WELCOME.

Slides:



Advertisements
Similar presentations
RFID Access Control System March, 2003 Softrónica.
Advertisements

Model: TA
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
BIOMETRIC VOTING SYSTEM
e-Solutions for Access Control, CCTV, Attendance Monitoring, Personal Identification, Building Management and Fire Detection SECURITY & SAFETY IS ONE.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
FIT3105 Biometric based authentication and identity management
User Verification System by William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe Client Dr.Cha.
Marjie Rodrigues
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
VAP (Vote Any Place) System By Asif Pathan Lokesh Gowtham Lavanya.
OCR GCSE ICT DATA CAPTURE METHODS. LESSON OVERVIEW In this lesson you will learn about the various methods of capturing data.
Biometrics Investigating Facial and Fingerprint Scanning Technologies prepared by Group
Alternative Input Devices Part B There will be a test on this information (both part a & b).
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
SEMINAR TOPIC ON GLOBAL WIRELESS E-VOTING
“Fingerprint Recognition based on Silicon Chips”.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Biometrics Stephen Schmidt Brian Miller Devin Reid.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Biometrics.
By: Kirti Chawla. Definition Biometrics utilize ”something you are” to authenticate identification. This might include fingerprints, retina pattern, iris,
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
 Biometrics refers to the identification of humans by their characteristics or traits. Biometrics is used in computer science as a form of identification.
PRESENTATION ON BIOMETRICS
Biometric Technologies
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
BIOMETRICS.
Biometric Technology Jordan Seaton CIS 320 WKU. Essay Questions Which industries would find biometric technology the most useful? Why?
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
INDUSTRIAL-PROJECT ON “ Finger Print Based Time attendance system ” Presented By:- Shaikh Shahzad Adil Dyanand Lawty Waghmare Sachin Atul Tamsekar Amar.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
An Introduction to Biometrics
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
BIOMETRIC VOTING SYSTEM ( A novel way to vote ). INTRODUCTION :  It has always been an arduous task for the election commission to conduct free and fair.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
Biometrics Security in Banking Systems Image processing in ATM
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Input Devices.
Authentication.
FACE RECOGNITION TECHNOLOGY
Karley Biometrics We strive to bring you a high- quality product that will increase your productivity and the security of our nation.
Jenna Lutton February 26th, 2007
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Biometric Security Palm Vein Technology
Ian Ramsey C of E School GCSE ICT On the move Final steps.
Seminar Presentation on Biometrics
Biometric technology.
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Biometrics , Computer & Network Security 1
BY: Michael Etse and Maverick Fermill
Presentation transcript:

WELCOME

BIOMETRIC VOTINNG SYSTEM

INTRODUCTION What is BIOMETRICS? * Biometrics is the term given to the use of biological traits or behavioral characteristics to identify an individual. The traits may be fingerprints, hand geometry, facial geometry, retina patterns, voice recognition, and handwriting recognition. * we have used thumb impression for the purpose of voter identification or authentication. As the thumb impression of every individual is unique, it helps in maximizing the accuracy. A database is created containing the thumb impressions of all the voters in the constituency. Illegal votes and repetition of votes is checked for in this system. Hence if this system is employed the elections would be fair and free from rigging. Thanks to this system that conducting elections would no longer be a tedious and expensive job.

DESIGN * The design of the system consists of the following important parameters : Scanning-using DSP Processor. Searching –based on the principle of GOOGLE SEARCH. Networking-all the election booths are connected in a network. Data transfer –using telephone lines. * The only pre-requisite for the use of this finger print scanner is a personal identification card. We hope that this system proves to be efficient and enables the people to be smarter in choosing their leaders.

SUMMARY OF DESIGN DSP CHIP HARD DISK SDRAM TRANSMITTER A/D CONVERTER DEMULTIPLEXER BIOMETRIC SCANNER Option Image Telephone Line DATABASE PARALLEL INTERFACING SERIAL INTERFACING

DESCRIPTION OF VOTING MACHINE DISPLAY UNIT 1-PARTY A 2-PARTY B KEYPAD 1 2 3 4 5 6 7 8 9 FINGER PRINT SCANNER LED DISPLAY FINGER PRINT SCANNER EXTRACTION OF THUMB IMPRESSION FEATURE EXTRACTION AND COMPARISON VERIFICATION OF VOTERS PROCESSING AND COUNTING REJECTION OF VOTER REPETITION FORMATION OF NETWORK Front view of the voting machine

FINGER PRINT SCANNER FINGER PRINT SENSOR: This scans the thumb impression and proceeds the data in analog form to the next stage. A/D CONVERTER: This converts analog data to digital form and transfers to processor. FLASH ROM: This stores data temporarily in DSP processor until it is transferred to HOST. DSP CHIP: It helps in receiving and processing data and further connected to USB port. USB PORT: It establishes a link between DSP processor and memory.

EXTRACTION OF THUMB IMPRESSION DSP CHIP FINGER PRINT SENSOR FLASH ROM A/D CONVERTER TRANSMITTER USB PORT MEMORY POWER OUTPUT PORT

FEATURE EXTRACTION AND COMPARISON This includes Scanning and Processing , Transfer of Data to Hard Disk . FINGER PRINT IMAGE FROM SCANNER PRE-PROCESSING FEATURE EXTRACTION REJECT THE OPTION MATCHING ACCEPT THE OPTION DATABASE NO YES

VERIFICATION OF VOTERS VERIFICATION OF VOTES DATABASE SEARCH FOR THE FEATURES STORED ON THE VOTER BELONG TO SAME CONSTITUENCY PROCEED DO NOT BELONG TO CONSTITUENCY REJECT

PROCESSING&COUNTING SELECT AN OPTION PROCEED IS THE OPTION VALID SYMBOLS OF PARTIES DISPLAYED SELECT AN OPTION IS THE OPTION VALID RESTART INCREMENT VOTE COUNT OF THE PARTICULAR PARTY SELECTED NO YES

REJECTION OF VOTER REPETITION CHECKING FOR MULTIPLE VOTES OR ACCESSING THE GIVEN VOTE LIVE SCAN OF FINGER PRINTS VERIFICATION OF ACCEPTIBILITY CHECK IF THE VOTE IS REPEATED REJECT AND STORE IDENTITY OF VOTERS NOTIFICATION OF VOTERS NAME TO POLICE STATION ACCEPT THE VOTE YES NO

FORMATION OF NETWORK

ADVANTAGES : The system is highly reliable and secure. In the long run the maintenance cost is very less when compared to the present systems. Illegal practices like rigging in elections can be checked for. It is possible to get instantaneous results and with high accuracy.

CONCLUSION Thus the advent of this biometric thumb impression voting system would enable hosting of fair elections in India. This will preclude the illegal practices like rigging. The citizen can be sure that they alone can choose their leaders, exercising their right of democracy.

queries

Presented by: A.Siva Ganesh P.Sudhir Y.Venkatesh.