Anda di halaman 1dari 6

FINGERPRINT BASED E-VOTING SYSTEM USING GSM

TECHNOLOGY
Abstract;Fingerprint biometric is one of the most widely deployed publicized identification systems in
biometrics. This is most widely used technique, due to its easy and cost effective integration in
existing and upcoming technologies. The integration of biometric with electronic voting
machine undoubtedly requires less manpower, save much time of voters and personnel
eliminate rigging, ensure accuracy, transparency and fast results in election. In this paper, a
framework for electronic voting machine based on biometric verification is proposed and
implemented. The proposed framework ensures secured identification and authentication
processes for the voters and candidates through the use of fingerprint biometrics. The system
uses thumb impression for voter identification as we know that the thumb impression of every
human being has a unique pattern. Thus it would have an edge over the present day voting
systems.

INTRODUCTION
Biometrics is the science and technology of measuring and analyzing biological data. In information
technology, biometrics refers to technologies that measure and analyze human body characteristics, such
as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for
authentication purposes.
In this paper we have used thumb impression for the purpose of voter identification or authentication. As
the thumb impression of every individual is unique, it helps in maximizing the accuracy. A database is
created containing the thumb impressions of all the voters in the constituency. Illegal votes and repetition
of votes is checked for in this system. Hence if this system is employed the elections would be fair and
free from rigging. Thanks to this system that conducting elections would no longer be a tedious and
expensive job.

EXISTING SYSTEM:
An EVM consists of two units namely Control Unit and Balloting Unit The two units are joined by a fivemeter cable. The Control Unit is with the Presiding Officer or a Polling Officer and the Ballot Unit is
placed inside the voting compartment. Instead of issuing a ballot paper, the Polling Officer in-charge of
the Control Unit will press the Ballot Button. This will enable the voter to cast his/her vote by pressing
the blue button on the Ballot Unit against the candidate and symbol of his/her choice. The controller used
in EVMs has its operating program etched permanently in silicon at the time of manufacturing by the
manufacturer. No one (including the manufacturer) can change the program once the controller is

manufactured. EVMs can cater to a maximum of 64 contesting candidates. There is provision for only 16
candidates in a BU if the total number of candidates exceeds 16, then a second BU is to be linked parallel
to the first BU. Similarly, if the total number of candidates exceeds 32, then a third BU is to be connected
and if the total number of candidates exceeds 48, fourth BU is to be connected to cater to a maximum of
64 candidates. As the process is faster and more reliable, the EVMs save considerable amount of time,
money, and paper and man power.

Fig:1: Electronic Voting Machine (EVM)

Actual process of identifying the voter has to be done by the polling officer. For casting of votes with
EVMs, the voters have to produce their Election Photo Identity Card(EPIC) issued by the Election
Commission. The polling officer needs to verify the EPIC with the official list he has, then he needs to
confirm whether it is an authorized card or not and he allows the voters to cast their votes. Therefore
EVMs depend upon manual verification of the EPIC. Consequently, this slows down the voting process.
This limitation is overcome with the help of finger-print identification module. The second limitation is
the number of contesting candidates available in the EVM. The EVMs can cater to a maximum of 64
candidates with the use of one CU and four BU. If the number of contestant candidates exceeds 64, then
the polling officer needs to carry one more set of EVM that necessitates more material and additional
manpower.
PROPOSED SYSTEM:
Use of the GSM security features, in particular the authentication The proposed system
suggests the function along with fingerprint biometric scanner technology inbuilt in mobile
phones, which will be customized in a cost-effective way, thus providing a more viable option
compared to existing systems. It possesses the ability for the voters to cast vote even if they are
not present in the polling booth, with high identification and secured measures, a unique feature of
our concep
This Project Is Used To Improve The Security Performance In The Voting Machine. In This Project
Finger Print Is Used As Vote ID Card Now Days Some Person Makes the Duplicate Vote Id Card but in
This Project Human Finger Print Is Used for Caste the Vote. So This Project Improves the Security
Performance and Avoid Forgery Vote Because Naturally Human
TECHNOLOGY BEHIND THIS PROJECT:

Bio Metric Authentication Technology


GSM Technology

OUR CHALLENGING WORK IN THIS PROJECT:

As embedded applications include more functionality, the challenge is making these functions
accessible to the end user in a meaningful way.
Design the hand held hardware with lcd, Keypad and RTC
Design the power supply selector circuit for peripheral and controller.
Write the programmer for the main controller using embedded c for PIC.
Design a driver for sending or receiving message.

BLOCK DIAGRAM

WORKING PRINCIPLE
To operate this project first we have to operate this project in Settings mode or Admin mode. In this
mode we have to enter data into the database of finger print sensor, for this we have to take impressions
of fingerprints of that person whom we want to give access to our security system. This can be done once
or whenever a new entry has to be added in the system. Then this project has to be used in Normal mode

or Search mode. In this mode the system compares the fingerprint input received at its optical plate with
the previously stored fingerprint from its flash memory. If the entry matches with the memory then it
gives out ok signal along with the identity number of that person. But if the entry does not match with the
memory then it gives out error signal. The output received from fingerprint sensor is given to the
microcontroller. Microcontroller then compares these output data. Function of microcontroller is to turn
on the respective device depending upon the input received. In case of OK signal from fingerprint
module, microcontroller turns on Relay and a Motor. However if the error output is received then it turns
on the Buzzer.
How does fingerprint scanner works:
Fingerprint is a pattern made up of ridges and valleys on our fingertip skin. While storing the entry in
database, scanner takes an image of these patterns and stores in its own memory. Then while performing
search operation, it again takes pattern of fingerprint of that user who needs to gain access. This pattern is
compared with all patterns previously stored in memory. In short it performs a task which is related to
Digital image processing. It performs various iterations and executes matching algorithms and if it finds
exact match then it gives out fingerprint ID number. Otherwise it gives out error signal.
Description in detail:
Following are the important blocks of this system:
1) Fingerprint sensor: We have used 4500 Finger Print Sensor. It has an Optical biometric fingerprint
reader. It also has inbuilt flash memory. It performs the function of image processing and gives out data
on its output pin.
2) Microcontroller: This is the CPU (central processing unit) of our project. We are going to use a
microcontroller of PIC family. The various functions of microcontroller are like: I. Reading various
digital input signals from fingerprint sensor II. Sending this data to LCD so that the person operating this
project should understand the status. III. Giving the respective signal to the various output devices. Relay
and DC motor for valid access and buzzer for the invalid access. IV. Sending the data to the computer
using serial port. This data consist of the status of valid or invalid access

3) LCD Display: We have used 162 alphanumeric Liquid Crystal Display (LCD) which means it can
display alphabets along with numbers on 2 lines each containing 16 characters.
4) Buzzer: We are going to use a buzzer to indicate the invalid access to open the door.
5) Keypad: User will enter various commands using the keypad. Various keys of keypad are as
following, I. Add fingerprint entry II. Search fingerprint III. Empty the database of fingerprint module.
Applications:
1. Industrial application: Fingerprint based security system project can be used by the employees,
staff or workers in various industries like Automobile industries, manufacturing industries, Software
development companies. 2. Home or domestic application: This project can be used to automate the
door locking process at our home, so the user need not to carry the door lock keys along with him, he can
just use his/her finger to open the door 3. Bank Lockers or security safes: Many of the banks use key
based or password based locks for their lockers or safes. We can implement Fingerprint based bank locker
system using this project.
Advantages:
1. Fingerprint based security system is most secured system as compared to other systems. Reason is
that RFID card or Keys of lock can be stolen, password may be leaked. However thumbnail of every
human being is unique, so lock will not open unless the same person is present to give the impression of
fingerprint. 2. No need to carry the keys to open the lock. Or even there is no need to remember the
password or any Pin number. 3. One of the main advantages is that this system remembers the stored
password even if the power supply is turned off. 4. Scientific research and studies have proved that

fingerprints do not change as you grow up. 5. Using Fingerprint saves time to gain access as compared
to other methods like RFID card, Password or Key.
Future Development:
1. We can send this data to a remote location using mobile or internet 2. We can use non-contact
fingerprint sensor. Which is also called as touchless 3D fingerprint scanner. 3. We can implement
other related modules like fire sensor, GSM modem.
REFERENCES:
[1] Schurmann, C.; IT Univ. of Copenhagen, Copenhagen, Denmark . Electronic Elections: Trust
Through Engineering, First international workshop Requirements Engineering for e-Voting Systems
(RE-VOTE), 2009.
[2] Lin Hong. "Automatic Personal Identification Using Fingerprints", Ph.D. Thesis, 1998.
[3] D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition. New York:
Springer-Verlag, 2003.
[4] Anil K. Jain and David maltoni. , Handbook of Fingerprint Recognition, Springer-verlag New York,
Inc., Secaucus, NJ, USA, 2003.
[5] Tadayoshikohno_ Adamstubblefield Avield Rubidans.Wallach Analysis of an Electronic Voting
system, IEEE symposium on Security and Privacy 2004.
[6] Y. A. Zuev and S. Ivanon, The voting as a way to increase the decision reliability, in Proc.
Foundations of Information/Decision Fusion with Applications to Engineering Problems,Washington,
DC, Aug. 1996, pp.206210.

Anda mungkin juga menyukai