A Matlab Based Electronic Voting Machine
A Matlab Based Electronic Voting Machine
https://doi.org/10.22214/ijraset.2020.31648
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.429
Volume 8 Issue IX Sep 2020- Available at www.ijraset.com
Abstract: Voting is a method for a group, such as a meeting or an electorate, in order to make a collective decision or express an
opinion usually following discussions, debates or election campaigns.Voting is the process through which every citizen of a
country conveys their opinion and has the freedom to elect a leader of their choice to signify and address the public issues. This
project proposes a system for voting through which individuals in the nation convey their opinion to elect a leader of their choice
to explain and address the issues around them. In this all the voters information will be stored already in the database. The
voters face will be recognised first using a camera. This information will be checked by the server using matlab GUI. This system
is helpful to the voter’s in decreasing the time of the voting process. This system has simple architecture, responses very quickly,
reduces the polling time, is easy to carry to the polling center from the polling box, reduces the staff of the voting centre and also
provides easy & accurate counting without any troubles.
Keywords: Matlab software, Face Recognition, Graphical user interface
I. INTRODUCTION
For elections electronic voting machines are widely used. This project aims to provide an enhanced security system for the voting
machines and they are done by the face recognition of the voter by using MATLAB software
In [4], This paper deals with the online voting system that will make the voting system smart. OVS(online voting system)is secured
and it has a simple design. We will use a biometric device in this. That makes it more secure. We linked it with an AADHAR card.
In the whole world, the fingerprint of every person is unique. So we will use this technique. The percentage of voting will surely
increase surly. And also it reduces the false vote.
In [5], This paper describes the online voting system with secure authentication. This is a web based voting system which allows
voters to vote irrespective of location. Providing security to any data or information is an important issue and it becomes sensitive
for online voting systems.
The proposed system provides secured authentication through Shamir's secret sharing scheme.
In [6], Using Cryptography and Steganography at the same time, we try to provide Biometric as well as Password security to voter
accounts. The scheme uses images as cover objects for Steganography and as keys for Cryptography. The key image is a Biometric
measure, such as a fingerprint image.
Proper use of Cryptography greatly reduces the risks in these systems as the hackers have to find both the secret key and the
template. The basic idea is to merge the secret key with the cover image on the basis of the key image. The result of this process
produces a stego image which looks quite similar to the cover image but not detectable by the human eye. The system targets the
authentication requirement of a voting system.
In [7], In this paper we introduce a new tool for controlling the knowledge transfer process in cryptographic protocol design. It is
applied to solve a general class of problems which include most of the two-party cryptographic problems in the literature.
Specifically, we show how two parties A and B can interactively generate a random integer N = p¿q such that its secret, i.e., the
prime factors (p, q), is hidden from either party individually but is recoverable jointly if desired.
This can be utilized to give a protocol for two parties with private values i and j to compute any polynomially computable functions
f(i,j) and g(i,j) with minimal knowledge transfer and a strong fairness property. As a special case, A and B can exchange a pair of
secrets sA, sB, e.g. the factorization of an integer and a Hamiltonian circuit in a graph, in such a way that sA becomes computable
by B when and only when sB becomes computable by A. All these results are proved assuming only that the problem of factoring
large integers is computationally intractable.
In [8], This paper aims at creation of a secure online voting system providing biometric security. Online voting system used for
government elections. Online voting systems are publically available systems so there are various types of attacks to hack this
system. Propose a new secure online voting system by using biometric and steganographic authentication. The vote casting and
recording are also secure using homomorphic encryption, blind signature to solve the problem of voter votes hacking and destroying
systems. Here an image based and biometric authentication is used. Use of homomorphic technique encrypts the casted vote stored
securely in vote casting and recording server. Also the system is very user friendly. It is a reliable system for outside voters.
In [9], This paper proposes a method for safe and secure aadhaar based biometric voting system to avoid misconceptions which are
going to take place in elections. From the last few years in India, the Aadhaar enrollment process is going on in Andhra Pradesh. At
that time, Indian government collected details of fingerprints and IRIS of every person. This entire data of each and every person
persists in the database of Indian government.
If Indian Government links this database to the author's proposed method, Indian Government will not need to collect details of
fingerprints of every person. So, if Indian Government adopts a biometric voting system for voting purposes, we can easily avoid
rigging in elections.
One more advantage of this project is, if an alcoholic person enters the polling booth, the buzzer will alert authorized persons or
constables who are in election duty.
Because of the Alcoholic sensor, we can provide a peaceful environment at the polling booth. If an unauthorized person enters the
polling booth to cast his vote, the buzzer will alert booth level officers. If an already voted person enters the booth with his RFID tag
for 2nd time voting, then the buzzer will alert booth level officers.
In [10], In democratic societies, voting is an important tool to collect and re-act people's thinking. Traditionally, voting is conducted
in centralized or distributed places called polling booths. Voters go to polling booths and cast their votes under the supervision of
authorized parties.
Then the votes are counted manually once the election has completed. With the rapid growing development of computer technology
and cryptographic methods. The electronic voting systems can be employed that replace the incident and most importantly error-
prone human Component.
III. METHODOLOGY
A program using matlab based graphical user interface (gui) to demonstrate the working of an evm is presented in the below
flowchart.
FIG 1. FLOWCHART
The GUI application program has been developed in the r2014a version of Matlab. on running Matlab program , when you select the
button marked ‘press button’ adjacent to the name of the candidate in the GUI, confirming successful casting of vote. selection of
the pushbutton executes a call back function in Matlab, and the candidate’s vote count is incremented by one in the program. at the
end of the voting process, the following information can be obtained by selecting ‘results’ on the GUI:
1) Total number of votes received by a candidate
2) Percentage of votes received by a candidate
3) Total number of voters who have cast their votes
B. Fingerprint Authentication
After authentication of the fingerprint, the party name along with the symbol will be displayed in the screen. Now the voter has to
choose the party according to her/his wish by pressing the respective symbol in the keypad and the vote has been polled.
C. Vote Status
Once the voter polled the vote, a message will be delivered to the voters registered mobile number and the data will be sent to the
cloud for later retrieval.
V. CONCLUSION
Thus the voting machine constructed using matlab successfully and output is generated.
REFERENCES
[1] S.Sridharan “IMPLEMENTATION OF AUTHENTICATE AND SECURE ONLINE VOTING SYSTEM” ,2013 Fourth International Conference on
Computing, Communications and Networking Technologies(ICCCNT),Tiruchengode,pp.1-7. 2013.
[2] H.Agarval and G.N.Pandey “ONLINE VOTING SYSTEM FOR INDIA BASED ON AADHAR ID,”2013,Eleven International Conference on ICT and
Knowledge Engineering Bangkok,pp.1-4.2013.
[3] Gomathi.B, Veena priyadarshini.S “MODERNIZED VOTING MACHINE USING FINGER PRINT RECOGNITION”, International Journal of Scientific &
Engineering Research
[4] Vishal.V Chinmay, R. Garg and P. Yaduv, “ONLINE VOTING SYSTEM LINKED WITH AADHAR”, 2016 3 rd International Conference on Computing for
Sustain Global Development (INDIA com), New Delhi,pp 3239-3240. 2016.
[5] Ashwini Walake, Prof. Ms, Pallavi Chavan, “EFFICIENT VOTING SYSTEM WITH SECRET SHARING BASED AUTHENTICATION”, (IJCSIT)
International Journal of Computer Science and Technologies, vol.6(1), pp.410-412. 2015.
[6] S. Katiyar, K.R. Meka, F.A.Barbhuiya and S .Nandi, “ONLINE VOTING SYSTEM POWERED BY BIOMETRIC SECURITY STEGANOGRAPHY”,
Second International Conference on Emerging Application of Information Technology, Kolkata,pp.288-291. 2011.
[7] K.Kim, & D.Hong, “ELECTRONIC VOTING SYSTEM USING MOBILE TERMINAL”,World Academy of Science,Engineering and Technology,pp.33-37.
2009.
[8] Smitha Khairnar, ReenaKharanth, Survey on “SECURE ONLINE VOTING SYSTEM”, International Journal of Computer Applications(0975-8887).Volume
134-No 13,January 2016.
[9] B. Madan Mohan Reddy, D. Srihari, (April 2015), “RFID BASED BIOMETRIC VOTING MACHINE LINKED TO AADHAAR FOR SAFE AND SECURE
VOTING”.
[10] Anandaraj, S, Anish R, Devakumar P.V “SECURED ELECTRONIC VOTING MACHINE USING BIOMETRIC “.