5
International Journ Internat ISSN No: 245 @ IJTSRD | Available Online @ www Web Based Electro Authen Research Scholars, University of Engineering & ABSTRACT Voting is the heart of a democratic c should be fair and square by all means . in the world is spending a handsome a electoral process to refine it to the next of all the refinement on the electoral pr always issues rises about the rigging in To counter this and to ameliorate the ele to next level we are proposing a s includes a finger print scanner and GSM have defined a methodology to counter holes in the electoral process. Keyword: Finger print, GSM module 1. INTRODUCTION To completely understand our system fi understand the conventional voting conventional voting system voters ca using ballots papers. Which is a troublesome process. The voters go to to cast their vote and there are pollin guide the voters to cast their vote. Th ticks their desired representative on the And this process is carried out for the ot well. And at the end of the day the vote And the winner is selected with the mos This process is difficult for the voters a for the government. Traditional voting process can be different phases. 1. Authentication: In this phase, voter authenticates himsel showing his or her voting card, this step verified by the presiding officer. A nal of Trend in Scientific Research and De tional Open Access Journal | www.ijtsr 56 - 6470 | Volume - 2 | Issue – 6 | Sep w.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct onic Voting System Using Fing ntication and GSM Module Bilal Hussain Ch, Subayyal Department of Computer Science and Engineer & Technology, RCET, Gujranwala Campus, Laho country and it .Every country amount on the t level. Instead rocess there is n the elections. ectoral process system which M module. We all the hidden irst we have to g system. In ast their vote a costly and polling Booth ng agents that he voters Than e ballot paper. thers Voters as es are counted. st votes. and as well as divided into lf or herself by p is public and At the end of authentication process, presid paper to voter to cast his or he 2. Vote: The vote takes place in a prot cannot be seen by any perso vote by writing it with a pen o the ballot paper and put into the votes are mixed. 3. Vote counting: At the end of voting time, the the ballot box containing all b it to the counting center. Aft members of the election co election commission of India opened and votes are counted announced. 4. Verification: Various types of verification procedure are public an representative of candidates Recount is also possible if ther In the 19 th century electronic presented and it got implem European countries and USA. machines are placed in the p users can access them easily made the electoral process a w the further inventions and res that this voting process is considered. Voting machines results can be changed. evelopment (IJTSRD) rd.com p – Oct 2018 2018 Page: 307 ger Print ring, ore, Pakistan ding officer give a ballot er vote. tected booth where voter on. The voter cast their on the paper ballot, folds the ballot box where all presiding officer collect ballot papers and submit ter that with the help of ommittee nominated by a, the ballot boxes are d and the results are then process are used, most nd verified by the of competing parties. re is any fraud or error. c voting system is also mented in most of the . In the E voting , voting public areas so that the y and cast their vote. It whole lot faster but with search it was established not as safe as it is can be hacked and the

52 Web based electronic voting system using finger Print … · 2018. 9. 14. · includes a finger print scanner and GSM module. We have defined a methodology to counter all the hidden

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

  • International Journal of Trend in

    International Open Access Journal

    ISSN No: 2456

    @ IJTSRD | Available Online @ www.ijtsrd.com

    Web Based Electronic VAuthentication

    Research Scholars, University of Engineering &

    ABSTRACT Voting is the heart of a democratic country and it should be fair and square by all means .Every in the world is spending a handsome amount on the electoral process to refine it to the next level. Instead of all the refinement on the electoral process there is always issues rises about the rigging in the elections. To counter this and to ameliorate the electoral process to next level we are proposing a system which includes a finger print scanner and GSM module. We have defined a methodology to counter all the hidden holes in the electoral process. Keyword: Finger print, GSM module 1. INTRODUCTION To completely understand our system first we have to understand the conventional voting system. In conventional voting system voters cast their vote using ballots papers. Which is a costly and troublesome process. The voters go to polling to cast their vote and there are polling agents that guide the voters to cast their vote. The voters Than ticks their desired representative on the ballot paper. And this process is carried out for the others Voters as well. And at the end of the day the votes are counted. And the winner is selected with the most votes. This process is difficult for the voters and as well as for the government. Traditional voting process can be divided into different phases. 1. Authentication: In this phase, voter authenticates himself or herself by showing his or her voting card, this step is public and verified by the presiding officer. At the end of

    International Journal of Trend in Scientific Research and Development (IJTSRD)

    International Open Access Journal | www.ijtsrd.com

    ISSN No: 2456 - 6470 | Volume - 2 | Issue – 6 | Sep

    www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018

    Web Based Electronic Voting System Using Finger PrintAuthentication and GSM Module

    Bilal Hussain Ch, Subayyal , Department of Computer Science and Engineering& Technology, RCET, Gujranwala Campus, Lahore

    Voting is the heart of a democratic country and it should be fair and square by all means .Every country in the world is spending a handsome amount on the electoral process to refine it to the next level. Instead of all the refinement on the electoral process there is always issues rises about the rigging in the elections.

    orate the electoral process to next level we are proposing a system which includes a finger print scanner and GSM module. We have defined a methodology to counter all the hidden

    To completely understand our system first we have to understand the conventional voting system. In conventional voting system voters cast their vote using ballots papers. Which is a costly and troublesome process. The voters go to polling Booth to cast their vote and there are polling agents that guide the voters to cast their vote. The voters Than ticks their desired representative on the ballot paper. And this process is carried out for the others Voters as

    the votes are counted. And the winner is selected with the most votes.

    This process is difficult for the voters and as well as

    Traditional voting process can be divided into

    enticates himself or herself by showing his or her voting card, this step is public and verified by the presiding officer. At the end of

    authentication process, presiding officer give a ballot paper to voter to cast his or her vote. 2. Vote: The vote takes place in a protected booth where voter cannot be seen by any person. The voter cast their vote by writing it with a pen on the paper ballot, folds the ballot paper and put into the ballot box where all the votes are mixed. 3. Vote counting: At the end of voting time, the presiding officer collect the ballot box containing all ballot papers and submit it to the counting center. After that with the help of members of the election committee nominated by election commission of India, the ballot boxes are opened and votes are counted and the results are then announced. 4. Verification: Various types of verification process are used, most procedure are public and verified by the representative of candidates of competing parties. Recount is also possible if there is any In the 19th century electronic voting system is also presented and it got implemented in most of the European countries and USA. In the E voting , voting machines are placed in the public areas so that the users can access them easily and cast their vote. It made the electoral process a whole lot faster but with the further inventions and research it was established that this voting process is not as safe as it is considered. Voting machines can be hacked and the results can be changed.

    Research and Development (IJTSRD)

    www.ijtsrd.com

    6 | Sep – Oct 2018

    Oct 2018 Page: 307

    oting System Using Finger Print

    Engineering, Lahore, Pakistan

    authentication process, presiding officer give a ballot paper to voter to cast his or her vote.

    lace in a protected booth where voter cannot be seen by any person. The voter cast their vote by writing it with a pen on the paper ballot, folds the ballot paper and put into the ballot box where all

    ng time, the presiding officer collect the ballot box containing all ballot papers and submit it to the counting center. After that with the help of members of the election committee nominated by election commission of India, the ballot boxes are

    d votes are counted and the results are then

    Various types of verification process are used, most procedure are public and verified by the representative of candidates of competing parties. Recount is also possible if there is any fraud or error.

    century electronic voting system is also presented and it got implemented in most of the European countries and USA. In the E voting , voting machines are placed in the public areas so that the users can access them easily and cast their vote. It

    electoral process a whole lot faster but with the further inventions and research it was established that this voting process is not as safe as it is considered. Voting machines can be hacked and the

  • International Journal of Trend in Scientific

    @ IJTSRD | Available Online @ www.ijtsrd.com

    To avoid all this confusion and trouble we have proposed a system that includes finger print scanning and GSM module.

    In our methodology there are three phases:� Registration phase: In this phase the voter will be

    registered and all the information regarding the voter is placed in the database. In this phase the voter will be prompted to input all his/her personal information in the required field like his ID card number, age , name, cell phone number. And after that the user will be asked to place the finger on the finger print device so that the image of the finger is placed in the database. After all this, registration phase will be completed.

    � Authentication phase: This phase will start when the user is about to cast the vote. When the user go the website to cast the vote, before casting the vote this phase will begin. The user is asked to place the finger on the device, first the user is authenticated with the information saved in the database at the time of registration. If the user is authenticated the user will be given permission to cast the vote.

    International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

    www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018

    d trouble we have proposed a system that includes finger print scanning

    In our methodology there are three phases: : In this phase the voter will be

    registered and all the information regarding the e database. In this phase the

    voter will be prompted to input all his/her personal information in the required field like his ID card number, age , name, cell phone number. And after that the user will be asked to place the finger on

    e so that the image of the finger is placed in the database. After all this, registration phase will be completed.

    This phase will start when the user is about to cast the vote. When the user go the website to cast the

    casting the vote this phase will begin. The user is asked to place the finger on the device, first the user is authenticated with the information saved in the database at the time of registration. If the user is authenticated the user will be given

    � Casting phase: In this phase the user will be given the privilege to cast the vote. If all the steps before are satisfied and completed then the user will be promoted to this phase. In this phase the user cast the vote .And at the result will be calculated.

    5. Benefits of our methodology:The benefits of our methodology are:� Fairness:

    Our system will introduce fairness in the electoral process to next level. As the methodology proposed by us is nearly impossible to break. will introduce fairness in the electoral process.

    � Eligibility of voters:-

    In our methodology we have made sure that only authorized will be able to cast the vote. Unauthorized voters will be caught at the start of the process and will not be allowedvote.

    � Uniqueness:-

    We have defined uniqueness in our system. Every voter has the unique identity because of the unique finger print. No voter would be allowed to cast the vote more than one time.

    � Privacy:-

    We have paid special attention to psystem. As the user will cast the vote over the internet and can cast the vote anywhere. So no one can access the information regarding the vote of the voter. His/her privacy will be maintained.

    � Accuracy:-

    Our methodology is accurate. We accurate and dependable devices in the system. They will provide the most accurate result is all conditions.

    � Efficiency:-

    Efficiency is the important factor that we have considered. Our system will enhance the efficiency to the next level. Our methodology will provide the result in minimal time and with precision.

    Research and Development (IJTSRD) ISSN: 2456-6470

    Oct 2018 Page: 308

    In this phase the user will be given the privilege to cast the vote. If all the steps before are satisfied and completed then the user will be promoted to

    In this phase the user cast the vote .And at the end the result will be calculated.

    Benefits of our methodology: The benefits of our methodology are:

    Our system will introduce fairness in the electoral process to next level. As the methodology proposed by us is nearly impossible to break. So it will introduce fairness in the electoral process.

    In our methodology we have made sure that only authorized will be able to cast the vote. Unauthorized voters will be caught at the start of the process and will not be allowed to cast the

    We have defined uniqueness in our system. Every voter has the unique identity because of the unique finger print. No voter would be allowed to cast the

    We have paid special attention to privacy in our system. As the user will cast the vote over the internet and can cast the vote anywhere.

    So no one can access the information regarding the vote of the voter. His/her privacy will be

    Our methodology is accurate. We have introduced accurate and dependable devices in the system. They will provide the most accurate result is all

    Efficiency is the important factor that we have

    Our system will enhance the efficiency to the next . Our methodology will provide the result in

    minimal time and with precision.

  • International Journal of Trend in Scientific

    @ IJTSRD | Available Online @ www.ijtsrd.com

    Difference between other e-voting systems and our methodology:- Due to intense need of the fairness in the electoral process various modules have been proposed. Various systems have been implemented in which finger print authentication is using. But there is a main difference between our methodology and other e voting scheme. First of all our methodology includes GSM modules that is absent in other types of systems. And besidesthat we are using Finger print authentication modules, functions of which are created in MATLAB and advanced acquisition and comparison techniques are used.

    We have used various built in functions and also created some functions in MATLAB to enhance quality of the input image and to store it in the database. The use of the GSM module is that when the user authorizes itself for the casting of the vote the message is send to the given number of the voter and the message contains the code for the vois asked to input the code in the required field in order to cast the vote. Explained view of the system:- We are using two basic modules GSM and the Finger print scanner. The use of both devices is immense and vital. Our proposed methodology is client/server based and web based. The voter will cast the vote using Internet. Our methodology consists of 3 phases:- Registration phase:- In this phase the voter will be registered. This is the first phase in the system. The user will log

    International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

    www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018

    voting systems and our

    Due to intense need of the fairness in the electoral process various modules have been proposed. Various

    have been implemented in which finger print authentication is using. But there is a main difference between our methodology and other e voting scheme.

    First of all our methodology includes GSM modules that is absent in other types of systems. And besides that we are using Finger print authentication modules, functions of which are created in MATLAB and advanced acquisition and comparison techniques are

    We have used various built in functions and also created some functions in MATLAB to enhance the quality of the input image and to store it in the

    The use of the GSM module is that when the user authorizes itself for the casting of the vote the message is send to the given number of the voter and the message contains the code for the voting. The user is asked to input the code in the required field in order

    We are using two basic modules GSM and the Finger print scanner. The use of both devices is immense and

    methodology is client/server based and web based. The voter will cast the vote using Internet.

    In this phase the voter will be registered. This is the first phase in the system. The user will login in to the

    system and opens the website to register itself. The user will be prompted to give the basic information regarding himself / herself. Remember our methodology is client/server based. The voter will be the client. And architecture. After the user will give all the information about himself / herselfasked to provide the cell phone number and after that the user is asked to place the finger on the device so that the system can take the fair good impression of the finger. We have used some MATLAB functions and have created some of the functions regarding image acquisition and image enhancement to get a clear impression of the finger. After all the working the voter will be registered and a unique voter id will be generated in database for the user. And thus the first phase will be completed this way. Authentication phase:- In this phase the voter will be authenticated as it name specifies. This phase will start right before the voting and the last phase. In this phase, when the voter is ready to cast the vote the voter will be prompted to place the finger on the device so that the system can take a fair good impression of the thumb. The image obtained will be compared with the image placed in the database for that voter. If the image matches with the one in the database the user will be authorizes and asked to cast the vote. And if the image doesn’t matches with the one on the database the voter is not authorized and will be not asked to cast the vote. We have used some of the MATLAB functions and also created some to remove the ambiguity of matching the finger prints.

    Research and Development (IJTSRD) ISSN: 2456-6470

    Oct 2018 Page: 309

    system and opens the website to register itself. The user will be prompted to give the basic information

    Remember our methodology is client/server based. The voter will be the client. And its web based

    re. After the user will give all the himself / herself then user will be

    asked to provide the cell phone number and after that the user is asked to place the finger on the device so that the system can take the fair good impression of

    inger. We have used some MATLAB functions and have created some of the functions regarding image acquisition and image enhancement to get a

    After all the working the voter will be registered and a nerated in database for the

    user. And thus the first phase will be completed this

    In this phase the voter will be authenticated as it name

    This phase will start right before the voting and the ase, when the voter is ready to

    cast the vote the voter will be prompted to place the finger on the device so that the system can take a fair good impression of the thumb. The image obtained will be compared with the image placed in the

    oter. If the image matches with the one in the database the user will be authorizes and asked to cast the vote. And if the image doesn’t matches with the one on the database the voter is not authorized and will be not asked to cast the vote.

    some of the MATLAB functions and also created some to remove the ambiguity of

  • International Journal of Trend in Scientific

    @ IJTSRD | Available Online @ www.ijtsrd.com

    Casting phase:- After all the registration and authentication the voter will be finally prompted to cast the vote. The list of candidates will be visible to the voter and the voter can tick the right one he/she wants. After the casting it is very easy and feasible to count the votes. The votes would automatically be counted at the end because of the efficiency of the system. And the winner will be announced. Flowchart:-

    Conclusion:- We have defined the methodology using two modules Finger print scanner and the GSM module. Both the modules have vital importance in the system. Our methodology is that we are using a client/ server based architecture. In which the voter is a client. It’s a web based architecture. First the user is registered with his/her unique finger print in the database of the government. After the registration phase there comes the authentication phase and in the end tphase. In the authentication phase finger print of the voter is compared with the finger print saved in the database at the time of registration. . The use of the GSM module is that when the user is about to cast the vote a code is send to the cell phone of the voter. The user will be asked to place the code in the field given to cast the vote. Our methodology is unique, fair, adaptable, secure and efficient.

    International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

    www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018

    After all the registration and authentication the voter will be finally prompted to cast the vote.

    visible to the voter and the voter can tick the right one he/she wants.

    After the casting it is very easy and feasible to count the votes. The votes would automatically be counted at the end because of the efficiency of the system.

    We have defined the methodology using two modules Finger print scanner and the GSM module. Both the modules have vital importance in the system. Our methodology is that we are using a client/ server

    architecture. In which the voter is a client. It’s a web based architecture. First the user is registered with his/her unique finger print in the database of the government. After the registration phase there comes the authentication phase and in the end there is casting phase. In the authentication phase finger print of the voter is compared with the finger print saved in the database at the time of registration. . The use of the GSM module is that when the user is about to cast the

    the cell phone of the voter. The user will be asked to place the code in the field given to cast the vote. Our methodology is unique, fair,

    Future work:- In future the voting process can be more verified and enhanced using our methodology. We can attach other modules as well to enhance the efficiency of the system. We can attach iris detection and face detection to maximize the efficiency. We can also attach speech recognition module.

    References:- 1. R. Mercuri, “Electronic Vote Tabulation Checks

    and Balances”, PhD thesis, University of Pennsylvania, Philadelphia, PA, October 2000.

    2. D. Rubin, “Security considerations for remote electronic voting. Communications of the ACM, 45(12):39–44”, December 2002.http://avirubin.com/e-voting.security.html

    3. T. E. Carroll, D. Grosu, "A Secure and Efficient Voter-controlled Anonymous Election Scheme," International Conference on Information Technology: Coding and computing, as Vegas, pp.721 - 726, 2005.

    4. C. H. Chen, C. M. Lan, and G. Homg, "A Practical Voting Systems for Small Scale Election," 3rd International Conference on

    Research and Development (IJTSRD) ISSN: 2456-6470

    Oct 2018 Page: 310

    In future the voting process can be more verified and g our methodology.

    We can attach other modules as well to enhance the efficiency of the system. We can attach iris detection and face detection to maximize the efficiency.

    We can also attach speech recognition module.

    R. Mercuri, “Electronic Vote Tabulation Checks and Balances”, PhD thesis, University of Pennsylvania, Philadelphia, PA, October 2000.

    D. Rubin, “Security considerations for remote electronic voting. Communications of the ACM,

    44”, December 2002. voting.security.html

    E. Carroll, D. Grosu, "A Secure and Efficient controlled Anonymous Election Scheme,"

    International Conference on Information Technology: Coding and computing, as Vegas,

    M. Lan, and G. Homg, "A Practical Voting Systems for Small Scale Election," 3rd International Conference on

  • International Journal of Trend in Scientific

    @ IJTSRD | Available Online @ www.ijtsrd.com

    Information Technology: Research and Education, Hsinchu, pp.322 - 326, 2005.

    5. Z. Claudia, R. H. Francisco, and O."SELES: An e-Voting System for Medium Scale Online Elections," Process of the Sixth Mexican International Conference on Computer Science, Puebla, pp.50-57, 2005.

    International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

    www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018

    Information Technology: Research and Education,

    H. Francisco, and O. A. Daniel, System for Medium Scale

    Online Elections," Process of the Sixth Mexican International Conference on Computer Science,

    6. Maltoni D, Maio D, Jain AHandbook of Fingerprint Recognition, 2nd ed., Springer, 2009

    7. Altun A A, Kocer H E, Allahverdi, “Genetic algorithm based feature selection level fusion using fingerprint and iris biometrics”, Int. J. Pattern Recog. Artif. Intell. (IJPRAI), 22(3): 585600, November 2008.

    Research and Development (IJTSRD) ISSN: 2456-6470

    Oct 2018 Page: 311

    Maltoni D, Maio D, Jain A K, Prabhakar S, Handbook of Fingerprint Recognition, 2nd ed.,

    E, Allahverdi, “Genetic algorithm based feature selection level fusion using fingerprint and iris biometrics”, Int. J. Pattern Recog. Artif. Intell. (IJPRAI), 22(3): 585-