0% found this document useful (0 votes)
0 views

Project Report Final Output

The document is a mini project report on 'RFID & Fingerprint Based Electronic Voting' submitted by students for their Bachelor of Technology in Computer Science and Engineering. It outlines the project's objectives, which include enhancing voting security through biometric identification and RFID technology, addressing issues with traditional voting methods, and ensuring accurate vote counting. The report also includes acknowledgments, system analysis, and literature survey related to electronic voting systems.

Uploaded by

Samuel Stanes
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
0 views

Project Report Final Output

The document is a mini project report on 'RFID & Fingerprint Based Electronic Voting' submitted by students for their Bachelor of Technology in Computer Science and Engineering. It outlines the project's objectives, which include enhancing voting security through biometric identification and RFID technology, addressing issues with traditional voting methods, and ensuring accurate vote counting. The report also includes acknowledgments, system analysis, and literature survey related to electronic voting systems.

Uploaded by

Samuel Stanes
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 40

FORM NO.

F/ TL / 024
Rev.00 Date 20.03.2020

RFID & FINGERPRINT BASED ELECTRONIC VOTING

MINI PROJECT REPORT

submitted in partial fulfillment of the requirements.


for the award of the degree in

BACHELOR OF TECHNOLOGY
IN
COMPUTER SCIENCE AND ENGINEERING

BY
SATHISH.E(211191101132)
YOGI RAJ SIVA.C(211191101170)

DEPARTMENT OF
COMPUTER SCIENCE AND ENGINEERING

APRIL 2024
FORM NO. F/ TL / 024
Rev.00 Date 20.03.2020

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

BONAFIDE CERTIFICATE

This is to certify that this Project Report is the bonafide work of


Mr.E.SATHISH Reg.No 211191101132
Mr. C.YOGI RAJ SIVA Reg.No 211191101170
who carried out the mini project entitled as RFID & FINGERPRINT BASED
ELECTRONIC VOTING
under our supervision from January 2024 to May 2024

Mini Project Coordinator 1 Mini Project Coordinator 2 HOD


Mrs.M.Devika Dr.Gunasekaran Dr.S.Geetha
Assistant Professor Professor HOD of CSE
Dr.MGR Educational and Dr.MGR Educational and Dr.MGR Educational
Research Institute Reseach Institute and Research Institute
Deemed to be University Deemed to be University Deemed to be University

Submitted for Viva Voce Examination held on

Internal Examiner External Examiner


FORM NO. F/ TL / 024
Rev.00 Date 20.03.2020

DECLARATION

We, Mr.E.SATHISH (211191101132), Mr.C.YOGI RAJ SIVA (211191101170),


hereby declare that the Mini Project Report entitled “RFID & FINGERPRINT
BASED ELECTRONIC VOTING” is done by us
under the guidance of “Mrs.M.Devika & Dr.Gunasekaran” is submitted in partial
fulfilment of the requirements for the award of the degree in Bachelor of
Technology in Computer Science and Engineering.

Date:

Place: CHENNAI
1.

2.

3.

Signature of the Candidates


ACKNOWLEDGEMENT

We would first like to thank our beloved Chancellor Thiru A.C. SHANMUGAM,
B.A., B.L. and President Er. A.C.S. Arunkumar, B.Tech., M.B.A., and for all the
encouragement and support extended to us during the tenure of this project and also
our years of studies in his wonderful University.

We express my heartfelt thanks to our Vice Chancellor Prof. Dr. S. Geethalakshmi in


providing all the support of our Mini Project.

We express my heartfelt thanks to our Head of the department,Prof. Dr. S. Geetha,who


has been actively involved and very influential from the start till the completion of
our project.

Our sincere thanks to our Project Coordinators Mrs.M.Devika & Dr.Gunasekaran,


for their continuous guidance and encouragement throughout thiswork, which has
made the mini project a success.

We would also like to thank all the teaching and non-teaching staffs of Computer
Science and Engineering department, for their constant support and the
encouragement given to us while we went about to achieving my project goals.
CONTENTS

CHAPTER TITLE PG NO

1 ABSTRACT 1

2 INTRODUCTION 2

3 SYSTEM ANALYSIS 3

4 OBJECTIVE OF THE PROJECT 4

5 LITERATURE SUREVEY 6

6 REQUIREMENT ANALYSIS 8
• EXISITING SYSTEM
• PROPOSED SYSTEM
• SOFTWARE/HARDWARE
12
7 DESIGN
• UML DIAGRAM
• ARCHITECTURE
DIAGRAM

8 IMPLEMENTATION 19
• MODULES
DESCRIPTION

9 SAMPLE CODE AND OUTPUT 22

10 CONCLUSION 30

11 REFERENCES/BIBLIOGRAPHY 31
CHAPTER 1- ABSTRACT

Providing preventive measures is one of the challenging matters in the world nowadays, either it is a bank or
institutions or home or real estates, the preventive measures are most important. Among the several field, providing the
preventive measures system for voting are the tedious and expensive one. In order to provide the inexpensive solutions to
the above, the Finger Print Based Electronic voting machine project is developed. This provides the security by means of
finger prints which is stored already in the data base. Then the finger print which is stored in the data base is checked.
Only if both the persons and the voter’s finger print are the same then the voting machine is enabled. This finger print
matching is done with the help of sensors. This is done using a Microcontroller processor.

The Microcontroller processes the signal and then enables the buzzer. Nowadays with the rise in population the need for
checking the validity of the voters has become a problem. With the micro controller based finger print technique the task
looks much simpler and also the accuracy is high. So this system provides the cost effective as well as reliable security
for the users. The main idea is to develop a micro controller based application which can work as Intelligent Electronic
Voting Machine2323 It has got two units, one is the control unit and the other is the ballet unit. It has a “RESULT” button
that will display the number of votes to respective candidate at the end of the poll. The ballet unit consists of various
buttons, so that the user can elect any one of them and the next trail of same user is being avoided. At the end of polling
the recorded information stored in the control unit is displayed and sent to the PC. The control unit is completely designed
by micro controller and it has got flexibility to increase the number of members for electing. This application can be used
by any one and provides security with accurate result.

1
CHAPTER 2- INTRODUCTION

The right of individuals to vote for our government representatives is at the heart of the democracy that
all will enjoy. Historically, great effort and care has been taken to ensure that elections are conducted in a fair manner
such that the candidate who should win the election based on the vote count actually does. In the past changes to the
election process have proceeded deliberately and judiciously, often entailing lengthy debates over even the minutes of
details. With the rapid propagation of the internet and the establishment of the information superhighway network, the
promotion of an information oriented society has demanded the appearance of new information services that deserve
attention. Voters need not visit the poll to vote and can vote at any place where they can use the internet. However,
through Internet Voting has these advantages, its safety must be guaranteed for practical use. The existing system meets
the requirements of electronic voting, it has the drawback of not being able to prevent buying votes.

Manual voting of the people is a difficult one. In order to monitor these facts automatically, this microcontroller
based system is proposed to develop. This project uses scanner, keypad, LCD display and then the RFID card, pin no:
and thumb impression is stored in the database. When the voter keeps his thumb in the scanner the system searches for
the matches which is already fed. If it matches, the PC shows the details of voter’s identity like photo, residential address
etc. Then the PC sends the report which is connected serially to the microcontroller with a single beep buzzer sound and
valid voter is displayed, at the same time in the LCD “please poll your vote” message is also displayed. When voter
presses the button a double beep sound is heard which indicates the vote is done. After the vote is finished, the LCD
displays a message stating, “Your vote is registered”. If suppose an invalid voter or already voted person comes for voting
booth and when his thumb impression is scanned, the PC sends a continuous beep sound to the controller and necessary
steps will be taken by the government.

Electronic voting systems may offer advantages compared to other voting techniques. An electronic voting
system can be involved in any one of a number of steps in the setup, distributing, voting, collecting and counting of
ballots, thus may or may not introduce advantages into any of these steps.

2
CHAPTER 3- SYSTEM ANALYSIS

EXISTING SYSTEM:

The existing elections were done in traditional way, using ballot, ink and tallying
the votes afterward, voting machines, etc., but this system prevents the election from being
more accurate, consumes more time to publish the result.

DRAWBACKS IN EXISTING SYSTEM

Problems encounter the usual elections are as follows:

▪ It requires human participation, in tallying the votes that makes the elections time consuming and prone to
human error.

▪ The voter find the event boring resulting to a small number of voters.

▪ Deceitful election mechanism.

▪ Constant spending funds for the elections staff every year.

▪ Voter ID, slips, required to poll the vote.

▪ Voting is done only in the concerned ballots.

▪ Lack of evidence and fraud resistance (duplicate votes and forged modified votes) are supported.

So, the proposed electronic voting system has to be addressed these problems.

OUTCOME OF THE PROJECT

1. Enhanced Security
• Improved Authentication: Combining RFID and fingerprint technologies provides a robust multi-factor
authentication mechanism, significantly reducing the chances of voter fraud and impersonation.

• Data Integrity and Confidentiality: The use of encrypted communication channels and secure data storage ensures
that voter information remains confidential and is not tampered with.

• Reduced Risk of Multiple Voting: The dual verification process ensures that each voter can cast their vote only
once, addressing the issue of multiple voting.
3
2. Increased Efficency
• Streamlined Voter Check-In: RFID tags allow for quick identification of voters, reducing the time required for
manual checks. Fingerprint verification further expedites the process.

• Faster Voting Process: The integration of these technologies minimizes queues and waiting times, making the
voting process more efficient and user-friendly.

• Automated Record Keeping: Electronic systems can automatically update voter records, reducing the administrative
burden and potential for human error.

3. Data Analytics and Reporting



• Real-Time Data Collection: Election officials can monitor voter turnout in real-time, enabling better management of
election resources.

Detailed Reporting: Post-election data analysis provides insights into voter behavior and system performance,
aiding future improvements.

4
CHAPTER 4- OBJECTIVE OF THE PROJECT
The objective of our project is to propose an internet voting system which will ensure the following:

▪ Only eligible persons vote.

▪ No person gets to vote more than once.

▪ The vote is secret.

▪ Each (correctly cast) vote gets counted.

▪ The voters trust that their vote is counted.

It also provides two levels of security i.e. user’s security and the voting system’s security. User’s security
is achieved by means of biometric identification and the nation’s security is attained by strongly encrypting the RFID-
TID and pin number so that the hacker will not be able to hack the information from the databases

By utilizing biometric information (such as fingerprints) and RFID technology, these systems aim to ensure
that only eligible voters can cast their votes. This helps prevent fraudulent activities such as impersonation
or multiple voting. Electronic voting systems aim to minimize errors associated with manual vote counting.
By automating the process, they reduce the likelihood of mistakes in tallying votes, thereby enhancing the
overall accuracy of the election results. Electronic voting systems can streamline the voting process,
potentially reducing long queues and wait times at polling stations. RFID and fingerprint-based systems can
expedite voter identification and authentication, making the voting process more efficient. These systems can
be designed to accommodate voters with disabilities or special needs, providing them with alternative
methods for casting their votes that are more accessible than traditional paper-based ballots.While ensuring
the confidentiality of individual votes, electronic voting systems can enhance the transparency of the overall
election process. They can provide mechanisms for auditing and verifying the integrity of the voting process,
thereby increasing public trust in the election. Electronic voting systems offer convenience to voters by
providing them with alternative methods for casting their votes, such as early voting or remote voting in
certain circumstances. This can potentially increase voter turnout and participation in election outcomes.

5
CHAPTER 5- LITERATURE SURVEY

LITERATURE SURVEY

1. RFID BASED SMART VOTING SYSTEM B. SurendraRao1, E. Prasanth2, R. Siva Sai


Teja3, Y. Sandeep4 p-ISSN: 2395-0072 1,2,3,4Student, Pragati Engineering College,
Surampalem, Andhra Pradesh, IN

Abstract: Operation of smart EVM using microcontroller, RFID, GSM technology to


improve the election process by avoiding the electoral fraud and to ensure safety, security,
reliability, guarantee and transparency and smooth conduct of elections in the country
2. Radio frequency identification based electronic voting machine using fingerprint module V
Malathy1, N Shilpa2, M Anand3 and R Elavarasi4 1Department of Electronics and
Communication Engineering, SR University, Warangal 2Department of
Electronics and Communication Engineering, S R Engineering College, Warangal
3Department of Electronics and Communication Engineering, DR M.G.R
Educational and Research Institute University, Chennai 4Department of Electronics and
Communication Engineering, Priyadarshini Engineering College, Vaniyamadi, Vellore
[email protected]
Abstract :Radio frequency identification (RFID) based electronic voting machine (EVM) with
fingerprint module overcomes the challenges of wired electronic voting. Finger print module
is to authenticate the voters. In this paper the system is constructed with microcontroller,
Liquid Crystal Display (LCD), RS232 cable, RFID reader, RFID tag, fingerprint module and
buzzer alarm. Dishonest voting will be avoided

3. IOT RFID ELECTRONIC VOTING MACHINE M.Nagasri1, V Hareessh Naidu2, Y


Krishna Sri2, Guggilla Ajay2, Pyata Pravalika2 1,2Department of Electronics and
Communication Engineering 1,2Malla Reddy Engineering College and Management
Sciences, Medchal, Telangana
ABSTRACT: This paper describes the design and operation of Smart Electronic Voting
Machine using Arduino UNO, RFID, to improve the election process by avoiding electoral
fraud and to ensure safety, security, reliability, and smooth conduct of elections in the country.
This paper talks about an innovative approach for the voting process where the device
communicates with the RFID tag, which is embedded in the voter ID card. When the voter
scans his card, the controller checks the ID, and if it matches, the LCD displays the result in
IOT as well.
6
4. [11:15 AM, 5/29/2024] SAMUEL MGR,YOGI RAJ SIVA: Radio frequency identification
based electronic voting machine using fingerprint module
V Malathy1, N Shilpa2, M Anand3 and R Elavarasi4
[11:15 AM, 5/29/2024] SAMUEL MGR,YOGI RAJ SIVA:

Abstract:
Radio frequency identification (RFID) based electronic voting machine (EVM) with
fingerprint module overcomes the challenges of wired electronic voting. Finger print module
is to authenticate the voters. In this paper the system is constructed with microcontroller,
Liquid Crystal Display (LCD), RS232 cable, RFID reader, RFID tag, fingerprint module and
buzzer alarm. Dishonest voting will be avoided if the government uses the biometric based
system. The details of all voters with their fingerprint will be stored in the database. Database
is kept in microcontroller. Microcontroller verifies the voter by comparing the database during
polling. If a person with RFID comes for second time voting, immediately the buzzer gives
sound. The RFID base EVM will reduce time consumption. When compared to the existing
voting system, the system in this paper is expected to be fast and reliable. The voters' details
will not be revealed out. For every polling end, the button should be pressed for getting the
number of votes polled.

5. A REVIEW ON SMART VOTING SYSTEMS 1 RUTUJA B. ARDAK, 2 DR. AASHISH


S. BARDEKAR 1 P.G. Student, Department of Computer Science & Engineering, Sipna
C.O.E.T., Amravati, India. 2 Associate Professor, Department of Computer Science &
Engineering, Sipna C.O.E.T., Amravati, India.

Abstract:- As we know that India is called the world's largest democracy. In such a
democratic country, voting plays a key role in electing government officials and reflects our
vision of how a governing body should be formed. Surveys are conducted time to time to
address difficulties in the central voting system so that it should be more anonymous, reliable
and secure while preventing any type of fraud. Or the use of electronic voting, we have to deal
with many problems of fraud and corruption. Currently, various researches are being
conducted to create a safe and reliable voting system while addressing issues of anonymity
and security. This paper implements a method that utilizes deep learning to work on smart
voting system. This provides great protection in the sense that the most secure voter password
is verified before a vote is received on the Indian Electoral Commission's main database and
voters can verify that his or her vote has reached to correct participant of election. And the
votes counting will be done automatically, thus saving a lot of time and the results can be
announced in a very short time by the Indian Electoral Commission. The user verification
process is enhanced by adding a face recognition to the app that will determine whether the
voter is a certified user or not.

7
CHAPTER 6- REQUIREMENT ANALYSIS

EXISTING SYSTEM:

The existing elections were done in traditional way, using ballot, ink and tallying the votes afterward,
voting machines, etc., but this system prevents the election from being more accurate, consumes more time to publish
the result.

DRAWBACKS IN EXISTING SYSTEM

Problems encounter the usual elections are as follows:

▪ It requires human participation, in tallying the votes that makes the elections time consuming and prone to
human error.
▪ The voter find the event boring resulting to a small number of voters.
▪ Deceitful election mechanism.
▪ Constant spending funds for the elections staff every year.
▪ Voter ID, slips, required to poll the vote.
▪ Voting is done only in the concerned ballots.
▪ Lack of evidence and fraud resistance (duplicate votes and forged modified votes) are supported.
So, the proposed electronic voting system has to be addressed these problems.

PROPOSED SYSTEM

These days, the explosive growth of internet use is accelerating the establishment of internet voting, which is more
convenient and creates a higher turnout than the existing voting systems. Many internet electronic voting systems have
been suggested, but they have the disadvantage of not having sufficient means of preventing attempts to doing fake votes
and in terms of security. To overcome this disadvantage, a practical internet electronic voting system that provides two
level of security is proposed. In the first level, the user’s finger print along with user name and password is given as input.
If it is found to be valid, then the second level is reached. Now the user is expected to show the RFID card and must enter
the pin number to perform voting. The user is allowed to vote only when the RFID Tag Identification (TID) and pin
voter’s id is found to be valid.
8
SOFTWARE/HARDWARE REQUIREMENT:

The system requirement is a main part in the analyzing phase of the project. The analyzer of the project has to properly
analyze the hardware and software requirements, otherwise in future the project will face more trouble with hardware and
the software required.

HARDWARE REQUIREMENTS

PROCESSOR : PENTIUM IV 2.4 GHz

RAM : 1 GB

MONITOR : 15”

HARD DISK : 10 GB

KEYBOARD : STANDARD 108 KEYS

DRIVE : CD DRIVE

SOFTWARE REQUIREMENTS

PROJECT ENVIRONMENT

LANGUAGE USED : C#.NET

DATABASE : SQL SERVER 2005

TOOLS USED : MATLAB

DEVELOPMENT ENVIRONMENT

OPERATING SYSTEM : WINDOWS XP PROFESSIONAL

9
SOFTWARE ENVIRONMENT
FEATURES OF NET

Microsoft .NET is a set of Microsoft software technologies for rapidly building and integrating XML Web
services, Microsoft Windows-based applications, and Web solutions. The .NET Framework is a language-neutral platform
for writing programs that can easily and securely interoperate. There’s no language barrier with .NET: there are numerous
languages available to the developer including Managed C++, C#, Visual Basic and Java Script. The .NET framework
provides the foundation for components to interact seamlessly, whether locally or remotely on different platforms. It
standardizes common data types and communications protocols so that components created in different languages can
easily interoperate.

“.NET” is also the collective name given to various software components built upon the .NET platform. These
will be both products (Visual Studio.NET and Windows.NET Server, for instance) and services (like Passport, .NET My
Services, and so on).

THE NET FRAMEWORK

The NET Framework has two main parts:

1. The Common Language Runtime (CLR).

2. A hierarchical set of class libraries.

The CLR is described as the “execution engine” of .NET. It provides the environment within which programs
run. The most important features are

▪ Conversion from a low-level assembler-style language, called Intermediate Language (IL), into code native to the
platform being executed on.

▪ Memory management, notably including garbage collection.


▪ Checking and enforcing security restrictions on the running code.
▪ Loading and executing programs, with version control and other such features.

ASP.NET Windows Forms

XML WEB SERVICES

Base Class Libraries

10
NET FRAMEWORK

THE NET FRAMEWORK

The .NET Framework is a new computing platform that simplifies application development in the highly
distributed environment of the Internet.

OBJECTIVES OF. NET FRAMEWORK

1. To provide a consistent object-oriented programming environment whether object codes is stored and
executed locally on Internet-distributed, or executed remotely.

2. To provide a code-execution environment to minimizes software deployment and guarantees safe


execution of code.

3. Eliminates the performance problems.

There are different types of application, such as Windows-based applications and Web-based applications.

FEATURES OF SQL-SERVER

The OLAP Services feature available in SQL Server version 7.0 is now called SQL Server 2000 Analysis
Services. The term OLAP Services has been replaced with the term Analysis Services. Analysis Services also includes a
new data mining component. The Repository component available in SQL Server version 7.0 is now called Microsoft
SQL Server 2000 Meta Data Services. References to the component now use the term Meta Data Services.

11
CHAPTER 7- DESIGN

The novelty of the system is that instead of using paper ballots, voting machines or other source, the votes in the proposed
system are cast on a computer terminal. To cast the votes, the voter firstly registers the required details and those details
are by default stored in the database. This is done for non-security-related reasons. Cost saving is also reportedly the
reason why the system has absolutely no paper trail – the designers wished to save on the cost of maintaining and supplying
paper to thousands of printers on election day. Thus a computer terminal with a scanner to scan the finger prints is designed
that allows the voter to poll.

RFID &
ZONAL FINGER
DATABASE PRINT

CONSTITUENCY
DATABASE

NATIONAL
DATABASE
VOTER

OVERALL SYSTEM DESIGN

BLOCK DIAGRAM

The following diagram shows the general view of the voting terminal’s architectural design.

Acceptance RFID and Finger Print Accepting option

Processing of image and RFID option

12
Comparison of image and RFID option

Matching
Doesn’t match

Option is rejected Option is transferred as


count

Sum up count of similar parties and Partywise total count updated in


data is arranged in order wise database

DATA FLOW DIAGRAMS

A data-flow diagram (DFD) is a graphical representation of the "flow" of data through an


information technology DFDs can also be used for the visualization of data processing (structured design).On
a DFD, data items flow from an external data source or an internal data store to an internal data store or an
external data sink, via an internal process. A DFD provides no information about the timing or ordering of
processes, or about whether processes will operate in sequence or in parallel. It is therefore quite different from
a flowchart.

DFD LEVEL 0

RFID
Voter Authentication Report on voting

FIG. Shows the DFD of the System


13
DFD LEVEL 1

ADMIN

REGISTRATION

CRYPT ANALYSIS

EMBEDDING

AUTHENTICATION

VERIFICATION

REPORT ON VOTING

FIG. Shows the DFD for Report on Voting

14
Flowchart

15
UML DIAGRAMS
1. USE CASE DIAGRAM

Login

Add/Edit User
Details

ADMIN
Add/Edit
Candidate & Party Server

Voting

USER

View Election
Result

FIG. Shows the Use Case Diagram

2. CLASS DIAGRAM

FIG.Shows the Class Diagram


16
3. SEQUENCE DIAGRAM

ADMIN
ADMIN USER
USER SERVER
SERVER

FIG. Shows the Sequence


Diagram

4. COLLABORATION DIAGRAM

USER
ADMIN
1: LOGIN

3: ADD/EDIT USER DETAILS 7: AUTHORISED


4: ADD/EDIT PARTY DETAILS

5: ADD/EDIT CANDIDATE DETAILS

9: VIEW ELECTION RESULT


6: LOGIN WITH RFID AND FINGERPRINT

2: AUTHORISED 8: VOTING

SERVER

FIG. Shows the Collaboration


Diagram

17
5. ACTIVITY DIAGRAM

FIG. Shows the Activity Diagram by the Admin

6. ACTIVITY – BY THE USER

FIG. Shows the Activity Diagram by the User

18
CHAPTER 8- IMPLEMENTATION

MODULES DESCRIPTION:

MODULES

▪ REGISTRATION MODULE
▪ FINGER PRINT EMBEDDING MODULE
▪ TID CRYPT ANALYSIS MODULE.
▪ AUTHENTICATION MODULE
▪ VERIFICATION MODULE

REGISTRATION MODULE

The purpose of the registration module is to get the user’s details such as name, finger print and other relevant
information in order to include the person successfully in the database as an authorized/ authenticated user to carry on
further processes of the application i.e., voting. Only after finishing the registration, a person can logon to the system to
perform voting say poll, view result of voting, etc.

FINGER PRINT EMBEDDING MODULE

In this module, user’s security is focused i.e. the user’s finger print given at the time of registration is embedded
as a fake image. The finger print is not stored as such in database instead it is strongly encrypted. The original finger print
image has been split into three parts and then the fake image is embedded on it. This fake image is encrypted and stored
in database. So this makes the user data to be in safer side. Hence, even when the hacker hacks the database and tries to
get the user’s details, the hacker will end up with fake one. Because the database contains the encrypted form of fake
images embedded on the original image. Thus security is enhanced.

TID CRYPT ANALYSIS MODULE

In this module, the voting organization’s security is focused i.e. voter is allowed to give a pin number along with
the exposure of RFID card. The pin number is a four digit number which will be stored as 16 bit value. The TID is also a
16 bit value but it will be in Manchester code format. These two values which are the user have input unique to each voter
is safely stored in database as encrypted form. The encryption performed is a strong encryption scheme i.e. the first 8 bit
of RFID TID is concatenated with first 8bit of pin number and then an encryption scheme is applied to encrypt the
concatenated bits, say X encryption scheme. Secondly the next 8 bit of RFID TID is concatenated with the next 8 bit of
pin number and then a different encryption scheme is performed say ‘Y’ to encrypt them.
19
AUTHENTICATION MODULE

Authentication is any process by which you verify that someone is who they claim they are. This usually involves
a username and a password, but can include any other method of demonstrating identity. In this project, the finger print
and pin number is used for authentication. During the authentication, the user has to give the finger print and pin number.
This will be done by the authentication module by interacting with the verification module.

VERIFICATION MODULE

In this verification module, the user’s finger print will be compared with the finger print image given at the time of
registration. The retrieval of the original finger print image from the database involves the reverse process of embedding
i.e. vice versa. If the given user’s finger print and the pin number are valid, the user is allowed to perform the next
process else the user is allowed to exit the system. After verifying both the user’s inputs, the user will be allowed to
perform transactions.

IMPLEMENTATION
Implementation is the stage of the project when the theoretical design is turned out into a working
system. Thus it can be considered to be the most it’s constraints on implementation, designing of methods to
achieve change over and evaluation of changeover methods. Implementation is the process of converting a new
system design into operation. It is the phase that focuses critical stage in achieving a successful new system and
in giving the user, confidence that the new system will work and be effective. The implementation stage involves
careful planning, investigation of the existing system and on user training, site preparation and file conversion
for installing a candidate system. The important factor that should be considered here is that the conversion
should not disrupt the functioning of the organization.

MODULE DECOMPOSITION

HARDWARE MODULE
RFID
Radio Frequency Identification, or RFID, is a rapidly-emerging identification and logging technology. Whether or
not you have come across RFID systems in your work, you have probably encountered RFID in your daily life, perhaps
without even being aware of it. At their simplest, RFID systems use tiny chips, called "tags," to contain and transmit some
piece of identifying information to an RFID reader, a device that in turn can interface with computers. To begin
understanding RFID, think of a conventional Point-of-Sale barcode reader scanning grocery barcodes. In its simplest
form, an RFID system is much the same: it also can identify a package. However, unlike barcodes, RFID tags don't need
a direct line of sight: within limits, we can now scan an unpacked skid of boxes. Next, think of RFID tags as mini
databases, or as barcodes that can be written to, and that can accumulate information as they travel. At this point, RFID
diverges qualitatively from bar-coding, giving it great new potential.
20
FEATURES

▪ Selectable UART or Wigand26


▪ Plug-and-Play, needs +12V to become a reader
▪ No repeat reads
▪ LED indicates tag reading operation
▪ Excellent read performance without an external circuit
▪ Compact size and cost-effective

Fig. 5.a RFID READER-125Khz/LF

SPECIFICATION OF RFID

21
SAMPLE CODE
using System;

using System.Collections.Generic;

using System.Text;

using System.Data;

using System.Data.SqlClient;

namespace RFID_VOTING

class Data_Access

public SqlConnection cn;

public SqlCommand cmd;

public SqlDataAdapter da;

public SqlDataReader dr;

public DataSet ds;

public void DBOpen()

cn = new SqlConnection("server=esther-b51ba3ab;database=voting; Integrated Security= true");

cn.Open();

public void DBCMD(string query)

DBOpen();

cmd = new SqlCommand(query, cn);

cmd.ExecuteNonQuery();

22
public void DBADAPTER(string query,string tbl)

DBOpen();

//ds.Clear();

da = new SqlDataAdapter(query, cn);

ds = new DataSet();

da.Fill(ds, tbl);

public void DBReader(string query)

DBOpen();

cmd = new SqlCommand(query, cn);

dr = cmd.ExecuteReader();

public void DBReaderClose()

cn.Close();

cmd = null;

dr.Close();

public void DBCMDClose()

cn.Close();

cmd = null;

public void DBConClose()

23
cn.Close();

internal object dr1(int p)

throw new NotImplementedException();

internal void DBADAPTER(string p)

throw new NotImplementedException();

//internal byte[] dr(string p)

//{

// throw new NotImplementedException();

//}

The OUTPUT:

24
FIG. Home Page for E-Voting

FIG. Login Page for E-Voting

25
FIG. Login Page for Admin Details

FIG. Login Page for User Details

26
FIG. Shows the User Information

FIG. Shows the Registration for a New Party

27
FIG. Candidate Registration successfully saved

FIG. User Voting Login Page

28
FIG. User Voter is added successfully

FIG. Shows the Page for Election Result

29
CHAPTER 10- CONCLUSION

In this paper a secure e-Voting system based on biometric fingerprint method is developed. With the implementation of
this system one can get rid of all the traditional voting system problems and they will have an ideal election process
containing all properties of a system like accuracy, loving democracy, verifiability, convenience, flexibility, mobility and
fastness. This is a system in which power is in system’s hand rather than human being. Previously existing technical
security flaws were also eliminated. This brings us one step closer to our objective of making electronic voting feasible
at networked polling stations in the short term and using any terminals without any technical, legal or organization
problems in the medium to long term. Thus a model for electronic voting is presented wherein fingerprint is embedded as
biometrics for voter identification. The future work will concentrate on implementation of fast and accurate fingerprint
recognition and other related technical aspects in the system.

30
CHAPTER 11- REFERENCES/BIBLIOGRAPHY

TEXT BOOKS
[1] Folorunso O, Ogunseye OS, Okesola JO, Olaniyan OM (2010). Visualizing e-voting results, J. Theor. Appl. Inf.
Technol., 16(1): 57-69.

[2] Edison TA (1869). Electric Vote-Recorder, US Patent, No: 90646.

[3] Kadry S, Smaili M (2010). Wireless attendance management system based on iris recognition, Sci. Res. Essays., 5(12):
1428-1435.

[4] Monrose R, Rubin A (1999). Keystroke dynamics as a biometric for authentication, Future Gen. Comp. Syst. 16(4):
351-359.

[5] EMVCo contactless communication protocol specification v2.0.1. Online, July 2009.

[6] K. Finkenzeller. RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification. John
Wiley & Sons, 2003.

[7] D. W. Jones. Problems with Voting Systems and the Applicable Standards May 2001. Testimony before the U.S.
House of Representatives’ Committee on Science.

WEBSITES
www.mysql.com

www.evoting.cc.com

www.onlinevoting.com

www.biometricevoting.cc.com

http://www.cs.uiowa.edu/jones/voting/congress.html

31
32
33
34
35

You might also like