Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 22

PAAVAI ENGINEERING COLLEGE (Autonomous)

ADVANCED VOTING MACHINE


USING FACE RECOGNITION

PRESENTED BY, GUIDE BY,


P.Parthasarathy (16105085) A.Samundeeswari
C.K,Ragul (16105106) AsP, ECE
K.Raguram (16105107)
OBJECTIVE
 In every country in the world election should place a
important role for electing a leader by people choice. The
good leaders make a country good.
 Mostly false votes place a big role in election. For this we
create a project called advance voting machine using face
recognition.
 Our objective is to make a secure voting system.
 The individual person database like voter id details images
and are stored in server the image person should vote as per
the matching image.
 We can easily found a false votes and the some other person
vote is done other person the GSM is used to alert original
person via message. In
EXISTING SYSTEM
The existing system focusing on RFID based electronic
voting machine for authentication and sorting out the wired
electronic voting problems. This method includes the overall
technical idea behind using Aadhar card for voting.
Electronic Voting Machine (EVM) is a device, used to count
ballot and record votes instead of doing it manually using
human resource to record and count votes. Many problems are
associated with the manual counting of votes that is laborious,
erroneous and time consuming.
DEMERITS OF EXISTING SYSTEM

 It is less efficient to find false votes.


 It counting based on barcode it will take more time.

 
LITERATURE REVIEW
TECHENIQUES PRINCIPLE DRAWBACKS
OPERATION
CURRENT VOTING In the current voting system, [3] • In practice employee may
SYSTEM the ballet machines where used focus on higher paid
in which the symbols of various women.
political parties are displayed. • Depends on the existence
When we press the button with of male comparators.
the respective party’s (political
party) symbol the voting is done.

TRANSPERANT VOTING voter identification and • Face recoganition voting


SYSTEM USING authentication, voting and system cant tell the
BIOMETRICS recording of votes cast, vote difference between identical
counting, publication of election twins
results. Voter identification is
required during electoral process.
Security is a heart of e-voting
process.
TECHENIQUES PRINCIPLE DRAWBACKS
OPERATION

SECURE INTERNET resolves all drawbacks of • Sufficient power is required


VOTING SYSTEM USING existing system. Important • System is little bit complex
QR CODE advantage of the system is that
less time consuming, secured,
location constrained is avoided,
accuracy, minimum requirement
of equipment’s and skills.

HIGHLY SECURED At the time of aadhaar database • Mismatch of voting


ELECTRONIC VOTING enrolment process, our • It need an accurate power
MACHINE USING Government enrolled fingerprint, supply
AADHAAR IN IOT iris and various other
PLATFORM information of the resident of
India. So when Government
attaches the voter identity to the
aadhaar database, everyone can
easily cast their votes easily
using fingerprint authentication.
TECHENIQUES PRINCIPLE DRAWBACKS
OPERATION
SECURE ELECTRONIC RSA public key algorithm is • Eavesdropping is happened
VOTING APPLICATION proposed to encrypt a voter • This system could be
BASED ON FACE choice, then based on a secret distributed to cover the
RECOGNATION AND key dedicated to each voter with whole country with more
CHIPERING the input voter instant image the servers and administrators
encrypted data with RSA
algorithm is encrypted again
before casting to the server
using spread spectrum
steganography technique.

A Face Recognition Approach This technology can be • Thus the votingis enabled or
forUniversal Identification implemented with MATLAB disabled based on the
(FL-UID) and can beintegrated with the system output
election system. Simulation
results demonstrated that the
proposed system canimprove
authentication and also the
problem of bogus vote can be
entirely eliminated.
PROPOSED SYSTEM
 The working principle of our proposed is based on image
processing. Initially the web camera finds an image of
matched person database through using image processing
using mat lab.
 Our objective is to make a secure voting system. The
individual person database like voter id details images and
are stored in server the image person should vote as per the
matching image.
 We can easily found a false votes and the some other person
vote is done other person the GSM is used to alert original
person via message.
 Everyone should done his own vote and avoid false vote to
elect a leader by people choice.
PROPOSED SYSTEM BLOCK
DIAGRAM
LCD

WEB
CAMERA

ALARM
PC RS232 ARDUINO
(MATLAB)
UNO

RS232 GSM

ONLINE
VOTING
THE MAIN COMPONENTS ARE
USED
 Arduino Uno
 Web camera
 PC
 Image Processing
 RS232
 GSM
 ALARM

SOFTWARE USED
• Mat lab(image processing)
• Arduino IDE
ARDUINO UNO
 The Arduino Uno is a small, complete, and
breadboard-friendly board based on the
ATmega328.
 It has more or less the same functionality of
the Arduino Duemilanove, but in a different
package.
 Technology that is used in Atmega328 is
flash technology, so that data is retained
even when the power is switched off.
WEB CAMERA
 A webcam is a video camera that
feeds its images in real time to a
computer or computer network, often
via USB, Ethernet, or Wi-Fi.
 Their most popular use is the
establishment of video links,
permitting computers to act as
videophones or videoconference
stations.
 The common use as a video camera
for the World Wide Web gave the
webcam its name. Other popular uses
include security surveillance,
computer vision, video broadcasting,
and for recording social videos .
PC(Personal computer)
A personal computer (PC) is any general-purpose
computer whose size, capabilities, and original sales
price make it useful for individuals, and which is
intended to be operated directly by an end user with no
intervening computer operator.
IMAGE PROCESSING
 Image processing is computer imaging where
application involves a human being in the visual loop. In
other words the images are to be examined and acted
upon by people. The major topics within the field of
image processing include:

 Image Restoration
 Image Enhancement
 Image Compression
RS232
 In telecommunications, RS-232 is a
standard for serial binary data
interconnection between a DTE
(Data terminal equipment) and a
DCE (Data Circuit-terminating
Equipment). It is commonly used in
computer serial ports.
GSM
 GSM (Global System for Mobile
Communications: originally from
Grouped Special Mobile) is the most
popular standard for mobile telephony
systems in the world.
 SM differs from its predecessor
technologies in that both signaling and
speech channels are digital, and thus
GSM is considered a second
generation (2G) mobile phone system.
ALARM
 An alarm gives an audible or visual
warning about a problem or condition.
 A buzzer or beeper is a signaling device,
usually electronic, typically used in
automobiles, household appliances such as
a microwave oven, or warning and security
system
MERITS OF PROPOSED SYSTEM
Higher efficiency
Lower cost
Easy to implement
WORK DONE TO BE IN PHASE II

 In this article, we have provided an over


view on “Advance voting machine using
Face recognition”. The basic architecture
and main channel characteristics have been
introduced furthermore. In phase-II complete
our project and give prototype model.
CONCLUSION
 In this effective way we are designed advance electronic
voting system using Image processing. This method of
voting is more secured comparing to other voting
systems. In this effective way we are creating a
advanced voting machine. Everyone should done his
own vote and avoid false vote to elect a leader by people
choice.
REFERENCES
 [1]Abinaya.B, “Smart voting system using Aadhar card”, “Asian
journal of applied science and technology”, Volume 1, Issue 1, PP
196-198, February 2017.
 [2]Jitendra Waghanare, “Implementation of Aadhar card based
EVM machine with GSM module”, “International journal of
engineering science &n computing”, Volume 7, Issue 3, PP 5452-
5455, March 2017. ]
 [2]Bhuvanapriya, “Smart Voting”, “International Journal on
computing and communication technologies”, Volume 1, Issue 2,
PP 143-147,August2017.
 [4]Karthikeyan.S, “Secured EVM using biometric”,
“International journal of scientific research in computer
science engineering & information technology”, Volume
2, Issue 2, PP 586-591, March 2017.
 [5]Sathya.G, “Biometric authentication system based on
Aadhar card”, “International journal of pure and applied
mathematics”, Volume 117, Issue 9, PP 7-10, July 2017.

You might also like