SlideShare a Scribd company logo
2
Most read
3
Most read
4
Most read
Smart Voting System With Face Recognition
By,
Nikhil Katte
NKOCET, Solapur
1
CONTENT
 Introduction
 System and System Architectures
 How it’s work?(Image Processing)
 conclusion
2
INTRODUCTION
3
 Now a days, every one is moving towards the digital India.
 Then why the voting system is still remained Manual ?
 So, for that facial recognition is the best way.
 This is the advance technique of voting.
 We can vote using our android (Smartphones) with the help of face
recognition.
SYSTEM (Application System)
 System Is mainly divided into three types:-
1. Server
2. Java Client (Registration Centre)
3. Android Client (Voter)
4
SYSTEM ARCHITECTURE
5
Contd…
6
How its work?(Image Processing)
 In this system, face recognition is playing main role for authentication. Live
image will be captured by mobile frontal camera. This captured image will be
sent to the server for further processing. By using this image, server checks
whether user is authorized or not. User is permitted for voting only if he is
authorized.
 Here the Standard algorithm is used for Face Recognition, which is explained
in next slide.
7
Contd...
 In facial recognition there are 2 types:-
1. VERIFICATION: The system compares the given individual with who
they say they are and gives a yes or no decision.
2. IDENTIFICATION- The system compares the given individual to all
the Other individuals in the database and gives a ranked list of
matches.
8
Contd…
9
Contd…
 Grayscale Algorithm
 Threshold Algorithm
 Blurring Algorithm
 Scaling Algorithm
 Template generation and Matching
10
CONCLUSION
This analysis of development of Smart-voting application on an android
platform. The usability of this system is very high if it will use in real life
election process. It will definitely helpful for the users who wish to vote and the
voting process will be made very easy by using this application. However, after
having tested the system, in future we tend to add additional functionality of
image validation for the security constraint and uniqueness which will provide
very strong security for the confidential information about vote.
11

More Related Content

PPT
Multi Head, Multi Tape Turing Machine
PDF
Javascript notes.pdf
PDF
Mobile Jammer report
PPTX
Ppt presentation on income tax
PPT
Voice morphing-
PPT
PPTX
Introduction to java
PPTX
Image recognition
Multi Head, Multi Tape Turing Machine
Javascript notes.pdf
Mobile Jammer report
Ppt presentation on income tax
Voice morphing-
Introduction to java
Image recognition

What's hot (20)

PPTX
Virtual Mouse using hand gesture recognition
PPTX
Global wireless e voting powerpoint presentation
PPTX
Driver drowsiness detection
PPTX
Face recognition technology
PPTX
Finger print ATM
PPTX
Fingerprint Authentication for ATM
PPTX
Face recognition attendance system
PPTX
Gesture Recognition
PPTX
Online Quiz System Project Report ppt
PPT
Ecg analysis in the cloud
PPTX
Face recognization
PDF
CYBERBULLYING DETECTION USING MACHINE LEARNING-1 (1).pdf
DOC
I.t in space
PDF
Driver Drowsiness Detection report
DOCX
Online voting system project
PPT
Face recognition ppt
DOCX
Best topics for seminar
PDF
20 Latest Computer Science Seminar Topics on Emerging Technologies
PPTX
Edge Computing.pptx
DOCX
Computer science seminar topics
Virtual Mouse using hand gesture recognition
Global wireless e voting powerpoint presentation
Driver drowsiness detection
Face recognition technology
Finger print ATM
Fingerprint Authentication for ATM
Face recognition attendance system
Gesture Recognition
Online Quiz System Project Report ppt
Ecg analysis in the cloud
Face recognization
CYBERBULLYING DETECTION USING MACHINE LEARNING-1 (1).pdf
I.t in space
Driver Drowsiness Detection report
Online voting system project
Face recognition ppt
Best topics for seminar
20 Latest Computer Science Seminar Topics on Emerging Technologies
Edge Computing.pptx
Computer science seminar topics
Ad

Similar to Smart Voting System with Face Recognition (20)

PPTX
smartvotingsystem-200727071529 0(1).pptx
PDF
Implementation of Biometric Based Electoral Fraud Desisting System
DOCX
Face Recognition Home Security System
PDF
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
PDF
Captiosus Voting System
PPTX
project _ for level protected voting machine_PPT.pptx
PDF
A Survey on Security for Server Using Spontaneous Face Detection
PPTX
Online voting
PPTX
eVoting.pptx
PPTX
Online voting system
DOCX
Final project prosal.docx
PDF
Online Voting System
PDF
Secure Internet Voting System
PDF
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
PDF
Fingerprint Based Voting
PDF
Nivritti : web-based Real time face recognition
PPTX
Face detection and recognition using surveillance camera2 edited
PPTX
Face Recognition Proposal Presentation
DOCX
finger print sensor
PDF
An03402300234
smartvotingsystem-200727071529 0(1).pptx
Implementation of Biometric Based Electoral Fraud Desisting System
Face Recognition Home Security System
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
Captiosus Voting System
project _ for level protected voting machine_PPT.pptx
A Survey on Security for Server Using Spontaneous Face Detection
Online voting
eVoting.pptx
Online voting system
Final project prosal.docx
Online Voting System
Secure Internet Voting System
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
Fingerprint Based Voting
Nivritti : web-based Real time face recognition
Face detection and recognition using surveillance camera2 edited
Face Recognition Proposal Presentation
finger print sensor
An03402300234
Ad

Recently uploaded (20)

PPTX
Spectroscopy.pptx food analysis technology
PPTX
Cloud computing and distributed systems.
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Spectral efficient network and resource selection model in 5G networks
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Empathic Computing: Creating Shared Understanding
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
Spectroscopy.pptx food analysis technology
Cloud computing and distributed systems.
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Programs and apps: productivity, graphics, security and other tools
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Spectral efficient network and resource selection model in 5G networks
“AI and Expert System Decision Support & Business Intelligence Systems”
Review of recent advances in non-invasive hemoglobin estimation
Building Integrated photovoltaic BIPV_UPV.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Encapsulation_ Review paper, used for researhc scholars
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Diabetes mellitus diagnosis method based random forest with bat algorithm
MYSQL Presentation for SQL database connectivity
Empathic Computing: Creating Shared Understanding
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Unlocking AI with Model Context Protocol (MCP)
Reach Out and Touch Someone: Haptics and Empathic Computing
The Rise and Fall of 3GPP – Time for a Sabbatical?

Smart Voting System with Face Recognition

  • 1. Smart Voting System With Face Recognition By, Nikhil Katte NKOCET, Solapur 1
  • 2. CONTENT  Introduction  System and System Architectures  How it’s work?(Image Processing)  conclusion 2
  • 3. INTRODUCTION 3  Now a days, every one is moving towards the digital India.  Then why the voting system is still remained Manual ?  So, for that facial recognition is the best way.  This is the advance technique of voting.  We can vote using our android (Smartphones) with the help of face recognition.
  • 4. SYSTEM (Application System)  System Is mainly divided into three types:- 1. Server 2. Java Client (Registration Centre) 3. Android Client (Voter) 4
  • 7. How its work?(Image Processing)  In this system, face recognition is playing main role for authentication. Live image will be captured by mobile frontal camera. This captured image will be sent to the server for further processing. By using this image, server checks whether user is authorized or not. User is permitted for voting only if he is authorized.  Here the Standard algorithm is used for Face Recognition, which is explained in next slide. 7
  • 8. Contd...  In facial recognition there are 2 types:- 1. VERIFICATION: The system compares the given individual with who they say they are and gives a yes or no decision. 2. IDENTIFICATION- The system compares the given individual to all the Other individuals in the database and gives a ranked list of matches. 8
  • 10. Contd…  Grayscale Algorithm  Threshold Algorithm  Blurring Algorithm  Scaling Algorithm  Template generation and Matching 10
  • 11. CONCLUSION This analysis of development of Smart-voting application on an android platform. The usability of this system is very high if it will use in real life election process. It will definitely helpful for the users who wish to vote and the voting process will be made very easy by using this application. However, after having tested the system, in future we tend to add additional functionality of image validation for the security constraint and uniqueness which will provide very strong security for the confidential information about vote. 11