Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 22

FINGERPRINT AUTHENTICATED

E-VOTING SYSTEM

SUBMITTED BY: GUIDED BY :Ms JINCY JESUDASAN


AFZAL AJEETH
SHABNA M
SIDHARTH S
SREESAJI S E-VOTING SYSTEM 1
INDEX
• ABSTRACT
• LITERATURE SURVEY
• PROBLEM DEFINITION
• EXISTING SYSTEM
• DISADVANTAGES
• PROPOSED SYSTEM
• ADVANTAGES
• DESIGN
• ALGORITHM
• METHODOLOGY
• CURRENT STATUS
• RESULT
E-VOTING SYSTEM 2
ABSTRACT

• Enhance the security and integrity of electronic voting (e-voting) through innovative biometric
authentication using fingerprints.
• Dual-Database System: Utilizes two databases: one for storing eligible voters' fingerprints and the
other for reference fingerprints for comparison during voting.
• Biometric Verification: Relies on cutting-edge fingerprint recognition technology to verify voter
identities, significantly reducing the risks of fraudulent voting and impersonation.

Key Components:
• User-Friendly Interface: Provides an easy way for voters to submit their fingerprints.
• Secure Transmission: Ensures safe transfer of fingerprint data to a central server.
• Robust Matching Algorithm: Compares input fingerprints to stored reference data for authentication.
E-VOTING SYSTEM 3
LITERATURE SURVEY
SL NO PAPER ADVANTAGE DISADVANTAGE AUTHOR

Adolfo Villafiorita;
Development, Formal
Komminist
Verification, and Increased Complexity and
1 Enhanced Transparency Weldemariam;
Evaluation of an E-Voting Cost
Roberto Tiella
System With VVPAT

E-NOTE: An E-voting
Haijun Pan;
system that ensures voter
Voter Confidentiality Susceptibility to Cyber Edwin Hou;
2 confidentiality and voting
Assurance Threats Nirwan Ansari
accuracy

Group signature Hamoud Alshammari;


Complexity in
entanglement in e-voting Enhanced Anonymity and Khaled Elleithy;
3 Implementation and
system Verifiability Khaled Almgren;
Management
E-VOTING SYSTEM 4
PROBLEM DEFINITION

• The challenge lies in reconciling security and transparency in electronic voting while addressing privacy
concerns, trust deficits, cost inefficiencies, and the complexity of implementation..

E-VOTING SYSTEM 5
EXISTING SYSTEM

• Software Design: Developed the software infrastructure for the electronic voting system, ensuring
user-friendly interfaces for voters and administrators.
• Security Measures: Implemented robust security protocols to safeguard against tampering,
unauthorized access, and ensure the integrity of the voting process.
• Specification Development: Clearly define the system's requirements and functionalities, ensuring
they align with the intended objectives and security standards.
• Verification Protocols: Utilize formal methods and verification techniques to rigorously assess the
system's design and code for correctness, consistency, and compliance with established
specifications.

E-VOTING SYSTEM 6
EXISTING SYSTEM

• Security Audits: Conduct comprehensive security audits and checks to identify and
address vulnerabilities that could compromise the system's integrity.
• Usability Testing: Perform usability tests to ensure the system's accessibility and ease of use for
various user demographics, including voters and election administrators.
• Functional Testing: Conduct extensive testing of the system's functionalities, including voter
registration, ballot casting, encryption, and decryption procedures, to ensure they operate as
intended.

E-VOTING SYSTEM 7
DISADVANTAGES

Complexity in Cost: Implementing VVPAT Time Consumption: The Potential Technical Issues: Confusion for Voters: Voters
Implementation: Integrating technology incurs additional process of printing, verifying, VVPAT systems may face might face challenges in
VVPAT with electronic voting expenses in terms of equipment and storing paper records can technical glitches, such as understanding or verifying the
systems adds complexity to the maintenance extend the time required to paper jams or printing errors, paper trail, potentially leading
setup conduct elections, potentially which could disrupt the voting to errors or doubts about the
delaying result announcements. process and cause accuracy of their selections.
inconvenience to voters.

E-VOTING SYSTEM 8
Encryption of Fingerprint Data:
• Utilizing a symmetric encryption algorithm secures the
fingerprint data stored in the databases.
• Symmetric encryption ensures that only authorized entities
with the corresponding decryption key can access and
interpret the stored fingerprint information.
Dual-Database System with Encrypted Fingerprint Storage:
PROPOSED • One database stores encrypted eligible voters' fingerprints.
• The other holds encrypted reference fingerprints for
SYSTEM comparison during the voting process.
Secure Transmission and Storage:
• The encrypted fingerprint data is securely transmitted to
the central server using established encryption protocols.
• Stored encrypted fingerprints ensure that even if the data
is accessed, it remains unreadable without the decryption
key.

E-VOTING SYSTEM 9
Robust Matching Algorithm and Decryption:

• The robust matching algorithm compares encrypted


input fingerprints to stored encrypted reference data,
ensuring accuracy without compromising security.
PROPOSED
SYSTEM • Decryption using the symmetric algorithm occurs only
when a match is identified during the voting process,
ensuring real-time verification without exposing the
raw fingerprint data

E-VOTING SYSTEM 10
DESIGN
Develop a user-friendly device or mobile interface
Voter Interface: for voters.

Design a module to receive fingerprints, encrypt


Fingerprint Submission and Encryption: them using a symmetric algorithm, and transmit
securely to the central server.

Develop a server-side application to receive and


Central Server for Processing: decrypt the submitted fingerprints using the
symmetric decryption algorithm.

Set up databases to store encrypted fingerprints of


Voter and Reference Databases: eligible voters and reference fingerprints for
comparison.
E-VOTING SYSTEM 11
ADVANTAGES

Biometric Data Protection: Tamper Resistance: Reduced Risk of Fraudulent Streamlined and Efficient Improved Trust and Transparency: While
Symmetric encryption adds an Encrypted fingerprint data Activities: By utilizing Process: The user-friendly Transparency: The system's maintaining data security
extra layer of security, ensures resistance against cutting-edge fingerprint interface for fingerprint robustness in addressing through encryption, the system
safeguarding the sensitive tampering or unauthorized recognition submission simplifies the identity verification and vote retains transparency by
biometric data stored in the access, maintaining the technology alongside voting process,with secure and integrity concerns fosters allowing verification and
databases. integrity of voter identities. encryption accurate fingerprint increased trust in the electoral validation of votes through
verification, the system process biometric authentication.
minimizes errors in voter
identification and
authentication,

E-VOTING SYSTEM 12
ALGORITHM

1. Receive and Decrypt:


• Receive the SubmittedFingerprint.
• Decrypt the SubmittedFingerprint using the symmetric decryption algorithm.
2. Search and Match:
• Compare the decrypted fingerprint with EncryptedVoterFingerprints in the voter
database.
• If a match is found:
 Retrieve the corresponding decrypted voter fingerprint.
 Compare this decrypted voter fingerprint with EncryptedReferenceFingerprints in
the reference database.

E-VOTING SYSTEM 13
ALGORITHM

3.Verification Process:
• If a match is found between the decrypted voter fingerprint and any reference
fingerprint:
 Confirm the identity of the voter.
 Register the vote securely.
• If no match is found:
 Prompt the voter to retry or indicate a verification failure.
4.Completion:
• Provide confirmation to the voter regarding successful registration or indicate the need
for further verification.

E-VOTING SYSTEM 14
METHODOLOGY

System Architecture:
• Design a high-level system architecture encompassing the voter interface, central server, encryption module, and
databases.
Encryption Strategy:
• Select a symmetric encryption algorithm suitable for securing fingerprint data and develop an encryption/decryption
strategy.
Frontend Development:
• Develop a user-friendly interface for voters to submit their fingerprints securely.
Backend Development:
• Implement server-side processing modules to handle fingerprint submission, encryption, decryption, and
verification.

E-VOTING SYSTEM 15
METHODOLOGY

Database Implementation:
• Set up databases to store encrypted fingerprint data and develop database interactions within the
system.

E-VOTING SYSTEM 16
CURRENT STATUS

Implemented candidate Implemented voting Approximately 70% of the


registration. portal. project is implemented.

E-VOTING SYSTEM 17
RESULTS AND ANALYSIS

E-VOTING SYSTEM 18
RESULTS AND ANALYSIS

E-VOTING SYSTEM 19
RESULTS AND ANALYSIS

20
E-VOTING SYSTEM
RESULTS AND ANALYSIS

E-VOTING SYSTEM 21
THANK YOU

E-VOTING SYSTEM 22

You might also like