4
@ IJTSRD | Available Online @ www ISSN No: 245 Inte R Secure Authenti usin B. Shalini Department of Computer Science and E GKM College of Engineering and Te Chennai, Tamil Nadu, Indi Assistant Professor, GKM College of Engi ABSTRACT The problem of voting is still critica rigging and security. A RFID and fingerprint sensor is being used in t voting system. In the initial stage of v bullet papers and polling machine witho authentication on the election vo Biometric are used for human secure because fingerprint are unique in hum nature. RFID (Radio Frequency Identi for automatic fetching data from data sto The both modules are enhanced the ri gg the election. Keywords: RFID tag and reader, finge microcontroller PIC16F877A. INTRODUCTION This paper focuses on problem faced b commission in rigging vote during the overcome this problem, we introduced fingerprint verification for the voting in (fingerprint is unique in nature for eac in the case of twins) RFID tags have details. Radio frequency identificatio allows time to be scanned quickly an identification of the particular. Even covered by several items. It enables get profile faster. Both of the fingerprint ve the RFID technology makes candidate secure and authenticate. w.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 56 - 6470 | www.ijtsrd.com | Volum ernational Journal of Trend in Sc Research and Development (IJT International Open Access Journ ication for Advanced Voting S ng Fingerprint and RFID Engineering, echnology, ia M. Sakthi P Department of Computer Sci GKM College of Engineer Chennai, Tamil N R. Krithika , Department of Computer Science and Engineer ineering and Technology, Chennai, Tamil Nadu, al in terms of BIOMETRIC this advanced voting we use out any unique oting process. authentication man biological ification) used ored in device. ging security in erprint sensor, by the election e election. To the bio-metric n the election. ch person even the candidate on technology nd enable fast n when it is t the candidate erification and cast their vote RELATED WORK Robust Biometric Recogniti Images for Gloved Hands 2015disadvantage is Biomet used to improve gesture automatically identifying computational cost mu segmentation algorithms for mobile phones, Danil disadvantages is Unconstraine recognition problem with mob yet because these systems h problems like different backgr Palm-Print Classification by Zhang, 2013 Three-dimensi harder to counterfeit than 2-D robust to variations in illu scrabbling on the palm surface palm-print recognition has features such as texture and lin PROPOSED SYSTEM The Biometric voting sys biometric fingerprint using v voters are permitted to cas human fallibility from the makes your election results a period of time at the end of ballots, no postage and no pri and there will be no fake votes r 2018 Page: 703 me - 2 | Issue 3 cientific TSRD) nal System Prabha ience and Engineering, ring and Technology, Nadu, India ring, , India ion from Palm Depth s, P. Nguyen, Member, tric recognition can be e-based interfaces by operators. Low ultilayer graph-based r hand recognition on de Santos-sierra,2014 ed and contact-free hand bile devices is not solved have to deal with hard rounds and illumination. y Global Features, Bob ional palm prints are D palm prints and more umination and serious e. Previous work on 3-D concentrated on local nes. stem with RFID and voter id. Only eligible st their vote. Removes tabulation process and available within limited f the election. No paper inting It will be secured s.

Secure Authentication for Advanced Voting System using Fingerprint and RFID

  • Upload
    ijtsrd

  • View
    6

  • Download
    0

Embed Size (px)

DESCRIPTION

The problem of voting is still critical in terms of rigging and security. A RFID and BIOMETRIC fingerprint sensor is being used in this advanced voting system. In the initial stage of voting we use bullet papers and polling machine without any unique authentication on the election voting process. Biometric are used for human secure authentication because fingerprint are unique in human biological nature. RFID Radio Frequency Identification used for automatic fetching data from data stored in device. The both modules are enhanced the rigging security in the election. B. Shalini | M. Sakthi Prabha | R. Krithika "Secure Authentication for Advanced Voting System using Fingerprint and RFID" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: https://www.ijtsrd.com/papers/ijtsrd11044.pdf Paper URL: http://www.ijtsrd.com/engineering/computer-engineering/11044/secure-authentication-for-advanced-voting-system-using-fingerprint-and-rfid/b-shalini

Citation preview

Page 1: Secure Authentication for Advanced Voting System using Fingerprint and RFID

@ IJTSRD | Available Online @ www.ijtsrd.com

ISSN No: 2456

InternationalResearch

Secure Authentication using Fingerprint

B. Shalini Department of Computer Science and Engineering,

GKM College of Engineering and Technology, Chennai, Tamil Nadu, India

Assistant Professor, Department of Computer Science and GKM College of Engineering and Technology, Chennai, Tamil Nadu, India

ABSTRACT

The problem of voting is still critical in terms of rigging and security. A RFID and BIOMETRIC fingerprint sensor is being used in this advanced voting system. In the initial stage of voting we use bullet papers and polling machine without any unique authentication on the election votinBiometric are used for human secure authentication because fingerprint are unique in human biological nature. RFID (Radio Frequency Identification) used for automatic fetching data from data stored in device. The both modules are enhanced the rigging security in the election.

Keywords: RFID tag and reader, fingerprint sensor, microcontroller PIC16F877A.

INTRODUCTION

This paper focuses on problem faced by the election commission in rigging vote during the election. Toovercome this problem, we introduced the biofingerprint verification for the voting in the election. (fingerprint is unique in nature for each person even in the case of twins) RFID tags have the candidate details. Radio frequency identification technology allows time to be scanned quickly and enable fast identification of the particular. Even when it is covered by several items. It enables get the candidate profile faster. Both of the fingerprint verification and the RFID technology makes candidate cast their vote secure and authenticate.

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018

ISSN No: 2456 - 6470 | www.ijtsrd.com | Volume

International Journal of Trend in Scientific Research and Development (IJTSRD)

International Open Access Journal

Secure Authentication for Advanced Voting Systemsing Fingerprint and RFID

Department of Computer Science and Engineering, GKM College of Engineering and Technology,

Chennai, Tamil Nadu, India

M. Sakthi PrabhaDepartment of Computer Science and Engineering,

GKM College of Engineering and Technology, Chennai, Tamil Nadu, India

R. Krithika

Assistant Professor, Department of Computer Science and EngineeringGKM College of Engineering and Technology, Chennai, Tamil Nadu, India

critical in terms of rigging and security. A RFID and BIOMETRIC fingerprint sensor is being used in this advanced voting system. In the initial stage of voting we use bullet papers and polling machine without any unique authentication on the election voting process. Biometric are used for human secure authentication because fingerprint are unique in human biological nature. RFID (Radio Frequency Identification) used for automatic fetching data from data stored in device.

gging security in

RFID tag and reader, fingerprint sensor,

This paper focuses on problem faced by the election commission in rigging vote during the election. To

introduced the bio-metric fingerprint verification for the voting in the election. (fingerprint is unique in nature for each person even in the case of twins) RFID tags have the candidate details. Radio frequency identification technology

scanned quickly and enable fast identification of the particular. Even when it is

enables get the candidate verification and

the RFID technology makes candidate cast their vote

RELATED WORK

Robust Biometric Recognition from Palm Depth Images for Gloved Hands, P. Nguyen, Member, 2015disadvantage is Biometric recognition can be used to improve gestureautomatically identifying operators. Lcomputational cost multilayer graphsegmentation algorithms for hand recognition on mobile phones, Danil de Santosdisadvantages is Unconstrained and contactrecognition problem with mobile devices is not solved yet because these systems have to deal with hard problems like different backgrounds and illumination. Palm-Print Classification by Global Features, Bob Zhang, 2013 Three-dimensional palm prints are harder to counterfeit than 2-D palm prints and more robust to variations in illumination and serious scrabbling on the palm surface. Previous work on 3palm-print recognition has concentrated on local features such as texture and lines.

PROPOSED SYSTEM

The Biometric voting system with RFID and biometric fingerprint using voter id. Only eligible voters are permitted to cast their vote. Removes human fallibility from the tabulation process and makes your election results available within limited period of time at the end of the election. No paper ballots, no postage and no printing It will be secured and there will be no fake votes.

Apr 2018 Page: 703

6470 | www.ijtsrd.com | Volume - 2 | Issue – 3

Scientific (IJTSRD)

International Open Access Journal

or Advanced Voting System

M. Sakthi Prabha Department of Computer Science and Engineering,

GKM College of Engineering and Technology, Chennai, Tamil Nadu, India

ngineering, GKM College of Engineering and Technology, Chennai, Tamil Nadu, India

Robust Biometric Recognition from Palm Depth Images for Gloved Hands, P. Nguyen, Member, 2015disadvantage is Biometric recognition can be used to improve gesture-based interfaces by automatically identifying operators. Low computational cost multilayer graph-based segmentation algorithms for hand recognition on

Danil de Santos-sierra,2014 disadvantages is Unconstrained and contact-free hand recognition problem with mobile devices is not solved

hese systems have to deal with hard problems like different backgrounds and illumination.

Print Classification by Global Features, Bob dimensional palm prints are

D palm prints and more ons in illumination and serious

scrabbling on the palm surface. Previous work on 3-D print recognition has concentrated on local

features such as texture and lines.

The Biometric voting system with RFID and voter id. Only eligible

voters are permitted to cast their vote. Removes human fallibility from the tabulation process and makes your election results available within limited period of time at the end of the election. No paper

printing It will be secured and there will be no fake votes.

Page 2: Secure Authentication for Advanced Voting System using Fingerprint and RFID

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

@ IJTSRD | Available Online @ www.ijtsrd.com

The following process involved in our proposed system:

RFID and Bio-Metric Finger Print Sensor is the first stage of the system, where the person place the RFID tag in the reader. The reader checks the matching data and moves to next stage. .

• Fingerprint is taken and checked, with the existing database of the area. This unit works as your voter id where they identify, whether the person resident of that area or not.

• Any proxy person try to vote and his data was not there means the red light will glow and he is not allowed to enter the voting stage and it also blocks the person who comes to vote twice.

• Voting Area is the second stage of the system, where the person who will go to push the butof his choice And the count is stored in microcontroller and send to counting station via RF immediately.

• Third stage is the Counting Area stage. In this stage information received from the voting station will be added and displayed parallel on the display, this will happen in real time.

• By using biometric fingerprint it provides enough security which reduces the false votes.

PIC 16F877A CONTROLLER

The 16F877A is a capable microcontroller that can do many tasks because it has a large enough programming memory (large in terms of sensor and control projects) 8k words and 368 Bytes of RAM. This is enough to do many different projects

in Scientific Research and Development (IJTSRD) ISSN: 2456

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018

The following process involved in our proposed

Metric Finger Print Sensor is the first stage of the system, where the person place the RFID

ecks the matching data

Fingerprint is taken and checked, with the existing database of the area. This unit works as your voter id where they identify, whether the person resident

vote and his data was not there means the red light will glow and he is not allowed to enter the voting stage and it also blocks the person who comes to vote twice.

Voting Area is the second stage of the system, where the person who will go to push the button of his choice And the count is stored in microcontroller and send to counting station via

Third stage is the Counting Area stage. In this stage information received from the voting station

displayed parallel on the play, this will happen in real time.

By using biometric fingerprint it provides enough security which reduces the false votes.

The 16F877A is a capable microcontroller that can do many tasks because it has a large enough

memory (large in terms of sensor and control projects) 8k words and 368 Bytes of RAM. This is enough to do many different projects.

BLOCK DIAGRAM

SYSTEM HARDWARE

Fig 1: PROPOSED SYSTEM

PIC 16F877A CONTROLLER

in Scientific Research and Development (IJTSRD) ISSN: 2456-6470

Apr 2018 Page: 704

PROPOSED SYSTEM

PIC 16F877A CONTROLLER

Page 3: Secure Authentication for Advanced Voting System using Fingerprint and RFID

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

@ IJTSRD | Available Online @ www.ijtsrd.com

ARCHITECTURE DIAGRAM

LIST OF WORKING MODULES IN PROPOSED SYSTEM

a) RFID module

b) Fingerprint verification module

c) Casting module

d) Counting module

a) RFID MODULE

In this module we are implement RFID tags and reader, RFID contain voters ID details and RFID reader is used to scan the tag and fetch the voter’s details from the database. Radio frequency identification technology allows time to be scanned quickly and enable fast identification of the particular

Fig 3: RFID Tag & Reader

in Scientific Research and Development (IJTSRD) ISSN: 2456

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018

Fig 2: Working Architecture

LIST OF WORKING MODULES IN PROPOSED

b) Fingerprint verification module

In this module we are implement RFID tags and reader, RFID contain voters ID details and RFID reader is used to scan the tag and fetch the voter’s details from the database. Radio frequency

time to be scanned able fast identification of the particular

RFID Tag & Reader

b) FINGERPRINT VERIFICATION MODULE

In the fingerprint verification module voter can authenticate their fingerprint after placing the RFID tag, fingerprint module captures the and verifying with the stored image of the candidate in the database on voting system.

Fig-4 .RS232 Interface FingerprintReader with Board

c) CASTING MODULE

This module is used to identify the specific constitution volume of voter and of candidates those who are nominated for particular volume in particular position. This module will help the voters they can easily identify the candidates in that system.

in Scientific Research and Development (IJTSRD) ISSN: 2456-6470

Apr 2018 Page: 705

b) FINGERPRINT VERIFICATION MODULE

In the fingerprint verification module voter can authenticate their fingerprint after placing the RFID

captures the fingerprint image and verifying with the stored image of the candidate in the database on voting system.

4 .RS232 Interface Fingerprint Reader with Board

This module is used to identify the specific constitution volume of voter and also viewing the list of candidates those who are nominated for particular volume in particular position. This module will help the voters they can easily identify the candidates in

Page 4: Secure Authentication for Advanced Voting System using Fingerprint and RFID

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

@ IJTSRD | Available Online @ www.ijtsrd.com

CASTING VOTE

Fig-5: Before Casting

Fig-6: After Casting

d) COUNTING MODULE

This module will count the number of from user applications to Database once they processed the action, voter should be revoked they are not allowed to perform further voting process in a specific duration.

Result Window

in Scientific Research and Development (IJTSRD) ISSN: 2456

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018

votes received from user applications to Database once they processed the action, voter should be revoked they are not allowed to perform further voting process in a

CONCLUSION

After implementation of this project we can change the face of today’s voting system making it more secure and corruption less. It will give a fair chance to every leader to win on the basis of strength of money and power. The scope of the the society, institutional or nation level by using a more secure and efficient database management system that could handle hundreds, thousands or billions of users.in future we implement iris authentication for security.

REFERENCE

1. Burmester, M., Magkos, E., Towards secure and practical e-elections in the new era. In D. Gritzalis, editor, Secure Electronic Voting, pages 63– 72. Kluwer Academic Publishers, (2003).

2. ARM Cortex M3‖, [Online] Available: http://www.st.com

3. A. illafiorita and K. Weldemariam, and. iella, “Development, Formal eriof an E-voting System with PA,” IEEE transactions on Information Forensics and Security, vol. 4, no. 4, 2009

4. Qadah, G.Z., Taha, R.: Electronic voting systems: requirements, design, and implementation. Compute. Stand. Interf. 29(3), 376

5. A. M. Keller, A. Dechert, K. Auerbach, D. Mertz, A. Pearl, and J. L. Hall, “A PCSource Voting Machine with an Accessible VoterVerifiable Paper Ballot,” ProceedUSENIX Annual Technical Conference, U.S.A., 2005, p.52.

in Scientific Research and Development (IJTSRD) ISSN: 2456-6470

Apr 2018 Page: 706

After implementation of this project we can change the face of today’s voting system making it more secure and corruption less. It will give a fair chance to every leader to win on the basis of strength of money

project can be raised to the society, institutional or nation level by using a more secure and efficient database management system that could handle hundreds, thousands or billions of users.in future we implement iris

Burmester, M., Magkos, E., Towards secure and elections in the new era. In D.

Gritzalis, editor, Secure Electronic Voting, pages 72. Kluwer Academic Publishers, (2003).

‖, [Online] Available:

orita and K. Weldemariam, and. iella, “Development, Formal erification, and Evaluation

voting System with PA,” IEEE transactions on Information Forensics and Security, vol. 4, no. 4, 2009

Qadah, G.Z., Taha, R.: Electronic voting systems: ments, design, and implementation.

Compute. Stand. Interf. 29(3), 376–386 (2007).

A. M. Keller, A. Dechert, K. Auerbach, D. Mertz, A. Pearl, and J. L. Hall, “A PC-based Open-Source Voting Machine with an Accessible Voter- Verifiable Paper Ballot,” Proceedings of the USENIX Annual Technical Conference, U.S.A.,