Biometric Voting System
Biometric Voting System
have been used since early in the 20th specialist high security applications,
century to refer to the field of development however we are now seeing their use and
1
years earlier, the people in the Nile valley respectable numbers of devices and poised
routinely employed biometric verification for significant growth as large-scale
formally identify individuals via unique applications have started to unfold.
physiological parameters such as scars and
a combination of features such as 1.2 Basic Techniques:
complexion, eye colour, height and so on.
Though they did not use the advanced A biometric system is a real-time
basic principles used by them were similar. person by measuring a particular physical
or behavioural characteristic and later
Later, in the nineteenth century there comparing it to a library of characteristics
was a peak of interest as researchers into belonging to many people. Fingerprint and
criminology attempted to relate physical other biometric devices consist of a reader
features and characteristics with criminal or scanning device, software that converts
tendencies. This resulted in a variety of the scanned information into digital form,
measuring devices being produced and and wherever the data is to be analysed, a
much data being collected. The results were database that stores the biometric data for
not conclusive but the idea of measuring comparison with previous records. When
individual physical characteristics seemed converting the biometric input, the software
to stick and the parallel development of identifies specific points of data as match
fingerprinting became the international points. The match points are processed
methodology among police forces for using an algorithm into a value that can be
identity verification. compared with biometric data scanned
when a user tries to gain access.
But, for many years, a fascination with
the possibility of using electronics and the
Thus, biometric devices can be
power of microprocessors to automate
explained with a 3-step procedure. They
identity verification had occupied the
are,
minds of individuals and organizations both
in the military and commercial sectors. 1. A sensor takes an observation. The type
Hence, various projects were initiated to of sensor and its observation depend on the
look at the potential of biometrics. In the type of biometrics device used. This
last decade, the biometric industry has observation gives us a Biometric Signature
matured to a global industry shipping of the individual.
2
2. A computer algorithm normalizes the Identification. Identification means
biometric signature so that it is in the same establishing a person's identity Verification
format (size, resolution, etc.) as the involves confirming or denying a person's
signatures on the system's database. The claimed identity. Each one of these
normalization of the biometric signature approaches has its own complexities and
gives us an A Normalized Signature of the could probably be solved best by a certain
individual. biometric system. Verification systems are
signature with the set (or sub-set) of system because the system tries to match
database and provides a similarity score against a specific biometric already on file.
that compares the individual's normalized Identification systems are different from
database set (or sub-set). What is then done identification system seeks to identify an
with the similarity scores depends on the unknown person, or unknown biometric.
3
Chapter 2 large user bases. Fingerprint verification
may be a good choice for in house systems
where adequate explanation and training
2. BIOMETRICS METHODOLOGIES:
can be provided to users and where the
Fingerprint recognition and iris
system is operated within a controlled
scanning are the most well-known forms of
environment. It is not surprising that the
biometric security. However, facial
workstation access application area seems
recognition and (finger and palm) vein
to be based almost exclusively around
pattern recognition is also gaining in
fingerprints, due to the relatively low cost,
popularity.
small size (easily integrated into
Fingerprint verification – keyboards) and ease of integration.
Hand geometry -
4
Accuracy can be very high if desired. Hand biometrics leading to the perception of
geometry readers are deployed in a wide voice verification as unfriendly in some
range of scenarios, including time and quarters. However, much work has been
attendance recording where they have and continues to be undertaken in this
proved extremely popular. Ease of context and it will be interesting to monitor
integration into other systems and progress accordingly.
processes, coupled to ease of use makes
hand geometry an obvious first step for Retinal scanning -
Voice verification -
5
business where identification is a Signature verification enjoys a synergy
requirement and prerequisite. with existing processes that other
6
Chapter 3
3. BIOMETRICS DESIGN:
7
2. A/D Converter: This is used to convert any one of the finger prints stored in the
the analogue data from the SENSOR into data base then the vote is rejected.
the digital data and transfer it to the
processor.
3. Flash Rom: This is for the storage of the
data temporarily in the DSP processor. This
will work until the data is transferred to the
main memory of the HOST.
4. DSP Chip: This is used to receive the Fig 3.5: Finger Print Expression
data and process it. This is connected to the Feature extraction and comparison
USB port for further transfer of the data. Scanning and processing:
5. USB Port: The sole purpose of the USB
The biometric sensor scans the
port is to establish a communication link
image. This so scanned data is in the
between the DSP processor and the
analogue form. This is converted into
MEMORY (DATABASE).
digital form by using an A/D converter.
Extraction of thumb impression:
Since the image is to be transferred quickly
to the converter, it is interfaced in parallel
with the DSP chip. The data received from
the parallel in ports is further processed in
the chip. Parallel interfacing is done to have
a quick performance.
8
The circuit connections for the process Here the identity of a person is checked
explained are as shown below. A DE- whether he\she belongs to the particular
MULTIPLEXER is connected to the inputs constituency or not. The machine which
in parallel to the chip. The option which is takes the finger print of the person checks it
given is transferred to the chip in binary with the data base already stored in it. If the
form. E.g.:1. Party one, 2. Party two, 3. finger print matches it will give access to
Party three, 4. Party four. the person to cast his vote and if it doesn’t
match any of the finger prints stored in the
Suppose if the option is two then the data base then it will reject the voter. Thus,
binary data transfer to the ports is 0010.DE- his method will enable the members of that
MULTIPLEXER is designed according to particular constituency only to vote. This
the number of parties present in the can be taken as the first step to avoid
constituency. The transferred data is stored rigging. To have a faster performance the
in a 16-bit register according to their option. searching technique is implemented on the
After counting takes place the count of each basis of GOOGLE SEARCH. The process
party is transferred to the transmitter. A in the form of a flow chart is as given
transmitter is interfaced serially to the DSP below.
chip. The transmitter data is transferred
through the telephone lines to the HOST. Processing and counting:
The counts of similar parties are added at
the host and the data is transferred to the
STATE HEAD QUARTERS to display the
result of the particular constituency.
9
is selected the voter is prompted for a searched folder. The searched folder is
confirmation. In case the voter enters an programmed such that an image cannot be
invalid number, the screen reappears and present more than once in this folder. So,
he\she is prompted to cast the vote again. when a voter casts multiple votes the
Then according to the option selected, the exception is generated and an alarm is
vote count of the particular party gets raised and even the police can be informed
incremented by one. Finally, at the end of about the identity of the intruder indulging
the day, the position of the parties in terms in this illegal activity. This is shown in the
of the total votes cast can be known. A very block diagram given below the scanned
simple flow chart for the above process is vote is first checked with the acceptability
as shown below: of the voter as explained in the first flow
chart. If the finger print is accessible then
Rejection of voter: the data of the specified person is taken into
account. The voter’s thumb impression is
verified with the previously cast votes. If
there is no match then the vote is accepted
and the count is increased by one. If the
vote matches with any of the previous votes
then the vote is rejected and the person’s
Fig 3.8: Rejection of Voter
identity is stored and it is given to the police
After we have emerged out with a for further enquiry. There is a flash ROM in
solution to check voter’s identity in a which these details can be stored.
constituency, our next task is to see that a
particular person cannot vote more than 3.2 ADVANTAGES AND
once i.e., to avoid multiple votes. This task
DISADVANTAGES
can be accomplished by simple software
technique employed. It consists of two A. Advantages: -
10
• Low power consumption 3. It could also be used to conduct
general assembly elections where
• It is economical
number of candidates are less than or
• Less manpower required
equal to eight in the current situation,
• Time conscious, less time required for on a small scale basis.
voting &counting
This project can be used as a voting 4. It could make the results available at
machine to prevent rigging, during the any corner of the world in minimum
elections in the polling booths. time.
11
Chapter 5
5. CONCLUSION:
Chapter 6
6. REFERENCES:
12