced after completion of election on the
same day.
REFERENCES

1) Stefania Loredana Nita , Marius Iulian Mihailescu And Valentin


Corneliu Pau, 2018, “Security And Cryptographic Challenges For
Authentication Based On Biometrics Data”, Cryptography, vol. 2,
no. 39, pp. 2-22.
2) Sanjay Kumar, Surjit Paul And Dilip Kumar Shaw, 2017, “Real-
Time Multimodal Biometric User Authentication For Web
Application Access In Wireless Lan”, Article In Journal Of
Computer Science, Journal Of Computer Science, vol. 13, no. 12,
pp. 681-695.
3) R.Akila Mukesh, M.Meena, G.Sasirekha,
A.Selvameena,T.Tamilselvi, 2016, “Finger Print Based Voting
System”, International Conference On New Scientific Creations In
Engineering And Technology, Pp. 365-378..
REFERENCES

4)Naveenraj M, Arun Ac, Gowtham A, Laleth Tr, Naveen Kumar


G, April 2019, “Biometric Based Electronic Voting System
Using Aadhar”, International Journal Of Innovative
Technology And Exploring Engineering (Ijitee), Vol. 8, No.
6s, Pp. 196-205.
5)Mohamed Amine Ferrag, Leandros Maglaras, Abdelouahid
Derhab, Feb 2018, “Authentication And Authorization For
Mobile Iot Devices Using Bio-Features: Recent Advances
And Future Trends”, IEEE International Journal Of
Innovative Technology, Vol. 56, No. 2, Pp. 150–157.

You might also like