Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 22

CLIFFORD UNIVERSITY OWERRINTA, IHIE CAMPUS, ABIA STATE

A PROJECT WORK ON THE TOPIC


DESIGN AND IMPLEMENTATION OF ANDRIOD BASED VOTING SYSTEM USING FINGERPRINT
AUTHENTICATION

BY
ADIELE SOLOMON C.
REG. NUMBER: - CLU/16/SC/CSC/011
 
A RESEARCH WORK SUBMITTED TO
THE DEPARTMENT OF MATHEMATICS AND COMPUTER SCIENCE
 
IN PARTIAL FULLFILLMENT OF THE REQUIREMENT FOR THE AWARD OF
BACHELOR OF SCIENCE IN COMPUTER SCIENCE

 SUPERVISOR: EMEINKE, BENSON E. ( PhD.)

DATE--------------- 03/11/2020
• OUTLINE
OUTLINE
Introduction • Benefits Of E-voting
Background Of Study Disadvantages Of E-voting
Significance Of Study Concept Of Android Mobile IOS
Aim And Objectives Of The Study Mobile Application
The Following Are The Objectives Of The Study Types of Mobile Application
Significance Of Study Benefits of Using Mobile Application during Election
Scope Of The Study Concept of Authentication
Limitations Of The Study Factors and identity
Review Of Related Literature Types of Authentication
Concepts Of Voting Benefit of Authentication during Election
According To (Hi
Fingerprint Authentication
Types Of Voting
Voting Methods Types of Fingerprint

Voting Places Reasons to Consider Fingerprint Authentication During


Voting System Election
Properties Of Voting Systems Benefits of Fingerprint Authentication during Election
Voting Systems Design Criteria CHAPTER THREE
E-voting SYSTEM ANALYSIS AND DESIGN
Types Of E-voting Analysis of the Existing System
Basic Principles Of E-voting Problems of the Existing System
Research Methodology
Objectives of the New System
Structure of the New System
Introduction
Voting is a process at the heart of democratic society. Voting schemes have evolved from counting
hands in the early days to the system that includes paper, punch card, mechanical lever, and optical-
scan machines. Internet census take precaution to prevent people from stuffing the ballot box, they
generally do so at the expense of voters privacy.
Electronic voting system facilities users to vote from different places. Users can commit their votes
by launching their voting application and commit their vote without much stress with the help of
finger print, which makes it very secured and difficult to be manipulated by unauthorized users.
As a prelude to other parts of this study, this chapter will discuss the Background upon which this
study was initiated, the Statement of problems that led to the study, the Aim and Objectives of the
study. Others are Significance of the study, Scope of work, Limitation of the study and Definition of
technical terms.
BACKGROUND OF STUDY

Voting theory formally began in the 18th century and ever since then, many proposal has been made towards using electronic

technologies to improve elections (Sobia, Ummer, Ayesha, Usman, and Hassan, 2011).

• In Clifford University Owerrinta elections has been done manually which has caused many errors and problems. The

Manual Voting System (MVS) involves presenting eligible student with a list of contestants on a paper called ballot paper, to

mark against their favorite contestants and place the ballot paper in a box called ballot box, this system of voting is used for

Faculty and Department election processes in Cclifford University Owerrinta. Manual voting system has some

disadvantages, which include possibility of placing the ballot paper in the wrong ballot box, votes counting problem, loss of

time when there happens to be some objections, paper printing and expenditures done for personnel, for these reasons, it is

necessary to use the new technologies to make the election system faster, economic and trustable.
Significance of Study

• The benefits of this project are to improve confidentiality, integrity and voter's identification in voting process, to reduce the
time and stress of conducting manual election and to provide equal level of security during CLUSA election and other
faculty/department that finds this project beneficial during their elections.

Aim and Objectives of the Study

• This project "Design and implementation of Android base voting system using finger print authentication" aimed at the
development of an Android application that will implement electronic voting system with an embedded finger print for users’
authentication in the system.

The following are the objectives of the study:

• To make sure that unaccredited student will not vote, by installing an android application in the mobile phone of very
accredited student which will allow them to vote using finger print authentication.

• To reduce the rate of manipulation by designing an android application that will run in any android phone that has finger
print.

• Making sure that the application will be user friendly.


Significance of Study

• The benefits of this project are to improve confidentiality, integrity and voter's identification in voting process, to reduce the time and
stress of conducting manual election and to provide equal level of security during CLUSA election and other faculty/department that finds
this project beneficial during their elections.

Scope of the Study

• The scope of the project is that it will use the Email and password created by user to register him/her in the voting site, through this all the
details of voter are saved in database. And it will act as the main security to the voting system.

Limitations of the Study

• During the course of this project, the researcher was deterred by so many factors and some of them are:

• Academic Work: Combining this research work with my (the researcher) normal activities posed a very serious challenge; it was not an
easy task at all. This is because combining my academic work with the time needed to fully develop this system was minimized hence
reduction of the scope work.

• Finance: Due to inadequate funds, the researcher could not buy some other APIs Libraries that could help give this project a more
professional attributes to function.

• Time: The time given for the submission of this work was very short.
REVIEW OF RELATED LITERATURE

Introduction

• As the world watched the electoral drama unfold in Florida at the end of 2000, people
started wondering, “Wouldn’t all our problems be solved if they just used Internet Voting?
People all over the world soon started taking a hard look at their voting equipment and
procedures, and trying to figure out how to improve them (Aviel D. Rubin, 2002).

There is a strong inclination towards moving to Remote Internet Voting at least among the
politicians in order to enhance voter convenience, increase voter confidence and voter
turnout.
The finger print authentication process always runs at the start of the application, before the
permission and throttling checks occur, and before any other code is allowed to proceed.
Concepts of Voting
•According to (Hillier 2012), Voting is a method for a group, such as, a meeting or an electorate to make a decision or express an
opinion, usually following discussions, debates or election campaigns.
Elections allow the populace to choose their representatives and express the preferences for how they will be governed.

Unsurprisingly, history is littered with examples of elections being manipulated in order to influence their outcome. The design of a good voting system,
whether electronic or using traditional paper ballots or mechanical devices must satisfy a number of sometimes competing criteria (Bhatnagar, 2004).

Types of Voting 1)Early Voting 2)Absentee Voting (By Mail) 3)Election Day Voting

•Voting Methods
•According to traditional parliamentary procedures by (Schum, 2000); there are several voting methods that are used at specific times during elections.

The following are voting methods you may choose to cast a vote.

1. Acclamation: All those in agreement say "aye" and all those opposed say "nay". 2)Standing Vote: All those in agreement stand.

3) Postal Voting: Voters are sent a ballot and return it by post. 4)Open Ballot/Show of Hands: Count the number in agreement and the number
opposed.

5) Secret Ballot: Vote written on a slip of paper, collected and normally tallied by advisor or chief officer. 6)Secret Roll Call Ballot: Members sign
the ballots.
Voting Places
1)Voting at polling places 2) Voting at home with voter's computer 3)Voting at anyplace with mobile devices

•Voting System
•Voting system is not just the equipment necessary to cast a vote. The voting system standard (VSS) has two definitions,
addressing the physical and functional components of a voting system.

•Properties of voting systems 1)Accuracy 2)Democracy 3)Privacy 3)Verifiability

•Voting systems design criteria

•According to (Toe and Srivastava, 2008), there are several criteria designed for voting system and they include the following:

1) Authentication: Only authorized voters should be able to vote.

2) Uniqueness: No voter should be able to vote more than once.

3) Accuracy: Voting systems should record the votes correctly.

4) Integrity: Votes should not be able to be modified without detection

5) Verifiability: Should be possible to verify that votes are correctly counted for in the final tally.
6)Audit ability: There should be reliable and demonstrably authentic election records. 7) Reliability: Systems should work robustly, even in
the face of numerous failures.

8) Secrecy: No one should be able to determine how any individual voted. 9) Flexibility: Equipment should allow for a variety of ballot
question formats.

10) Convenience: Voters should be able to cast votes with minimal equipment and skills. 11) Verifiability: Systems should be testable
against essential criteria.

12) Transparency: Voters should be able to possess a general understanding of the whole process. 13) Cost-effectiveness: Systems should
be affordable and efficient.

•E-VOTING
•Udupa (2001); Defines Electronic voting as the use of computers or computerized voting equipment to cast ballots in an election. Sometimes,
this term is used more specifically to refer to voting that takes place over the Internet. Electronic systems can be used to register voters, tally
ballots, and record votes.
Types of E-Voting

•E-Voting is a type of voting that includes the use of a computer rather than the traditional use of ballot at polling centers or by postal mail. It
encompasses various types of voting: kiosks, the Internet, telephones, punch cards, and mark sense or optical scan ballots (Gerlach, 2009).
• Basic Principles of E-voting
According to Maiya and McGrath (2008), the main principle of e-voting is that it must be as similar to regular voting as possible, compliant with
election legislation and principles and be at least as secure as regular voting.
 According to (Estonian election legislation, 2008) e-voting takes place from 6th to 4th day before Election Day and the following requirements are
laid out:

 On advance polling days, voters may vote electronically on the web page of the National Electoral Committee. A voter shall vote himself or
herself.
 A voter shall identify himself or herself using the certificate entered on his or her identity card which enables digital identification.
 After identification of the voter, the consolidated list of candidates in the electoral district of the residence of the voter shall be displayed to the
voter on the web page.
 The voter shall indicate on the web page the candidate in the electoral district of his or her residence for whom he or she wishes to vote and shall
confirm the vote by signing it digitally using the certificate entered on his or her identity card which enables digital signing.
 A notice that the vote has been taken into account shall be displayed to the voter on the web page.

•According to (Gerlach, 2009), There are two types of e-voting namely:

•Polling place voting: In a polling place, both the voting clients (voting machines) and the physical environment are supervised by authorized
entities.
•Internet voting: The vote is cast over the Internet and the voting client is unsupervised during voting (the voting client may be at home, at work, in
a library, etc).
Benefits of E-Voting Disadvantages of E-Voting
•Convenience --- You can vote at your comfort zone. •Inequality problem---people with low salary may not
•Mobility ---- you can stay at any environment and cast your vote. afford the equipment for e-voting.
•Tally Speed ----- easy to calculate the result of the vote as fast as •Vulnerable to Security --- hackers may try attack
possible.
•Denial of Service attack -- An attacker may attempt to
•Less Cost --- it is less expensive to compare with ballot processes
"flood" a network and thus reduce a legitimate user's
•Flexibility ---- . It can be used to collect public opinions or bandwidth
election.
•Virus-- Virus such as Trojan horse would do great damage
to the system.

Concept of Android Mobile IOS


Android is a mobile operating system developed by Google, based on a modified version of the Linux kernel and other
open source software and designed primarily for touch screen mobile devices such as smart phones and tablets.

Mobile Application
A mobile app is a computer program designed to run on a mobile device such as a phone/tablet or watch. Mobile
applications often stand in contrast to desktop applications which run on desktop computers, and with web applications
which run in mobile web browsers rather than directly on the mobile device (Pogue, 2009).
Types of Mobile Application
According to (Miller, 2011), there are different types of Apps they include:
Native App, Web App, Hybrid App

Native App: Native App has been developed for use on a particular platform or device. A native mobile app is a
Smartphone application that is coded in a specific programming language, such as Objective C for IOS and Java for
Android operating systems. Native mobile apps provide fast performance and a high degree of reliability.

Hybrid App: This type of application has cross-platform compatibility but can still access a phone’s hardware. It is
developed using platforms such as Sencha, PhoneGap and Mosync.

Dedicated Web App: A website that is tailored to function on a mobile device. These are tailored to a specific
platform and will not work on other Smartphones or feature phones.

Generic Mobile App: A mobile website that will work with all mobile phones.
In the early stages of the Smartphone market, most apps were tailored to the iPhone.
•Web App

•Web App stored on a remote server and delivered over the internet through a browser.

•Web apps are not real apps; they are really websites that, in many ways, look and feel like native applications. They are run by a browser and typically
written in HTML5.

•Hybrid App

•Hybrid Apps are like native apps, run on the device, and are written with web technologies (HTML5, CSS and JavaScript).

•Benefits of Using Mobile Application during Election

•According to (Jason, 2016), the main aim of any mobile application development company is to build an app that supports various mobile platforms
like Android, Windows, and iOS.
•User Experience: An expert mobile app development company develops great apps with great user experience that fit the client requirements as well
as are likeable for common users.

•Cost Saving: Developing mobile app to improve business helps in increasing productivity and profitability. However, the organization that develops
mobile apps can adapt to the budget of clients.
•Time Saving: Getting a mobile app can save more time than you think, as you can skip traditional marketing techniques that demand time and money.
•Constant Availability: A mobile app is available 24x7, your sales executive may not be. This is one of the biggest reasons why people are switching
to mobile apps.
•Concept of Authentication

• According to Bennett &Coleman (2013); he defined Authentication as the process of recognizing a user’s identity. It is the mechanism of
associating an incoming request with a set of identifying credentials. The credentials provided are compared to those on a file in a database of the
authorized user’s information on a local operating system or within an authentication server.

• The authentication process always runs at the start of the application, before the permission and throttling checks occur, and before any other
code is allowed to proceed.

Factors and identity


• The ways in which someone may be authenticated fall into three categories, based on what are known as the factors of authentication: something
the user knows, something the user has, and something the user is.
•The three factors (classes) and some of elements of each factor are:

 The knowledge factors: Something the user knows (e.g., a password, partial password, pass phrase, or personal identification number (PIN),
challenge response (the user must answer a question, or pattern), Security question.

 The ownership factors: Something the user has (e.g., wrist band, ID card, security token, implanted device, cell phone with built-in hardware
token, software token, or cell phone holding a software token)

 The inherence factors: Something the user is or does (e.g., fingerprint, retinal pattern, DNA sequence (there are assorted definitions of what is
sufficient), signature, face, voice, unique bio-electric signals, or other biometric identifier).
•Types of Authentication

•According to (Rejesh, 2013), there are four major types of authentication and these include:

 Password Based Authentication

•The use of a password and username is the most common form of authentication used and is generally considered the cheapest and most
convenient method.

 Device Based Authentication

•Portable hardware devices that are similar to credit cards in size with a magnetic strip to hold data have been designed as an
authentication method.

•These smart cards securely store public and private certificate information, are carried by the user and inserted into a card reader attached
to a computer device. Many of these systems require the use of a PIN and will lock down if an incorrect PIN is entered a particular
number of times, preventing use if stolen (Rejesh, 2013).

 Biometric Authentication

•Biometrics user authentication identifies and verifies the identity of the user with measurements of unique characteristics stored in the
program’s server, eliminating the need for a password or identification card.
Benefit of Authentication during Election

•There are numerous advantages of authentication systems which are used to identify the user of a home, ATM or a security clearance computer system. The main purpose of these

systems is to validate the user's right to access the system and information, and protect against identity theft and fraud.

Fingerprint Authentication

•A fingerprint in its narrow sense is an impression left by the friction ridges of a human finger. The recovery of fingerprints from a crime scene is an important method of forensic

science.

Types of Fingerprint

•According to (Danny Thakkar, 2011), there are four major types of fingerprint and these include the following:

•Exemplar: Exemplar prints, or known prints, are the name given to fingerprints deliberately collected from a subject, whether for purposes of enrollment in a system or when under

arrest for a suspected criminal offense.


•Reasons to Consider Fingerprint Authentication During Election.

•The reasons include the following:

•1. No two fingers have the exact same dermal ridge characteristics.

•2. It does not change with age or get affected by any disease.

•3. Small storage spaces required for the biometrics template.

•4. It can’t be lost, shared or duplicated.

•5. Easy to use, requires no additional training

•6. Reduce the amount of human work.


• Benefits of Fingerprint Authentication during Election
 The system will not allow the voter to vote two or more candidates.

 The system will allow the user to vote for one time for a particular election

 The system will authenticate the user through his fingerprint so the user is uniquely identified.
CHAPTER THREE

SYSTEM ANALYSIS AND DESIGN


•Introduction

•This chapter deals with the analysis of the existing voting system and design of new system. It provides
details analysis of the existing system, problems of the existing system and methodology adopted during
the analysis and design of the new system. This chapter also covers objective of the new system,
feasibility study, new system structure and the new system design specification.

•Analysis of the Existing System

•In Clifford University, elections are done manually using ballot box as the storage for the votes. On the
Election Day students go to the election ground with their school receipt and CLUSA receipt or school ID
card and present it to the electorates for accreditation. The electorate will confirm it and sign on it and tell
the student to go ahead and vote.
•Problems of the Existing System
•From the Investigations carried out by the researcher, the existing system operation reveals the following problems:

•1. Unaccredited Persons may sink-in and vote during Elections:

•In the election ground unaccredited voters may find their way-in and vote. This is because the only form of accreditation is
student showing their ID card to get entrance into the voting center. However, some students gain entrance into voting centers
without ID cards.

•2. There may be impersonation of votes during Elections.

•Since the only form of accreditation for the election is showing ID card at point entrance into voting center, most people who
gain entrance into the voting center end up voting with other names other than their own especially when such student has not
completed the necessary requirement to be legible to vote such as payment of CLUSA dues and school fees.

•3. Results of the votes stands a chance for Manipulation

•The results of the election conducted may be manipulated by the officials since accurate record of accredited voters are not
kept most times.
• Research Methodology
• The particular techniques used in collection of data for the study are: observation and interview.
•Observation
The researcher happens to be a student of Clifford University Owerrinta, which is the case study of the project work hence participant observer.
The Observations shows that elections are not conducted in accordance to know global practices. The researcher also gathered information
about how accreditation and counting are done during elections.
Interview
The researcher in a bid to gain a better understanding of the existing system adopted personal interview technique. The researcher interviewed
students of Clifford University Owerrinta, who revealed the challenges and weaknesses of the current system used in the CLUSA elections.
Also interviewed some staff who serves as observers in the elections.
Objectives of the New System

•The following are the specific objectives of the new system

• 1. To design an Android application that will be able to detect unaccredited students who try to vote during CLUSA elections.

• 2. To design an Android application that will help to control impersonation of votes on CLUSA elections.

•3. It will help to control manipulation of votes during CLUSA elections.


CONCLUTION

•System Design and Menu Specification

The important processes of the system design such as input, outputs, security and interface design were
covered here. Design specification tables are used here to show core processes of the specification. The
essence is to document the system design specification.
•Security Design Specification

The security features applied in this system include login for administrator users of this system and
access to admin alone, Login page for students to be able to view the Home page, About us Page,
Rules, Profile, Votes and to update their profiles. This design affected access level of some user
referred to regular user. This category of users can only view the Home, About Us, Profile, and Rules.
They cannot view complaints reported by others. Administrator users are only the personals permitted
to login to the admin page to view the portal, to register and accredit students.

You might also like