SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 04 | April 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 622
Fingerprint Based Voting
Akshat Bheda1, Udit Intwala2, Rahul Ghimire3, Prof. Sanketi Raut4
,1,2,3 Student, 4Assistant Professor, Department of Information Technology Engineering, Universal college of
Engineering, Maharashtra, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The idea of this paper arises by taking the
present Covid crisis into consideration, as public gathering is
prohibited/limited and risky. If people gather for voting in
such situations there it may give rise to vast spread of virus
instead of keeping it under control. People need to maintain
long queues which costs them a lot of time and energy. The
main motive of this project is to offer reliability and prohibit
the challenges that are in the conventional balloting system.
The simple idea of this project is the user has to register on the
app, submit their fingerprint which will be processed using
SIFT algorithm and complete theirvoting. So, by usingtheidea
of this project people can avoid long queues and also avoid
gathering and can vote easily from their homes without
risking their lives keeping the Covid crisis under control.
Key Words: Fingerprint, Voting, Java, Firebase, Python,
Android, SITF.
1.INTRODUCTION
These days the mechanical device has become an efficient
toll compared with traditional paper-based voting
techniques. Thus, we decided to style a system to beat the
already existing electoral system. the most scheme of this
project is to possess safer, no duplication of votes and
declare the results as early as possible.
Requirements are often classified into functional and
security requirements. Reviewing these requirements as
they affect e-voting system, the important factors are:
• Authentication
• Integrity
• Confidentiality
• Non-Repudiation
• Accuracy
• Flexibility
• Auditability
• Eligibility
2. LITERATURE SURVEY
We have studied some of available fingerprint recognition
system and how it can be implemented.
Biometric Based Mobile Voting
This paper shows various methods voting can be carried on
mobile devices. It creates simple application to perform
voting with help of biometric stored in government
database. Accessing it and basedonthatvotingiscarried out.
Fingerprint Recognition System: Design & Analysis
Fingerprint are of large variety. Some has more no of ridges
and curve than others, some individual has almost no
fingerprint. It is really important to design a system whichis
capable to counter almost all possible scenarios. There are
many techniques developed in recent years from optical to
ultrasonic fingerprint reader.
3. PROBLEM STATEMENT
Current system majority of them use ballot system with
digital system. A more hybrid method to ensure the votingis
done without cheat. It is said that no system is complete
system. Every system has major or minor flaw which is
exploit for unfair advantages. We cannot make a fully secure
system, if something is working it does not mean it can’t be
better.
Problem arise as such votingsystemneedseachindividual to
physically present at the time of voting. Which is true as to
conform identity, it is not possible always as many
individuals has to face difficulty especially for disabled
individual.
Also, at time when there is a global catastrophe where we
are prohibited to gather in crowd and perform mass voting.
This project is to tackle exactly such situations. It makes
voting literally at your doorsteps. Proposed system is
privacy protected authentication system in which database
of biometric identities is createdusingfingerprinttemplates.
4. IDEA OF IMPLEMENTATION
Fingerprint recognition system uses android camera to
capture image of voter’s finger and then pass it to the
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 04 | April 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 623
database to match the fingerprints in order to authenticate
the voter.
It works along with built-in android biometrics
authentication to enhance the authentication of voting
system.
4.1 TECHNILOGY USED
4.1.1. Android Studio
Android Studio is an Integrated Development Environment
(IDE) for android app development, based on IntelliJ IDEA.
On top of IntelliJ’s powerful code editor and developer tools,
It offers many great features that help increase your
productivity while building android apps.
4.1.2. Java
Java may be a general-purpose, class-based, object-oriented
programming language designed for having lesser
implementation dependencies.Itisa computingplatform for
application development. Java is fast, secure, and reliable.
4.1.3. Firebase
Google Firebase may be a Google-backed application
development software that permits developers to develop
iOS, Android and Web apps. Firebase provides tools for
tracking analytics, reporting and fixing appcrashes,creating
marketing and merchandise experiment.
Firebase offers a number of services, following are used:
• Authentication, Realtime database, Firebase Storage,
Firebase Analytics
4.1.4. OpenCV
This paper describes a system createdusingSIFTtechnology
to identify fingerprint and with help of it we can verify user
fingerprint. It allows user to verified and authenticated.
It can be used and implemented in multiple ways, It provide
freedom to create dynamic system with solid security setup.
We can replace current version of working system to much
faster and more secure version.
4.1.5. Python
It is an interpreted high-level general-purposeprogramming
language. Its design philosophy emphasizescodereadability
with its use of serious indentation. Its language constructs
also as its object-oriented approach aim to assist
programmers write clear, logical code for little and large-
scale projects.
4.2 SYSTEM DESIGN
The motive of our system design is to create a procedural
solution that can fulfil thefunctional requirementsforsecure
scheme for e-democratic governance. The architecture that
describes the components and interfaces of the entire
system derived from system requirements are modelled to
solve identified problem.
Figure 1: System Design
The first part of this work is to create database of different
fingerprints of voter, who are eligible for voting in election.
Fingerprint sensor is used for scanning of finger and
generates the templates. After creating a database, the
complete process is classified in three parts.
First one is identification in which, fingerprint of the voteris
matched with the previously stored templates in database.
Second part is verification, in which whether the voter is
valid or not is to be checked. If one of the templates matches
with the finger of voter then, the voter is eligible for voting.
Repeated voting is also monitored in this process, which is
not allowed by the same candidate.
Third part of the work is voting, in which, voter will choose
the option, which is available for voting. This is developed
using java, python using android studio IDE.
4.3 ALGORITHM
4.3.1. SITF [5]
Scale Invariant Feature Transformation (SIFT). The SIFT
algorithm proposed by Lowe[1] is an approach for extracting
distinctive invariant features from images. It has been
successfully applied toa spreadofcomputervisionproblems
supported feature matching, which incorporates visual
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 04 | April 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 624
perception, pose estimation, image retrieval, etc. Since the
SIFT feature points have already showed their efficacy
within the visual perception field, there are high expectation
to be used in fingerprint verification.
This method extractsdistinctivefeaturesfromimages,which
can be used to perform reliable matching between different
images. There are four major stages of computation usedfor
generating the SIFT features: Scale-spaceextrema detection,
Key point localization, Orientation assignment and the Key
point descriptor.
4.3.2. Implementation
The Process start with taking clear image of voter
fingerprint, it is then stored into firebase with respect to the
authenticated voter.
After performing voting the voter will submit his fingerprint
which is send to algorithm, It then access stored fingerprint
image from the firebase database storage.
It then performs matching of fingerprint as follows:
1. Taking Initial Fingerprint image:
(sample = cv2.imread("Input Image"))
2. Taking Stored Fingerprint image from Database:
(for [file stored in Database (“Image from
Database")]
3. Extracting Keypoints from both the images:
(keypoints_1,descriptors_1=sift.detectAndCompute(
sample, None)
keypoints_2,descriptors_2=sift.detectAndCompute(f
ingerprint_image, None))
4. Matching and Comparing Key points of both images:
(matches1=cv2.FlannBasedMatcher({'algorithm':1,
'trees': 10}, {}).knnMatch(descriptors_1,
descriptors_2, k=2)
bf = cv2.BFMatcher(cv2.NORM_L1,
crossCheck=False)
matches=bf.match(descriptors_1,descriptors_2)
matches = sorted(matches, key=lambda x:
x.distance)
for p, q in matches1:
if p.distance < 0.1 * q.distance:
match_points.append(p)
keypoints = 0
if len(keypoints_1) < len(keypoints_2): keypoints =
len(keypoints_1)
else: keypoints = len(keypoints_2))
5. Displaying result with best possible match:
(print("BEST MATCH: " + filename)
print("SCORE: " + str(best_score))
result = cv2.drawMatches(sample, kp1, image, kp2,
mp, None)
plt.rcParams['figure.figsize'] = [14.0, 7.0]
plt.title('Best Matching Points') plt.imshow(result)
plt.show())
4.3.3. Result
Figure 2: Test 1 Image Output
Figure 3: Test 1 Output
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 04 | April 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 625
Figure 4: Test 2 Output
Fingerprint Test Table
Fingerprints Result %
Fingerprint 1 Fingerprint 2 82.65
Fingerprint 1 None No Match
5. CONCLUSIONS
This paper describes a system createdusingSIFTtechnology
to identify fingerprint and with help of it we can verify user
fingerprint. It allows user to verified and authenticated.
It can be used and implemented in multipleways, itprovides
freedom to create dynamic system with solid security setup.
We can replace current version of working system to much
faster and more secure version.
REFERENCES
[1] David G. Lowe, “Object recognition from local scale-
invariant features”, International Conference on
Computer Vision, Corfu, Greece, pp. 1150- 1157, 1999
[2] D.G.Lowe, “Distinctive Image Features from Scale-
Invariant Keypoints,” International Jounal of Computer
Vision, 60(2), 91-110, 2004
[3] P. Gnanasivam, S. Muttan, “An efficient Algorithm for
fingerprint preprocessing and feature extraction”
Procedia Computer Science 2 (2010) 133–142.
[4] Donovan Gentles, Dr. Suresh SankaranarayananAdjunct
Professor, “Biometric Secured Mobile Voting” 2011
IEEE.
[5] Ru Zhou, SangWoo Sin, Dongju Li, Tsuyoshi Isshiki and
Hiroaki Kunieda, “Adaptive SIFT-Based Algorithm for
Specific Fingerprint Verification” 2011 IEEE.
[6] Kavita Rathi and Sudhir Sawarkar, “Finger Print
Matching Algorithm for Android” International Journal
of Engineering Research & Technology (IJERT) ISSN:
2278-0181 Vol. 2 Issue 10, October – 2013.
[7] G.A. Bahgat, A.H. Khalil, N.S. Abdel Kader, S. Mashali,
“Fast and accurate algorithm for core point detection in
fingerprint images”Egyptian InformaticsJournal (2013)
14, 15–25
[8] Dibyendu Nath, Saurav Ray, Sumit Kumar Ghosh,
“Fingerprint Recognition System: Design & Analysis”
Conference Paper · January 2011 Research Gate 2014.
[9] Masao Yamazaki, Dongju Li, Tsuyoshi Isshiki and
Hiroaki Kunieda, “SIFT-based Algorithm for Fingerprint
authentication on smartphone”. 2015 IEEE.
[10]Farah Dhib Tatar, “fingerprint recognition algorithm”
David C. CCSEIT, AIAP, DMDB, ICBB, CNSA – 2017.
[11]Khadija Hasta, Aditya Date,Aparna Shrivastava,Prajakta
Jhade, S. N. Shelke, “Fingerprint Based Secured Voting”.
[12]Noorazlina Mohamid Salih, “A Design of Voting System
by Using an Android Apps for Fisherman.

More Related Content

PDF
Fingerprint Based E Voting System
PDF
ONLINE FINGERPRINT VOTING SYSTEM
PDF
IRJET- Portable Biometric E-Voting System
PDF
FINGERPRINT BASED SECURED VOTING
PDF
IRJET- Secure Voting System using Aadhar and Biometrics
PDF
Captiosus Voting System
PDF
IRJET- Biometric Voting Machine
PDF
IRJET- IoT based Smart Voting System
Fingerprint Based E Voting System
ONLINE FINGERPRINT VOTING SYSTEM
IRJET- Portable Biometric E-Voting System
FINGERPRINT BASED SECURED VOTING
IRJET- Secure Voting System using Aadhar and Biometrics
Captiosus Voting System
IRJET- Biometric Voting Machine
IRJET- IoT based Smart Voting System

Similar to Fingerprint Based Voting (20)

PDF
IRJET- Aadhaar Based Voting System using Android Application
PPTX
ADVANCED BIOMETRIC - BASED VOTING SYSTEM ENSURING SECURITY AND INTELLIGENCE-1...
PDF
IRJET-Effective and Secure E- Voting Application in GSM Module using IOT
PDF
IRJET- Safe and Secure Smart Electronic Voting Machine using Biometric
PDF
N010438890
PDF
Design of biometric electronic voting machine
PDF
A SECURITY BASED VOTING SYSTEMUSING BIOMETRIC
PDF
VIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTP
PDF
IRJET- E-Voting System for Election using Fingerprint and Aadhar Number
PDF
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
PDF
IRJET- A Survey on: Aadhar Based Dual Authentication Secured E-Voting System
PDF
IRJET- Biometric Voting Machine using Aadhar Authentication
PDF
Implementation of Biometric Based Electoral Fraud Desisting System
PDF
IRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
PDF
Smart Voting System using Aadhar Card
PDF
IRJET- Online Voting System using Fingerprint Scanner
PPTX
Fingerpring scanner
PDF
IRJET- Aadhar Card based Online Voting System
PDF
Online Voting System Using Fingerprint sensor and Blockchain
PPTX
project _ for level protected voting machine_PPT.pptx
IRJET- Aadhaar Based Voting System using Android Application
ADVANCED BIOMETRIC - BASED VOTING SYSTEM ENSURING SECURITY AND INTELLIGENCE-1...
IRJET-Effective and Secure E- Voting Application in GSM Module using IOT
IRJET- Safe and Secure Smart Electronic Voting Machine using Biometric
N010438890
Design of biometric electronic voting machine
A SECURITY BASED VOTING SYSTEMUSING BIOMETRIC
VIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTP
IRJET- E-Voting System for Election using Fingerprint and Aadhar Number
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
IRJET- A Survey on: Aadhar Based Dual Authentication Secured E-Voting System
IRJET- Biometric Voting Machine using Aadhar Authentication
Implementation of Biometric Based Electoral Fraud Desisting System
IRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
Smart Voting System using Aadhar Card
IRJET- Online Voting System using Fingerprint Scanner
Fingerpring scanner
IRJET- Aadhar Card based Online Voting System
Online Voting System Using Fingerprint sensor and Blockchain
project _ for level protected voting machine_PPT.pptx

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PDF
Well-logging-methods_new................
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PDF
composite construction of structures.pdf
PPTX
web development for engineering and engineering
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
Sustainable Sites - Green Building Construction
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
Current and future trends in Computer Vision.pptx
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
PPT on Performance Review to get promotions
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
Foundation to blockchain - A guide to Blockchain Tech
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
Safety Seminar civil to be ensured for safe working.
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
Construction Project Organization Group 2.pptx
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Well-logging-methods_new................
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
composite construction of structures.pdf
web development for engineering and engineering
R24 SURVEYING LAB MANUAL for civil enggi
Sustainable Sites - Green Building Construction
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Current and future trends in Computer Vision.pptx
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPT on Performance Review to get promotions
Operating System & Kernel Study Guide-1 - converted.pdf
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
bas. eng. economics group 4 presentation 1.pptx
Foundation to blockchain - A guide to Blockchain Tech
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Safety Seminar civil to be ensured for safe working.
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
Construction Project Organization Group 2.pptx
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx

Fingerprint Based Voting

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | April 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 622 Fingerprint Based Voting Akshat Bheda1, Udit Intwala2, Rahul Ghimire3, Prof. Sanketi Raut4 ,1,2,3 Student, 4Assistant Professor, Department of Information Technology Engineering, Universal college of Engineering, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The idea of this paper arises by taking the present Covid crisis into consideration, as public gathering is prohibited/limited and risky. If people gather for voting in such situations there it may give rise to vast spread of virus instead of keeping it under control. People need to maintain long queues which costs them a lot of time and energy. The main motive of this project is to offer reliability and prohibit the challenges that are in the conventional balloting system. The simple idea of this project is the user has to register on the app, submit their fingerprint which will be processed using SIFT algorithm and complete theirvoting. So, by usingtheidea of this project people can avoid long queues and also avoid gathering and can vote easily from their homes without risking their lives keeping the Covid crisis under control. Key Words: Fingerprint, Voting, Java, Firebase, Python, Android, SITF. 1.INTRODUCTION These days the mechanical device has become an efficient toll compared with traditional paper-based voting techniques. Thus, we decided to style a system to beat the already existing electoral system. the most scheme of this project is to possess safer, no duplication of votes and declare the results as early as possible. Requirements are often classified into functional and security requirements. Reviewing these requirements as they affect e-voting system, the important factors are: • Authentication • Integrity • Confidentiality • Non-Repudiation • Accuracy • Flexibility • Auditability • Eligibility 2. LITERATURE SURVEY We have studied some of available fingerprint recognition system and how it can be implemented. Biometric Based Mobile Voting This paper shows various methods voting can be carried on mobile devices. It creates simple application to perform voting with help of biometric stored in government database. Accessing it and basedonthatvotingiscarried out. Fingerprint Recognition System: Design & Analysis Fingerprint are of large variety. Some has more no of ridges and curve than others, some individual has almost no fingerprint. It is really important to design a system whichis capable to counter almost all possible scenarios. There are many techniques developed in recent years from optical to ultrasonic fingerprint reader. 3. PROBLEM STATEMENT Current system majority of them use ballot system with digital system. A more hybrid method to ensure the votingis done without cheat. It is said that no system is complete system. Every system has major or minor flaw which is exploit for unfair advantages. We cannot make a fully secure system, if something is working it does not mean it can’t be better. Problem arise as such votingsystemneedseachindividual to physically present at the time of voting. Which is true as to conform identity, it is not possible always as many individuals has to face difficulty especially for disabled individual. Also, at time when there is a global catastrophe where we are prohibited to gather in crowd and perform mass voting. This project is to tackle exactly such situations. It makes voting literally at your doorsteps. Proposed system is privacy protected authentication system in which database of biometric identities is createdusingfingerprinttemplates. 4. IDEA OF IMPLEMENTATION Fingerprint recognition system uses android camera to capture image of voter’s finger and then pass it to the
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | April 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 623 database to match the fingerprints in order to authenticate the voter. It works along with built-in android biometrics authentication to enhance the authentication of voting system. 4.1 TECHNILOGY USED 4.1.1. Android Studio Android Studio is an Integrated Development Environment (IDE) for android app development, based on IntelliJ IDEA. On top of IntelliJ’s powerful code editor and developer tools, It offers many great features that help increase your productivity while building android apps. 4.1.2. Java Java may be a general-purpose, class-based, object-oriented programming language designed for having lesser implementation dependencies.Itisa computingplatform for application development. Java is fast, secure, and reliable. 4.1.3. Firebase Google Firebase may be a Google-backed application development software that permits developers to develop iOS, Android and Web apps. Firebase provides tools for tracking analytics, reporting and fixing appcrashes,creating marketing and merchandise experiment. Firebase offers a number of services, following are used: • Authentication, Realtime database, Firebase Storage, Firebase Analytics 4.1.4. OpenCV This paper describes a system createdusingSIFTtechnology to identify fingerprint and with help of it we can verify user fingerprint. It allows user to verified and authenticated. It can be used and implemented in multiple ways, It provide freedom to create dynamic system with solid security setup. We can replace current version of working system to much faster and more secure version. 4.1.5. Python It is an interpreted high-level general-purposeprogramming language. Its design philosophy emphasizescodereadability with its use of serious indentation. Its language constructs also as its object-oriented approach aim to assist programmers write clear, logical code for little and large- scale projects. 4.2 SYSTEM DESIGN The motive of our system design is to create a procedural solution that can fulfil thefunctional requirementsforsecure scheme for e-democratic governance. The architecture that describes the components and interfaces of the entire system derived from system requirements are modelled to solve identified problem. Figure 1: System Design The first part of this work is to create database of different fingerprints of voter, who are eligible for voting in election. Fingerprint sensor is used for scanning of finger and generates the templates. After creating a database, the complete process is classified in three parts. First one is identification in which, fingerprint of the voteris matched with the previously stored templates in database. Second part is verification, in which whether the voter is valid or not is to be checked. If one of the templates matches with the finger of voter then, the voter is eligible for voting. Repeated voting is also monitored in this process, which is not allowed by the same candidate. Third part of the work is voting, in which, voter will choose the option, which is available for voting. This is developed using java, python using android studio IDE. 4.3 ALGORITHM 4.3.1. SITF [5] Scale Invariant Feature Transformation (SIFT). The SIFT algorithm proposed by Lowe[1] is an approach for extracting distinctive invariant features from images. It has been successfully applied toa spreadofcomputervisionproblems supported feature matching, which incorporates visual
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | April 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 624 perception, pose estimation, image retrieval, etc. Since the SIFT feature points have already showed their efficacy within the visual perception field, there are high expectation to be used in fingerprint verification. This method extractsdistinctivefeaturesfromimages,which can be used to perform reliable matching between different images. There are four major stages of computation usedfor generating the SIFT features: Scale-spaceextrema detection, Key point localization, Orientation assignment and the Key point descriptor. 4.3.2. Implementation The Process start with taking clear image of voter fingerprint, it is then stored into firebase with respect to the authenticated voter. After performing voting the voter will submit his fingerprint which is send to algorithm, It then access stored fingerprint image from the firebase database storage. It then performs matching of fingerprint as follows: 1. Taking Initial Fingerprint image: (sample = cv2.imread("Input Image")) 2. Taking Stored Fingerprint image from Database: (for [file stored in Database (“Image from Database")] 3. Extracting Keypoints from both the images: (keypoints_1,descriptors_1=sift.detectAndCompute( sample, None) keypoints_2,descriptors_2=sift.detectAndCompute(f ingerprint_image, None)) 4. Matching and Comparing Key points of both images: (matches1=cv2.FlannBasedMatcher({'algorithm':1, 'trees': 10}, {}).knnMatch(descriptors_1, descriptors_2, k=2) bf = cv2.BFMatcher(cv2.NORM_L1, crossCheck=False) matches=bf.match(descriptors_1,descriptors_2) matches = sorted(matches, key=lambda x: x.distance) for p, q in matches1: if p.distance < 0.1 * q.distance: match_points.append(p) keypoints = 0 if len(keypoints_1) < len(keypoints_2): keypoints = len(keypoints_1) else: keypoints = len(keypoints_2)) 5. Displaying result with best possible match: (print("BEST MATCH: " + filename) print("SCORE: " + str(best_score)) result = cv2.drawMatches(sample, kp1, image, kp2, mp, None) plt.rcParams['figure.figsize'] = [14.0, 7.0] plt.title('Best Matching Points') plt.imshow(result) plt.show()) 4.3.3. Result Figure 2: Test 1 Image Output Figure 3: Test 1 Output
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | April 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 625 Figure 4: Test 2 Output Fingerprint Test Table Fingerprints Result % Fingerprint 1 Fingerprint 2 82.65 Fingerprint 1 None No Match 5. CONCLUSIONS This paper describes a system createdusingSIFTtechnology to identify fingerprint and with help of it we can verify user fingerprint. It allows user to verified and authenticated. It can be used and implemented in multipleways, itprovides freedom to create dynamic system with solid security setup. We can replace current version of working system to much faster and more secure version. REFERENCES [1] David G. Lowe, “Object recognition from local scale- invariant features”, International Conference on Computer Vision, Corfu, Greece, pp. 1150- 1157, 1999 [2] D.G.Lowe, “Distinctive Image Features from Scale- Invariant Keypoints,” International Jounal of Computer Vision, 60(2), 91-110, 2004 [3] P. Gnanasivam, S. Muttan, “An efficient Algorithm for fingerprint preprocessing and feature extraction” Procedia Computer Science 2 (2010) 133–142. [4] Donovan Gentles, Dr. Suresh SankaranarayananAdjunct Professor, “Biometric Secured Mobile Voting” 2011 IEEE. [5] Ru Zhou, SangWoo Sin, Dongju Li, Tsuyoshi Isshiki and Hiroaki Kunieda, “Adaptive SIFT-Based Algorithm for Specific Fingerprint Verification” 2011 IEEE. [6] Kavita Rathi and Sudhir Sawarkar, “Finger Print Matching Algorithm for Android” International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol. 2 Issue 10, October – 2013. [7] G.A. Bahgat, A.H. Khalil, N.S. Abdel Kader, S. Mashali, “Fast and accurate algorithm for core point detection in fingerprint images”Egyptian InformaticsJournal (2013) 14, 15–25 [8] Dibyendu Nath, Saurav Ray, Sumit Kumar Ghosh, “Fingerprint Recognition System: Design & Analysis” Conference Paper · January 2011 Research Gate 2014. [9] Masao Yamazaki, Dongju Li, Tsuyoshi Isshiki and Hiroaki Kunieda, “SIFT-based Algorithm for Fingerprint authentication on smartphone”. 2015 IEEE. [10]Farah Dhib Tatar, “fingerprint recognition algorithm” David C. CCSEIT, AIAP, DMDB, ICBB, CNSA – 2017. [11]Khadija Hasta, Aditya Date,Aparna Shrivastava,Prajakta Jhade, S. N. Shelke, “Fingerprint Based Secured Voting”. [12]Noorazlina Mohamid Salih, “A Design of Voting System by Using an Android Apps for Fisherman.