Vous êtes sur la page 1sur 11

BIOMETRIC VOTING SYSTEM

- A novel way to vote

To,
Akula Gopayya College of engineering and Technology
Thadepalligudam,

By,
M.N.S.S.Kranthi Sarika Jeevani
III, E.C.E III, E.C.E
Chaitanya Institute of Science & Technology.
Madavpatnam, Kakinada. (EG .Dist)
ABSTRACT As a pre-poll procedure, a database

It has always been an arduous task consisting of the thumb impressions of

for the election commission to conduct all the eligible voters in a constituency is

free and fair polls in our country, the created. During elections, the thumb

largest democracy in the world. Crores impression of a voter is entered as input

of rupees have been spent on this to to the system. This is then compared

make sure that the elections are riot free. with the available records in the

But, now- a -days it has become database. If the particular pattern

common for some forces to indulge in matches with any one in the available

rigging which may eventually lead to a record, access to cast a vote is granted.

result contrary to the actual verdict given But in case the pattern doesn’t match

by the people. with the records of the database or in

This paper aims to present a case of repetition, access to cast a vote is

new voting system employing biometrics denied or the vote gets rejected. Also the

in order to avoid rigging and to enhance police station nearby to the election poll

the accuracy and speed of the process. booth is informed about the identity of

The system uses thumb impression for the imposter. All the voting machines are

voter identification as we know that the connected in a network, through which

thumb impression of every human being data transfer takes place to the main

has a unique pattern. Thus it would have host. The result is instantaneous and

an edge over the present day voting counting is done finally at the main host

systems. itself. The overall cost for conducting


elections gets reduced and so does the
maintenance cost of the systems.

INTRODUCTION
3. Networking- all the election
Biometrics is the term given to booths are connected in a
the use of biological traits or behavioral network
characteristics to identify an individual. 4. Data transfer– using telephone
The traits may be fingerprints, hand lines..
geometry, facial geometry, retina The only pre-requisite for the use of this
patterns, voice recognition, and finger print scanner is a personal
handwriting recognition. identification card. We hope that this
In this paper we have used thumb system proves to be efficient and enables
impression for the purpose of voter the people to be smarter in choosing
identification or authentication. As the their leaders.
thumb impression of every individual is
unique, it helps in maximizing the SUMMARY OF DESIGN
accuracy. A database is created The main aim in designing this
containing the thumb impressions of all product is to provide the concept of the
the voters in the constituency. Illegal personal identity for each individual.
votes and repetition of votes is checked This is extended to a special case of
for in this system. Hence if this system is electronic voting machine concept. The
employed the elections would be fair and summary of the design can be briefly
free from rigging. Thanks to this system explained diagrammatically as follows.
that conducting elections would no
I
longer be a tedious and expensive job. m
a
g
e
DESIGN
The design of the system consists of
the following important parameters
Opti
1. Scanning- using DSP Processor on

2. Searching- based on the principle


of GOOGLE SEARCH Telep
hone
Line
As a pre-poll procedure the finger prints DESCRIPTION OF THE
of all the voters are collected and stored VOTING MACHINE:
in a database initially at time of
distributing voting cards. At the time of
DISPLAY UNIT
voting, the option of the voter is taken 1-PARTY A
2-PARTY B
along with the finger print. The finger
print taken by the scanner is sent to the FINGER
KEYPAD PRINT
DSP chip through an in-built A/D SCANNER
1 2 3
converter. The processed image is 4 5 6
7 8 9
transferred to hard disk with biasing of 0 LED
DISPLAY
SDRAM.
The option entered by the voter is
Front view of the voting machine
transferred to chip through DEMUX and
is stored in the memory. If the
BLOCK DIAGRAM FOR THE
transferred image is matched with any of
WHOLE PROCESS IN BRIEF:
the records in the data base, then the
interrupt is given by the HARD DISK to
ACCEPTING ACCEPTIN
DSP chip. Then the option is considered IMAGE G OPTION

in the count. After the acquisition of the


count this is transmitted to the HOST PROCESSING OF IMAGE AND
OPTION
computer or central server using
COMPARISON OF IMAGE
telephone lines. As the count of each WITH DATABASE

party is transmitted to the HOST from


all the VOTING MACHINES present in IF IMAGE IF IMAGE
DOESN’T MATCH MATCHES
the constituency, the HOST will add
OPTION IS OPTION IS
parallel count of particular party and REJECTED TRANSFERRED AS
COUNT
makes the final count of each party in
AFTER TOTAL
ascending order. The final count is COUNT

transferred to the main HOST (head


SUMS UP COUNT COUNT OF EACH
quarters) using either telephone lines or OF SIMILAR PARTY IS
PARTIES AND DATA TRANSFERRED TO
radio waves. IS ARRANGED IN HOST THROUGH
AN ORDER TELEPHONE LINE
The detailed description of each and communication link between the
every internal unit in the VOTING DSP processor and the
SYSTEM is given below. It can be MEMORY (DATABASE).
divided in to the following main
categories. EXTRACTION OF THUMB
IMPRESSION:-

FINGER PRINT SCANNER:


US ME
The finger print scanner consists of B MO
PO RY
the following parts: RT
FLA
1. FINGER PRINT SENSOR: This SH
RO
M
is used to scan the thumb
DSP
impression. The data obtained FINGE A/D CHI TRANS
R CON MITTE
from this is analog in nature. This PRINT VER P R
SENSO TER
R
is transferred to the A/D OUT
PUT
POR
converter for further processing. T
PO
2. A/D CONVERTER: This is used WE
R
to convert the analog data from
The next step in the process is the
the SENSOR into the digital data
extraction of the thumb impression
and transfer it to the processor.
from the memory. The features of the
3. FLASH ROM: This is for the
finger print are stored in the form of
storage of the data temporarily in
pixels. This is further sent for pattern
the DSP processor. This will
matching where the finger print is
work until the data is transferred
then compared with the records in
to the main memory of the
the database. If the pattern matches
HOST.
with any one of he records then the
4. DSP CHIP: This is used to
vote is accepted. If the feature
receive the data and process it.
doesn’t match with any one of the
This is connected to the USB port
finger prints stored in the data base
for further transfer of the data.
then the vote is rejected.
5. USB PORT: The sole purpose of
the USB port is to establish a
the image to the HARD DISK for further
FINGER
PRE- FEATUR process. The image transferred to the
PRINT
PROCE E
IMAGE
FROM SSING EXTRAC HARD DISK is compared with that of
Y TION
SCANNE N E the DATA BASE. The circuit
R O S
REJECT MATCH ACCEPT connections for the process explained are
THE ING THE
OPTION OPTION as shown below.

DATAB
ASE

FEATURE EXTRACTION AND


COMPARISON
SCANNING AND PROCESSING:
The biometric sensor scans the
image. This so scanned data is in the
analog form. This is converted into
digital form by using an A/D converter.
Since the image is to be transferred
quickly to the converter, it is interfaced
A DE-MULTIPLEXER is connected
in parallel with the DSP chip. The data
to the inputs in parallel to the chip. The
received from the parallel in ports is
option which is given is transferred to
further processed in the chip. Parallel
the chip in binary form.
interfacing is done to have a quick
E.g.:
performance.
1. Party one, 2. Party two, 3. Party
TRANSFER OF PROCESSED DATA
three, 4. Party four.
TO THE HARD DISK:
Suppose if the option is two then the
The data which is processed in the
binary data transfer to the ports is
DSP chip (finger print) is transferred in
0010.DE-MULTIPLEXER is designed
parallel to the HARD DISK for
according to the number of parties
searching process. The BIOS language
present in the constituency. The
of the HARD DISK is stored in SDRAM
transferred data is stored in a 16-bit
which is also interfaced in parallel with
register according to their option.
the chip. This helps the chip to transfer
After counting takes place the count of given below.
each party is transferred to the
VERIFIC
transmitter. A transmitter is interfaced ATION
serially to the DSP chip. The transmitter OF
VOTES
data is transferred through the telephone DATABASE
SEARCH FOR
lines to the HOST. The counts of similar THE FEATURES
STORED ON
parties are added at the host and the data
BELON THE VOTER DO
is transferred to the STATE HEAD G TO NOT
SAME BELON
QUARTERS (main HOST) to display CONS G TO
PRO
TITUE RE
CONS
the result of the particular constituency. CEE
NCY JE
TITUE
D CT
NCY

BLOCK DIAGRAMS FOR VARIOUS


PROCESSES
VERIFICATION OF VOTERS PROCESSING AND COUNTING:
Here the identity of a person is checked After the person gets the PROCEED
whether he\she belongs to the particular symbol from the voting machine, there
constituency or not. The machine which appears a screen on which all the parties
takes the finger print of the person names along with the symbols are
checks it with the data base already present. The person should select any
stored in it. If the finger print matches it one of the party by giving the number
will give access to the person to cast his allotted to that particular party as input
vote and if it doesn’t match any of the through the keypad. After the option is
finger prints stored in the data base then selected the voter is prompted for a
it will reject the voter. Thus his method confirmation. In case the voter enters an
will enable the members of that invalid number, the screen reappears and
particular constituency only to vote. This he\she is prompted to cast the vote again.
can be taken as the first step to avoid Then according to the option selected,
rigging. To have a faster performance the the vote count of the particular party gets
searching technique is implemented on incremented by one. Finally, at the end
the basis of GOOGLE SEARCH. The of the day, the position of the parties in
process in the form of a flow chart is as
terms of the total votes cast can be unsearched. Initially the searched folder
known. A very simple flow chart for the consists of no images. The thumb
above process is as shown below: impression images of all the voters of a
constituency will be present in the
unsearched folder. As and when a vote is
cast, the image of the particular voter
gets transferred to the searched folder.
The searched folder is programmed such
that an image cannot be present more
than once in this folder. So when a voter
SYMBOLS OF SELE
PROC PARTIES CT casts multiple votes the exception is
EED DISPLAYED AN
OPTI generated and an alarm is raised and
ON
even the police can be informed about
N IS THE the identity of the intruder indulging in
REST O OPTION
ART VALID this illegal activity. This is shown in the
block diagram given below
Y
E
S
INCREMENT
VOTE COUNT
OF THE
PARTICULAR
PARTY
SELECTED

REJECTION OF VOTER
REPETITION
After we have emerged out with a
solution to check voter’s identity in a
constituency, our next task is to see that a
particular person cannot vote more than
once i.e. to avoid multiple votes. This
task can be accomplished by simple
software technique employed. It consists
of two folders namely searched and
There is a flash ROM in which these
CHECKING FOR details can be stored.
MULTIPLE VOTES
OR ACCESSING THE
GIVEN VOTE FORMATION OF THE NETWORK
LIVE SCAN OF
FINGER PRINTS The voting machines present in a
town are interlinked in the form of a
VERIFICATION
highly secure LAN. This network is
OF
ACCEPTIBILITY formed with the help of the telephone
N
CHECK IF THE lines. All the data collected in the voting
O
VOTE IS REPEATED
system is first stored in the voting
ACCEPT Y
machine itself. Then it is sent to the
THE E
VOTE S HOST which will be located at
REJECT AND STORE
IDENTITY OF VOTERS headquarters of the town. All the data is
collected there and it is transferred to the
NOTIFICATION
main HOST. The purpose of saving the
OF VOTERS
NAME TO data in the voting machine at first is that
POLICE STATION
even if there is loss of data by some
means then it can be easily retrieved
The scanned vote is first checked with from the machine again. In this way all
the acceptability of the voter as the things are bought into a network.
explained in the first flow chart. If the
finger print is accessible then the data of
the specified person is taken into
account. The voter’s thumb impression is
verified with the previously cast votes. If
there is no match then the vote is
accepted and the count is increased by
one. If the vote matches with any of the
previous votes then the vote is rejected
and the person’s identity is stored and it
is given to the police for further enquiry.
These hosts are again grouped into
network through radio waves or again
telephone lines. Host is a device which
consists of a PROCESSOR and a RAM.
It will accept the data from all the voting
machines through telephone lines and it
will store the data in RAM (count of all
parties). Then it will add the count of
similar parties and store the count in
ascending or descending order and
display the result whenever it is
necessary.
Thus all the voting machines in
the state can be formed into a network.
The network can make use of RADIO
waves or TELEPHONE lines for the data
transfer.

ADVANTAGES: CONCLUSION:

1. The system is highly Thus the advent of this biometric

reliable and secure. thumb impression voting system would

2. In the long run the enable hosting of fair elections in India.

maintenance cost is very This will preclude the illegal practices

less when compared to the like rigging. The citizens can be sure that

present systems. they alone can choose their leaders, thus

3. Illegal practices like rigging exercising their right in the democracy.

in elections can be checked


for. REFERENCES:
4. It is possible to get 1) www.efymag.com
instantaneous results and 2) www.utdallas.edu
with high accuracy.
3) www.m2sys.com

Vous aimerez peut-être aussi