Chapter No Title Page - No List of Figures List of Tables I
Chapter No Title Page - No List of Figures List of Tables I
Chapter No Title Page - No List of Figures List of Tables I
ABSTRACT
LIST OF FIGURES
LIST OF TABLES
I INTRODUCTION
1.1 Introduction
1.2 Problem Description
1.3 About The Organization
II SYSTEM ANALYSIS
2.1 Existing System
2.2 Proposed System
2.3 Feasibility Analysis
III SOFTWARE REQUIREMENTS
3.1 Hardware Requirements
3.2 Software Requirements
3.3 Software Description
IV SYSTEM DESIGN
4.1 Introduction
4.2 Dataflow Diagram
4.3 Use Case Diagram
4.4 Sequence Diagram
4.5 Database Table Design
V IMPLEMENTATION
5.1 Introduction
5.2 Project Description
5.3 Form Design
VI TESTING
6.1 Introduction
6.2 Unit Testing
6.3 Integration Testing
6.4 Functional Testing
VII CONCLUSION
7.1 Conclusion
VIII FUTURE ENHANCEMENTS
8.1 Future Enhancements
BIBLIOGRAPHY
ANNEXURE I – Screenshot
ANNEXURE II – Coding
ANNEXURE III – Report
LIST OF TABLES
Fingerprint Based Voting Project is an application where the user is recognized by his
finger pattern. Since the finger pattern of each human being is different, the voter can be
easily authenticated. The system allows the voter to vote through his fingerprint. Finger print
is used to uniquely identify the user. The finger print minutiae features are different for each
human being. Finger print is used as a authentication of the voters.
Voter can vote the candidate only once, the system will not allow the candidate to
vote for the second time. The system will allow admin to add the candidate name and
candidate photo who are nominated for the election. Admin only has the right to add
candidate name and photo who are nominated. Admin will register the voters name by
verifying voter. Admin will authenticate the user by verifying the user’s identity proof and
then admin will register the voter. The number of candidate added to the system by the admin
will be automatically deleted after the completion of the election.
Admin has to add the date when the election going to end. Once the user has got the user id
and password from the admin the user can login and vote for the candidate who are
nominated. The system will allow the user to vote for only one candidate. The system will
allow the user to vote for one time for a particular election. Admin can add any number of
candidates when the new election will be announced. Admin can view the election result by
using the election id. Even user can view the election result.
INTRODUCTION
Introduction
Biometrics is the science and technology of measuring and analyzing biological data.
Biometrics refers to technologies that measure and analyze human body characteristics, such
as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand
measurements, for authentication purposes. The field of biometrics was formed and has since
expanded on to many types of physical identification. Among the several human fingerprints
remain a very common identifier and the biometric method of choice among law
enforcement. These concepts of human identification have lead to the development of
fingerprint scanners that serve to quickly identify individuals and assign access privileges.
The basic point of these devices is also to examine the fingerprint data of an individual and
compare it to a database of other fingerprints.
In our project we have used fingerprint for the purpose of voter identification or
authentication. As the thumb impression of every individual is unique, it helps in minimizing
the error. A database is created containing the fingerprint images of all the voters as required.
Illegal votes and repetition of votes is checked for in this system with accurate coding. Hence
with the application of this fingerprint based EVM system elections could be made fair and
free from rigging. Further that the elections would is no longer a tedious and expensive job.
Problem Description
Now-a-days, democracy has become an important part of people's lives. The heart of
democracy is voting. The voting must be trust one and vote must be recorded and tallied with
accuracy and impartiality. This is achieved by using biometric system. An electronic voting
system defines valid voting and gives an fast method of counting votes, which helps to yield
a final result. Moreover, electronic voting systems can improve voter identification process
by using biometric recognition. Biometrics is becoming an essential personal identification
solution, since biometric identifiers cannot be misplaced and they represent an individual’s
identity. Biometric recognition refers to the use of iris, fingerprint, face, palm and speech
characteristics, called biometric identifiers. Fingerprint matching is a important for this
process. It is an extremely difficult problem, due to variations in different impressions of the
same finger. Fingerprints are unique to each individual and they do not change over time.
Voting system starts from the 18th century and many proposals for voting system have been
made till now. When designing an electronic voting system, it is essential to consider ways in
which the voting tasks can be performed electronically without sacrificing voter privacy or
introducing opportunities for fraud.
About The Organization
Existing System
In paper-based elections voters cast their votes by simply depositing their ballots in sealed
boxes distributed across the electoral circuits around a given country. When the election
period ends, all these boxes are opened and votes are counted manually in presence of the
certified officials. In this process there can be error in counting of votes or in some cases
voters find ways to vote more than once. Sometimes votes are even manipulated to distort the
results of an election in favor of certain candidates
Disadvantage
It is time consuming
It consumes lot of manpower to better results
The system will allow the voter to vote two or more candidates
Proposed System
We propose client-server web-enabled software architecture for the project. On the client
side we have a fingerprint scanner and a GUI that accepts voter’s aadhar number, provides an
interface to vote and display confirmation, status and error messages. The GUIs will only act
on events from the server and feedback of the voter without any extra processing. Servers are
placed at remote locations from the poll booths. They are used for carrying out all the
processing work such as image processing, transferring data between the client and the
database, generating statistics, sending messages to voters, etc
Advantage
The system will not allow the voter to vote two or more candidates.
The system will allow the user to vote for one time for a particular election
The system will authenticate the user through his fingerprint so the user is uniquely
identified.
Feasibility Analysis
The feasibility of the project is analyzed in this phase and business proposal is put forth
with a very general plan for the project and some cost estimates. During system analysis the
feasibility study of the proposed system is to be carried out. This is to ensure that the
proposed system is not a burden to the company. For feasibility analysis, some
understanding of the major requirements for the system is essential.
Economical feasibility
Technical feasibility
Social feasibility
Economical Feasibility
This study is carried out to check the economic impact that the system will have on the
organization. The amount of fund that the company can pour into the research and
development of the system is limited. The expenditures must be justified. Thus the developed
system as well within the budget and this was achieved because most of the technologies
used are freely available. Only the customized products had to be purchased.
Technical Feasibility
This study is carried out to check the technical feasibility, that is, the technical
requirements of the system. Any system developed must not have a high demand on the
available technical resources. This will lead to high demands on the available technical
resources. This will lead to high demands being placed on the client. The developed system
must have a modest requirement, as only minimal or null changes are required for
implementing this system.
Social Feasibility
The aspect of study is to check the level of acceptance of the system by the user. This
includes the process of training the user to use the system efficiently. The user must not feel
threatened by the system, instead must accept it as a necessity. The level of acceptance by the
users solely depends on the methods that are employed to educate the user about the system
and to make him familiar with it. His level of confidence must be raised so that he is also
able to make some constructive criticism, which is welcomed, as he is the final user of the
system.
SOFTWARE REQUIREMENTS
Hardware Requirements
RAM : 2GB
Software Requirements
The following are additional C# resources: For a good general introduction to the
language, see Chapter 1 of the C# Language Specification. For detailed information about
specific aspects of the C# language, seethe C# Reference. For more information about LINQ,
seal INQ (Language-Integrated Query). C# programs run on the.NET Framework, an integral
component of Windows that includes a virtual execution system called the common language
runtime (CLR) and a unified set of class libraries. The CLR is the commercial
implementation by Microsoft of the common language infrastructure (CLI), an international
standard that is the basis for creating execution and development environments in which
languages and libraries work together seamlessly. Source code written in C# is compiled into
an intermediate language (IL) that conforms to the CLI specification. Their code and
resources, such as bitmaps and strings, restored on disk in an executable file called an
assembly, typically with an extension of .exe or .dll.
Introduction
Systems design is the process of defining the architecture, modules, interfaces, and data for
a system to satisfy specified requirements. Systems design could be seen as the application
of systems theory to product development. There is some overlap with the disciplines
of systems analysis, systems architecture and systems engineering. If the broader topic
of product development "blends the perspective of marketing, design, and manufacturing into
a single approach to product development,"[3]then design is the act of taking the marketing
information and creating the design of the product to be manufactured. Systems design is
therefore the process of defining and developing systems to satisfy specified requirements of
the user. The architectural design of a system emphasizes the design of the system
architecture that describes the structure, behavior and more views of that system and
analysis. The logical design of a system pertains to an abstract representation of the data
flows, inputs and outputs of the system. This is often conducted via modelling, using an over-
abstract (and sometimes graphical) model of the actual system. In the context of systems,
designs are included. Logical design includes entity-relationship diagrams (ER diagrams).
The physical design relates to the actual input and output processes of the system. This is explained in
terms of how data is input into a system, how it is verified/authenticated, how it is processed, and how
it is displayed. In physical design, the following requirements about the system are decided.
1. Input requirement,
2. Output requirements,
3. Storage requirements,
4. Processing requirements,
5. System control and backup or recovery.
Put another way, the physical portion of system design can generally be broken down into
three sub-tasks:
1. User Interface Design
2. Data Design
3. Process Design
User Interface Design is concerned with how users add information to the system and with
how the system presents information back to them. Data Design is concerned with how the
data is represented and stored within the system. Finally, Process Design is concerned with
how data moves through the system, and with how and where it is validated, secured and/or
transformed as it flows into, through and out of the system. At the end of the system design
phase, documentation describing the three sub-tasks is produced and made available for use
in the next phase.
Physical design, in this context, does not refer to the tangible physical design of an
information system. To use an analogy, a personal computer's physical design involves input
via a keyboard, processing within the CPU, and output via a monitor, printer, etc. It would
not concern the actual layout of the tangible hardware, which for a PC would be a monitor,
CPU, motherboard, hard drive, modems, video/graphics cards, USB slots, etc. It involves a
detailed design of a user and a product database structure processor and a control processor.
The H/S personal specification is developed for the proposed system.
Dataflow Diagram
Use Case Diagram
Sequence Diagram
Database Table Design
Voter Table
Admin
Voting
ID NCHAR(10) ID
IMPLEMENTATION
Introduction
The project is entitled as “Online Voting Process “as the following form to make a secure
data. This project carried out by taking ASP.NET and SQL Server. It has following module
Authentication module
Registration module
View member
Voting module
Result module
Project Description
Authentication module
An authentication module is a plug-in that collects user information such as a user ID and
password, and compares the information against entries in a database. If a user provides
information that meets the authentication criteria, the user is validated and, assuming the
appropriate policy configuration, granted access to the requested resource. If the user
provides information that does not meet the authentication criteria, the user is not validated
and denied access to the requested resource.
Registration module
Voter registration (or enrollment) is the requirement that a person otherwise eligible to vote
register (or enroll) on an electoral roll before they will be entitled or permitted to vote. Such
enrollment may be automatic or may require application being made by the eligible voter.
The rules governing registration vary between jurisdictions. Some jurisdictions have
"election day registration" and others do not require registration, or may require production
of evidence of entitlement to vote at time of voting. In some jurisdictions registration by
those of voting age is compulsory, while in most it is optional. In jurisdictions where
registration is voluntary, an effort may be made to encourage persons otherwise eligible to
vote to register, in what is called as a voter registration drive.
View member
It depends on which rights (also called permissions, user groups, bits or flags) are assigned
to accounts. This is determined by whether the editor is logged into an account, and whether
the account has a sufficient age and number of edits for certain automatic rights, and what
additional rights have been assigned manually to the account.
Voting module
Voting is a method for a group, such as a meeting or an electorate, in order to make a
collective decision or express an opinion, usually following discussions, debates or election
campaigns. Democracies elect holders of high office by voting. Residents of a place
represented by an elected official are called "constituents", and those constituents who cast
a ballot for their chosen candidate are called "voters". There are different systems for
collecting votes.
Result module
A result (also called upshot) is the final consequence of a sequence of actions or events
expressed qualitatively or quantitatively. Possible results,
include advantage, disadvantage, gain, injury, loss, value and victory. There may be a range
of possible outcomes associated with an event depending on the point of view, historical
distance or relevance. Reaching no result can mean that actions are inefficient, ineffective,
meaningless or flawed.
Form Design
TESTING
Introduction
The purpose of testing is to discover errors. Testing is the process of trying to discover every
conceivable fault or weakness in a work product. It provides a way to check the functionality
of components, sub assemblies, assemblies and/or a finished product It is the process of
exercising software with the intent of ensuring that the Software system meets its
requirements and user expectations and does not fail in an unacceptable manner. There are
various types of test. Each test type addresses a specific testing requirement.
Unit Testing
Unit testing involves the design of test cases that validate that the internal program
logic is functioning properly, and that program inputs produce valid outputs. All decision
branches and internal code flow should be validated. It is the testing of individual software
units of the application .it is done after the completion of an individual unit before
integration.
This is a structural testing, that relies on knowledge of its construction and is invasive. Unit
tests perform basic tests at component level and test a specific business process, application,
and/or system configuration. Unit tests ensure that each unique path of a business process
performs accurately to the documented specifications and contains clearly defined inputs and
expected results.
Integration Testing
Functional tests provide systematic demonstrations that functions tested are available
as specified by the business and technical requirements, system documentation, and user
manuals.
Conclusion
Fingerprints considered as one of the most popular biometric methods used for human
recognition. Every person in the globe is born with unique fingerprint even twins born with
totally different fingerprints and fingerprint is naturally unchangeable throughout life. For
that reason fingerprint voting system has been made and the person ID has been replaced
with his fingerprint. This fingerprint voting system is implemented and evaluated
successfully. The evaluation of the system is made using different PCs with different
specifications in order to stand on system strength and weaknesses. The final result of the
fingerprint voting system was amazingly significant and computable with other voting
system. The system’s accuracy came from the image enhancement by removing or reducing
the noise and Gabor filter.
FUTURE ENHANCEMENTS
Future Enhancements
Journal
6. Phil Brimblecombe, (2005). Face Detection Using Gabor filter, Bachelor Thesis.
School of Electronics and Physical Sciences, Department of Electronic Engineering.
University of Surrey.
Website
1. www.gov.in
2. www.vottingsystem.in
ANNEXURE I – Screenshot
User Page
Admin Page
ANNEXURE II – Coding
About
using System;
using System.Collections.Generic;
using System.Linq;
using System.Web;
using System.Web.UI;
using System.Web.UI.WebControls;
}
}
AddUser
using System;
using System.Collections.Generic;
using System.Linq;
using System.Web;
using System.Web.UI;
using System.Web.UI.WebControls;
AddVote
using System;
using System.Collections.Generic;
using System.Linq;
using System.Web;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Data.SqlClient;
using System.Web.Configuration;
using System.Configuration;
}
protected void btnAddVote_Click(object sender, EventArgs e)
{
try
{
SqlConnection myConnection = new SqlConnection(connectionString);
myConnection.Open();
string query = "INSERT INTO AddVote (ElectorName, VoterId, District, Party,
CanditateName) VALUES ('" + txtElectorName.Text + "','" + txtVoterId.Text + "','" +
ddlDistrict.Value + "','" + ddlParty.Value + "','')";
Response.Redirect("UserLogin.aspx");
}
catch
{
}
}
}
Default
using System;
using System.Collections.Generic;
using System.Linq;
using System.Web;
using System.Web.UI;
using System.Web.UI.WebControls;
}
}
Home
using System;
using System.Collections.Generic;
using System.Linq;
using System.Web;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Data;
using System.Configuration;
using System.Data.SqlClient;
if (dt.Rows.Count > 0)
{
for (int i = 0; dt.Rows.Count > i; i++)
{
if (dt.Rows[i]["Party"].ToString() == "ADMK")
{
lblADMK.Text = dt.Rows[i]["Total"].ToString();
}
if (dt.Rows[i]["Party"].ToString() == "BJP")
{
lblBJP.Text = dt.Rows[i]["Total"].ToString();
}
if (dt.Rows[i]["Party"].ToString() == "Communist")
{
lblCommunist.Text = dt.Rows[i]["Total"].ToString();
}
if (dt.Rows[i]["Party"].ToString() == "Congress")
{
lblCongress.Text = dt.Rows[i]["Total"].ToString();
}
if (dt.Rows[i]["Party"].ToString() == "DMK")
{
lblDMK.Text = dt.Rows[i]["Total"].ToString();
}
}
}
UserLogin
using System;
using System.Collections.Generic;
using System.Linq;
using System.Web;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.IO;
using System.Configuration;
using System.Data.SqlClient;
using System.Data;
if (FileUpload1.FileName == imagename)
{
if (uploadbase64String == imgBase64String)
{
if (dt.Rows.Count > 0)
{
ClientScript.RegisterStartupScript(GetType(), "hwa", "CheckVote();",
true);
}
else
{
SqlConnection myConnection = new SqlConnection(connectionString);
myConnection.Open();
Response.Redirect("AddVote.aspx");
}
}
else
{
ClientScript.RegisterStartupScript(GetType(), "hwa", "validate();", true);
}
}
}
}
catch
{
}
}
protected static string GetBase64StringForImage(string imgPath)
{
string base64String = "";
try
{
byte[] imageBytes = System.IO.File.ReadAllBytes(imgPath);
base64String = Convert.ToBase64String(imageBytes);
}
catch
{
}
return base64String;
}
}
Voting
using System;
using System.Collections.Generic;
using System.Linq;
using System.Web;
using System.Web.UI;
using System.Web.UI.WebControls;
}
ANNEXURE III – Report