0% found this document useful (0 votes)
283 views25 pages

Advanced Voting Machine Using Face Recognition

The document proposes an advanced voting machine using face recognition to improve security and reduce false votes. The system stores voter ID details and images in a server database. Voters can only cast ballots matching their stored image. Any false or duplicate votes can be easily identified. The original voter would also receive an alert message via GSM if someone else votes under their name. This secure system aims to ensure each person votes only for themselves and prevents false votes, allowing leaders to be elected truly by the people's choice.

Uploaded by

ritu Official
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
283 views25 pages

Advanced Voting Machine Using Face Recognition

The document proposes an advanced voting machine using face recognition to improve security and reduce false votes. The system stores voter ID details and images in a server database. Voters can only cast ballots matching their stored image. Any false or duplicate votes can be easily identified. The original voter would also receive an alert message via GSM if someone else votes under their name. This secure system aims to ensure each person votes only for themselves and prevents false votes, allowing leaders to be elected truly by the people's choice.

Uploaded by

ritu Official
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 25

PAAVAI ENGINEERING COLLEGE (Autonomous)

ADVANCED VOTING MACHINE


USING FACE RECOGNITION

PRESENTED BY, GUIDE BY,


P.Parthasarathy (16105085) A.Samundeeswari
C.K,Ragul (16105106) AsP, ECE
K.Raguram (16105107)
OBJECTIVE
 Our objective is to make a secure voting system.
 The individual person database like voter id details
images and are stored in server the image person should
vote as per the matching image.
 We can easily found a false votes and the some other
person vote is done other person the GSM is used to
alert original person via message. In
ABSTRACT
 In every country in the world election should place a important role
for electing a leader by people choice. The good leaders make a
country good.
 Mostly false votes place a big role in election. For this we create a
project called advance voting machine using face recognition.
 The individual person database like voter id details images and are
stored in server the image person should vote as per the matching
image.
 We can easily found a false votes and the some other person vote is
done other person the GSM is used to alert original person via
message.
 In this effective way we are creating a advanced voting machine.
Everyone should done his own vote and avoid false vote to elect a
leader by people choice.
EXISTING SYSTEM
The existing system focusing on RFID based electronic
voting machine for authentication and sorting out the wired
electronic voting problems. This method includes the overall
technical idea behind using Aadhar card for voting.
Electronic Voting Machine (EVM) is a device, used to count
ballot and record votes instead of doing it manually using
human resource to record and count votes. Many problems are
associated with the manual counting of votes that is laborious,
erroneous and time consuming.
DEMERITS OF EXISTING SYSTEM

 It is less efficient to find false votes.


 It counting based on barcode it will take more time.

 
LITERATURE REVIEW
TECHENIQUES PRINCIPLE DRAWBACKS
OPERATION
CURRENT VOTING SYSTEM In the current voting system, [3] the • In practice employee may
ballet machines where used in which focus on higher paid women.
the symbols of various political • Depends on the existence of
parties are displayed. When we press male comparators.
the button with the respective party’s
(political party) symbol the voting is
done.

TRANSPERANT VOTING voter identification and • Face recoganition voting system


SYSTEM USING BIOMETRICS authentication, voting and recording cant tell the difference between
of votes cast, vote counting, identical twins
publication of election results. Voter
identification is required during
electoral process. Security is a heart
of e-voting process. Therefore the
necessity of designing a secure e-
voting process is very important. A
secured electronic voting machine
using unique identification number
i.e. AADHAR number has been
developed. To provide additional
security along with the AADHAR
number biometric identification is
used.
TECHENIQUES PRINCIPLE DRAWBACKS
OPERATION
e-VOTING SYSTEM In this paper a new authentication • Security issues and unequa
technique in online voting system internet access
using facial recognition of the • We have to use external chi
voter is used. In India, currently to store the votes
there are two types of voting
system in practice. They are secret
Ballet paper and Electronic Voting
Machines (EVM), but both of the
process have some limitation or
demerits. In India online voting
has not been yet implemented.

Biometric Security based e existing E-voting system • Any voter can cast his/her vot
Intelligent E-Voting System intelligent enough to ensure • The flexibility to voters to cas
security aspect of electoral process their vote from their neares
specially regarding voter available EVM
authentication, vote casting
authenticity and mobility to avoid
fake voting and to maximize the
percentage of vote cast despite of
corrupted (partial) input presented
on EVM (Electronic Voting
Machine) during vote casting.
TECHENIQUES PRINCIPLE DRAWBACKS
OPERATION
SYSTEM SUSCEPTIBILITY Information security is very • Cost can be a big factor
AND ISSUES IN CYBER important to our system. There • False sence of security
SECURITY is inherent need to secure all
the communications between
the clients and their local DB
servers. We also need to secure
the communications between
the local DB(s) and the central
DB server. The system may use
the Internet or any other public
network to connect the local
servers or the clients.
AUTHENITICITY OF THE Automating an election • Worse negatiating
VOTING PROCESS AND process, while relying on state- position towards the EU
PRIVACY OF VOTER of-the-art in computer and ICT member - states
RIGHTS technologies, can significantly • Technology transcition
mitigate many of the factors is slower
that would hamper a healthy
progress of an election process.
TECHENIQUES PRINCIPLE DRAWBACKS
OPERATION

SECURE INTERNET VOTING resolves all drawbacks of existing • Sufficent power is required
SYSTEM USING QR CODE system. Important advantage of the • System is little bit complex
system is that less time consuming,
secured, location constrained is
avoided, accuracy, minimum
requirement of equipment’s and
skills.

HIGHLY SECURED At the time of aadhaar database • Mismatch of voting


ELECTRONIC VOTING enrolment process, our Government • It need an accurate power supply
MACHINE USING AADHAAR IN enrolled fingerprint, iris and various
IOT PLATFORM other information of the resident of
India. So when Government attaches
the voter identity to the aadhaar
database, everyone can easily cast
their votes easily using fingerprint
authentication.
TECHENIQUES PRINCIPLE DRAWBACKS
OPERATION
SECURE ELECTRONIC RSA public key algorithm is • Eavesdropping is happened
VOTING APPLICATION BASED proposed to encrypt a voter choice, • This system could be distributed
ON FACE RECOGNATION AND then based on a secret key dedicated to cover the whole country with
CHIPERING to each voter with the input voter more servers and administrators
instant image the encrypted data
with RSA algorithm is encrypted
again before casting to the server
using spread spectrum
steganography technique.

A FACE RECOGNITION This technology can be • Thus the votingis enabled or


APPROACH FORUNIVERSAL implemented with MATLAB and can disabled based on the system
IDENTIFICATION (FL-UID) beintegrated with the election output
system. Simulation results
demonstrated that the proposed
system canimprove authentication
and also the problem of bogus vote
can be entirely eliminated.
PROPOSED SYSTEM
 The working principle of our proposed is based on image
processing. Initially the web camera finds an image of
matched person database through using image processing
using mat lab.
 Our objective is to make a secure voting system. The
individual person database like voter id details images and
are stored in server the image person should vote as per the
matching image.
 We can easily found a false votes and the some other person
vote is done other person the GSM is used to alert original
person via message.
 Everyone should done his own vote and avoid false vote to
elect a leader by people choice.
PROPOSED SYSTEM BLOCK
DIAGRAM
LCD

WEB
CAMERA

ALARM
PC RS232 ARDUINO
(MATLAB)
UNO

RS232 GSM

ONLINE
VOTING
THE MAIN COMPONENTS ARE
USED
 Arduino Uno
 Web camera
 PC
 Image Processing
 RS232
 GSM
 ALARM

SOFTWARE USED
• Mat lab(image processing)
• Arduino IDE
ARDUINO UNO
 The Arduino Uno is a small, complete, and
breadboard-friendly board based on the
ATmega328.
 It has more or less the same functionality of
the Arduino Duemilanove, but in a different
package.
 Technology that is used in Atmega328 is flash
technology, so that data is retained even
when the power is switched off.
WEB CAMERA
 A webcam is a video camera that
feeds its images in real time to a
computer or computer network, often
via USB, Ethernet, or Wi-Fi.
 Their most popular use is the
establishment of video links,
permitting computers to act as
videophones or videoconference
stations.
 The common use as a video camera
for the World Wide Web gave the
webcam its name. Other popular uses
include security surveillance,
computer vision, video broadcasting,
and for recording social videos .
PC(Personal computer)
A personal computer (PC) is any general-purpose
computer whose size, capabilities, and original sales
price make it useful for individuals, and which is
intended to be operated directly by an end user with no
intervening computer operator.
IMAGE PROCESSING
 Image processing is computer imaging where
application involves a human being in the visual loop. In
other words the images are to be examined and acted
upon by people. The major topics within the field of
image processing include:

 Image Restoration
 Image Enhancement
 Image Compression
RS232
 In telecommunications, RS-232 is a
standard for serial binary data
interconnection between a DTE
(Data terminal equipment) and a
DCE (Data Circuit-terminating
Equipment). It is commonly used in
computer serial ports.
GSM
 GSM (Global System for Mobile
Communications: originally from
Grouped Special Mobile) is the most
popular standard for mobile telephony
systems in the world.
 SM differs from its predecessor
technologies in that both signaling and
speech channels are digital, and thus
GSM is considered a second
generation (2G) mobile phone system.
ALARM
 An alarm gives an audible or visual
warning about a problem or condition.
 A buzzer or beeper is a signaling device,
usually electronic, typically used in
automobiles, household appliances such as
a microwave oven, or warning and security
system
MERITS OF PROPOSED SYSTEM
Higher efficiency
Lower cost
Easy to implement
WORK DONE TO BE IN PHASE II

 In this article, we have provided an over


view on “Advance voting machine using
Face recognition”. The basic architecture
and main channel characteristics have been
introduced furthermore. In phase-II complete
our project and give prototype model.
CONCLUSION
 In this effective way we are designed advance electronic
voting system using Image processing. This method of
voting is more secured comparing to other voting
systems. In this effective way we are creating a
advanced voting machine. Everyone should done his
own vote and avoid false vote to elect a leader by people
choice.
REFERENCES
 [1]Abinaya.B, “Smart voting system using Aadhar card”, “Asian
journal of applied science and technology”, Volume 1, Issue 1, PP
196-198, February 2017.
 [2]Jitendra Waghanare, “Implementation of Aadhar card based
EVM machine with GSM module”, “International journal of
engineering science &n computing”, Volume 7, Issue 3, PP 5452-
5455, March 2017. ]
 [2]Bhuvanapriya, “Smart Voting”, “International Journal on
computing and communication technologies”, Volume 1, Issue 2,
PP 143-147,August2017.
 [4]Karthikeyan.S, “Secured EVM using biometric”,
“International journal of scientific research in computer
science engineering & information technology”, Volume
2, Issue 2, PP 586-591, March 2017.
 [5]Sathya.G, “Biometric authentication system based on
Aadhar card”, “International journal of pure and applied
mathematics”, Volume 117, Issue 9, PP 7-10, July 2017.

You might also like