See discussions, stats, and author profiles for this publication at: https://www.researchgate.
net/publication/377597933
Fingerprint-Based Voting System
Conference Paper · September 2023
CITATION READS
1 2,916
2 authors, including:
Gangadurai Elumalai
Velammal Engineering College
11 PUBLICATIONS 2 CITATIONS
SEE PROFILE
All content following this page was uploaded by Gangadurai Elumalai on 23 January 2024.
The user has requested enhancement of the downloaded file.
Journal of Volume-8, Issue-2 (May-August, 2023)
Telecommunication Study
www.matjournals.com
Fingerprint-Based Voting System
Gangadurai E 1*, Divakaran R 2, Aruneshwaran U 3
1
Assistant Professor, 2,3Under Graduate Student, Department of Electronics and Communication
Engineering, Velammal Engineering College, Chennai, Tamil Nadu, India
*
Corresponding Author:
[email protected]Received Date: September 16, 2023 Published Date: September 27, 2023
ABSTRACT scale implementation of such a transformative
In the contemporary era, electronic voting system. This abstract offers a glimpse into the
machines (EVMs) have emerged as potential benefits and challenges of leveraging
indispensable tools in elections, vital for Aadhar card fingerprint data to enhance the
ensuring the authenticity of the electoral security and efficiency of the voting process,
process and curbing the risk of multiple underscoring the necessity of a thorough and
voting instances. This paper introduces a prudent approach to electoral innovation.
ground-breaking approach to tackle the issue
of electoral fraud by harnessing the Keywords- Aadhar card, Data privacy, Electoral
distinctive fingerprint data contained within innovation, Electronic voting machines,
an individual's Aadhar card—a widely Fingerprint-based voting, Security, Unique
accepted biometric identity document in Identification Authority of India (UIDAI)
various nations. Our novel concept revolves
around fingerprint-based voting machines,
designed to offer a secure and streamlined INTRODUCTION
voting experience that eliminates the necessity
for voters to carry conventional identification The Aadhar-based voting system
documents. This system operates seamlessly represents a ground-breaking approach
by linking every voter's identity to their revolutionising the electoral process in India,
Aadhar card, facilitating the effortless offering numerous advantages. By integrating
retrieval of biometric data. The voting the unique Aadhar identification number into the
process commences when a voter places their voting system, several key benefits can be
finger on a dedicated fingerprint reader, realized. Firstly, the system significantly
which reads and cross-references the data enhances the security and integrity of the
against the UIDAI's (Unique Identification electoral process [1, 2]. Aadhar's biometric
Authority of India) cloud-based database. In authentication, linking individuals' fingerprints
cases where the provided fingerprint aligns or iris scans to their unique identification
with the registered data, the voter is granted numbers, ensures that only eligible voters can
access to cast their vote. Conversely, if a cast their ballots. This robust verification process
discrepancy is detected, an immediate effectively eliminates instances of voter fraud
warning message is displayed on an LCD and impersonation, safeguarding the integrity of
screen, and the voter is precluded from elections. Secondly, the Aadhar-based system
participating in the electoral proceedings. streamlines the voter registration process,
Beyond the commendable boost in security making it more efficient and accurate. Citizens
for the voting process, this innovative system with Aadhar cards are automatically eligible to
promises several advantages, including vote, eliminating the need for separate and often
accelerated result processing when compared cumbersome registration procedures [3-5]. This
to conventional methods. Nevertheless, it is simplification not only reduces administrative
imperative to address a host of crucial burdens but also increases the accessibility of
considerations encompassing data privacy, voting, encouraging more eligible citizens to
cybersecurity, inclusivity, system reliability, participate in the democratic process. Moreover,
and navigating the legal and ethical the system addresses the issue of duplicate
intricacies before contemplating the large- voting effectively.
30 Page 30-38 © MAT Journals 2023. All Rights Reserved
Journal of Volume-8, Issue-2 (May-August, 2023)
Telecommunication Study
www.matjournals.com
By cross-verifying unique identification promotes a more representative democracy
numbers, the system ensures that each voter can where the voices of all eligible citizens can be
cast only one vote, eliminating the possibility of heard. Additionally, the automation of vote
multiple votes from the same individual, and collection and tabulation in the Aadhar-based
reinforcing fairness and transparency in elections system improves efficiency. Manual counting
[6]. Furthermore, the Aadhar-based system can and tabulation processes are time-consuming and
lead to increased voter turnout. The simplified prone to errors. By automating these tasks, the
registration process and the introduction of a system reduces the time required to declare
more secure and accessible system remove results, allowing for quicker dissemination of
barriers that may discourage citizens from election outcomes [8-10]. This efficiency
participating in elections [7]. By making voting contributes to public trust and confidence in the
more convenient and inclusive, the system electoral process.
EXISTING SYSTEM
Figure 1: EVM machine.
The Electronic Voting Machines (EVMs) used [6]. The first-generation machines, whose
in India were developed in collaboration with service life had expired, were not used in
government-owned companies (Fig.1), the national elections [6]. The existing EVMs have
Electronics Corporation of India (ECIL) and their limitations and vulnerabilities, which have
Bharat Electronics Limited (BEL) [6]. These led to concerns about their security [5, 9, 11].
machines have evolved, with the first-generation Research has been conducted to analyze these
EVMs introduced in the early 1980s [6]. These vulnerabilities and suggest improvements [5].
first-generation machines used microcontrollers The Aadhar-based voting system presents a
and external storage for firmware and vote data transformative solution to the challenges faced
[6]. Subsequent generations incorporated by traditional voting methods [1]. Through
improvements, eventually leading to the third- enhanced security, streamlined registration,
generation design [6, 8]. As of July 2009, there prevention of duplicate voting, increased voter
were approximately 1,378,352 EVMs in use in turnout, and efficient result tabulation, the
India [6]. Among them, 448,000 were third- system promotes a fair, transparent, and
generation machines manufactured from 2006 to inclusive democratic process in India [1]. By
2009, with 253,400 from BEL and 194,600 from leveraging Aadhar's capabilities, this innovative
ECIL [6]. The remaining 930,352 were second- approach strengthens the electoral system,
generation models produced from 2000 to 2005, ensuring that elections accurately reflect the will
with 440,146 from BEL and 490,206 from ECIL of the people [1, 4, 10].
31 Page 30-38 © MAT Journals 2023. All Rights Reserved
Journal of Volume-8, Issue-2 (May-August, 2023)
Telecommunication Study
www.matjournals.com
LITERATURE SURVEY: Verification: The voter approaches the Aadhar-
based voting machine and provides their Aadhar
The field of Aadhar-based voting card or Aadhar number.
systems has seen significant research and Aadhar Authentication: The machine
technological advancements. Notable studies and authenticates the provided Aadhar details by
works in this domain include which explores the verifying biometric information, such as
integration of Aadhar-based voting with fingerprints or iris scans, ensuring the person is a
blockchain technology for enhanced security and legitimate voter and preventing impersonation.
transparency [1, 2]. Focusing on the design of a Voter Registration: Upon successful Aadhar
blockchain-based electronic voting system to authentication, the machine registers the voter as
ensure the integrity and immutability of voting eligible to cast their vote.
records [3]. The researchers investigate the Candidate Selection: The machine displays the
implementation of end-to-end verifiability in list of candidates and their respective symbols on
voting systems, addressing theoretical and the screen. The voter selects their preferred
practical aspects [4]. Presenting a secure candidate by pressing the corresponding button
electronic voting machine that incorporates or symbol on the machine.
biometric authentication to enhance voter Vote Casting: After candidate selection, the
identification and prevent fraud [5] which machine records the voter's choice securely and
analyses the security vulnerabilities of India's ensures it is associated with the correct
electronic voting machines, highlighting candidate.
potential weaknesses and suggesting Confirmation: The machine displays a
improvements [6]. Providing an expert confirmation message to the voter, indicating
committee's evaluation of the upgraded that their vote has been successfully cast.
electronic voting machine, along with Vote Counting: At the end of the voting
recommendations for enhancements [7]. This process, the Aadhar-based voting machine
article discusses the financial aspects of India's securely stores the cast votes, which can be
elections, highlighting the significant costs retrieved later for counting and result
involved in conducting elections. declaration.
It's important to note that the specific technical
PROPOSED SYSTEM implementation of an Aadhar-based voting
machine may vary, but the general working
The proposed Aadhar-based voting process outlined above provides a simplified
system's working process can be summarized as overview of how such a system functions (Fig.
follows: 2).
BLOCK DIAGRAM OF THE PROPOSED SYSTEM
Figure 2: Block diagram of the proposed system.
32 Page 30-38 © MAT Journals 2023. All Rights Reserved
Journal of Volume-8, Issue-2 (May-August, 2023)
Telecommunication Study
www.matjournals.com
HARDWARE COMPONENTS: system is utilised [11]. The goal of biometric
Fingerprint Module identification for this study is to read user
fingerprints so that each image can be defined
Dactyloscopy is another term for and saved in the system's internal memory in an
identifying fingerprints. Comparison of two individually unique manner. The numerical
friction ridge skin impressions made by human values that are assigned to these distinctive
fingers, palms, or toes is the process of fingerprint images are distinctive and simple to
fingerprint identification. Here, a biometrics retrieve (Fig. 3).
(Source: Optical-Light-Imaging-Photon: Fingerprint Sensor R307 for ... (circuit.rocks))
Figure 3: Finger scanner.
Iris Scanner fingerprint-based systems. It verifies voters'
identities using unique patterns in their irises
An iris scanner can be used as an (Fig. 4).
alternative or complementary method to
(Source: BMT-20 Dual Iris Scanner (radiumbox.com))
Figure 4: Iris scanner.
Extraction Algorithm fingerprint images to enhance their accuracy and
extract minutiae data for identification (Fig. 5).
A specialized algorithm processes
33 Page 30-38 © MAT Journals 2023. All Rights Reserved
Journal of Volume-8, Issue-2 (May-August, 2023)
Telecommunication Study
www.matjournals.com
Figure 5: Minutiae extraction.
When given a fingerprint image, the extraction the work while taking temporal performance into
method enhances the image, analyses the account, extracts characteristics following post-
fingerprint's features, and then executes processing, and saves as a template made up of
binarization utilising the analysed data. It thins characteristic points [12, 13].
Figure 6: Matching algorithm.
By comparing two templates obtained by the LCD
characteristic point extraction technique—more
particularly, by comparing the positions of each A liquid crystal display (LCD) provides
characteristic point and the structure—the an interface for users to interact with the voting
matching algorithm determines whether there is machine, displaying instructions, messages, and
a match (Fig. 6). vote confirmation (Fig. 7).
(Source: Interface LCD 16x2 with Raspberry Pi 4 - The Engineering Projects)
Figure 7: LCD.
34 Page 30-38 © MAT Journals 2023. All Rights Reserved
Journal of Volume-8, Issue-2 (May-August, 2023)
Telecommunication Study
www.matjournals.com
Raspberry Pi Module user interface, vote recording, data transmission,
result compilation, and system management
The Raspberry Pi serves as the central (Fig. 8).
processing unit, enabling Aadhar authentication,
(RASPBERRY PI B+ | Raspberry Pi 1 - Model B+ 512MB RAM | Distrelec International)
Figure 8: Microcontroller.
FLOWCHART
Figure 9: Flowchart of the algorithm.
35 Page 30-38 © MAT Journals 2023. All Rights Reserved
Journal of Volume-8, Issue-2 (May-August, 2023)
Telecommunication Study
www.matjournals.com
SOFTWARE COMPONENTS RESULT AND DISCUSSION
Raspberry Pi OS
The proposed Fingerprint-based voting
The official operating system optimized system represents a significant improvement
for Raspberry Pi, based on Debian, provides the over previous systems. This new system
foundation for the voting system's software. enhances security, expedites the voting process,
increases transparency, and upholds the integrity
Fingerprint Module Software of the voting process. It effectively prevents
illegal voting, ensures ease of use, and provides
The software package includes an SDK real-time feedback to voters. Moreover, it
with libraries, APIs, and documentation for prevents multiple votes by the same person and
integrating the fingerprint module. It also offers rigorously verifies voters' eligibility. These
drivers for host system communication, advancements contribute to a safer and more
configuration tools, demo applications, and efficient voting method, essential for the growth
comprehensive documentation for developers of a developing nation (Fig. 10 and 11).
(Fig. 9).
Figure 10: False vote alert.
Figure 11: Prototype of the project.
36 Page 30-38 © MAT Journals 2023. All Rights Reserved
Journal of Volume-8, Issue-2 (May-August, 2023)
Telecommunication Study
www.matjournals.com
CONCLUSION AND FUTURE WORK boundaries, further increasing accessibility.
Enhancing security measures to protect
The Aadhar-based voting system voter data and system integrity.
presents a comprehensive and transformative Exploring the integration of advanced
solution to the contemporary challenges faced by biometric authentication methods for even
democracies worldwide in modernizing and greater accuracy.
reinforcing the electoral process. It adeptly Implementing blockchain technology to
addresses the imperative of securing elections ensure the immutability of voting records.
while concurrently fostering inclusivity and Conducting extensive field trials and
efficiency. A pivotal element of this system is its refining the system based on real-world
adept utilization of Aadhar's distinctive usage.
identification capabilities, leveraging biometric Addressing scalability and infrastructure
authentication to provide an unprecedented level challenges to accommodate a large number
of security. This multifaceted approach not only of voters.
serves as a deterrent to fraudulent voting but also By continuously improving and expanding
elevates public confidence in the electoral the Fingerprint-based voting system, we can
mechanism. By eradicating the potential for contribute to the advancement of secure and
duplicate voting, this system fundamentally efficient democratic processes.
enhances transparency and overall integrity.
Moreover, the Aadhar-based voting system REFERENCES
simplifies the process of voter registration,
thereby enhancing accessibility and convenience 1. T.M. Roopak and R Sumathi (2020).
for citizens. This streamlined approach, Electronic voting based on virtual ID of
combined with the robust security measures in aadhar using blockchain technology. 2020
place, holds the promise of elevating voter 2nd International Conference on Innovative
turnout rates, ensuring a more comprehensive Mechanisms for Industry Applications
representation of the populace in the democratic (ICIMIA). IEEE, Available at:
process. Furthermore, the system's automation of https://doi.org/10.1109/ICIMIA48430.2020.
vote collection and tabulation not only reduces 9074942
the likelihood of errors but also expedites the 2. R Hanifatunnisa and B Rahardjo (2017).
release of election results. Timely result Blockchain based e-voting recording
announcements contribute significantly to system design. 2017 11th International
reinforcing public trust in the electoral process Conference on Telecommunication Systems
and mitigate the potential for disputes or Services and Applications (TSSA). IEEE,
controversies. In essence, the Aadhar-based Available at:
voting system represents a monumental stride https://doi.org/10.1109/TSSA.2017.827289
toward fortifying democracy. By championing 6
principles of fairness, transparency, and 3. P Y.A. Ryan, S Schneider and V Teague
accessibility in the electoral process, it (2015). End-to-end verifiability in voting
accurately mirrors the collective will of the systems, from theory to practice, IEEE
citizenry, thereby reaffirming the foundations of Security & Privacy, 13(3), 59-62, Available
democratic governance. As nations adapt to the at: https://doi.org/10.1109/MSP.2015.54
evolving digital landscape, embracing innovative 4. S Anandaraj, R Anish and P V Devakumar
solutions such as this emerges as a pivotal (2015). Secured electronic voting machine
strategy in securing the future of democratic using biometric. 2015 International
principles and practices on a global scale. Conference on Innovations in Information,
Embedded and Communication Systems
FUTURE WORK (ICIIECS). IEEE, Available at:
https://doi.org/10.1109/ICIIECS.2015.7192
The Fingerprint-based voting system opens the 976
door for various enhancements and future 5. S Wolchok, E Wustrow, J. Alex
developments. Some potential areas for future Halderman, et al (2010). Security analysis
work include: of India's electronic voting machines.
Enabling remote voting within electoral
37 Page 30-38 © MAT Journals 2023. All Rights Reserved
Journal of Volume-8, Issue-2 (May-August, 2023)
Telecommunication Study
www.matjournals.com
Proceedings of the 17th ACM conference https://doi.org/10.1109/ISMA.2008.464881
on Computer and Communications 8
Security, (pp. 1-14). ACM, Available at: 10. V Kumar Yadav, S Batham, M Jain and S
https://doi.org/10.1145/1866307.1866309 Sharma (2014). An approach to electronic
6. Scribd, “Expert Committee Report On voting system using UIDAI. 2014
EVM”, [Online] Available at: International Conference on Electronics
https://www.scribd.com/document/6794194 and Communication Systems (ICECS).
/Expert-Committee-Report-on-EVM IEEE, Available at:
7. Bloomberg (2019), “Why India’s election is https://doi.org/10.1109/ECS.2014.6892510
among the world’s most expensive”, 11. D L Chaum (1981). Untraceable electronic
[Online] Available at: mail, return addresses, and digital
https://economictimes.indiatimes.com/news pseudonyms, Communications of the ACM,
/elections/lok-sabha/india/why-indias- 24(2), 84-90, Available at:
election-is-among-the-worlds-most- https://doi.org/10.1145/358549.358563
expensive/articleshow/68367262.cms 12. Q Zhao, L Zhang, D Zhang, et al (2008).
[Accessed on March 2019]. Adaptive pore model for fingerprint pore
8. S. Abimanyu, R. Anbarasan and S. extraction. 2008 19th International
Dhinakaran (2021). Iris detection based Conference on Pattern Recognition. IEEE,
authentication for secure voting system, Available at:
International Journal of Engineering https://doi.org/10.1109/ICPR.2008.4761458
Research & Technology, 9(5), 404-406, 13. M R. Girgis, T M. Mahmoud and T Abd-
Available at: El-Hafeez (2007). An approach to image
https://www.ijert.org/research/iris- extraction and accurate skin detection from
detection-based-authentication-for-secure- web pages, World Academy of Science,
voting-system.IJERTCONV9IS05085.pdf Engineering and Technology, 367-375,
9. Md Khasawneh, Md Malkawi, O Al-Jarrah, Available at:
et al (2008). A biometric-secure e-voting https://www.researchgate.net/publication/23
system for election processes. 2008 5th 8782112_An_Approach_to_Image_Extracti
International Symposium on Mechatronics on_and_Accurate_Skin_Detection_from_W
and Its Applications. IEEE, Available at: eb_Pages
CITE THIS ARTICLE
Gangadurai E, et al. (2023). Fingerprint-Based Voting System, Journal of Telecommunication
Study, 8(2), 30-38.
38 Page 30-38 © MAT Journals 2023. All Rights Reserved
View publication stats