3
@ IJTSRD | Available Online @ www ISSN No: 245 Inte R Secure Authe using Finger B. Chand Departme G.K.M. College of Eng ABSTRACT The problem of voting is still critica safety and security. This paper deals w and development of a web-based voting fingerprint and adhaar card in order to p performance with high security to the v Also we use web technology to mak system more practical. The proposed O System allows the voters to scan the which is then matched with an already within a database that is retrieved from database of the government. The vot managed in a simpler way as all the us by adhaar card number and password his/her favorable candidates to cast the System we also restrict the Ineligible respect to age. This will increas percentage in India and reduces the c process. By using biometric fingerpri enough security which reduces the false Keywords: Biometric recognition, a synthetic database, verification, voting I. INTRODUCTION Online voting system project is im Asp.net platform using Mysql database Main aim of online voting system is online application like online reservatio citizens who are above 18 years of age to online. Using these system citizens i Indian can vote through online wi polling booth. A centralized database is election commission of india wh information is maintained when citizen is maintained whenever citizen is using o w.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 56 - 6470 | www.ijtsrd.com | Volum ernational Journal of Trend in Sc Research and Development (IJT International Open Access Journ entication to Identify the Hum Printer Profile in Voting Syst draganesh, J. Nareshkumar, S. Thirumal ent of Computer Science and Engineering, gineering and Technology, Chennai, Tamil Nadu al in terms of with the design g system using provide a high voting system. ke the voting Online Voting eir fingerprint, y saved image m adhaar card ting system is sers must login d and click on vote. In this le voters with se the voting cost of voting int it provides votes. aadhar card, mplemented in e as back end. to develop an on system, for o vote through information of ithout visiting maintained by here citizens ns information online voting system his/her information is data present in database if use cannot use online voting syst with a online registration fo these details are compared password using this informat vote using biometric fingerpri correct entry will be canceled vote. It might be reduced the f II. RELATED WORKS Robust Biometric Recogniti Images for Gloved Hands, (2015). The from palm a d palm biometric recognition. It and palm of users. palm techniques depend upon palm humans. Low computational based segmentation algorithm on mobile phones, Danil de segmentation method based theory that performs accura without being computationa algorithm hand recognition fo segmentation algorithms (NC using a synthetic database wi Palm-Print Classification by Zhang, 2013.Meng-Hui, Wang the concept of Application of chaos theory in ECG identi Surface, Vivek Kanhangad technique Contactless and Po Identification Using Hand s Fellow, IEEE, Arun Ross, M r 2018 Page: 256 me - 2 | Issue 3 cientific TSRD) nal man tem u, India s authenticated with the er is not in the list he/she tem. Users are provided orm and submit details d with username and tion user can login and int. If conditions are not d and user cannot able to false voters and votes. ion From Palm Depth P. Nguyen, Member depth-based solution for t can be extracts fingers biometric recognition m appearance features of cost multilayer graph- ms for hand recognition Santos-sierra (2014). A d on multilayer graph ate hand segmentation ally. This segmentation or mobile phones. known Cuts and KMeans) by ith over 400000 images. y Global Features, Bob g (2016) were explained f extension method and ity recognition system. (2011) were used the ose Invariant Biometric surface. Anil K. Jain, Member, IEEE, and Salil

Secure Authentication to Identify the Human using Finger Printer Profile in Voting System

  • Upload
    ijtsrd

  • View
    2

  • Download
    0

Embed Size (px)

DESCRIPTION

The problem of voting is still critical in terms of safety and security. This paper deals with the design and development of a web based voting system using fingerprint and adhaar card in order to provide a high performance with high security to the voting system. Also we use web technology to make the voting system more practical. The proposed Online Voting System allows the voters to scan their fingerprint, which is then matched with an already saved image within a database that is retrieved from adhaar card database of the government. The voting system is managed in a simpler way as all the users must login by adhaar card number and password and click on his her favorable candidates to cast the vote. In this System we also restrict the Ineligible voters with respect to age. This will increase the voting percentage in India and reduces the cost of voting process. By using biometric fingerprint it provides enough security which reduces the false votes. B. Chandraganesh | J. Nareshkumar | S. Thirumal "Secure Authentication to Identify the Human using Finger Printer Profile in Voting System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: https://www.ijtsrd.com/papers/ijtsrd10860.pdf Paper URL: http://www.ijtsrd.com/engineering/computer-engineering/10860/secure-authentication-to-identify-the-human-using-finger-printer-profile-in-voting-system/b-chandraganesh

Citation preview

Page 1: Secure Authentication to Identify the Human using Finger Printer Profile in Voting System

@ IJTSRD | Available Online @ www.ijtsrd.com

ISSN No: 2456

InternationalResearch

Secure Authentication using Finger Printer Profile in

B. Chandraganesh, J. Nareshkumar, S. ThirumalDepartment of Computer Science and Engineering,

G.K.M. College of Engineering and Technology

ABSTRACT The problem of voting is still critical in terms of safety and security. This paper deals with the design and development of a web-based voting system using fingerprint and adhaar card in order to provide a high performance with high security to the voting system. Also we use web technology to make the voting system more practical. The proposed Online Voting System allows the voters to scan their fingerprint, which is then matched with an already saved image within a database that is retrieved from adhaar card database of the government. The voting system is managed in a simpler way as all the users must login by adhaar card number and password and click on his/her favorable candidates to cast the vote. In this System we also restrict the Ineligible voters with respect to age. This will increase the voting percentage in India and reduces the cost of voting process. By using biometric fingerprint it provides enough security which reduces the false votes. Keywords: Biometric recognition, aadhar card, synthetic database, verification, voting I. INTRODUCTION

Online voting system project is implemented in Asp.net platform using Mysql database as back end. Main aim of online voting system is to develop an online application like online reservation system, for citizens who are above 18 years of age to vote througonline. Using these system citizens information of Indian can vote through online without visiting polling booth. A centralized database is maintained by election commission of india where citizens information is maintained when citizens information is maintained whenever citizen is using online voting

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018

ISSN No: 2456 - 6470 | www.ijtsrd.com | Volume

International Journal of Trend in Scientific Research and Development (IJTSRD)

International Open Access Journal

Secure Authentication to Identify the Humaninger Printer Profile in Voting System

B. Chandraganesh, J. Nareshkumar, S. Thirumal Department of Computer Science and Engineering,

G.K.M. College of Engineering and Technology, Chennai, Tamil Nadu,

The problem of voting is still critical in terms of safety and security. This paper deals with the design

based voting system using order to provide a high

performance with high security to the voting system. Also we use web technology to make the voting system more practical. The proposed Online Voting System allows the voters to scan their fingerprint,

already saved image within a database that is retrieved from adhaar card database of the government. The voting system is managed in a simpler way as all the users must login by adhaar card number and password and click on

cast the vote. In this System we also restrict the Ineligible voters with respect to age. This will increase the voting percentage in India and reduces the cost of voting process. By using biometric fingerprint it provides

s the false votes.

Biometric recognition, aadhar card,

Online voting system project is implemented in Asp.net platform using Mysql database as back end. Main aim of online voting system is to develop an online application like online reservation system, for citizens who are above 18 years of age to vote through online. Using these system citizens information of Indian can vote through online without visiting polling booth. A centralized database is maintained by election commission of india where citizens information is maintained when citizens information

aintained whenever citizen is using online voting

system his/her information is authenticated with the data present in database if user is not in the list he/she cannot use online voting system. Users are provided with a online registration form and submit details these details are compared with username password using this information user can login and vote using biometric fingerprint. If conditions are not correct entry will be canceled and user cannot able to vote. It might be reduced the false voters and votes.

II. RELATED WORKS

Robust Biometric Recognition From Palm Depth Images for Gloved Hands, P. Nguyen, Member (2015). The from palm a depthpalm biometric recognition. It can be extracts fingers and palm of users. palm biometric recognition techniques depend upon palm appearanhumans. Low computational cost multilayer graphbased segmentation algorithms for hand recognition on mobile phones, Danil de Santossegmentation method based on multilayer graph theory that performs accurate hand segmentatiwithout being computationally. This segmentation algorithm hand recognition for mobile phones. known segmentation algorithms (NCuts and KMeans) by using a synthetic database with over 400000 images. Palm-Print Classification by Global Features, Bob Zhang, 2013.Meng-Hui, Wang (2016) were explained the concept of Application of extension method and chaos theory in ECG identity recognition system. Surface, Vivek Kanhangad (2011) were used the technique Contactless and Pose Invariant Biometric Identification Using Hand surface. Anil K. Jain, Fellow, IEEE, Arun Ross, Member, IEEE, and Salil

Apr 2018 Page: 256

6470 | www.ijtsrd.com | Volume - 2 | Issue – 3

Scientific (IJTSRD)

International Open Access Journal

he Human Voting System

Chennai, Tamil Nadu, India

system his/her information is authenticated with the data present in database if user is not in the list he/she cannot use online voting system. Users are provided with a online registration form and submit details these details are compared with username and password using this information user can login and vote using biometric fingerprint. If conditions are not correct entry will be canceled and user cannot able to vote. It might be reduced the false voters and votes.

ognition From Palm Depth Images for Gloved Hands, P. Nguyen, Member (2015). The from palm a depth-based solution for palm biometric recognition. It can be extracts fingers and palm of users. palm biometric recognition techniques depend upon palm appearance features of

nal cost multilayer graph-segmentation algorithms for hand recognition

Danil de Santos-sierra (2014). A segmentation method based on multilayer graph theory that performs accurate hand segmentation without being computationally. This segmentation algorithm hand recognition for mobile phones. known segmentation algorithms (NCuts and KMeans) by using a synthetic database with over 400000 images.

Print Classification by Global Features, Bob Hui, Wang (2016) were explained

the concept of Application of extension method and chaos theory in ECG identity recognition system. Surface, Vivek Kanhangad (2011) were used the technique Contactless and Pose Invariant Biometric

Using Hand surface. Anil K. Jain, Fellow, IEEE, Arun Ross, Member, IEEE, and Salil

Page 2: Secure Authentication to Identify the Human using Finger Printer Profile in Voting System

International Journal of Trend in Scien

@ IJTSRD | Available Online @ www.ijtsrd.com

Prabhakar, Member, IEEE (2004) were proposed an Introduction to Biometric Recognition.

PROPOSED SYSTEM

The Biometric online voting system with biometric fingerprint using aadhar card. Only eligible voters are permitted to cast their vote. removes human fallibility from the tabulation process and makes your election results available within seconds of the close of the election. no paper ballots, no postage and no printing allows voters to go back and correct any mistakes before final submission of their ballot. Once a ballot has been submitted however, it is final and can not be altered.

Fig 1: Architecture of OVS A. Home

It is the welcome page of the website, having all the features options of the website. It includes all the features like registration, login, election commission

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018

Prabhakar, Member, IEEE (2004) were proposed an

The Biometric online voting system with biometric Only eligible voters are

permitted to cast their vote. removes human fallibility from the tabulation process and makes your election results available within seconds of the close of the

no paper ballots, no postage and no printing allows voters to go back and correct any mistakes before final submission of their ballot. Once a ballot has been submitted however, it is final and can not be

Architecture of OVS

It is the welcome page of the website, having all the features options of the website. It includes all the features like registration, login, election commission

login This module describes the authentication so Admin and Users enters the application throuBoth Admin and Users must have the separate username password.

◦ Election commission Login◦ User Login B. Registration

This is the registration page, where the voter can be register themseleves. They all have to enter basic informations best of their known and also voters want to enter their aadhardcard number and voter id number to register themseleves. All the informatiothe website is saved in the respective database. module we are implementing verification and validation process based on username, phone number, and account number. This process is created by Aadhar application linked with aadhar server and stored details in database.

C. Login

After registering into the website, this information is saved to the database and sent to the election commission. The user can login to the website with is unique AADHARCARD and FINGERPRINT. After finshing the login voter can poll the vote to their favour candidate using their fingerprint which is match with aadharcard. An voter can view the candidate details in the pooling options.is used to identify the specific constitution volume of voter and also viewing the list of candidates those who are nominated for particular volume in particular position.

D. Admin login

An admin login is used by election commission officer. The election commission officer authority to accept eligible users only otherwise he/she has reject their registration. Election commission officer only have the authority to view the results and declare the results. He/she doesn’t have the authority to change the results or any other activities

tific Research and Development (IJTSRD) ISSN: 2456-6470

Apr 2018 Page: 257

login This module describes the authentication so Admin and Users enters the application through login. Both Admin and Users must have the separate

Election commission Login

This is the registration page, where the voter can be register themseleves. They all have to enter basic informations best of their known and also voters want to enter their aadhardcard number and voter id number to register themseleves. All the information in the website is saved in the respective database. In this module we are implementing verification and validation process based on username, phone number, and account number. This process is created by Aadhar application linked with aadhar server and

After registering into the website, this information is saved to the database and sent to the election commission. The user can login to the website with is unique AADHARCARD and FINGERPRINT. After

can poll the vote to their favour candidate using their fingerprint which is match with aadharcard. An voter can view the candidate details in the pooling options. This module is used to identify the specific constitution volume of

the list of candidates those who are nominated for particular volume in particular

An admin login is used by election commission officer. The election commission officer authority to accept eligible users only otherwise he/she has right to reject their registration. Election commission officer only have the authority to view the results and declare the results. He/she doesn’t have the authority to change the results or any other activities.

Page 3: Secure Authentication to Identify the Human using Finger Printer Profile in Voting System

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 258

Fig 2: Block diagram of OVS

CONCLUSIONS

Our proposals enables a voter to cast his/her vote through internet without going to voting booth and additionally registering himself/herself for voting in advance, proxy vote or double voting is not possible, fast to access, highly secure, easy to maintain all the information of voting, highly efficient and flexible, easy to declare the results within one or two hour. Hence by this voting percentage will increase drastically. The using of online voting has the capability to reduce or remove unwanted human errors. In addition to its reliability, online voting can handle multiple modalities, and provider better scalability for large elections. Online voting is also an excellent mechanism that does not require geographical proximity of the voters. For example, soldiers can poll their vote in online

REFERENCES

1. Wang, M.H. and Lee, Z.Y., 2016, July. Application of extension method and chaos theory in ECG identity recognition system. In Industrial Informatics (INDIN), 2016 IEEE 14th International Conference on (pp. 1247-1251). IEEE.

2. Jain, A.K., Ross, A. and Prabhakar, S., 2004. An introduction to biometric recognition. IEEE Transactions on circuits and systems for video technology, 14(1), pp.4-20..

3. Kanhangad, V., Kumar, A. and Zhang, D., 2011. Contactless and pose invariant biometric identification using hand surface. IEEE transactions on image processing, 20(5), pp.1415-1424.

4. de Santos-Sierra, D., Arriaga-Gómez, M.F., Bailador, G. and Sánchez-Ávila, C., 2014, October. Low computational cost multilayer graph-based segmentation algorithms for hand recognition on mobile phones. In Security Technology (ICCST), 2014 International Carnahan Conference on (pp. 1-5). IEEE..

5. Han, C.C., Cheng, H.L., Lin, C.L. and Fan, K.C., 2003. Personal authentication using palm-print features. Pattern recognition, 36(2), pp.371-381Anderson, R., Wiryana, F., Ariesta, M.C. and Kusuma, G.P., 2017. Sign Language Recognition Application Systems for Deaf-Mute People: A Review Based on Input-Process-Output. Procedia Computer Science, 116, pp.441-448.

6. Nguyen, B.P., Tay, W.L. and Chui, C.K., 2015. Robust biometric recognition from palm depth images for gloved hands. IEEE Transactions on Human-Machine Systems, 45(6), pp.799-804.

7. Kanhangad, V., Kumar, A. and Zhang, D., 2011. A unified framework for contactless hand verification. IEEE transactions on information forensics and security, 6(3), pp.1014