Voting System Report 2
Voting System Report 2
RECOGNITION
A PROJECT REPORT
SUBMITTED BY
DHAKSHAYANI.R (710716205009)
NIVETHA.M (710716205027)
SHURUTHI.S (710716205045)
BACHELOR OF TECHNOLOGY
IN
INFORMATION TECHNOLOGY
BONAFIDE CERTIFICATE
Certified that this project report “BIOMETRIC VOTING SYSTEM USING
FACE RECOGNITION” is the bonafide work of “DHAKSHAYANI. R,
NIVETHA. M, SHRUTHI. S” who carried out the project work under my
supervision.
SIGNATURE SIGNATURE
_____________ ______________
We express our hearty thanks to our project guide, Mr. T. Vijaya kumar,
Assistant Professor, Department of Information Technology, for his valuable
guidance and timely help for completing our project.
We express our sincere thanks to our project coordinator, Mr. D.PREM
KUMAR, Assistant professor, Department of Information Technology, for his
support in developing our project.
COMPUTING 3
SYSTEM 3
DETECTION 3
3. SYSTEM DESIGN 5
4. SYSTEM ANALYSIS 7
FRAMEWORK 26
SPECIFICATION 33
.NET 35
DISTRUCTORS 36
5.12. OVERLOADING 38
5.13. MULTITHREADING 39
5.14. STRUCTURED EXCEPTION
HANDLING 40
5.14.2. OBJECTIVES OF
.NET FRAMEWORK 41
6. MODULE DESCRIPTION 42
7.1. CODING 37
9. REFERENCES 42
CHAPTER 1
INTRODUCTION
Now, in order to cast a voter the voter does not click on the
candidate or party of her choice but enters the corresponding code;
Trusted Computing, the idea is to use an appropriate security
architecture based on a security kernel and on Trusted Computing
elements. Such a solution is the only one that could efficiently overcome
malicious software on the voting casting device as well as potential
malicious voters installing malware on purpose on their device.
However, currently, there are still open problems with Trusted
computing itself and it is not wide-spread enough; Individual
Verifiability, the idea is that you use one software to prepare a voter and
a second one to verify that the vote has been properly prepared
(encrypted).
Plus, you can also do the verification with an offline tool In this
research, we proposed an authentication technique using a Face
Detection and Recognition system in Face Biometric based to achieve
the rules of Supreme Electoral Council as follow: Only eligible persons
vote, No person gets to vote more than once, the vote is secret, and each
(correctly cast) vote gets counted and to achieve the aims of Face
Biometric based as follow: increase participation, lower the costs of
running elections, and improve the accuracy of results. In general, an
FDR system starts by Interfacing with an image source for grabbing
facial images, Automatic detection or manual selection of human face
may be found within the scene, Manipulate (create, add, delete) a
database of faces, Launching the recognition process by comparing the
face previously detected with the database's faces.
The frame contents in the video stream are always changing, the
original detection on each frame will bring a lot of unnecessary
computation in the cascade classification. We are inspired that the
subwindow adaptive mechanism that adjusts the subwindow parameter
at the runtime according to the frame contents can reduce the data
amounts for the cascade classification. If the hardware architecture can
support this mechanism, the cascaded classification speed will be
improved.
2.4 Real-time face-priority auto focus for digital and cell-phone cameras - M.
Rahman and N. Kehtarnavaz - 2008
Matc
h the y chec ye Eligible to
imag es k s vote
e
no n
o Display
Not Possible to Vote the Vote
LEVEL – 0
Candidate
VOTING SYSTEM USING
FACE RECOGNITION Voter
LEVEL – 1
Details Stored
Level 3
3.3 Use case diagram:
Voter Registration
Face Recognition
Candidate
Registration
Counting and
Resulting
CHAPTER 4
SYSTEM ANALYSIS
4.1 Existing system
Ram : 4 GB
Features Of .Net
MANAGED CODE
The code that targets .NET, and which contains certain extra
Information - “metadata” - to describe itself. Whilst both managed and
unmanaged code can run in the runtime, only managed code contains the
information that allows the CLR to guarantee, for instance, safe
execution and interoperability.
MANAGED DATA
The CLR uses something called the Common Type System (CTS)
to strictly enforce type-safety. This ensures that all classes are
compatible with each other, by describing types in a common way. CTS
define how types work within the runtime, which enables types in one
language to interoperate with types in another language, including cross-
language exception handling. As well as ensuring that types are only
used in appropriate ways, the runtime also ensures that code doesn’t
attempt to access memory that hasn’t been allocated to it.
FORTRAN
COBOL
Eiffel
.Net Framework
GARBAGE COLLECTION
OVERLOADING
MULTITHREADING:
CHAPTER 6
MODULES
After fill detail in page then give submit camera is recognize voter
face in different way.
Admin maintain the detail of both voter list and candidate list.
Check only authenticated person can cast vote.
namespace MultiFaceRec
{
public partial class FrmVoterRegistration : Form
{
String S = "";
CodeClass Ws = new CodeClass();
public FrmVoterRegistration()
{
InitializeComponent();
}
Photo.Image = Image.FromFile("Default.png");
VIDPhoto.Image = Image.FromFile("Default.png");
LblPhotoPath.Text = "";
LblVIDPath.Text = "";
}
if (Str.Trim() != "")
{
MessageBox.Show(Str, "Cannot Proceed");
return;
}
// PHOTO
string PPath = "";
if ((LblPhotoPath.Text.Trim() == ""))
{
PPath = "";
}
else
{
PPath = "Photo\\" + TxtUN.Text + ".jpg";
if ((System.IO.File.Exists(PPath) == true))
{
System.IO.File.Delete(PPath);
}
System.IO.File.Copy(LblPhotoPath.Text, PPath);
}
// Voter-ID
string vPPath = "";
if ((LblVIDPath.Text.Trim() == ""))
{
vPPath = "";
}
else
{
vPPath = "VoterID\\" + TxtUN.Text + ".jpg";
if ((System.IO.File.Exists(vPPath) == true))
{
System.IO.File.Delete(vPPath);
}
System.IO.File.Copy(LblVIDPath.Text, vPPath);
}
S="InsertIntoRegisterValues(@UID,@Name,@Age,@Mail,
@Mb,@Address,@UN,@Pwd,@Photo,@VPhoto,0,1)";
Cmd = new SqlCommand(S, Cn);
Cmd.Parameters.Add(newSqlParameter("@UID",TxtVID.Text));
Cmd.Parameters.Add(newSqlParameter("@Name",TxtName.Text));
Cmd.Parameters.Add(newSqlParameter("@Age",TxtAge.Text));
Cmd.Parameters.Add(newSqlParameter("@Mail",TxtMail.Text));
Cmd.Parameters.Add(new SqlParameter("@Mb", TxtMb.Text));
Cmd.Parameters.Add(newSqlParameter("@Address",TxtAddr.Text));
Cmd.Parameters.Add(new SqlParameter("@UN", TxtUN.Text));
Cmd.Parameters.Add(newSqlParameter("@Pwd",TxtPwd.Text));
Cmd.Parameters.Add(newSqlParameter("@Photo",LblPhotoPath.Text));
Cmd.Parameters.Add(newSqlParameter("@VPhoto",LblVIDPath
.Text))
Cmd.ExecuteNonQuery();
Cmd.Parameters.Clear();
Cmd.Dispose();
Cn.Close();
Clear();
}
namespace MultiFaceRec
{
public partial class FrmBioVoting : Form
{
String S = "";
CodeClass Ws = new CodeClass();
public FrmBioVoting()
{
InitializeComponent();
}
CHAPTER 8
CONCLUSION
This voting system helps everybody to cast their votes without any
problem. Voting application will increase the percentage of voting.
Manual counting is not required. So by this we will get the very
prominent, clear and fast result. By using this newly developed system
we can overcome many problems of existing system. This system is
more efficient than the existing one. Application voting allows the voter
to vote from anywhere in his state or out of state
CHAPTER 9
REFERENCES
[1] Anandaraj S., Anish R., and Devakumar P.V. (2015), ‘Secured
electronic voting machine using biometric’, IEEE International
conference on innovations in information, embedded and
communication systems.
[2] Bishop M., and Frincke D. (2007), ‘Achieving learning objectives
through e-voting case studies’, IEEE Security& Privacy, Vol. 5, No. 1,
pp.53–56.
[3] Herb Deutsch (2005), ‘Public opinion’s influence on voting system
technology’, IEEE Standards Association.
[4] Hongyu Zhang., Qianzi You, and Junxing Zhang (2015), ‘A
lightweight electronic voting scheme based on blind signature and
kerberos mechanisms’, International conference on advanced networks
and telecommuncations systems,pp.978-4799.
[5] Jambhulkar S.M., Jagdish B. Chakole, and Praful. R. Pardhi (2014),
‘A Secure approach for web based internet voting system using multiple
encryption’, IEEE International conference on electronic systems, signal
processing and computing technologies.
[6] Kausal malladi, Srivatsan sridharan, Jayprakash L.T. (2014),
‘Architecting a large-scale ubiquitous e-voting solution for conducting
government elections’, IEEE International conference on advances in
electronics, computers and communications.
[7] Kohno. T et al., (2004), ‘Analysis of an electronic voting system’,
Proc. 2004IEEE symposium security and privacy, pp. 27–40.
[8] Mohammad Malkawi., Omar Al-Jarrah., Thaier S. Hayajneh.,
Munzer S. Ebaid, and Mohammed Khasawneh (2008), ‘A biometric-
secure e-Voting system for election processes’, IEEE symposium on
mechatronics and its applicationsMay 27-29.
[9] Mona F.M.Mursi., Ghazy M.R.Assassa., Ahmed A. AbdelHafez, and
Kareem M. AboSamra (2015), ‘A secure and auditable
cryptographicbased e-voting scheme’, International conference on
mathematics and computers in sciences and in industry, IEEE.
[10] Nazatul Haque Sultan., Ferdous Ahmed Barbhuiya, and Nityananda
sarma (2015), ‘Pair voting: A secure online voting scheme using pairing
based cryptography and fuzzy extractor’, IEEE International conference
on advanced networks and telecommuncations systems.
[11] Nathanael Paul and Andrew S. Tanenbaum (2009), ‘Trustworthy
Voting: From Machine to System’, IEEE Journal of Computer Society.
[12] Purushothama B.R., and Alwyn R. Pais (2009), ‘Design and
implementation of secure internet based voting system with user
anonymity using identity based encryption system’. In IEEE
International conference on services computing, scc ’09., pages 474–
481.
[13] Shivendra Katiyar., Kullai Reddy Meka., Ferdous A. Barbhuiya,
and Sukumar Nandi (2011), ‘Online voting system powered by
biometric security using steganography’, IEEE second International
conference on emerging applications of information technology.