BIOMETRIC VOTING SYSTEM ( A novel way to vote ). INTRODUCTION :  It has always been an arduous task for the election commission to conduct free and fair.

Slides:



Advertisements
Similar presentations
Network II.5 simulator ..
Advertisements

pan Testing Centers I-9 Training
E – Electors P – Photo I - Identity C - Card. EPIC Identity card issued by ERO under rule 28, RER is Permanent document for an elector Used at time of.
Introduction to Computers Lecture By K. Ezirim. What is a Computer? An electronic device –Desktops, Notebooks, Mobile Devices, Calculators etc. Require.
ICT IN THE ELECTORAL PROCESS: LESSONS LEARNED Susanne Caarls International Electoral Affairs Symposium May 2012.
BIOMETRIC VOTING SYSTEM
Automatic Fingerprint Acquisition System An example employing Hardware-Software Co- Design - Komal kasat Nalini Kumar Gaurav Chitroda.
e-Solutions for Access Control, CCTV, Attendance Monitoring, Personal Identification, Building Management and Fire Detection SECURITY & SAFETY IS ONE.
Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
AUTOMATIC DATA CAPTURE  a term to describe technologies which aim to immediately identify data with 100 percent accuracy.
DAKNET Presented By: rreema.
TEAM-1 JACKIE ABBAZIO SASHA PEREZ DENISE SILVA ROBERT TESORIERO Face Recognition Systems.
Parts of a Computer.
History of computers What your computer can do depends upon two things: the hardware your computer has, and the software that can be run on your computer. 
Karthiknathan Srinivasan Sanchit Aggarwal
 What’s a Computer? What’s a Computer?  Characteristics of a Computer Characteristics of a Computer  Evolution of Computers Evolution of Computers.
VAP (Vote Any Place) System By Asif Pathan Lokesh Gowtham Lavanya.
Introduction to Computers Personal Computing 10. What is a computer? Electronic device Performs instructions in a program Performs four functions –Accepts.
OCR GCSE ICT DATA CAPTURE METHODS. LESSON OVERVIEW In this lesson you will learn about the various methods of capturing data.
Topics Covered: Data preparation Data preparation Data capturing Data capturing Data verification and validation Data verification and validation Data.
Fayoum University Faculty of Engineering Electrical Engineering Department E-voting system Using Smart Card Under the supervision Of: Dr. Magdy Amer.
Fundamental Principles of Computer Systems Unit B, Objective 3.01 & 3.02.
Input/OUTPUT [I/O Module structure].
2-3 note. 2 Peripheral Devices “Peripheral devices” are hardware plugged into ports or connected to a computer wirelessly. These devices can be for input,
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
Introduction to Computers Business Technology Essentials.
THIS IS With Host... Your Database Vocabulary Spreadsheet Vocabulary Social & Ethical Issues Bonus Vocabulary Area of Impact Bonus.
Management Information Systems MS Access MS Access is an application software that facilitates us to create Database Management Systems (DBMS)
Jeopardy K201 – The Computer In Business Exam Review 2 Manjit Trehan.
SEMINAR TOPIC ON GLOBAL WIRELESS E-VOTING
“Fingerprint Recognition based on Silicon Chips”.
MS Access 2007 Management Information Systems 1. Overview 2  What is MS Access?  Access Terminology  Access Window  Database Window  Create New Database.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Organizing Data and Information. What is Data?? Numbers, characters, images, or other method of recording, in a form which can be assessed by a human.
COMPUTER ARCHITECTURE. Recommended Text 1Computer Organization and Architecture by William Stallings 2Structured Computer Organisation Andrew S. Tanenbaum.
ITGS Databases.
Biometrics Authentication Technology
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
WELCOME.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
COM111 Introduction to Computer Applications
Input Criminal Law (Forensic Procedures) Amendment Bill (B2-2009) 3 NOVEMBER 2009 Caring, compassionate and responsive.
The Polling Process in Uganda.. Learning outcome (LO) The ability to explain the importance of voting, Identify polling day officials and their duties,
Discovering Computers 2008 Fundamentals Fourth Edition Discovering Computers 2008 Fundamentals Fourth Edition Chapter 1 Introduction to Computers.
Power Point Vocabulary Suarez, Alejandra Per. 6 10/12/13.
Association of World Election Bodies Contents ICT–based Election Management Voter Registration and Identification Voting and Counting Examples.
IT infrastructure Hardware. What is IT infrastructre It is the physical facilities, services and management that support computing in the organization.
EKT 314/4 WEEK 9 : CHAPTER 4 DATA ACQUISITION AND CONVERSION ELECTRONIC INSTRUMENTATION.
FINGERPRINT BASED ACCESS CONTROL SECURITY SYSTEM SPONSERED BY : PINACLE SOLUTIONS GROUP MEMBERS : 1.PRATIBHA DESAI 2.MANISHA BOLAGE 3.SEEMA KAKADE GROUP.
ITT_04101 COMPUTER APPLICATIONS Gaper M CIT
Component 8/Unit 1bHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 1b Elements of a Typical.
What is electronic voting An electronic voting (e-voting) system is a voting system in which the election data is recorded, stored and processed primarily.
RECORDS MANAGEMENT Judith Read and Mary Lea Ginn Chapter 12 Electronic Media and Image Records 1 © 2016 Cengage Learning ®. May not be scanned, copied.
Section 3 Computing with confidence. The purpose of this section The purpose of this section is to develop your skills to achieve two goals: 1-Becoming.
Five Components of a Computer Input Device – keyboard, scanner, PDA/stylus, digital camera, mouse, MP3 player, fax machine, microphone Storage Device –
WHAT IS A NETWORK TYPES OF NETWORK NETWORK HARDWARE
COSEC Visitor Management
I/O SYSTEMS MANAGEMENT Krishna Kumar Ahirwar ( )
Assured Minimum Facilities
Authentication.
Technology Literacy Hardware.
Electronic Records Management Program
FACE RECOGNITION TECHNOLOGY
GO! with Microsoft Access 2016
DEPARTMENT OF INSTRUMENTATION AND CONTROL
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Biometric Security Palm Vein Technology
Welcome To Money pad November 23, 2018 Sample footer.
Biometric technology.
Presentation transcript:

BIOMETRIC VOTING SYSTEM ( A novel way to vote )

INTRODUCTION :  It has always been an arduous task for the election commission to conduct free and fair polls in our country, the largest democracy in the world.  Crores of rupees have been spent on this to make sure that the elections are riot free.  This paper aims to present a new voting system employing biometrics in order to avoid rigging and to enhance the accuracy and speed of the process.  The system uses thumb impression for voter identification as we know that the thumb impression of every human being has a unique pattern.

BRIEF OVERVIEW :  As a pre-poll procedure, a database consisting of the thumb impressions of all the eligible voters in a constituency is created. During elections, the thumb impression of a voter is entered as input to the system.  This is then compared with the available records in the database. If the particular pattern matches with any one in the available record, access to cast a vote is granted. But in case the pattern doesn’t match with the records of the database or in case of repetition, access to cast a vote is denied or the vote gets rejected.  Also, the police station nearby to the election poll booth is informed about the identity of the imposter.

DESIGN SPECIFICATIONS & COMPONENTS The design of the system consists of the following important parameters : The design of the system consists of the following important parameters : 1.Scanning- using DSP Processor 1.Scanning- using DSP Processor 2. Searching- based on the principle of GOOGLE SEARCH 2. Searching- based on the principle of GOOGLE SEARCH 3.Networking- all the election booths are connected in a network 3.Networking- all the election booths are connected in a network 4. Data transfer– using telephone lines.. 4. Data transfer– using telephone lines.. The only pre-requisite for the use of this finger print scanner is a personal identification card. The only pre-requisite for the use of this finger print scanner is a personal identification card.

BLOCK DIAGRAM FOR THE WHOLE PROCESS IN BRIEF: ACCEPTING IMAGEACCEPTING OPTION PROCESSING OF IMAGE AND OPTION COMPARISON OF IMAGE WITH DATABASE IF IMAGE DOESN’T MATCH IF IMAGE MATCHES OPTION IS REJECTED OPTION IS TRANSFERRED AS COUNT AFTER TOTAL COUNT COUNT OF EACH PARTY IS TRANSFERRED TO HOST THROUGH TELEPHONE LINE SUMS UP COUNT OF SIMILAR PARTIES AND DATA IS ARRANGED IN AN ORDER

FINGER PRINT SCANNER: The finger print scanner consists of the following parts: 1.FINGER PRINT SENSOR: This is used to scan the thumb impression. The data obtained from this is analog in nature. This is transferred to the A/D converter for further processing. 1.FINGER PRINT SENSOR: This is used to scan the thumb impression. The data obtained from this is analog in nature. This is transferred to the A/D converter for further processing. 2. A/D CONVERTER: This is used to convert the analog data from the SENSOR into the digital data and transfer it to the processor. 2. A/D CONVERTER: This is used to convert the analog data from the SENSOR into the digital data and transfer it to the processor. 3. FLASH ROM: This is for the storage of the data temporarily in the DSP processor. This will work until the data is transferred to the main memory of the HOST. 3. FLASH ROM: This is for the storage of the data temporarily in the DSP processor. This will work until the data is transferred to the main memory of the HOST. 4. DSP CHIP: This is used to receive the data and process it. This is connected to the USB port for further transfer of the data. 4. DSP CHIP: This is used to receive the data and process it. This is connected to the USB port for further transfer of the data. 5. USB PORT: The sole purpose of the USB port is to establish a communication link between the DSP processor and the MEMORY (DATABASE). 5. USB PORT: The sole purpose of the USB port is to establish a communication link between the DSP processor and the MEMORY (DATABASE).

EXTRACTION OF THUMB IMPRESSION : 1. The next step in the process is the extraction of the thumb impression from the memory. The features of the finger print are stored in the form of pixels. 1. The next step in the process is the extraction of the thumb impression from the memory. The features of the finger print are stored in the form of pixels. 2. This is further sent for pattern matching where the finger print is then compared with the records in the database. If the pattern matches with any one of he records then the vote is accepted. 2. This is further sent for pattern matching where the finger print is then compared with the records in the database. If the pattern matches with any one of he records then the vote is accepted. 3. If the feature doesn’t match with any one of the finger prints stored in the data base then the vote is rejected. 3. If the feature doesn’t match with any one of the finger prints stored in the data base then the vote is rejected.

BLOCK DIAGRAM : FINGER PRINT IMAGE FROM SCANNER PRE-PROCESSING FEATURE EXTRACTION REJECT THE OPTION MATCHING ACCEPT THE OPTION DATABASE NOYES

BLOCK DIAGRAMS FOR VARIOUS PROCESSES VERIFICATION OF VOTERS : VERIFICATION OF VOTES DATABASE SEARCH FOR THE FEATURES STORED ON THE VOTER BELONG TO SAME CONSTITUENCY PROCEED DO NOT BELONG TO CONSTITUENCY REJECT

REJECTION OF VOTER REPETITION CHECKING FOR MULTIPLE VOTES OR ACCESSING THE GIVEN VOTE LIVE SCAN OF FINGER PRINTS VERIFICATION OF ACCEPTIBILITY CHECK IF THE VOTE IS REPEATED REJECT AND STORE IDENTITY OF VOTERS NOTIFICATION OF VOTERS NAME TO POLICE STATION ACCEPT THE VOTE YES NO

FORMATION OF THE NETWORK The voting machines present in a town are interlinked in the form of a highly secure LAN. This network is formed with the help of the telephone lines. All the data collected in the voting system is first stored in the voting machine itself. Then it is sent to the HOST which will be located at headquarters of the town. All the data is collected there and it is transferred to the main HOST. All the data collected in the voting system is first stored in the voting machine itself. Then it is sent to the HOST which will be located at headquarters of the town. All the data is collected there and it is transferred to the main HOST. The purpose of saving the data in the voting machine at first is that even if there is loss of data by some means then it can be easily retrieved from the machine again. In this way all the things are bought into a network.

ADVANTAGES : The system is highly reliable and secure. The system is highly reliable and secure. In the long run the maintenance cost is very less when compared to the present systems. In the long run the maintenance cost is very less when compared to the present systems. Illegal practices like rigging in elections can be checked for. Illegal practices like rigging in elections can be checked for. It is possible to get instantaneous results and with high accuracy. It is possible to get instantaneous results and with high accuracy.

CONCLUSION: Thus the advent of this biometric thumb impression voting system would enable hosting of fair elections in India. This will preclude the illegal practices like rigging. The citizens can be sure that they alone can choose their leaders, thus exercising their right in the democracy.

THANK YOU THANK YOU