a new method of thumb print based design of electronic ... · a new method of thumb print based...
TRANSCRIPT
IJCSIET--International Journal of Computer Science information and Engg., Technologies ISSN 2277-4408 || 01082014-024
IJCSIET-ISSUE4-VOLUME2-SERIES4 Page 1
A New method of Thumb print based design of Electronic
Voting Machine
Vemula Venkatesh #1, MD Khaja Mohinoddin #2, P. Ravinder#3, Ramesh Kumar#4, R. Surender Rajan#5
M-Tech Students of Jagruthi Institute of Engineering and Technology, T.S, India*1.*2,*3
Professor of Department ECE, Jagruthi Institute of Engineering and Technology, T.S, India*4.
Associated Professor of Head of Department ECE, Jagruthi Institute of Engineering and
Technology, T.S, India*5.
Abstract
In this paper we propose a completely automated E- voting system. Authentication is the
bigger concern at the time of voting. Recognizing the need of authentication, we developed an automated system with user friendly access using finger print sensor module. The sensor is a
solid-state fingerprint sensor that reliably captures fingerprint information and was designed to
integrate into devices for improved authentication and convenience. It provides a reliable, quick and user-friendly alternative to passwords and even for PIN's and other forms of user
authentication. We make use of this device to construct an E-voting machine. Whenever a person
puts his finger over the finger print module, if that is authenticated, the system will ask him to
select the respective contestant. After that is done, his vote will be counted. When a person has casted his vote, the corresponding officer presses a button confirming that the particular finger
print has casted the vote. So in case if the same person tries to caste again, it will not allow that.
The number of votes each contestant got is displayed on PC.
Index terms: Finger print system, LCD, selection buttons.
I. INTRODUCTION:
Biometrics refers to metrics related to
human characteristics and traits.
Biometrics authentication is used in
computer science as a form of
identification and access control. It is
also used to identify individuals in
groups that are under surveillance.
Biometric identifiers are very distinctive,
and also have measurable characteristics
that are used to label and describe every
biometric individual. Biometric
identifiers are divided or categorized as
physiological versus behavioral
characteristics. The Physiological
characteristics are mostly related to the
shape of the body like examples palm
veins, face recognition, DNA, palm
print, hand geometry, iris recognition,
retina and odour/scent include, but are
not limited to fingerprint. The second
category is Behavioral characteristics
which are completely related to the
pattern of behavior of a person, gait, and
voice including but not limited to typing
rhythm. Some other researchers have
coined a term as behaviometrics which
describes the latter class of biometrics.
In past or earlier days more traditional
means of security access control were
used. These systems include token-based
identification systems, such as a driver's
license or passport, or any kind of
IJCSIET--International Journal of Computer Science information and Engg., Technologies ISSN 2277-4408 || 01082014-024
IJCSIET-ISSUE4-VOLUME2-SERIES4 Page 2
knowledge-based identification systems,
such as a password or any personal
identification number. Subsequent
biometric identifiers are unique to
differentiate the individuals so the
identification process is simpler and
easier, than compared to prior methods.
They are more reliable in verifying
identity than token and knowledge-based
appropriate barely methods. Although,
these features of collection of biometric
identifiers may raise privacy concerns
about the ultimate use of this
information
Finger print identification or
corroboration device has been used most
popularly among all the identification
devices by cause of its ease in
acquisition, and also in view of
availability of numerous sources for its
data collection. The basics of this
identification process comes from
“Galton points” – a certain
characteristics defined by Sir Francis
Galton.
II. RELATED WORK:
A method of voting system or electoral
system is a defined as, by which voters
can make a choice between options,
often in an election. The voting system
accomplishes the rules to ensure valid
voting, and also how votes are counted
and to aggregate the final result. Most
common voting systems are based on the
majority rule, a proportional
representation voting with a number of
variations and methods such as first-
past-the-post or preferential voting. The
study of conventionally defined voting
systems which is named as social choice
theory or voting theory, consists of a
subfield with political science,
economics, or mathematics.
In the Proposed system we used Finger
print sensor which is a solid-state
fingerprint sensor that reliably captures
the fingerprint information. It is
designed to incorporate for different
devices to provide an improved
authentication and also for the purpose
of convenience. This sensor module
provides a reliable, quick and user-
friendly alternative to passwords, along
with PIN's and other forms of user
authentication details.
Aforementioned identification process
using finger print will change slightly
between different products and systems.
These Standard systems are comprised
of a sensor for scanning a fingerprint and
a processor which stores the fingerprint
database and software which compares
and also matches the fingerprint to the
predefined database. Within the
database, a fingerprint is consistently
matched to a reference number, or any
PIN number which is then again
matched to a person's name or account.
The primary information about
fingerprint is that, it is unique for each
and every person. O it is for even a twin
brother will not have the same
fingerprints. Hence each fingerprint is
used to store a unique identifiable piece
of data base or any information. The
uniqueness in each fingerprint is due to
the peculiar genetic code of DNA which
is present in every person. This code
causes the formation of a different
pattern of our fingerprints.
A single fingerprint consists of
ridges and valleys. These ridges and
valleys both together provide friction for
the skin. The primary identification of
the skin is based upon the minutiae,
which absolutely is the location and
IJCSIET--International Journal of Computer Science information and Engg., Technologies ISSN 2277-4408 || 01082014-024
IJCSIET-ISSUE4-VOLUME2-SERIES4 Page 3
direction of the ridge endings and splits
along a ridge path.
Fig.1 Finger print image
The other characteristics of the
finger print are shown in the above
image. These characteristics may also
helpful during the process of minutiae
for extraction. The unique information
used for the identification process also
includes the flow of the friction ridges,
the sequence and the presence/absence
of the individual friction ridge path
features.
II. PROPOSED METHODOLOGY:
In this paper we are presented a
biometric finger print based voting
system. We make use of this device to
construct voting machine. Whenever a
person puts his finger over the finger
print module, if that is authenticated, the
system will ask him to select the
respective contestant. After that is done,
his vote will be counted. When a person
has casted his vote, the corresponding
officer presses a button confirming that
the particular finger print has casted the
vote. So in case if the same person tries
to caste again, it will not allow that. The
number of votes each contestant got is
displayed on LCD.
The present system uses an
onboard mini computer named as PIC
microcontroller which consists of
number of input and output ports. The
input and output port of the micro
controller are interfaced with different
input and output modules depending on
the requirements. The current system
uses finger print module, selection
buttons as input to the microcontroller
and the LCD and buzzer as output
modules. In other words micro controller
acts as a communication medium for all
the modules involved in the project. The
system also performs an health check
indication of microcontroller using LED
indicators.
The device also consists of LCD
which displays the required information
and also alerts the user when any wrong
finger authentication was detected suing
buzzer alarm.
Finger print based Voting Machine
PIC
Micro
controller
Finger
module
Buzzer
DriverBuzzer
LED
Indicators
Crystal
Oscillator
Reset
Button
Control
Buttons
LCD
DriverLCD
Filter
O/P
5V
DC
I/O
230V
Transformer Rectifier Regulator
Regulated power supply
Fig 2.Block diagram of finger print based
voting system
a. Fingerprint:
IJCSIET--International Journal of Computer Science information and Engg., Technologies ISSN 2277-4408 || 01082014-024
IJCSIET-ISSUE4-VOLUME2-SERIES4 Page 4
The present system uses finger
print module and the Fingerprint
processing includes two parts:
fingerprint enrollment and fingerprint
matching (the matching can be 1:1 or
1:N).When enrolling, the finger print
the user needs to enter the finger
twice. The system will process the
twice given finger images, and
generates a template of the finger based
on processing results. And this template
is stored. When matching, any finger
prints the user enters the finger through
optical sensor and system will generate
a template of the finger and compare it
with templates of the fingers stored in
library. For 1:1 matching, system will
compare the live finger with specific
template designated in the Module; for
1: N matching, or searching, system
will search the whole finger
library for the matching finger. In
both circumstances, the system will
provide the results of matching
either success or failure.
Fig.3. Finger print module
b. Microcontroller
The microcontroller used in
the proposed system is PIC which stands
for Peripheral Interface Controller given
by Microchip Technology to identify its
single-chip microcontrollers. PIC
microcontrollers are very successful in
8-bit microcontrollers. This project
makes use of an onboard mini computer,
which is usually termed as micro
controller. It acts as heart of the project.
This onboard computer can efficiently
communicate with the output and input
modules which are being used. The
controller contains some internal
memory to store the program code. This
memory is also used to dump some set
of assembly instructions into the
controller and these help for the
functioning of the controller.
The crystal oscillator speed that
can be connected to the PIC
microcontroller ranges from up to
20Mhz. Using the CCS C compiler
usually 20Mhz oscillator will be used.
The cost of the microcontroller is also
very cheaper. The 20 MHz crystal
oscillator should be connected with
about 22pF capacitor. There are 5
input/output ports on PIC
microcontroller namely port A port B
port C port D and port E. Every single
port has different based functionality.
Most of them can be used as general I/O
ports. The microcontroller uses Harvard
architecture which separates both
Program and Variable (data) memory
interface. This facilitates fetching of an
instruction and the operation on
data/accessing of variables
simultaneously.
Fig4. Microcontroller
c. LCD Display module:
One of the most common devices
attached to a micro controller is an LCD
display. A liquid crystal display is
IJCSIET--International Journal of Computer Science information and Engg., Technologies ISSN 2277-4408 || 01082014-024
IJCSIET-ISSUE4-VOLUME2-SERIES4 Page 5
special thin flat panels that can let light
go through it, or can block the light.
Some of the most common LCD’s
connected to the many microcontrollers
are 16x2 and 20x2 LCD displays. It
means that 16 characters per line by 2
lines were displayed and 20 characters
per line by 2 lines were displayed,
respectively. Liquid crystal displays are
usually abbreviated as LCD’s. These
displays are often used in battery-
powered devices, such as digital
watches, since they require very
little amount of electricity consumption.
Fig.5. LCD module
c. Buzzer
The paper related to finger based voting
system uses a buzzer module for audible
alerts when any wrong finger print was
detected. The buzzer or beeper is an
audio based signaling device. It is
mainly designed as mechanical,
electromechanical, or piezoelectric.
There are many typical uses of buzzers
and beepers which include alarm
devices, timers and also based on
confirmation of user inputs such as a
mouse click or keystroke.
Fig.6. Buzzer
IV CONCLUSION:
The existing voting system is an
Integrating feature of all the hardware
components been used and developed in
it. The Presence of each and every
module has been reasoned out and
placed very carefully. Hence the
contributing to the best working unit for
a secured voting system has been
designed perfectly. Secondly, using
highly advanced IC’s like finger print
module, biometric technology with the
help of growing technology, the project
has been successfully implemented with
a unique idea. Thus the project has been
successfully designed and tested.
The project “Finger
print based Voting Machine” was
designed to construct an automated
voting machine using a finger print
module and push buttons. The finger
print module captures fingerprint
information through which the user can
be identified and his vote will be taken
into account. The required information
was displayed on LCD.
This project can be extended using a
GSM module and 3G technology. GSM
intimates the bank authorities and the
owner of the locker if the password is
entered wrongly for 3 times
continuously and 3G technology is used
to have a photograph of the person who
entered wrong password, which helps a
lot in security issues
IJCSIET--International Journal of Computer Science information and Engg., Technologies ISSN 2277-4408 || 01082014-024
IJCSIET-ISSUE4-VOLUME2-SERIES4 Page 6
REFERENCES
[1]. Jain, A et al (1997) "On-Line Fingerprint Verification." IEEE Transactions on Pattern Analysis and Machine Intelligence VOL. 19, No. 4, 1997: 302-
305. [2] Electronic Voting (2009), Available from http://www.hwskioskprinter. com/terminology_electronicvoting.pdf [3] T Kohno et al.(2004), “Analysis of Electronic Voting”, IEEE Symposium on Privacy and Security. [4] D Deville et al(2003), “Smart Card Operating system: Past, Present and Future” .Proceedings of
Fifth USENIX/NordU Conference, Vaster°as, Sweden [5] Nalini K. Ratha, “Enhancing security and privacy in biometrics-based authentication systems,” IBM Systems Journal, vol. 40, no. 3, pp. 614-634, 2001. [6] A. Abhyankar, S. Schuckers, “Fingerprint liveness detection using local ridge frequencies and multiresolution texture analysis techniques,” in Proc. International Conference On Image Processing, pp.
321-324, 2006. [7] Sujan Parthasaradhi, Reza Derakhshani, L Hornak, S. A. C. Schuckers, “Time-series detection of perspiration as a liveness test in fingerprint scanners,” IEEE Transactions on Systems, Man, and Cybernetics-Part C: Applications and Reviews, vol. 35, no. 3, pp. 335-343, August 2005. [8] M.Kaur, M. Singh, A. Girdhar, and P. S. Sandhu,
"Fingerprint verification system using minutiae extraction technique" . World Academy of Science, Engineering and Technology 46. pp 497-502, 2008 [9].www.wikipedia.com
[10].www.allaboutcircuits.com
[11].www.microchip.com
[12].www.howstuffworks.com