1 / 4

Secure Authentication for Advanced Voting System using Fingerprint and RFID

The problem of voting is still critical in terms of rigging and security. A RFID and BIOMETRIC fingerprint sensor is being used in this advanced voting system. In the initial stage of voting we use bullet papers and polling machine without any unique authentication on the election voting process. Biometric are used for human secure authentication because fingerprint are unique in human biological nature. RFID Radio Frequency Identification used for automatic fetching data from data stored in device. The both modules are enhanced the rigging security in the election. B. Shalini | M. Sakthi Prabha | R. Krithika "Secure Authentication for Advanced Voting System using Fingerprint and RFID" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: https://www.ijtsrd.com/papers/ijtsrd11044.pdf Paper URL: http://www.ijtsrd.com/engineering/computer-engineering/11044/secure-authentication-for-advanced-voting-system-using-fingerprint-and-rfid/b-shalini<br>

Download Presentation

Secure Authentication for Advanced Voting System using Fingerprint and RFID

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. International Research Research and Development (IJTSRD) International Open Access Journal Secure Authentication for Advanced Voting System sing Fingerprint and RFID International Journal of Trend in Scientific Scientific (IJTSRD) International Open Access Journal ISSN No: 2456 ISSN No: 2456 - 6470 | www.ijtsrd.com | Volume 6470 | www.ijtsrd.com | Volume - 2 | Issue – 3 Secure Authentication or Advanced Voting System using Fingerprint B. Shalini M. Sakthi Prabha M. Sakthi Prabha Department of Computer Science and Engineering, GKM College of Engineering and Technology, Chennai, Tamil Nadu, India Department of Computer Science and Engineering, GKM College of Engineering and Technology, Chennai, Tamil Nadu, India Department of Computer Science and Engineering, GKM College of Engineering and Technology, Department of Computer Science and Engineering, GKM College of Engineering and Technology, Chennai, Tamil Nadu, India Chennai, Tamil Nadu, India R. Krithika Assistant Professor, Department of Computer Science and GKM College of Engineering and Technology, Chennai, Tamil Nadu, India GKM College of Engineering and Technology, Chennai, Tamil Nadu, India GKM College of Engineering and Technology, Chennai, Tamil Nadu, India Assistant Professor, Department of Computer Science and Engineering ngineering, RELATED WORK ABSTRACT The problem of voting is still critical in terms of rigging and security. A RFID and BIOMETRIC fingerprint sensor is being used in this advanced voting system. In the initial stage of voting we use bullet papers and polling machine without any unique authentication on the election votin Biometric are used for human secure authentication because fingerprint are unique in human biological nature. RFID (Radio Frequency Identification) used for automatic fetching data from data stored in device. The both modules are enhanced the rigging security in the election. critical in terms of Robust Biometric Recognition from Palm Depth Images for Gloved Hands, P. Nguyen, Member, 2015disadvantage is Biometric recognition can be used to improve gesture automatically identifying computational cost multilayer segmentation algorithms for hand recognition on mobile phones, Danil disadvantages is Unconstrained and contact recognition problem with mobile devices is not solved yet because these systems have to deal with hard problems like different backgrounds and illumination. Palm-Print Classification by Global Features, Bob Zhang, 2013 Three-dimensional palm prints are harder to counterfeit than 2-D palm prints and more robust to variations in illumination and serious scrabbling on the palm surface. Previous work on 3 palm-print recognition has concentrated on local features such as texture and lines. features such as texture and lines. Robust Biometric Recognition from Palm Depth Images for Gloved Hands, P. Nguyen, Member, 2015disadvantage is Biometric recognition can be used to improve gesture-based interfaces by automatically identifying computational cost multilayer segmentation algorithms for hand recognition on Danil disadvantages is Unconstrained and contact-free hand recognition problem with mobile devices is not solved hese systems have to deal with hard problems like different backgrounds and illumination. Print Classification by Global Features, Bob dimensional palm prints are rigging and security. A RFID and BIOMETRIC fingerprint sensor is being used in this advanced voting system. In the initial stage of voting we use bullet papers and polling machine without any unique authentication on the election voting process. Biometric are used for human secure authentication because fingerprint are unique in human biological nature. RFID (Radio Frequency Identification) used for automatic fetching data from data stored in device. operators. operators. L Low graph graph-based de de Santos Santos-sierra,2014 gging security in Keywords: RFID tag and reader, fingerprint sensor, microcontroller PIC16F877A. RFID tag and reader, fingerprint sensor, D palm prints and more ons in illumination and serious INTRODUCTION scrabbling on the palm surface. Previous work on 3-D print recognition has concentrated on local This paper focuses on problem faced by the election commission in rigging vote during the election. To overcome this problem, we introduced the bio fingerprint verification for the voting in the election. (fingerprint is unique in nature for each person even in the case of twins) RFID tags have the candidate details. Radio frequency identification technology allows time to be scanned quickly and enable fast identification of the particular. Even when it is covered by several items. It enables get the candidate profile faster. Both of the fingerprint verification and the RFID technology makes candidate cast their vote secure and authenticate. This paper focuses on problem faced by the election commission in rigging vote during the election. To introduced the bio-metric PROPOSED SYSTEM fingerprint verification for the voting in the election. (fingerprint is unique in nature for each person even in the case of twins) RFID tags have the candidate details. Radio frequency identification technology scanned quickly and enable fast identification of the particular. Even when it is The Biometric voting system with RFID and biometric fingerprint using voter id. Only eligible voters are permitted to cast their vote. Removes human fallibility from the tabulation process and makes your election results available within limited period of time at the end of the election. No paper ballots, no postage and no printing It will be secured and there will be no fake votes. and there will be no fake votes. The Biometric voting system with RFID and voter id. Only eligible voters are permitted to cast their vote. Removes human fallibility from the tabulation process and makes your election results available within limited period of time at the end of the election. No paper enables get the candidate verification and printing It will be secured the RFID technology makes candidate cast their vote @ IJTSRD | Available Online @ www.ijtsrd.com @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Apr 2018 Page: 703

  2. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 in Scientific Research and Development (IJTSRD) ISSN: 2456 in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 The following process involved in our proposed system: The following process involved in our proposed RFID and Bio-Metric Finger Print Sensor is the first stage of the system, where the person place the RFID tag in the reader. The reader checks the matching data and moves to next stage. . Metric Finger Print Sensor is the first stage of the system, where the person place the RFID ecks the matching data •Fingerprint is taken and checked, with the existing database of the area. This unit works as your voter id where they identify, whether the person resident of that area or not. Fingerprint is taken and checked, with the existing database of the area. This unit works as your voter id where they identify, whether the person resident PIC 16F877A CONTROLLER PIC 16F877A CONTROLLER BLOCK DIAGRAM •Any proxy person try to vote and his data was not there means the red light will glow and he is not allowed to enter the voting stage and it also blocks the person who comes to vote twice. the person who comes to vote twice. vote and his data was not there means the red light will glow and he is not allowed to enter the voting stage and it also blocks •Voting Area is the second stage of the system, where the person who will go to push the but of his choice And the count is stored in microcontroller and send to counting station via RF immediately. Voting Area is the second stage of the system, where the person who will go to push the button of his choice And the count is stored in microcontroller and send to counting station via •Third stage is the Counting Area stage. In this stage information received from the voting station will be added and displayed parallel on the display, this will happen in real time. play, this will happen in real time. Third stage is the Counting Area stage. In this stage information received from the voting station displayed parallel on the SYSTEM HARDWARE •By using biometric fingerprint it provides enough security which reduces the false votes. security which reduces the false votes. By using biometric fingerprint it provides enough PIC 16F877A CONTROLLER The 16F877A is a capable microcontroller that can do many tasks because it has a large enough programming memory (large in terms of sensor and control projects) 8k words and 368 Bytes of RAM. This is enough to do many different projects This is enough to do many different projects. The 16F877A is a capable microcontroller that can do many tasks because it has a large enough memory (large in terms of sensor and control projects) 8k words and 368 Bytes of RAM. Fig 1: PROPOSED SYSTEM PROPOSED SYSTEM @ IJTSRD | Available Online @ www.ijtsrd.com @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Apr 2018 Page: 704

  3. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 in Scientific Research and Development (IJTSRD) ISSN: 2456 in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 ARCHITECTURE DIAGRAM Fig 2: Working Architecture LIST OF WORKING MODULES IN PROPOSED SYSTEM LIST OF WORKING MODULES IN PROPOSED b) FINGERPRINT VERIFICATION MODULE b) FINGERPRINT VERIFICATION MODULE In the fingerprint verification module voter can authenticate their fingerprint after placing the RFID captures the fingerprint image and verifying with the stored image of the candidate In the fingerprint verification module voter can authenticate their fingerprint after placing the RFID tag, fingerprint module captures the and verifying with the stored image of the candidate in the database on voting system. in the database on voting system. a) RFID module b) Fingerprint verification module b) Fingerprint verification module c) Casting module d) Counting module a) RFID MODULE In this module we are implement RFID tags and reader, RFID contain voters ID details and RFID reader is used to scan the tag and fetch the voter’s details from the database. identification technology allows time to be scanned quickly and enable fast identification of the particular able fast identification of the particular In this module we are implement RFID tags and reader, RFID contain voters ID details and RFID reader is used to scan the tag and fetch the voter’s details from the database. Radio Radio time to be scanned frequency frequency Fig-4 .RS232 Interface Fingerprint Reader with Board Reader with Board 4 .RS232 Interface Fingerprint c) CASTING MODULE This module is used to identify the specific constitution volume of voter and also viewing the list of candidates those who are nominated for particular volume in particular position. This module will help the voters they can easily identify the candidates in This module is used to identify the specific constitution volume of voter and of candidates those who are nominated for particular volume in particular position. This module will help the voters they can easily identify the candidates in that system. Fig 3: RFID Tag & Reader RFID Tag & Reader @ IJTSRD | Available Online @ www.ijtsrd.com @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Apr 2018 Page: 705

  4. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 in Scientific Research and Development (IJTSRD) ISSN: 2456 in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 CASTING VOTE CONCLUSION After implementation of this project we can change the face of today’s voting system making it more secure and corruption less. It will give a fair chance to every leader to win on the basis of strength of money After implementation of this project we can change the face of today’s voting system making it more secure and corruption less. It will give a fair chance to every leader to win on the basis of strength of money and power. The scope of the the society, institutional or nation level by using a more secure and efficient database management system that could handle hundreds, thousands or billions of users.in future we implement iris authentication for security. project can be raised to the society, institutional or nation level by using a more secure and efficient database management system that could handle hundreds, thousands or billions of users.in future we implement iris Fig-5: Before Casting REFERENCE 1.Burmester, M., Magkos, E., Towards secure and practical e-elections in the new era. In D. Gritzalis, editor, Secure Electronic Voting, pages 63– 72. Kluwer Academic Publishers, (2003). 72. Kluwer Academic Publishers, (2003). Burmester, M., Magkos, E., Towards secure and elections in the new era. In D. Gritzalis, editor, Secure Electronic Voting, pages Fig-6: After Casting 2.ARM http://www.st.com Cortex M3‖, ‖, [Online] [Online] Available: Available: d) COUNTING MODULE 3.A. illafiorita and K. Weldemariam, and. iella, “Development, Formal eri of an E-voting System with PA,” IEEE transactions on Information Forensics and Security, vol. 4, no. 4, 2009 Security, vol. 4, no. 4, 2009 orita and K. Weldemariam, and. iella, “Development, Formal erification, and Evaluation voting System with PA,” IEEE transactions on Information Forensics and This module will count the number of from user applications to Database once they processed the action, voter should be revoked they are not allowed to perform further voting process in a specific duration. votes received from user applications to Database once they processed the action, voter should be revoked they are not allowed to perform further voting process in a 4.Qadah, G.Z., Taha, R.: Electronic voting systems: requirements, design, Compute. Stand. Interf. 29(3), 376 Compute. Stand. Interf. 29(3), 376–386 (2007). Qadah, G.Z., Taha, R.: Electronic voting systems: ments, design, and and implementation. implementation. Result Window 5.A. M. Keller, A. Dechert, K. Auerbach, D. Mertz, A. Pearl, and J. L. Hall, “A PC Source Voting Machine with an Accessible Voter Verifiable Paper Ballot,” Proceed USENIX Annual Technical Conference, U.S.A., 2005, p.52. A. M. Keller, A. Dechert, K. Auerbach, D. Mertz, A. Pearl, and J. L. Hall, “A PC-based Open- Source Voting Machine with an Accessible Voter- Verifiable Paper Ballot,” Proceedings of the USENIX Annual Technical Conference, U.S.A., @ IJTSRD | Available Online @ www.ijtsrd.com @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Apr 2018 Page: 706

More Related