Professional Documents
Culture Documents
Dan Project (Facial Recognition)
Dan Project (Facial Recognition)
22/ND/COM/010
COMPUTER SCIENCE
INTRODUCTION
Facial Recognition and Authentication System, such as FaceNet, have gained significant attention
in recent years due to their potential applications in various fields, including online voting.
FaceNet is an advanced deep learning model that is specifically designed for face recognition
tasks. It utilizes neural network architecture to extract facial features and create a unique
representation, or embedding for each individual’s face, (Gupta and Rahman, 2018).
In the context of online voting, a facial recognition and authentication system using FaceNet can
be implemented to ensure the integrity and security of the voting process. The system would
involve capturing an individual’s face image during the registration process and creating a unique
face embedding for that person. This embedding would serve as a digital representation of their
face.
During the voting process, the system would compare the face embedding of the person
attempting to vote with the registered face embedding in the database. By analyzing the similarity
between the embeddings, the system can verify the identity of the voter and authenticate their
It is important to note that the implementation of facial recognition and authentication systems for
online voting using FaceNet, or any other technology, should be accompanied by robust security
measure to prevent fraudulent activities. These measures may include encryption of data, secure
storage of face embedding, and protection against spoofing attempts, (Kim & Lee, 2018).
The FaceNet model is a deep learning-based facial recognition system developed by researchers at
Google. It was introduced in a research paper titled “FaceNet”: A Unified Embedding for Face
The FaceNet model utilizes convolutional neural network (CNN) architecture to extract facial
features and generate a high-dimensional embedding for each face. This embedding is then used to
measure the similarity between different faces, enabling accurate face recognition and clustering
The goal of implementing a facial recognition and authentication system for implementing a facial
recognition and authentication system for e-voting revolves around the need for a secure and
reliable method to verify the identity of voters in an online voting system. Traditional methods of
impersonation. Therefore, there is a demand for a robust system that can accurately and efficiently
authenticate voters using facial recognition technology, (Sharma & Gupta, 2017).
The aim of this study is to implement facial recognition and authentication using FaceNet in an e-
voting system.
To build facial recognition and authentication for e-voting system using FaceNet model, the
Implementing facial recognition and authentication systems in e-voting systems can bring several
verifying the identity of voters through their unique facial features, the system can help prevent
impersonation and ensure that only eligible individuals participate in the voting process.
This technology can significantly reduce the risk of fraudulent activities, such as multiple voting
or identity theft. By accurately identifying individuals, the system can detect and prevent any
Implementing facial recognition and authentication can streamline the voting process, making it
faster and more efficient. Voters can be quickly authenticated by simply presenting their face,
eliminating the need for physical identification documents or lengthy verification procedure.
Facial recognition and authentication systems can contribute to the transparency and
trustworthiness of the e-voting process. By ensuring that each vote is associated with a verified
individual, the system can enhance the integrity of the election and instill confidence in the
The motivation behind implementing facial recognition and authentication using FaceNet in an e-
voting system is primarily driven by the need to address the problem statement of ensuring the
integrity and security of the voting process. Traditional methods of online voting often face
facial recognition technology, the e-voting system aims to enhance the authentication process and
The use of FaceNet in the e-voting system offers several advantages. Firstly, it provides a reliable
and efficient means of verifying the identity of voters. By comparing the face embedding of
individual attempting to vote with the registered face embedding in the database, the system can
Secondly, facial recognition technology can help prevent impersonation and fraudulent activities.
Since each individual’s face is unique, attempting to vote using someone else’s identity becomes
significantly more difficult. The system can detect any discrepancies between the presented face
and the registered face embeddings, thereby reducing the risk of fraudulent
can enhance the overall security of the voting process. By utilizing advanced deep learning models
like FaceNet, the system can detect and prevent spoofing attempts, such as the use of photographs
Overall, the motivation behind incorporating facial recognition and authentication using FaceNet
in an e-voting system is to address the problem statement of ensuring the integrity, security, and
authenticity of the voting process. By leveraging this technology, the system aims to enhance
identity verification, prevent fraudulent activities, and instill trust among voters in the online
voting system.
FaceNet is a deep learning model and framework developed by Google researchers for face
recognition tasks. It utilizes neural network architecture to extract facial features and create a
unique representation, or embedding, for each individual’s face. The model is trained on a large
dataset of face images to learn discriminative features that can accurately identify and differentiate
between different faces. FaceNet’s embeddings can be used for various applications, including
face verification, face identification, and face clustering. The model has achieved state-of-the-art
performance in face recognition tasks and has been widely adopted in both research and industry
settings.
CHAPTER TWO
LITERATURE REVIEW
In this study S. J. J. Arputhamoni et al. (2021)[1], have put forth a proposition for an online voting
system that incorporates the utilization of biometric authentication, specifically in the form of
facial and fingerprint recognition. Additionally, image processing techniques and a convolutional
neural network (CNN-S) have been employed. The objective of this system is to augment the
security and precision of online voting by ensuring the authentication of voters. Biometrics
assume a pivotal role in the verification of voters, while image processing techniques are
implemented to enhance the quality of biometric data. The CNN-S is utilized for the purpose of
extracting features, thereby enhancing the overall dependability of the authentication process. The
focus of the paper is to overcome the traditional limitations associated with voting and to heighten
the security and accessibility of online voting. In this research G. PrabhuS et al. (2021)[2],
proposed the development of a secure internet voting system that addresses the limitations of
India's current offline voting system. This proposed system integrates face recognition technology
and OTP authentication to enable remote voting through computers or mobile phones, thereby
enhancing accessibility and efficiency. Furthermore, it provides the opportunity for offline voting
using RFID tags. The main objective of proposed system is to streamline the voting process,
ensure transparency, and reduce the requirement for extensive manual labor. RFID tags, issued by
the government, are utilized by offline voters and are verified by RFID card readers. Online voters
are required to register their facial features in the system, with multiple instances captured to
ensure accuracy. The voting process includes a two-step authentication process: facial recognition
and OTP verification, which uphold the security of the vote. The results can be accessed in real-
time through a central database, thereby further enhancing transparency and efficiency. According
recognition. The framework is devised with the intention of ensuring security, convenience, and
the absence of malpractice. It employs a three-tier security model, encompassing the verification
of Aadhar ID and Unique voter ID by means of mobile number OTP verification, facial
recognition, and captcha verification. Additionally, the framework utilizes the Local Binary
Pattern Histogram (LBPH) for facial recognition, which attains an accuracy rate of 89%. The
article also delves into the potential predicaments that may arise in the operation of the system,
such as twin identification, variations in acquisition and physical appearances, as well as the
challenge of storing vast and sensitive data. The article suggests resolutions to these challenges,
such as verifying the UID number and Aadhar number by cross-referencing with the pre-
registered voter database. It also recommends ensuring a reliable internet connection, capturing
real-time facial impressions and current physiological features during registration, organizing data
through a suitable format and structure, storing it securely on the cloud, and allowing
administrators to access location-specific data stored in the cloud. In this research Nilam
Choudhary et al. (2021)[9], proposes a novel voting system that offers heightened security through
the implementation of three levels of verification. The initial level entails the creation of a
distinctive identification number for voters at the time of registration. The subsequent level
Commission Officers. Lastly, the third and most pivotal level incorporates the utilization of facial
recognition technology, wherein the current facial attributes of voters are compared with those
stored in a comprehensive database, thereby mitigating the occurrence of fraudulent voting. The
research delves into an exploration of diverse facial recognition algorithms, namely Eigenfaces,
Fisherfaces, and SURF (Speeded Up Robust Features), and provides an indepth comparative
analysis of their respective performance. Eigenfaces rely on Eigenvectors for facial identification
and are founded on the principles of Principal Component Analysis (PCA). Conversely,
Fisherfaces expand upon the concept of Eigenfaces by integrating both PCA and Linear
algorithm that facilitates scale and rotation-invariant feature detection, rendering it highly resilient
for both object and facial recognition. In this research, N. Roy, et al. (2023)[4] suggests an
original approach to enhance the security and verifiability of online voting. This approach
incorporates the utilization of one-time password (OTP) authentication and facial recognition. The
proposed system implements a two-step verification process, where voters initially authenticate
their identity by using their Aadhaar card, and subsequently validate themselves through their face
and an OTP delivered to their mobile phone. Additionally, this system makes use of a database
containing the information of registered voters, guaranteeing that only eligible individuals are
Several authors have put in efforts in the field of face recognition; significant contributions are
briefed in the literature review. Vigorous technique for naturally coordinating highlights in
pictures compared to the equivalent physical point on an item observed from two discretionary
presumption like no earlier information about the relative camera positions and directions.
Actually in this application this is the data wish to decide from the picture feature matches.
Highlights are distinguished in two or more pictures and portrayed utilizing affine texture
invariants. The fundamental test is the way to improve the recognition performance when
influenced by the fluctuation of non-linear effects that incorporate illumination variances, poses,
facial expressions, occlusions and so on. A robust 4- layer Convolutional Neural Network (CNN),
engineering is proposed for the face acknowledgment issue, with an answer that is equipped for
dealing with facial pictures that contain occlusions, poses, facial expressions. There are many face
recognition algorithms, just a bunch of them meet the continuous limitations of a software based
arrangement without utilizing any committed hardware engine. This paper presents a real-time and
robust solution for mobile platforms, which in general have limited computation and memory
resources as compared to PC platforms. This solution includes joining two previous real-time
implementations for mobile platforms to address the shortcoming of each implementation. The
main execution gives an on the web or on-the-fly light source adjustment for the second usage
which is seen as robust to various face postures or orientations. Pattern classification approach by
illumination but fixed pose, lie in a 3D linear subspace of the high dimensional image space—if
the face is a Lambertian surface without shadowing. In any case, since faces are not genuinely
Lambertian surfaces and in fact produce self-shadowing; images will deviate from this linear
subspace. As opposed to explicitly projecting this deviation, linearly project the image into a
subspace in a way which limits those regions of the face with huge deviation. Design and
execution of the component extraction strategy for Speeded-Up Robust Features (SURF) and
Support Vector Machine (SVM) grouping technique into the traffic signs recognition application
is deliberated in. The yield of this application is the importance of the traffic sign with two
languages, Indonesia and English. In the SURF strategy, the littlest huge number of key focuses
will influence the accuracy level to perceive a picture. Face detection is the premise of all the face
processing systems, while in video the face detection issue has more special importance. By
examining the face detection dependent on Adaboost algorithm, this paper presents a quick and
good robust face detection method. Firstly, the motion region which contains faces is obtained
based on motion detection, excluding the background interference. Secondly, the Adaboost
algorithm is used to detect the face in the motion region and locate the face. The experiments
show that this method can rapidly and accurately detect human faces. The face recognition and
tracking and the advancement of the customer side of the system uses Android cell phones. For
the face recognition stage, Viola-Jones algorithm is used that isn't influenced by illuminations.
The face tracking stage depends on the Optical Flow algorithm. Optical Flow is implemented in
the framework with two component extraction strategies, Fast Corner Features and Regular
Features. Real-time robust technique is created to distinguish irises on faces with coronal axis
rotation within the normal range. The technique permits head movement without any limitations to
the background. The technique depends on anthropometric templates applied to recognize the face
and eyes. The template uses key features of the face, for example, elliptical shape, and location of
METHODOLOGY
The data collection method for facial recognition and authentication in an e-voting system using
Obtain a dataset of facial images from the potential voters. This can be done by capturing images
from a webcam or mobile device camera during the voter registration process. Ensure that the
images capture various facial expressions, lighting conditions, and angles to create a diverse
dataset. Apply a face detection algorithm to automatically detect and extract faces from the
acquired images. This step involves locating the facial region within each image.
Preprocess the facial images to enhance the quality and normalize them for further analysis. This
typically includes steps such as resizing, cropping, and normalization to ensure consistency and
Utilize the FaceNet model to compute a high-dimensional feature vector, or embedding, for each
face. This embedding represents the face in a numerical format that captures unique facial
During the registration process, associate each voter's identity with their corresponding facial
embedding. This creates a reference database of known embeddings for authorized voters in the e-
voting system. During the voting process, capture the facial image of the voter and repeat the steps
of face detection and preprocessing. Compute the embedding for the captured face using the
FaceNet model.
Compare the computed embedding of the captured face with the reference embeddings in the
enrollment database. Measure the similarity between the embeddings, typically using distance
Apply a threshold to the similarity score to determine whether the captured face matches any of
the authorized voters' embeddings. If the similarity score exceeds the threshold, authenticate the
privacy and integrity of the collected facial data throughout the data collection process.
essential to ensure the accuracy and reliability of the facial recognition and authentication system
After conducting a comprehensive analysis of numerous research papers, our proposed Online
traditional voting procedure, with a strong emphasis on security, accessibility, transparency, and
efficiency that is tailored specifically for online voting. Within the online framework, voters
securely access the voting platform by means of web-enabled devices, necessitating a login with
their voter ID and a one-time password (OTP) that is transmitted to their registered mobile
number. As an integral component of the stringent registration process, the voter's facial image is
captured by the camera on their device, thus ensuring the establishment of a secure and verifiable
identity. The securely stored facial image is maintained within a database, adhering strictly to
robust measures for safeguarding voter privacy. The utilization of Haar Cascade and Facenet
algorithm bolsters security by focusing on real-time face recognition during the voting process,
thereby effectively deterring instances of fraudulent voting and unauthorized entry. This
meticulous approach ensures the authentication of individuals who endeavor to cast their votes as
duly registered voters. Prior to casting a vote, the system performs face recognition in order to
further verify the genuineness of the voter, thereby contributing to the overall security of the
electoral process. The design of the system gives priority to accessibility and user-friendliness,
ensuring a positive and comprehensive electoral experience for voters. By upholding the intrinsic
security, transparency, and efficiency of the traditional voting process, this system takes an
additional step by ensuring that voters can engage in the electoral process with the utmost level of
security. Rigorous cybersecurity measures are embedded within the system, employing encryption
protocols to safeguard the integrity of voter data and the voting process. Continuous monitoring
and updates are implemented to ensure that the system remains resilient against emerging threats,
The data analysis process for facial recognition and authentication in an e-voting system using the
i. Data Preprocessing: Preprocess the facial images captured during the authentication process to
ensure consistency and quality. This may include resizing, cropping, and normalization to
ii. Face Detection: Apply a face detection algorithm to automatically detect and extract the face
region from the preprocessed images. This step is crucial as it helps extract the relevant facial
iii. Face Embedding: Utilize the FaceNet model to compute a high-dimensional feature vector, or
embedding, for each detected face. This embedding captures unique facial characteristics and
iv. Enrollment Database Comparison: Compare the computed embedding of the captured face with
the reference embeddings in the enrollment database. This step involves measuring the
similarity between embeddings using distance metrics such as Euclidean distance or cosine
similarity.
v. Thresholding: Apply a predefined threshold to the similarity score to determine whether the
captured face matches any of the authorized voters' embeddings. If the similarity score exceeds
the threshold, authenticate the voter as an authorized participant in the e-voting system.
vi. Result Generation: Based on the outcome of the similarity comparison and thresholding,
generate the result of the authentication process. Determine whether the voter is successfully
authenticated or rejected.
It is crucial to conduct rigorous testing and evaluation of the facial recognition and authentication
system to ensure its accuracy and reliability. This can involve using a diverse dataset to validate
the system's performance, including various facial expressions, lighting conditions, and angles.
Additionally, it's important to consider and address potential challenges such as spoofing attacks
or image quality issues that may affect the accuracy of the system.
Data analysis in this context is not limited to these steps and can vary based on the specific
Training FaceNet Model: Train the FaceNet model using the preprocessed dataset. FaceNet uses
a deep convolutional neural network (CNN) architecture to learn embeddings of facial images in a
high-dimensional space where similar faces are closer together and dissimilar faces are farther
apart.
Face Detection: Integrate a face detection module into your system to detect faces in images
captured by the e-voting system's camera. This could be done using a pre-trained face detection
model such as Haar cascades or a deep learning-based approach like Single Shot Multibox
Face Alignment: Align the detected faces to ensure that they are in a consistent pose and
orientation. This step helps improve the accuracy of face recognition by reducing variations
Feature Extraction: Use the trained FaceNet model to extract embeddings (feature vectors) from
the aligned facial images. These embeddings represent unique representations of each face in the
dataset.
Face Matching: Implement a matching algorithm to compare the embeddings of the captured face
with the embeddings of registered voters stored in the database. This could involve calculating the
Euclidean distance or cosine similarity between the embeddings and setting a threshold to
Authentication: If the captured face matches a registered voter's face, authenticate the voter and
allow them to proceed with the e-voting process. Otherwise, deny access and notify the voter
accordingly.
Security Measures: Implement security measures to protect the integrity of the system, such as
encryption of facial images and embeddings, secure communication protocols, and access control
mechanisms.
Testing and Evaluation: Thoroughly test the facial recognition and authentication system using a
variety of test cases and scenarios to ensure its reliability, accuracy, and robustness. Evaluate its
Deployment: Deploy the facial recognition and authentication system as part of the e-voting
system, ensuring seamless integration with other components and compliance with regulatory
Monitoring and Maintenance: Continuously monitor the performance of the system in real-
world settings and perform regular maintenance to address any issues that arise, update the model
with new data periodically, and adapt to changing requirements and technologies.
Model-based face recognition methods aim to construct a model of the human face that capture
facial variations. Prior knowledge of the human face is highly utilized to design the model. For
example, model-based matching derives the distance and relative position features from the
placement of internal facial elements. Model-based methods can be made invariant to size,
orientation, and lighting. The other benefits of these schemes are the compactness of the
representation of face images and rapid matching. Three different extraction methods are
distinguished (generic methods based on edges, lines, and curves; feature template based methods,
and structural matching methods that consider geometrical feature constraints). The major
disadvantage of these methods is the difficulty of automatic feature detection. Implementation any
of these methods needs arbitrary decisions on which features are important. Probably if the
features set lacks discrimination ability, no amount of subsequent processing can compensate for
The investigational consequences are proved in this paper to confirm the feasibility of the
suggested face recognition technique. Also only 15% of Eigen faces with the largest Eigen values
are adequate for the recognition of a person. The best optimized solution for face recognition is
provided when both the features are combined i.e. 15% of Eigen faces with largest Eigen values
are chosen and threshold value is chosen 0.8 times maximum of minimum the Euclidean distances
from all other images of each image, it will wholly improve the recognition performance of the
appropriate address, date of birth, number then it is trained and stored in a database, A Person who
wants to vote should correctly focus his/her face in front of webcam window then enter the card id
number. After doing this if voter face and id number match with the data base value then voter is
successfully complete voting. The security level of our system is greatly improved by the new
application method for each voter. The user authentication process of the system is improved by
adding face recognition in an application which will identify whether the particular user is
authenticated user or not. The recognition percentage of the scheme is protected as each individual
will have a dissimilar unique proportion. This scheme will prevent the forbidden follows like
equipping. Thus, the citizens can be sure that they alone can choose their leaders, thus exercising
their right in the democracy. The procedure of online voting has the ability to decrease or
eliminate unsolicited humanoid mistakes. In addition to its reliability, online voting can handle
multiple modalities, and provide better scalability for large elections. Online voting is also an
excellent mechanism that does not require geographical proximity of the voters. Thus, we will be
able to change the face of today’s voting system by making it corruption less. It will give a fair
chance to every leader to win on the basis of his/her talent, ability and not on the basis of strength
of money, power and rule. The range of the scheme can be elevated to the people, official or
national level via a highly protected and effective database management system that could handle
4.4 Conclusion
The use of facial recognition and machine learning algorithms for voter authentication helps to
prevent fraudulent practices and ensures that only registered voters are allowed to cast their votes.
The real-time monitoring feature of the system provides transparency and helps to prevent any
malpractice during the voting process. The implementation of the system using Flask web
application provides a user-friendly interface that can be easily accessed by voters and election
officials. The use of FaceNet algorithm in this system provides accurate facial recognition, and it
is a widely accepted algorithm in the field of computer vision and machine learning. Overall, the
proposed system is an effective solution to the current challenges of traditional voting systems. It
is reliable, efficient, and ensures a fair and transparent voting process. The system can be used in
various settings, such as government elections, organizational elections, and other voting-related
processes.
CHAPTER FIVE
5.1 Summary
The project aims to design and implement a facial recognition and authentication system for e-
voting to improve the security, transparency, and integrity of electronic voting processes. The
system incorporates advanced biometric technology, utilizing deep learning algorithms and
computer vision techniques to accurately identify and authenticate voters based on their facial
features. This ensures that only authorized individuals can participate in the voting process.
To further enhance security and prevent fraudulent activities, the system integrates blockchain
technology, which maintains an immutable record of votes. The combination of facial recognition
and blockchain technology creates a secure and reliable e-voting platform, addressing the concerns
The project successfully demonstrates the effectiveness of the proposed system in maintaining the
integrity and reliability of the e-voting process while preserving user privacy. The potential
applications of this system extend beyond e-voting, as it can inspire trust in democratic processes
5.2 Conclusion
In conclusion, the design and implementation of a facial recognition and authentication system for
e-voting have demonstrated its potential to significantly enhance the security, transparency, and
system ensures that only authorized individuals can participate in the voting process. The
The successful demonstration of the system's effectiveness in preserving the integrity of the e-
voting process, while maintaining user privacy, highlights its potential to revolutionize the way
elections are conducted. This innovative approach can inspire trust in democratic processes,
encourage broader participation in elections, and serve as a model for secure and reliable e-voting
5.3 Recommendation
The design and implementation of a facial recognition and authentication system can be
1. Government agencies: Local, state, and federal government agencies responsible for
elections, public safety, and national security can benefit from implementing secure and
2. Election commissions: Organizations overseeing elections at various levels can adopt the
system to enhance transparency, security, and public trust in the voting process.
3. Banks and financial institutions: Banks and financial institutions can utilize facial
recognition systems to secure transactions, prevent fraud, and improve customer experiences.
4. Airports and transportation hubs: Facial recognition systems can streamline passenger
5. Educational institutions: Schools and universities can implement facial recognition systems
6. Healthcare facilities: Hospitals and clinics can use facial recognition technology to verify
7. Retail businesses: Retailers can employ facial recognition systems for customer
8. Event venues: Concert halls, sports arenas, and other event venues can utilize facial
These organizations can leverage the benefits of facial recognition and authentication systems to
improve security, efficiency, and user experiences, while ensuring privacy and ethical
HGFDFGH