Project Report Final Output
Project Report Final Output
F/ TL / 024
Rev.00 Date 20.03.2020
BACHELOR OF TECHNOLOGY
IN
COMPUTER SCIENCE AND ENGINEERING
BY
SATHISH.E(211191101132)
YOGI RAJ SIVA.C(211191101170)
DEPARTMENT OF
COMPUTER SCIENCE AND ENGINEERING
APRIL 2024
FORM NO. F/ TL / 024
Rev.00 Date 20.03.2020
BONAFIDE CERTIFICATE
DECLARATION
Date:
Place: CHENNAI
1.
2.
3.
We would first like to thank our beloved Chancellor Thiru A.C. SHANMUGAM,
B.A., B.L. and President Er. A.C.S. Arunkumar, B.Tech., M.B.A., and for all the
encouragement and support extended to us during the tenure of this project and also
our years of studies in his wonderful University.
We would also like to thank all the teaching and non-teaching staffs of Computer
Science and Engineering department, for their constant support and the
encouragement given to us while we went about to achieving my project goals.
CONTENTS
CHAPTER TITLE PG NO
1 ABSTRACT 1
2 INTRODUCTION 2
3 SYSTEM ANALYSIS 3
5 LITERATURE SUREVEY 6
6 REQUIREMENT ANALYSIS 8
• EXISITING SYSTEM
• PROPOSED SYSTEM
• SOFTWARE/HARDWARE
12
7 DESIGN
• UML DIAGRAM
• ARCHITECTURE
DIAGRAM
8 IMPLEMENTATION 19
• MODULES
DESCRIPTION
10 CONCLUSION 30
11 REFERENCES/BIBLIOGRAPHY 31
CHAPTER 1- ABSTRACT
Providing preventive measures is one of the challenging matters in the world nowadays, either it is a bank or
institutions or home or real estates, the preventive measures are most important. Among the several field, providing the
preventive measures system for voting are the tedious and expensive one. In order to provide the inexpensive solutions to
the above, the Finger Print Based Electronic voting machine project is developed. This provides the security by means of
finger prints which is stored already in the data base. Then the finger print which is stored in the data base is checked.
Only if both the persons and the voter’s finger print are the same then the voting machine is enabled. This finger print
matching is done with the help of sensors. This is done using a Microcontroller processor.
The Microcontroller processes the signal and then enables the buzzer. Nowadays with the rise in population the need for
checking the validity of the voters has become a problem. With the micro controller based finger print technique the task
looks much simpler and also the accuracy is high. So this system provides the cost effective as well as reliable security
for the users. The main idea is to develop a micro controller based application which can work as Intelligent Electronic
Voting Machine2323 It has got two units, one is the control unit and the other is the ballet unit. It has a “RESULT” button
that will display the number of votes to respective candidate at the end of the poll. The ballet unit consists of various
buttons, so that the user can elect any one of them and the next trail of same user is being avoided. At the end of polling
the recorded information stored in the control unit is displayed and sent to the PC. The control unit is completely designed
by micro controller and it has got flexibility to increase the number of members for electing. This application can be used
by any one and provides security with accurate result.
1
CHAPTER 2- INTRODUCTION
The right of individuals to vote for our government representatives is at the heart of the democracy that
all will enjoy. Historically, great effort and care has been taken to ensure that elections are conducted in a fair manner
such that the candidate who should win the election based on the vote count actually does. In the past changes to the
election process have proceeded deliberately and judiciously, often entailing lengthy debates over even the minutes of
details. With the rapid propagation of the internet and the establishment of the information superhighway network, the
promotion of an information oriented society has demanded the appearance of new information services that deserve
attention. Voters need not visit the poll to vote and can vote at any place where they can use the internet. However,
through Internet Voting has these advantages, its safety must be guaranteed for practical use. The existing system meets
the requirements of electronic voting, it has the drawback of not being able to prevent buying votes.
Manual voting of the people is a difficult one. In order to monitor these facts automatically, this microcontroller
based system is proposed to develop. This project uses scanner, keypad, LCD display and then the RFID card, pin no:
and thumb impression is stored in the database. When the voter keeps his thumb in the scanner the system searches for
the matches which is already fed. If it matches, the PC shows the details of voter’s identity like photo, residential address
etc. Then the PC sends the report which is connected serially to the microcontroller with a single beep buzzer sound and
valid voter is displayed, at the same time in the LCD “please poll your vote” message is also displayed. When voter
presses the button a double beep sound is heard which indicates the vote is done. After the vote is finished, the LCD
displays a message stating, “Your vote is registered”. If suppose an invalid voter or already voted person comes for voting
booth and when his thumb impression is scanned, the PC sends a continuous beep sound to the controller and necessary
steps will be taken by the government.
Electronic voting systems may offer advantages compared to other voting techniques. An electronic voting
system can be involved in any one of a number of steps in the setup, distributing, voting, collecting and counting of
ballots, thus may or may not introduce advantages into any of these steps.
2
CHAPTER 3- SYSTEM ANALYSIS
EXISTING SYSTEM:
The existing elections were done in traditional way, using ballot, ink and tallying
the votes afterward, voting machines, etc., but this system prevents the election from being
more accurate, consumes more time to publish the result.
▪ It requires human participation, in tallying the votes that makes the elections time consuming and prone to
human error.
▪ The voter find the event boring resulting to a small number of voters.
▪ Lack of evidence and fraud resistance (duplicate votes and forged modified votes) are supported.
So, the proposed electronic voting system has to be addressed these problems.
1. Enhanced Security
• Improved Authentication: Combining RFID and fingerprint technologies provides a robust multi-factor
authentication mechanism, significantly reducing the chances of voter fraud and impersonation.
• Data Integrity and Confidentiality: The use of encrypted communication channels and secure data storage ensures
that voter information remains confidential and is not tampered with.
• Reduced Risk of Multiple Voting: The dual verification process ensures that each voter can cast their vote only
once, addressing the issue of multiple voting.
3
2. Increased Efficency
• Streamlined Voter Check-In: RFID tags allow for quick identification of voters, reducing the time required for
manual checks. Fingerprint verification further expedites the process.
• Faster Voting Process: The integration of these technologies minimizes queues and waiting times, making the
voting process more efficient and user-friendly.
• Automated Record Keeping: Electronic systems can automatically update voter records, reducing the administrative
burden and potential for human error.
4
CHAPTER 4- OBJECTIVE OF THE PROJECT
The objective of our project is to propose an internet voting system which will ensure the following:
It also provides two levels of security i.e. user’s security and the voting system’s security. User’s security
is achieved by means of biometric identification and the nation’s security is attained by strongly encrypting the RFID-
TID and pin number so that the hacker will not be able to hack the information from the databases
By utilizing biometric information (such as fingerprints) and RFID technology, these systems aim to ensure
that only eligible voters can cast their votes. This helps prevent fraudulent activities such as impersonation
or multiple voting. Electronic voting systems aim to minimize errors associated with manual vote counting.
By automating the process, they reduce the likelihood of mistakes in tallying votes, thereby enhancing the
overall accuracy of the election results. Electronic voting systems can streamline the voting process,
potentially reducing long queues and wait times at polling stations. RFID and fingerprint-based systems can
expedite voter identification and authentication, making the voting process more efficient. These systems can
be designed to accommodate voters with disabilities or special needs, providing them with alternative
methods for casting their votes that are more accessible than traditional paper-based ballots.While ensuring
the confidentiality of individual votes, electronic voting systems can enhance the transparency of the overall
election process. They can provide mechanisms for auditing and verifying the integrity of the voting process,
thereby increasing public trust in the election. Electronic voting systems offer convenience to voters by
providing them with alternative methods for casting their votes, such as early voting or remote voting in
certain circumstances. This can potentially increase voter turnout and participation in election outcomes.
5
CHAPTER 5- LITERATURE SURVEY
LITERATURE SURVEY
Abstract:
Radio frequency identification (RFID) based electronic voting machine (EVM) with
fingerprint module overcomes the challenges of wired electronic voting. Finger print module
is to authenticate the voters. In this paper the system is constructed with microcontroller,
Liquid Crystal Display (LCD), RS232 cable, RFID reader, RFID tag, fingerprint module and
buzzer alarm. Dishonest voting will be avoided if the government uses the biometric based
system. The details of all voters with their fingerprint will be stored in the database. Database
is kept in microcontroller. Microcontroller verifies the voter by comparing the database during
polling. If a person with RFID comes for second time voting, immediately the buzzer gives
sound. The RFID base EVM will reduce time consumption. When compared to the existing
voting system, the system in this paper is expected to be fast and reliable. The voters' details
will not be revealed out. For every polling end, the button should be pressed for getting the
number of votes polled.
Abstract:- As we know that India is called the world's largest democracy. In such a
democratic country, voting plays a key role in electing government officials and reflects our
vision of how a governing body should be formed. Surveys are conducted time to time to
address difficulties in the central voting system so that it should be more anonymous, reliable
and secure while preventing any type of fraud. Or the use of electronic voting, we have to deal
with many problems of fraud and corruption. Currently, various researches are being
conducted to create a safe and reliable voting system while addressing issues of anonymity
and security. This paper implements a method that utilizes deep learning to work on smart
voting system. This provides great protection in the sense that the most secure voter password
is verified before a vote is received on the Indian Electoral Commission's main database and
voters can verify that his or her vote has reached to correct participant of election. And the
votes counting will be done automatically, thus saving a lot of time and the results can be
announced in a very short time by the Indian Electoral Commission. The user verification
process is enhanced by adding a face recognition to the app that will determine whether the
voter is a certified user or not.
7
CHAPTER 6- REQUIREMENT ANALYSIS
EXISTING SYSTEM:
The existing elections were done in traditional way, using ballot, ink and tallying the votes afterward,
voting machines, etc., but this system prevents the election from being more accurate, consumes more time to publish
the result.
▪ It requires human participation, in tallying the votes that makes the elections time consuming and prone to
human error.
▪ The voter find the event boring resulting to a small number of voters.
▪ Deceitful election mechanism.
▪ Constant spending funds for the elections staff every year.
▪ Voter ID, slips, required to poll the vote.
▪ Voting is done only in the concerned ballots.
▪ Lack of evidence and fraud resistance (duplicate votes and forged modified votes) are supported.
So, the proposed electronic voting system has to be addressed these problems.
PROPOSED SYSTEM
These days, the explosive growth of internet use is accelerating the establishment of internet voting, which is more
convenient and creates a higher turnout than the existing voting systems. Many internet electronic voting systems have
been suggested, but they have the disadvantage of not having sufficient means of preventing attempts to doing fake votes
and in terms of security. To overcome this disadvantage, a practical internet electronic voting system that provides two
level of security is proposed. In the first level, the user’s finger print along with user name and password is given as input.
If it is found to be valid, then the second level is reached. Now the user is expected to show the RFID card and must enter
the pin number to perform voting. The user is allowed to vote only when the RFID Tag Identification (TID) and pin
voter’s id is found to be valid.
8
SOFTWARE/HARDWARE REQUIREMENT:
The system requirement is a main part in the analyzing phase of the project. The analyzer of the project has to properly
analyze the hardware and software requirements, otherwise in future the project will face more trouble with hardware and
the software required.
HARDWARE REQUIREMENTS
RAM : 1 GB
MONITOR : 15”
HARD DISK : 10 GB
DRIVE : CD DRIVE
SOFTWARE REQUIREMENTS
PROJECT ENVIRONMENT
DEVELOPMENT ENVIRONMENT
9
SOFTWARE ENVIRONMENT
FEATURES OF NET
Microsoft .NET is a set of Microsoft software technologies for rapidly building and integrating XML Web
services, Microsoft Windows-based applications, and Web solutions. The .NET Framework is a language-neutral platform
for writing programs that can easily and securely interoperate. There’s no language barrier with .NET: there are numerous
languages available to the developer including Managed C++, C#, Visual Basic and Java Script. The .NET framework
provides the foundation for components to interact seamlessly, whether locally or remotely on different platforms. It
standardizes common data types and communications protocols so that components created in different languages can
easily interoperate.
“.NET” is also the collective name given to various software components built upon the .NET platform. These
will be both products (Visual Studio.NET and Windows.NET Server, for instance) and services (like Passport, .NET My
Services, and so on).
The CLR is described as the “execution engine” of .NET. It provides the environment within which programs
run. The most important features are
▪ Conversion from a low-level assembler-style language, called Intermediate Language (IL), into code native to the
platform being executed on.
10
NET FRAMEWORK
The .NET Framework is a new computing platform that simplifies application development in the highly
distributed environment of the Internet.
1. To provide a consistent object-oriented programming environment whether object codes is stored and
executed locally on Internet-distributed, or executed remotely.
There are different types of application, such as Windows-based applications and Web-based applications.
FEATURES OF SQL-SERVER
The OLAP Services feature available in SQL Server version 7.0 is now called SQL Server 2000 Analysis
Services. The term OLAP Services has been replaced with the term Analysis Services. Analysis Services also includes a
new data mining component. The Repository component available in SQL Server version 7.0 is now called Microsoft
SQL Server 2000 Meta Data Services. References to the component now use the term Meta Data Services.
11
CHAPTER 7- DESIGN
The novelty of the system is that instead of using paper ballots, voting machines or other source, the votes in the proposed
system are cast on a computer terminal. To cast the votes, the voter firstly registers the required details and those details
are by default stored in the database. This is done for non-security-related reasons. Cost saving is also reportedly the
reason why the system has absolutely no paper trail – the designers wished to save on the cost of maintaining and supplying
paper to thousands of printers on election day. Thus a computer terminal with a scanner to scan the finger prints is designed
that allows the voter to poll.
RFID &
ZONAL FINGER
DATABASE PRINT
CONSTITUENCY
DATABASE
NATIONAL
DATABASE
VOTER
BLOCK DIAGRAM
The following diagram shows the general view of the voting terminal’s architectural design.
12
Comparison of image and RFID option
Matching
Doesn’t match
DFD LEVEL 0
RFID
Voter Authentication Report on voting
ADMIN
REGISTRATION
CRYPT ANALYSIS
EMBEDDING
AUTHENTICATION
VERIFICATION
REPORT ON VOTING
14
Flowchart
15
UML DIAGRAMS
1. USE CASE DIAGRAM
Login
Add/Edit User
Details
ADMIN
Add/Edit
Candidate & Party Server
Voting
USER
View Election
Result
2. CLASS DIAGRAM
ADMIN
ADMIN USER
USER SERVER
SERVER
4. COLLABORATION DIAGRAM
USER
ADMIN
1: LOGIN
2: AUTHORISED 8: VOTING
SERVER
17
5. ACTIVITY DIAGRAM
18
CHAPTER 8- IMPLEMENTATION
MODULES DESCRIPTION:
MODULES
▪ REGISTRATION MODULE
▪ FINGER PRINT EMBEDDING MODULE
▪ TID CRYPT ANALYSIS MODULE.
▪ AUTHENTICATION MODULE
▪ VERIFICATION MODULE
REGISTRATION MODULE
The purpose of the registration module is to get the user’s details such as name, finger print and other relevant
information in order to include the person successfully in the database as an authorized/ authenticated user to carry on
further processes of the application i.e., voting. Only after finishing the registration, a person can logon to the system to
perform voting say poll, view result of voting, etc.
In this module, user’s security is focused i.e. the user’s finger print given at the time of registration is embedded
as a fake image. The finger print is not stored as such in database instead it is strongly encrypted. The original finger print
image has been split into three parts and then the fake image is embedded on it. This fake image is encrypted and stored
in database. So this makes the user data to be in safer side. Hence, even when the hacker hacks the database and tries to
get the user’s details, the hacker will end up with fake one. Because the database contains the encrypted form of fake
images embedded on the original image. Thus security is enhanced.
In this module, the voting organization’s security is focused i.e. voter is allowed to give a pin number along with
the exposure of RFID card. The pin number is a four digit number which will be stored as 16 bit value. The TID is also a
16 bit value but it will be in Manchester code format. These two values which are the user have input unique to each voter
is safely stored in database as encrypted form. The encryption performed is a strong encryption scheme i.e. the first 8 bit
of RFID TID is concatenated with first 8bit of pin number and then an encryption scheme is applied to encrypt the
concatenated bits, say X encryption scheme. Secondly the next 8 bit of RFID TID is concatenated with the next 8 bit of
pin number and then a different encryption scheme is performed say ‘Y’ to encrypt them.
19
AUTHENTICATION MODULE
Authentication is any process by which you verify that someone is who they claim they are. This usually involves
a username and a password, but can include any other method of demonstrating identity. In this project, the finger print
and pin number is used for authentication. During the authentication, the user has to give the finger print and pin number.
This will be done by the authentication module by interacting with the verification module.
VERIFICATION MODULE
In this verification module, the user’s finger print will be compared with the finger print image given at the time of
registration. The retrieval of the original finger print image from the database involves the reverse process of embedding
i.e. vice versa. If the given user’s finger print and the pin number are valid, the user is allowed to perform the next
process else the user is allowed to exit the system. After verifying both the user’s inputs, the user will be allowed to
perform transactions.
IMPLEMENTATION
Implementation is the stage of the project when the theoretical design is turned out into a working
system. Thus it can be considered to be the most it’s constraints on implementation, designing of methods to
achieve change over and evaluation of changeover methods. Implementation is the process of converting a new
system design into operation. It is the phase that focuses critical stage in achieving a successful new system and
in giving the user, confidence that the new system will work and be effective. The implementation stage involves
careful planning, investigation of the existing system and on user training, site preparation and file conversion
for installing a candidate system. The important factor that should be considered here is that the conversion
should not disrupt the functioning of the organization.
MODULE DECOMPOSITION
HARDWARE MODULE
RFID
Radio Frequency Identification, or RFID, is a rapidly-emerging identification and logging technology. Whether or
not you have come across RFID systems in your work, you have probably encountered RFID in your daily life, perhaps
without even being aware of it. At their simplest, RFID systems use tiny chips, called "tags," to contain and transmit some
piece of identifying information to an RFID reader, a device that in turn can interface with computers. To begin
understanding RFID, think of a conventional Point-of-Sale barcode reader scanning grocery barcodes. In its simplest
form, an RFID system is much the same: it also can identify a package. However, unlike barcodes, RFID tags don't need
a direct line of sight: within limits, we can now scan an unpacked skid of boxes. Next, think of RFID tags as mini
databases, or as barcodes that can be written to, and that can accumulate information as they travel. At this point, RFID
diverges qualitatively from bar-coding, giving it great new potential.
20
FEATURES
SPECIFICATION OF RFID
21
SAMPLE CODE
using System;
using System.Collections.Generic;
using System.Text;
using System.Data;
using System.Data.SqlClient;
namespace RFID_VOTING
class Data_Access
cn.Open();
DBOpen();
cmd.ExecuteNonQuery();
22
public void DBADAPTER(string query,string tbl)
DBOpen();
//ds.Clear();
ds = new DataSet();
da.Fill(ds, tbl);
DBOpen();
dr = cmd.ExecuteReader();
cn.Close();
cmd = null;
dr.Close();
cn.Close();
cmd = null;
23
cn.Close();
//{
//}
The OUTPUT:
24
FIG. Home Page for E-Voting
25
FIG. Login Page for Admin Details
26
FIG. Shows the User Information
27
FIG. Candidate Registration successfully saved
28
FIG. User Voter is added successfully
29
CHAPTER 10- CONCLUSION
In this paper a secure e-Voting system based on biometric fingerprint method is developed. With the implementation of
this system one can get rid of all the traditional voting system problems and they will have an ideal election process
containing all properties of a system like accuracy, loving democracy, verifiability, convenience, flexibility, mobility and
fastness. This is a system in which power is in system’s hand rather than human being. Previously existing technical
security flaws were also eliminated. This brings us one step closer to our objective of making electronic voting feasible
at networked polling stations in the short term and using any terminals without any technical, legal or organization
problems in the medium to long term. Thus a model for electronic voting is presented wherein fingerprint is embedded as
biometrics for voter identification. The future work will concentrate on implementation of fast and accurate fingerprint
recognition and other related technical aspects in the system.
30
CHAPTER 11- REFERENCES/BIBLIOGRAPHY
TEXT BOOKS
[1] Folorunso O, Ogunseye OS, Okesola JO, Olaniyan OM (2010). Visualizing e-voting results, J. Theor. Appl. Inf.
Technol., 16(1): 57-69.
[3] Kadry S, Smaili M (2010). Wireless attendance management system based on iris recognition, Sci. Res. Essays., 5(12):
1428-1435.
[4] Monrose R, Rubin A (1999). Keystroke dynamics as a biometric for authentication, Future Gen. Comp. Syst. 16(4):
351-359.
[5] EMVCo contactless communication protocol specification v2.0.1. Online, July 2009.
[6] K. Finkenzeller. RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification. John
Wiley & Sons, 2003.
[7] D. W. Jones. Problems with Voting Systems and the Applicable Standards May 2001. Testimony before the U.S.
House of Representatives’ Committee on Science.
WEBSITES
www.mysql.com
www.evoting.cc.com
www.onlinevoting.com
www.biometricevoting.cc.com
http://www.cs.uiowa.edu/jones/voting/congress.html
31
32
33
34
35