Professional Documents
Culture Documents
Finger Print e Vote
Finger Print e Vote
E-VOTING SYSTEM
• Enhance the security and integrity of electronic voting (e-voting) through innovative biometric
authentication using fingerprints.
• Dual-Database System: Utilizes two databases: one for storing eligible voters' fingerprints and the
other for reference fingerprints for comparison during voting.
• Biometric Verification: Relies on cutting-edge fingerprint recognition technology to verify voter
identities, significantly reducing the risks of fraudulent voting and impersonation.
Key Components:
• User-Friendly Interface: Provides an easy way for voters to submit their fingerprints.
• Secure Transmission: Ensures safe transfer of fingerprint data to a central server.
• Robust Matching Algorithm: Compares input fingerprints to stored reference data for authentication.
E-VOTING SYSTEM 3
LITERATURE SURVEY
SL NO PAPER ADVANTAGE DISADVANTAGE AUTHOR
Adolfo Villafiorita;
Development, Formal
Komminist
Verification, and Increased Complexity and
1 Enhanced Transparency Weldemariam;
Evaluation of an E-Voting Cost
Roberto Tiella
System With VVPAT
E-NOTE: An E-voting
Haijun Pan;
system that ensures voter
Voter Confidentiality Susceptibility to Cyber Edwin Hou;
2 confidentiality and voting
Assurance Threats Nirwan Ansari
accuracy
• The challenge lies in reconciling security and transparency in electronic voting while addressing privacy
concerns, trust deficits, cost inefficiencies, and the complexity of implementation..
E-VOTING SYSTEM 5
EXISTING SYSTEM
• Software Design: Developed the software infrastructure for the electronic voting system, ensuring
user-friendly interfaces for voters and administrators.
• Security Measures: Implemented robust security protocols to safeguard against tampering,
unauthorized access, and ensure the integrity of the voting process.
• Specification Development: Clearly define the system's requirements and functionalities, ensuring
they align with the intended objectives and security standards.
• Verification Protocols: Utilize formal methods and verification techniques to rigorously assess the
system's design and code for correctness, consistency, and compliance with established
specifications.
E-VOTING SYSTEM 6
EXISTING SYSTEM
• Security Audits: Conduct comprehensive security audits and checks to identify and
address vulnerabilities that could compromise the system's integrity.
• Usability Testing: Perform usability tests to ensure the system's accessibility and ease of use for
various user demographics, including voters and election administrators.
• Functional Testing: Conduct extensive testing of the system's functionalities, including voter
registration, ballot casting, encryption, and decryption procedures, to ensure they operate as
intended.
E-VOTING SYSTEM 7
DISADVANTAGES
Complexity in Cost: Implementing VVPAT Time Consumption: The Potential Technical Issues: Confusion for Voters: Voters
Implementation: Integrating technology incurs additional process of printing, verifying, VVPAT systems may face might face challenges in
VVPAT with electronic voting expenses in terms of equipment and storing paper records can technical glitches, such as understanding or verifying the
systems adds complexity to the maintenance extend the time required to paper jams or printing errors, paper trail, potentially leading
setup conduct elections, potentially which could disrupt the voting to errors or doubts about the
delaying result announcements. process and cause accuracy of their selections.
inconvenience to voters.
E-VOTING SYSTEM 8
Encryption of Fingerprint Data:
• Utilizing a symmetric encryption algorithm secures the
fingerprint data stored in the databases.
• Symmetric encryption ensures that only authorized entities
with the corresponding decryption key can access and
interpret the stored fingerprint information.
Dual-Database System with Encrypted Fingerprint Storage:
PROPOSED • One database stores encrypted eligible voters' fingerprints.
• The other holds encrypted reference fingerprints for
SYSTEM comparison during the voting process.
Secure Transmission and Storage:
• The encrypted fingerprint data is securely transmitted to
the central server using established encryption protocols.
• Stored encrypted fingerprints ensure that even if the data
is accessed, it remains unreadable without the decryption
key.
E-VOTING SYSTEM 9
Robust Matching Algorithm and Decryption:
E-VOTING SYSTEM 10
DESIGN
Develop a user-friendly device or mobile interface
Voter Interface: for voters.
Biometric Data Protection: Tamper Resistance: Reduced Risk of Fraudulent Streamlined and Efficient Improved Trust and Transparency: While
Symmetric encryption adds an Encrypted fingerprint data Activities: By utilizing Process: The user-friendly Transparency: The system's maintaining data security
extra layer of security, ensures resistance against cutting-edge fingerprint interface for fingerprint robustness in addressing through encryption, the system
safeguarding the sensitive tampering or unauthorized recognition submission simplifies the identity verification and vote retains transparency by
biometric data stored in the access, maintaining the technology alongside voting process,with secure and integrity concerns fosters allowing verification and
databases. integrity of voter identities. encryption accurate fingerprint increased trust in the electoral validation of votes through
verification, the system process biometric authentication.
minimizes errors in voter
identification and
authentication,
E-VOTING SYSTEM 12
ALGORITHM
E-VOTING SYSTEM 13
ALGORITHM
3.Verification Process:
• If a match is found between the decrypted voter fingerprint and any reference
fingerprint:
Confirm the identity of the voter.
Register the vote securely.
• If no match is found:
Prompt the voter to retry or indicate a verification failure.
4.Completion:
• Provide confirmation to the voter regarding successful registration or indicate the need
for further verification.
E-VOTING SYSTEM 14
METHODOLOGY
System Architecture:
• Design a high-level system architecture encompassing the voter interface, central server, encryption module, and
databases.
Encryption Strategy:
• Select a symmetric encryption algorithm suitable for securing fingerprint data and develop an encryption/decryption
strategy.
Frontend Development:
• Develop a user-friendly interface for voters to submit their fingerprints securely.
Backend Development:
• Implement server-side processing modules to handle fingerprint submission, encryption, decryption, and
verification.
E-VOTING SYSTEM 15
METHODOLOGY
Database Implementation:
• Set up databases to store encrypted fingerprint data and develop database interactions within the
system.
E-VOTING SYSTEM 16
CURRENT STATUS
E-VOTING SYSTEM 17
RESULTS AND ANALYSIS
E-VOTING SYSTEM 18
RESULTS AND ANALYSIS
E-VOTING SYSTEM 19
RESULTS AND ANALYSIS
20
E-VOTING SYSTEM
RESULTS AND ANALYSIS
E-VOTING SYSTEM 21
THANK YOU
E-VOTING SYSTEM 22