SlideShare a Scribd company logo
International Journal of Trend in
International Open Access Journal
ISSN No: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com
Web Based Electronic V
Authentication
Research Scholars,
University of Engineering &
ABSTRACT
Voting is the heart of a democratic country and it
should be fair and square by all means .Every
in the world is spending a handsome amount on the
electoral process to refine it to the next level. Instead
of all the refinement on the electoral process there is
always issues rises about the rigging in the elections.
To counter this and to ameliorate the electoral process
to next level we are proposing a system which
includes a finger print scanner and GSM module. We
have defined a methodology to counter all the hidden
holes in the electoral process.
Keyword: Finger print, GSM module
1. INTRODUCTION
To completely understand our system first we have to
understand the conventional voting system. In
conventional voting system voters cast their vote
using ballots papers. Which is a costly and
troublesome process. The voters go to polling
to cast their vote and there are polling agents that
guide the voters to cast their vote. The voters Than
ticks their desired representative on the ballot paper.
And this process is carried out for the others Voters as
well. And at the end of the day the votes are counted.
And the winner is selected with the most votes.
This process is difficult for the voters and as well as
for the government.
Traditional voting process can be divided into
different phases.
1. Authentication:
In this phase, voter authenticates himself or herself by
showing his or her voting card, this step is public and
verified by the presiding officer. At the end of
International Journal of Trend in Scientific Research and Development (IJTSRD)
International Open Access Journal | www.ijtsrd.com
ISSN No: 2456 - 6470 | Volume - 2 | Issue – 6 | Sep
www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018
Web Based Electronic Voting System Using Finger Print
Authentication and GSM Module
Bilal Hussain Ch, Subayyal
, Department of Computer Science and Engineering
& Technology, RCET, Gujranwala Campus, Lahore
Voting is the heart of a democratic country and it
should be fair and square by all means .Every country
in the world is spending a handsome amount on the
electoral process to refine it to the next level. Instead
of all the refinement on the electoral process there is
always issues rises about the rigging in the elections.
orate the electoral process
to next level we are proposing a system which
includes a finger print scanner and GSM module. We
have defined a methodology to counter all the hidden
To completely understand our system first we have to
understand the conventional voting system. In
conventional voting system voters cast their vote
using ballots papers. Which is a costly and
troublesome process. The voters go to polling Booth
to cast their vote and there are polling agents that
guide the voters to cast their vote. The voters Than
ticks their desired representative on the ballot paper.
And this process is carried out for the others Voters as
the votes are counted.
And the winner is selected with the most votes.
This process is difficult for the voters and as well as
Traditional voting process can be divided into
enticates himself or herself by
showing his or her voting card, this step is public and
verified by the presiding officer. At the end of
authentication process, presiding officer give a ballot
paper to voter to cast his or her vote.
2. Vote:
The vote takes place in a protected booth where voter
cannot be seen by any person. The voter cast their
vote by writing it with a pen on the paper ballot, folds
the ballot paper and put into the ballot box where all
the votes are mixed.
3. Vote counting:
At the end of voting time, the presiding officer collect
the ballot box containing all ballot papers and submit
it to the counting center. After that with the help of
members of the election committee nominated by
election commission of India, the ballot boxes are
opened and votes are counted and the results are then
announced.
4. Verification:
Various types of verification process are used, most
procedure are public and verified by the
representative of candidates of competing parties.
Recount is also possible if there is any
In the 19th
century electronic voting system is also
presented and it got implemented in most of the
European countries and USA. In the E voting , voting
machines are placed in the public areas so that the
users can access them easily and cast their vote. It
made the electoral process a whole lot faster but with
the further inventions and research it was established
that this voting process is not as safe as it is
considered. Voting machines can be hacked and the
results can be changed.
Research and Development (IJTSRD)
www.ijtsrd.com
6 | Sep – Oct 2018
Oct 2018 Page: 307
oting System Using Finger Print
Engineering,
Lahore, Pakistan
authentication process, presiding officer give a ballot
paper to voter to cast his or her vote.
lace in a protected booth where voter
cannot be seen by any person. The voter cast their
vote by writing it with a pen on the paper ballot, folds
the ballot paper and put into the ballot box where all
ng time, the presiding officer collect
the ballot box containing all ballot papers and submit
it to the counting center. After that with the help of
members of the election committee nominated by
election commission of India, the ballot boxes are
d votes are counted and the results are then
Various types of verification process are used, most
procedure are public and verified by the
representative of candidates of competing parties.
Recount is also possible if there is any fraud or error.
century electronic voting system is also
presented and it got implemented in most of the
European countries and USA. In the E voting , voting
machines are placed in the public areas so that the
users can access them easily and cast their vote. It
electoral process a whole lot faster but with
the further inventions and research it was established
that this voting process is not as safe as it is
considered. Voting machines can be hacked and the
International Journal of Trend in Scientific
@ IJTSRD | Available Online @ www.ijtsrd.com
To avoid all this confusion and trouble we have
proposed a system that includes finger print scanning
and GSM module.
In our methodology there are three phases:
Registration phase: In this phase the voter will be
registered and all the information regarding the
voter is placed in the database. In this phase the
voter will be prompted to input all his/her personal
information in the required field like his ID card
number, age , name, cell phone number. And after
that the user will be asked to place the finger on
the finger print device so that the image of the
finger is placed in the database. After all this,
registration phase will be completed.
Authentication phase:
This phase will start when the user is about to cast
the vote. When the user go the website to cast the
vote, before casting the vote this phase will begin.
The user is asked to place the finger on the device,
first the user is authenticated with the information
saved in the database at the time of registration. If
the user is authenticated the user will be given
permission to cast the vote.
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018
d trouble we have
proposed a system that includes finger print scanning
In our methodology there are three phases:
: In this phase the voter will be
registered and all the information regarding the
e database. In this phase the
voter will be prompted to input all his/her personal
information in the required field like his ID card
number, age , name, cell phone number. And after
that the user will be asked to place the finger on
e so that the image of the
finger is placed in the database. After all this,
registration phase will be completed.
This phase will start when the user is about to cast
the vote. When the user go the website to cast the
casting the vote this phase will begin.
The user is asked to place the finger on the device,
first the user is authenticated with the information
saved in the database at the time of registration. If
the user is authenticated the user will be given
Casting phase:
In this phase the user will be given the privilege to
cast the vote. If all the steps before are satisfied
and completed then the user will be promoted to
this phase.
In this phase the user cast the vote .And at
the result will be calculated.
5. Benefits of our methodology:
The benefits of our methodology are:
Fairness:
Our system will introduce fairness in the electoral
process to next level. As the methodology
proposed by us is nearly impossible to break.
will introduce fairness in the electoral process.
Eligibility of voters:-
In our methodology we have made sure that only
authorized will be able to cast the vote.
Unauthorized voters will be caught at the start of
the process and will not be allowed
vote.
Uniqueness:-
We have defined uniqueness in our system. Every
voter has the unique identity because of the unique
finger print. No voter would be allowed to cast the
vote more than one time.
Privacy:-
We have paid special attention to p
system. As the user will cast the vote over the
internet and can cast the vote anywhere.
So no one can access the information regarding
the vote of the voter. His/her privacy will be
maintained.
Accuracy:-
Our methodology is accurate. We
accurate and dependable devices in the system.
They will provide the most accurate result is all
conditions.
Efficiency:-
Efficiency is the important factor that we have
considered.
Our system will enhance the efficiency to the next
level. Our methodology will provide the result in
minimal time and with precision.
Research and Development (IJTSRD) ISSN: 2456-6470
Oct 2018 Page: 308
In this phase the user will be given the privilege to
cast the vote. If all the steps before are satisfied
and completed then the user will be promoted to
In this phase the user cast the vote .And at the end
the result will be calculated.
Benefits of our methodology:
The benefits of our methodology are:
Our system will introduce fairness in the electoral
process to next level. As the methodology
proposed by us is nearly impossible to break. So it
will introduce fairness in the electoral process.
In our methodology we have made sure that only
authorized will be able to cast the vote.
Unauthorized voters will be caught at the start of
the process and will not be allowed to cast the
We have defined uniqueness in our system. Every
voter has the unique identity because of the unique
finger print. No voter would be allowed to cast the
We have paid special attention to privacy in our
system. As the user will cast the vote over the
internet and can cast the vote anywhere.
So no one can access the information regarding
the vote of the voter. His/her privacy will be
Our methodology is accurate. We have introduced
accurate and dependable devices in the system.
They will provide the most accurate result is all
Efficiency is the important factor that we have
Our system will enhance the efficiency to the next
. Our methodology will provide the result in
minimal time and with precision.
International Journal of Trend in Scientific
@ IJTSRD | Available Online @ www.ijtsrd.com
Difference between other e-voting systems and our
methodology:-
Due to intense need of the fairness in the electoral
process various modules have been proposed. Various
systems have been implemented in which finger print
authentication is using. But there is a main difference
between our methodology and other e voting scheme.
First of all our methodology includes GSM modules
that is absent in other types of systems. And besides
that we are using Finger print authentication modules,
functions of which are created in MATLAB and
advanced acquisition and comparison techniques are
used.
We have used various built in functions and also
created some functions in MATLAB to enhance
quality of the input image and to store it in the
database.
The use of the GSM module is that when the user
authorizes itself for the casting of the vote the
message is send to the given number of the voter and
the message contains the code for the vo
is asked to input the code in the required field in order
to cast the vote.
Explained view of the system:-
We are using two basic modules GSM and the Finger
print scanner. The use of both devices is immense and
vital.
Our proposed methodology is client/server based and
web based. The voter will cast the vote using Internet.
Our methodology consists of 3 phases:-
Registration phase:-
In this phase the voter will be registered. This is the
first phase in the system. The user will log
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018
voting systems and our
Due to intense need of the fairness in the electoral
process various modules have been proposed. Various
have been implemented in which finger print
authentication is using. But there is a main difference
between our methodology and other e voting scheme.
First of all our methodology includes GSM modules
that is absent in other types of systems. And besides
that we are using Finger print authentication modules,
functions of which are created in MATLAB and
advanced acquisition and comparison techniques are
We have used various built in functions and also
created some functions in MATLAB to enhance the
quality of the input image and to store it in the
The use of the GSM module is that when the user
authorizes itself for the casting of the vote the
message is send to the given number of the voter and
the message contains the code for the voting. The user
is asked to input the code in the required field in order
We are using two basic modules GSM and the Finger
print scanner. The use of both devices is immense and
methodology is client/server based and
web based. The voter will cast the vote using Internet.
In this phase the voter will be registered. This is the
first phase in the system. The user will login in to the
system and opens the website to register itself. The
user will be prompted to give the basic information
regarding himself / herself.
Remember our methodology is client/server based.
The voter will be the client. And
architecture. After the user will give all the
information about himself / herself
asked to provide the cell phone number and after that
the user is asked to place the finger on the device so
that the system can take the fair good impression of
the finger. We have used some MATLAB functions
and have created some of the functions regarding
image acquisition and image enhancement to get a
clear impression of the finger.
After all the working the voter will be registered and a
unique voter id will be generated in database for the
user. And thus the first phase will be completed this
way.
Authentication phase:-
In this phase the voter will be authenticated as it name
specifies.
This phase will start right before the voting and the
last phase. In this phase, when the voter is ready to
cast the vote the voter will be prompted to place the
finger on the device so that the system can take a fair
good impression of the thumb. The image obtained
will be compared with the image placed in the
database for that voter. If the image matches with the
one in the database the user will be authorizes and
asked to cast the vote. And if the image doesn’t
matches with the one on the database the voter is not
authorized and will be not asked to cast the vote.
We have used some of the MATLAB functions and
also created some to remove the ambiguity of
matching the finger prints.
Research and Development (IJTSRD) ISSN: 2456-6470
Oct 2018 Page: 309
system and opens the website to register itself. The
user will be prompted to give the basic information
Remember our methodology is client/server based.
The voter will be the client. And its web based
re. After the user will give all the
himself / herself then user will be
asked to provide the cell phone number and after that
the user is asked to place the finger on the device so
that the system can take the fair good impression of
inger. We have used some MATLAB functions
and have created some of the functions regarding
image acquisition and image enhancement to get a
After all the working the voter will be registered and a
nerated in database for the
user. And thus the first phase will be completed this
In this phase the voter will be authenticated as it name
This phase will start right before the voting and the
ase, when the voter is ready to
cast the vote the voter will be prompted to place the
finger on the device so that the system can take a fair
good impression of the thumb. The image obtained
will be compared with the image placed in the
oter. If the image matches with the
one in the database the user will be authorizes and
asked to cast the vote. And if the image doesn’t
matches with the one on the database the voter is not
authorized and will be not asked to cast the vote.
some of the MATLAB functions and
also created some to remove the ambiguity of
International Journal of Trend in Scientific
@ IJTSRD | Available Online @ www.ijtsrd.com
Casting phase:-
After all the registration and authentication the voter
will be finally prompted to cast the vote.
The list of candidates will be visible to the voter and
the voter can tick the right one he/she wants.
After the casting it is very easy and feasible to count
the votes. The votes would automatically be counted
at the end because of the efficiency of the system.
And the winner will be announced.
Flowchart:-
Conclusion:-
We have defined the methodology using two modules
Finger print scanner and the GSM module. Both the
modules have vital importance in the system. Our
methodology is that we are using a client/ server
based architecture. In which the voter is a client. It’s a
web based architecture. First the user is registered
with his/her unique finger print in the database of the
government. After the registration phase there comes
the authentication phase and in the end t
phase. In the authentication phase finger print of the
voter is compared with the finger print saved in the
database at the time of registration. . The use of the
GSM module is that when the user is about to cast the
vote a code is send to the cell phone of the voter. The
user will be asked to place the code in the field given
to cast the vote. Our methodology is unique, fair,
adaptable, secure and efficient.
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018
After all the registration and authentication the voter
will be finally prompted to cast the vote.
visible to the voter and
the voter can tick the right one he/she wants.
After the casting it is very easy and feasible to count
the votes. The votes would automatically be counted
at the end because of the efficiency of the system.
We have defined the methodology using two modules
Finger print scanner and the GSM module. Both the
modules have vital importance in the system. Our
methodology is that we are using a client/ server
architecture. In which the voter is a client. It’s a
web based architecture. First the user is registered
with his/her unique finger print in the database of the
government. After the registration phase there comes
the authentication phase and in the end there is casting
phase. In the authentication phase finger print of the
voter is compared with the finger print saved in the
database at the time of registration. . The use of the
GSM module is that when the user is about to cast the
the cell phone of the voter. The
user will be asked to place the code in the field given
to cast the vote. Our methodology is unique, fair,
Future work:-
In future the voting process can be more verified and
enhanced using our methodology.
We can attach other modules as well to enhance the
efficiency of the system. We can attach iris detection
and face detection to maximize the efficiency.
We can also attach speech recognition module.
References:-
1. R. Mercuri, “Electronic Vote Tabulation Checks
and Balances”, PhD thesis, University of
Pennsylvania, Philadelphia, PA, October 2000.
2. D. Rubin, “Security considerations for remote
electronic voting. Communications of the ACM,
45(12):39–44”, December 2002.
http://avirubin.com/e-voting.security.html
3. T. E. Carroll, D. Grosu, "A Secure and Efficient
Voter-controlled Anonymous Election Scheme,"
International Conference on Information
Technology: Coding and computing, as Vegas,
pp.721 - 726, 2005.
4. C. H. Chen, C. M. Lan, and G. Homg, "A
Practical Voting Systems for Small Scale
Election," 3rd International Conference on
Research and Development (IJTSRD) ISSN: 2456-6470
Oct 2018 Page: 310
In future the voting process can be more verified and
g our methodology.
We can attach other modules as well to enhance the
efficiency of the system. We can attach iris detection
and face detection to maximize the efficiency.
We can also attach speech recognition module.
R. Mercuri, “Electronic Vote Tabulation Checks
and Balances”, PhD thesis, University of
Pennsylvania, Philadelphia, PA, October 2000.
D. Rubin, “Security considerations for remote
electronic voting. Communications of the ACM,
44”, December 2002.
voting.security.html
E. Carroll, D. Grosu, "A Secure and Efficient
controlled Anonymous Election Scheme,"
International Conference on Information
Technology: Coding and computing, as Vegas,
M. Lan, and G. Homg, "A
Practical Voting Systems for Small Scale
Election," 3rd International Conference on
International Journal of Trend in Scientific
@ IJTSRD | Available Online @ www.ijtsrd.com
Information Technology: Research and Education,
Hsinchu, pp.322 - 326, 2005.
5. Z. Claudia, R. H. Francisco, and O.
"SELES: An e-Voting System for Medium Scale
Online Elections," Process of the Sixth Mexican
International Conference on Computer Science,
Puebla, pp.50-57, 2005.
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018
Information Technology: Research and Education,
H. Francisco, and O. A. Daniel,
System for Medium Scale
Online Elections," Process of the Sixth Mexican
International Conference on Computer Science,
6. Maltoni D, Maio D, Jain A
Handbook of Fingerprint Recognition, 2nd ed.,
Springer, 2009
7. Altun A A, Kocer H E, Allahverdi, “Genetic
algorithm based feature selection level fusion
using fingerprint and iris biometrics”, Int. J.
Pattern Recog. Artif. Intell. (IJPRAI), 22(3): 585
600, November 2008.
Research and Development (IJTSRD) ISSN: 2456-6470
Oct 2018 Page: 311
Maltoni D, Maio D, Jain A K, Prabhakar S,
Handbook of Fingerprint Recognition, 2nd ed.,
E, Allahverdi, “Genetic
algorithm based feature selection level fusion
using fingerprint and iris biometrics”, Int. J.
Pattern Recog. Artif. Intell. (IJPRAI), 22(3): 585-

More Related Content

ODP
Aadhar based Digital election system of india
PDF
IRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
PPTX
Aadhar based voting system
PDF
E voting system using mobile sms
PDF
IRJET- Biometric Voting Machine
PDF
IRJET- Online Election Management System
PDF
AADHAR based Electronic Voting Machine using Arduino - review
Aadhar based Digital election system of india
IRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
Aadhar based voting system
E voting system using mobile sms
IRJET- Biometric Voting Machine
IRJET- Online Election Management System
AADHAR based Electronic Voting Machine using Arduino - review

What's hot (20)

DOC
Electronic Voting System
PDF
Aadhar Based Electronic Voting Machine
PDF
Mobile Voting System Using Advanced NFC Technology
ODP
e-Voting Application using Barcode Vtoken
PDF
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
PDF
A SECURITY BASED VOTING SYSTEMUSING BIOMETRIC
PPTX
Distributed algorithm for electronic voting system
PDF
IEEE_paper_work11_2015_12_03_20_49_47_415
PDF
IRJET- Biometric Voting Machine using Aadhar Authentication
PDF
IVRS and DTMF based Voting System
PPT
M voting
PPTX
Computerised voting system
PDF
Referendum Using Android Application
PPT
Estonian E-Voting
PDF
Final project report on evm 16.04.2019
DOCX
mobile-iris voting system(1)
PPTX
A Transition To Mobile Voting Systems
PDF
IRJET- Smart and Secured Voting System using Magnetic Stripe Voter ID Card an...
PDF
Smart Voting System using Aadhar Card
Electronic Voting System
Aadhar Based Electronic Voting Machine
Mobile Voting System Using Advanced NFC Technology
e-Voting Application using Barcode Vtoken
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
A SECURITY BASED VOTING SYSTEMUSING BIOMETRIC
Distributed algorithm for electronic voting system
IEEE_paper_work11_2015_12_03_20_49_47_415
IRJET- Biometric Voting Machine using Aadhar Authentication
IVRS and DTMF based Voting System
M voting
Computerised voting system
Referendum Using Android Application
Estonian E-Voting
Final project report on evm 16.04.2019
mobile-iris voting system(1)
A Transition To Mobile Voting Systems
IRJET- Smart and Secured Voting System using Magnetic Stripe Voter ID Card an...
Smart Voting System using Aadhar Card
Ad

Similar to Web Based Electronic Voting System Using Finger Print Authentication and GSM Module (20)

PDF
Design of biometric electronic voting machine
PDF
IRJET- Design and Development of Security based Voting System
PDF
IRJET-Effective and Secure E- Voting Application in GSM Module using IOT
PDF
Impressive smart card based electronic voting system
PDF
IRJET- Aadhar Card Based Electronic Voting System
PDF
Fingerprint Based E Voting System
PDF
Captiosus Voting System
PDF
IRJET- E-Voting System for Election using Fingerprint and Aadhar Number
PDF
Biometric Electronic Voting Machine
PDF
Aadhar based fully Automated EVM with High End Security Network using ARM7 an...
PDF
IRJET- Electronic Voting Machine (EVM) using Finger-Print Sensor
PDF
Convenient voting machine
PDF
IRJET- A Survey on: Aadhar Based Dual Authentication Secured E-Voting System
PDF
VIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTP
PDF
FINGERPRINT BASED SECURED VOTING
PPTX
Secure electronic voting system using fingerprint technique
PPTX
Biometric voting system_by_vinodh
PDF
Online Voting System Using Fingerprint sensor and Blockchain
PDF
Efficacious electronic voting using biometry
PDF
IRJET- Digitized Election Voting System : An Innovative Approach
Design of biometric electronic voting machine
IRJET- Design and Development of Security based Voting System
IRJET-Effective and Secure E- Voting Application in GSM Module using IOT
Impressive smart card based electronic voting system
IRJET- Aadhar Card Based Electronic Voting System
Fingerprint Based E Voting System
Captiosus Voting System
IRJET- E-Voting System for Election using Fingerprint and Aadhar Number
Biometric Electronic Voting Machine
Aadhar based fully Automated EVM with High End Security Network using ARM7 an...
IRJET- Electronic Voting Machine (EVM) using Finger-Print Sensor
Convenient voting machine
IRJET- A Survey on: Aadhar Based Dual Authentication Secured E-Voting System
VIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTP
FINGERPRINT BASED SECURED VOTING
Secure electronic voting system using fingerprint technique
Biometric voting system_by_vinodh
Online Voting System Using Fingerprint sensor and Blockchain
Efficacious electronic voting using biometry
IRJET- Digitized Election Voting System : An Innovative Approach
Ad

More from ijtsrd (20)

PDF
A Study of School Dropout in Rural Districts of Darjeeling and Its Causes
PDF
Pre extension Demonstration and Evaluation of Soybean Technologies in Fedis D...
PDF
Pre extension Demonstration and Evaluation of Potato Technologies in Selected...
PDF
Pre extension Demonstration and Evaluation of Animal Drawn Potato Digger in S...
PDF
Pre extension Demonstration and Evaluation of Drought Tolerant and Early Matu...
PDF
Pre extension Demonstration and Evaluation of Double Cropping Practice Legume...
PDF
Pre extension Demonstration and Evaluation of Common Bean Technology in Low L...
PDF
Enhancing Image Quality in Compression and Fading Channels A Wavelet Based Ap...
PDF
Manpower Training and Employee Performance in Mellienium Ltdawka, Anambra State
PDF
A Statistical Analysis on the Growth Rate of Selected Sectors of Nigerian Eco...
PDF
Automatic Accident Detection and Emergency Alert System using IoT
PDF
Corporate Social Responsibility Dimensions and Corporate Image of Selected Up...
PDF
The Role of Media in Tribal Health and Educational Progress of Odisha
PDF
Advancements and Future Trends in Advanced Quantum Algorithms A Prompt Scienc...
PDF
A Study on Seismic Analysis of High Rise Building with Mass Irregularities, T...
PDF
Descriptive Study to Assess the Knowledge of B.Sc. Interns Regarding Biomedic...
PDF
Performance of Grid Connected Solar PV Power Plant at Clear Sky Day
PDF
Vitiligo Treated Homoeopathically A Case Report
PDF
Vitiligo Treated Homoeopathically A Case Report
PDF
Uterine Fibroids Homoeopathic Perspectives
A Study of School Dropout in Rural Districts of Darjeeling and Its Causes
Pre extension Demonstration and Evaluation of Soybean Technologies in Fedis D...
Pre extension Demonstration and Evaluation of Potato Technologies in Selected...
Pre extension Demonstration and Evaluation of Animal Drawn Potato Digger in S...
Pre extension Demonstration and Evaluation of Drought Tolerant and Early Matu...
Pre extension Demonstration and Evaluation of Double Cropping Practice Legume...
Pre extension Demonstration and Evaluation of Common Bean Technology in Low L...
Enhancing Image Quality in Compression and Fading Channels A Wavelet Based Ap...
Manpower Training and Employee Performance in Mellienium Ltdawka, Anambra State
A Statistical Analysis on the Growth Rate of Selected Sectors of Nigerian Eco...
Automatic Accident Detection and Emergency Alert System using IoT
Corporate Social Responsibility Dimensions and Corporate Image of Selected Up...
The Role of Media in Tribal Health and Educational Progress of Odisha
Advancements and Future Trends in Advanced Quantum Algorithms A Prompt Scienc...
A Study on Seismic Analysis of High Rise Building with Mass Irregularities, T...
Descriptive Study to Assess the Knowledge of B.Sc. Interns Regarding Biomedic...
Performance of Grid Connected Solar PV Power Plant at Clear Sky Day
Vitiligo Treated Homoeopathically A Case Report
Vitiligo Treated Homoeopathically A Case Report
Uterine Fibroids Homoeopathic Perspectives

Recently uploaded (20)

PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
Presentation on HIE in infants and its manifestations
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
01-Introduction-to-Information-Management.pdf
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
RMMM.pdf make it easy to upload and study
PDF
Classroom Observation Tools for Teachers
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
A systematic review of self-coping strategies used by university students to ...
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Module 4: Burden of Disease Tutorial Slides S2 2025
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Presentation on HIE in infants and its manifestations
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
VCE English Exam - Section C Student Revision Booklet
Abdominal Access Techniques with Prof. Dr. R K Mishra
01-Introduction-to-Information-Management.pdf
Microbial disease of the cardiovascular and lymphatic systems
Supply Chain Operations Speaking Notes -ICLT Program
202450812 BayCHI UCSC-SV 20250812 v17.pptx
RMMM.pdf make it easy to upload and study
Classroom Observation Tools for Teachers
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
A systematic review of self-coping strategies used by university students to ...
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...

Web Based Electronic Voting System Using Finger Print Authentication and GSM Module

  • 1. International Journal of Trend in International Open Access Journal ISSN No: 2456 @ IJTSRD | Available Online @ www.ijtsrd.com Web Based Electronic V Authentication Research Scholars, University of Engineering & ABSTRACT Voting is the heart of a democratic country and it should be fair and square by all means .Every in the world is spending a handsome amount on the electoral process to refine it to the next level. Instead of all the refinement on the electoral process there is always issues rises about the rigging in the elections. To counter this and to ameliorate the electoral process to next level we are proposing a system which includes a finger print scanner and GSM module. We have defined a methodology to counter all the hidden holes in the electoral process. Keyword: Finger print, GSM module 1. INTRODUCTION To completely understand our system first we have to understand the conventional voting system. In conventional voting system voters cast their vote using ballots papers. Which is a costly and troublesome process. The voters go to polling to cast their vote and there are polling agents that guide the voters to cast their vote. The voters Than ticks their desired representative on the ballot paper. And this process is carried out for the others Voters as well. And at the end of the day the votes are counted. And the winner is selected with the most votes. This process is difficult for the voters and as well as for the government. Traditional voting process can be divided into different phases. 1. Authentication: In this phase, voter authenticates himself or herself by showing his or her voting card, this step is public and verified by the presiding officer. At the end of International Journal of Trend in Scientific Research and Development (IJTSRD) International Open Access Journal | www.ijtsrd.com ISSN No: 2456 - 6470 | Volume - 2 | Issue – 6 | Sep www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018 Web Based Electronic Voting System Using Finger Print Authentication and GSM Module Bilal Hussain Ch, Subayyal , Department of Computer Science and Engineering & Technology, RCET, Gujranwala Campus, Lahore Voting is the heart of a democratic country and it should be fair and square by all means .Every country in the world is spending a handsome amount on the electoral process to refine it to the next level. Instead of all the refinement on the electoral process there is always issues rises about the rigging in the elections. orate the electoral process to next level we are proposing a system which includes a finger print scanner and GSM module. We have defined a methodology to counter all the hidden To completely understand our system first we have to understand the conventional voting system. In conventional voting system voters cast their vote using ballots papers. Which is a costly and troublesome process. The voters go to polling Booth to cast their vote and there are polling agents that guide the voters to cast their vote. The voters Than ticks their desired representative on the ballot paper. And this process is carried out for the others Voters as the votes are counted. And the winner is selected with the most votes. This process is difficult for the voters and as well as Traditional voting process can be divided into enticates himself or herself by showing his or her voting card, this step is public and verified by the presiding officer. At the end of authentication process, presiding officer give a ballot paper to voter to cast his or her vote. 2. Vote: The vote takes place in a protected booth where voter cannot be seen by any person. The voter cast their vote by writing it with a pen on the paper ballot, folds the ballot paper and put into the ballot box where all the votes are mixed. 3. Vote counting: At the end of voting time, the presiding officer collect the ballot box containing all ballot papers and submit it to the counting center. After that with the help of members of the election committee nominated by election commission of India, the ballot boxes are opened and votes are counted and the results are then announced. 4. Verification: Various types of verification process are used, most procedure are public and verified by the representative of candidates of competing parties. Recount is also possible if there is any In the 19th century electronic voting system is also presented and it got implemented in most of the European countries and USA. In the E voting , voting machines are placed in the public areas so that the users can access them easily and cast their vote. It made the electoral process a whole lot faster but with the further inventions and research it was established that this voting process is not as safe as it is considered. Voting machines can be hacked and the results can be changed. Research and Development (IJTSRD) www.ijtsrd.com 6 | Sep – Oct 2018 Oct 2018 Page: 307 oting System Using Finger Print Engineering, Lahore, Pakistan authentication process, presiding officer give a ballot paper to voter to cast his or her vote. lace in a protected booth where voter cannot be seen by any person. The voter cast their vote by writing it with a pen on the paper ballot, folds the ballot paper and put into the ballot box where all ng time, the presiding officer collect the ballot box containing all ballot papers and submit it to the counting center. After that with the help of members of the election committee nominated by election commission of India, the ballot boxes are d votes are counted and the results are then Various types of verification process are used, most procedure are public and verified by the representative of candidates of competing parties. Recount is also possible if there is any fraud or error. century electronic voting system is also presented and it got implemented in most of the European countries and USA. In the E voting , voting machines are placed in the public areas so that the users can access them easily and cast their vote. It electoral process a whole lot faster but with the further inventions and research it was established that this voting process is not as safe as it is considered. Voting machines can be hacked and the
  • 2. International Journal of Trend in Scientific @ IJTSRD | Available Online @ www.ijtsrd.com To avoid all this confusion and trouble we have proposed a system that includes finger print scanning and GSM module. In our methodology there are three phases: Registration phase: In this phase the voter will be registered and all the information regarding the voter is placed in the database. In this phase the voter will be prompted to input all his/her personal information in the required field like his ID card number, age , name, cell phone number. And after that the user will be asked to place the finger on the finger print device so that the image of the finger is placed in the database. After all this, registration phase will be completed. Authentication phase: This phase will start when the user is about to cast the vote. When the user go the website to cast the vote, before casting the vote this phase will begin. The user is asked to place the finger on the device, first the user is authenticated with the information saved in the database at the time of registration. If the user is authenticated the user will be given permission to cast the vote. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018 d trouble we have proposed a system that includes finger print scanning In our methodology there are three phases: : In this phase the voter will be registered and all the information regarding the e database. In this phase the voter will be prompted to input all his/her personal information in the required field like his ID card number, age , name, cell phone number. And after that the user will be asked to place the finger on e so that the image of the finger is placed in the database. After all this, registration phase will be completed. This phase will start when the user is about to cast the vote. When the user go the website to cast the casting the vote this phase will begin. The user is asked to place the finger on the device, first the user is authenticated with the information saved in the database at the time of registration. If the user is authenticated the user will be given Casting phase: In this phase the user will be given the privilege to cast the vote. If all the steps before are satisfied and completed then the user will be promoted to this phase. In this phase the user cast the vote .And at the result will be calculated. 5. Benefits of our methodology: The benefits of our methodology are: Fairness: Our system will introduce fairness in the electoral process to next level. As the methodology proposed by us is nearly impossible to break. will introduce fairness in the electoral process. Eligibility of voters:- In our methodology we have made sure that only authorized will be able to cast the vote. Unauthorized voters will be caught at the start of the process and will not be allowed vote. Uniqueness:- We have defined uniqueness in our system. Every voter has the unique identity because of the unique finger print. No voter would be allowed to cast the vote more than one time. Privacy:- We have paid special attention to p system. As the user will cast the vote over the internet and can cast the vote anywhere. So no one can access the information regarding the vote of the voter. His/her privacy will be maintained. Accuracy:- Our methodology is accurate. We accurate and dependable devices in the system. They will provide the most accurate result is all conditions. Efficiency:- Efficiency is the important factor that we have considered. Our system will enhance the efficiency to the next level. Our methodology will provide the result in minimal time and with precision. Research and Development (IJTSRD) ISSN: 2456-6470 Oct 2018 Page: 308 In this phase the user will be given the privilege to cast the vote. If all the steps before are satisfied and completed then the user will be promoted to In this phase the user cast the vote .And at the end the result will be calculated. Benefits of our methodology: The benefits of our methodology are: Our system will introduce fairness in the electoral process to next level. As the methodology proposed by us is nearly impossible to break. So it will introduce fairness in the electoral process. In our methodology we have made sure that only authorized will be able to cast the vote. Unauthorized voters will be caught at the start of the process and will not be allowed to cast the We have defined uniqueness in our system. Every voter has the unique identity because of the unique finger print. No voter would be allowed to cast the We have paid special attention to privacy in our system. As the user will cast the vote over the internet and can cast the vote anywhere. So no one can access the information regarding the vote of the voter. His/her privacy will be Our methodology is accurate. We have introduced accurate and dependable devices in the system. They will provide the most accurate result is all Efficiency is the important factor that we have Our system will enhance the efficiency to the next . Our methodology will provide the result in minimal time and with precision.
  • 3. International Journal of Trend in Scientific @ IJTSRD | Available Online @ www.ijtsrd.com Difference between other e-voting systems and our methodology:- Due to intense need of the fairness in the electoral process various modules have been proposed. Various systems have been implemented in which finger print authentication is using. But there is a main difference between our methodology and other e voting scheme. First of all our methodology includes GSM modules that is absent in other types of systems. And besides that we are using Finger print authentication modules, functions of which are created in MATLAB and advanced acquisition and comparison techniques are used. We have used various built in functions and also created some functions in MATLAB to enhance quality of the input image and to store it in the database. The use of the GSM module is that when the user authorizes itself for the casting of the vote the message is send to the given number of the voter and the message contains the code for the vo is asked to input the code in the required field in order to cast the vote. Explained view of the system:- We are using two basic modules GSM and the Finger print scanner. The use of both devices is immense and vital. Our proposed methodology is client/server based and web based. The voter will cast the vote using Internet. Our methodology consists of 3 phases:- Registration phase:- In this phase the voter will be registered. This is the first phase in the system. The user will log International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018 voting systems and our Due to intense need of the fairness in the electoral process various modules have been proposed. Various have been implemented in which finger print authentication is using. But there is a main difference between our methodology and other e voting scheme. First of all our methodology includes GSM modules that is absent in other types of systems. And besides that we are using Finger print authentication modules, functions of which are created in MATLAB and advanced acquisition and comparison techniques are We have used various built in functions and also created some functions in MATLAB to enhance the quality of the input image and to store it in the The use of the GSM module is that when the user authorizes itself for the casting of the vote the message is send to the given number of the voter and the message contains the code for the voting. The user is asked to input the code in the required field in order We are using two basic modules GSM and the Finger print scanner. The use of both devices is immense and methodology is client/server based and web based. The voter will cast the vote using Internet. In this phase the voter will be registered. This is the first phase in the system. The user will login in to the system and opens the website to register itself. The user will be prompted to give the basic information regarding himself / herself. Remember our methodology is client/server based. The voter will be the client. And architecture. After the user will give all the information about himself / herself asked to provide the cell phone number and after that the user is asked to place the finger on the device so that the system can take the fair good impression of the finger. We have used some MATLAB functions and have created some of the functions regarding image acquisition and image enhancement to get a clear impression of the finger. After all the working the voter will be registered and a unique voter id will be generated in database for the user. And thus the first phase will be completed this way. Authentication phase:- In this phase the voter will be authenticated as it name specifies. This phase will start right before the voting and the last phase. In this phase, when the voter is ready to cast the vote the voter will be prompted to place the finger on the device so that the system can take a fair good impression of the thumb. The image obtained will be compared with the image placed in the database for that voter. If the image matches with the one in the database the user will be authorizes and asked to cast the vote. And if the image doesn’t matches with the one on the database the voter is not authorized and will be not asked to cast the vote. We have used some of the MATLAB functions and also created some to remove the ambiguity of matching the finger prints. Research and Development (IJTSRD) ISSN: 2456-6470 Oct 2018 Page: 309 system and opens the website to register itself. The user will be prompted to give the basic information Remember our methodology is client/server based. The voter will be the client. And its web based re. After the user will give all the himself / herself then user will be asked to provide the cell phone number and after that the user is asked to place the finger on the device so that the system can take the fair good impression of inger. We have used some MATLAB functions and have created some of the functions regarding image acquisition and image enhancement to get a After all the working the voter will be registered and a nerated in database for the user. And thus the first phase will be completed this In this phase the voter will be authenticated as it name This phase will start right before the voting and the ase, when the voter is ready to cast the vote the voter will be prompted to place the finger on the device so that the system can take a fair good impression of the thumb. The image obtained will be compared with the image placed in the oter. If the image matches with the one in the database the user will be authorizes and asked to cast the vote. And if the image doesn’t matches with the one on the database the voter is not authorized and will be not asked to cast the vote. some of the MATLAB functions and also created some to remove the ambiguity of
  • 4. International Journal of Trend in Scientific @ IJTSRD | Available Online @ www.ijtsrd.com Casting phase:- After all the registration and authentication the voter will be finally prompted to cast the vote. The list of candidates will be visible to the voter and the voter can tick the right one he/she wants. After the casting it is very easy and feasible to count the votes. The votes would automatically be counted at the end because of the efficiency of the system. And the winner will be announced. Flowchart:- Conclusion:- We have defined the methodology using two modules Finger print scanner and the GSM module. Both the modules have vital importance in the system. Our methodology is that we are using a client/ server based architecture. In which the voter is a client. It’s a web based architecture. First the user is registered with his/her unique finger print in the database of the government. After the registration phase there comes the authentication phase and in the end t phase. In the authentication phase finger print of the voter is compared with the finger print saved in the database at the time of registration. . The use of the GSM module is that when the user is about to cast the vote a code is send to the cell phone of the voter. The user will be asked to place the code in the field given to cast the vote. Our methodology is unique, fair, adaptable, secure and efficient. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018 After all the registration and authentication the voter will be finally prompted to cast the vote. visible to the voter and the voter can tick the right one he/she wants. After the casting it is very easy and feasible to count the votes. The votes would automatically be counted at the end because of the efficiency of the system. We have defined the methodology using two modules Finger print scanner and the GSM module. Both the modules have vital importance in the system. Our methodology is that we are using a client/ server architecture. In which the voter is a client. It’s a web based architecture. First the user is registered with his/her unique finger print in the database of the government. After the registration phase there comes the authentication phase and in the end there is casting phase. In the authentication phase finger print of the voter is compared with the finger print saved in the database at the time of registration. . The use of the GSM module is that when the user is about to cast the the cell phone of the voter. The user will be asked to place the code in the field given to cast the vote. Our methodology is unique, fair, Future work:- In future the voting process can be more verified and enhanced using our methodology. We can attach other modules as well to enhance the efficiency of the system. We can attach iris detection and face detection to maximize the efficiency. We can also attach speech recognition module. References:- 1. R. Mercuri, “Electronic Vote Tabulation Checks and Balances”, PhD thesis, University of Pennsylvania, Philadelphia, PA, October 2000. 2. D. Rubin, “Security considerations for remote electronic voting. Communications of the ACM, 45(12):39–44”, December 2002. http://avirubin.com/e-voting.security.html 3. T. E. Carroll, D. Grosu, "A Secure and Efficient Voter-controlled Anonymous Election Scheme," International Conference on Information Technology: Coding and computing, as Vegas, pp.721 - 726, 2005. 4. C. H. Chen, C. M. Lan, and G. Homg, "A Practical Voting Systems for Small Scale Election," 3rd International Conference on Research and Development (IJTSRD) ISSN: 2456-6470 Oct 2018 Page: 310 In future the voting process can be more verified and g our methodology. We can attach other modules as well to enhance the efficiency of the system. We can attach iris detection and face detection to maximize the efficiency. We can also attach speech recognition module. R. Mercuri, “Electronic Vote Tabulation Checks and Balances”, PhD thesis, University of Pennsylvania, Philadelphia, PA, October 2000. D. Rubin, “Security considerations for remote electronic voting. Communications of the ACM, 44”, December 2002. voting.security.html E. Carroll, D. Grosu, "A Secure and Efficient controlled Anonymous Election Scheme," International Conference on Information Technology: Coding and computing, as Vegas, M. Lan, and G. Homg, "A Practical Voting Systems for Small Scale Election," 3rd International Conference on
  • 5. International Journal of Trend in Scientific @ IJTSRD | Available Online @ www.ijtsrd.com Information Technology: Research and Education, Hsinchu, pp.322 - 326, 2005. 5. Z. Claudia, R. H. Francisco, and O. "SELES: An e-Voting System for Medium Scale Online Elections," Process of the Sixth Mexican International Conference on Computer Science, Puebla, pp.50-57, 2005. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018 Information Technology: Research and Education, H. Francisco, and O. A. Daniel, System for Medium Scale Online Elections," Process of the Sixth Mexican International Conference on Computer Science, 6. Maltoni D, Maio D, Jain A Handbook of Fingerprint Recognition, 2nd ed., Springer, 2009 7. Altun A A, Kocer H E, Allahverdi, “Genetic algorithm based feature selection level fusion using fingerprint and iris biometrics”, Int. J. Pattern Recog. Artif. Intell. (IJPRAI), 22(3): 585 600, November 2008. Research and Development (IJTSRD) ISSN: 2456-6470 Oct 2018 Page: 311 Maltoni D, Maio D, Jain A K, Prabhakar S, Handbook of Fingerprint Recognition, 2nd ed., E, Allahverdi, “Genetic algorithm based feature selection level fusion using fingerprint and iris biometrics”, Int. J. Pattern Recog. Artif. Intell. (IJPRAI), 22(3): 585-