Uploaded by Vishwanath. M.O.

60-Swetha

advertisement
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/340855528
Secured Electronic Voting Machine Using Biometric Technique with Unique
Identity Number and IOT
Chapter · January 2020
DOI: 10.1007/978-981-15-3172-9_31
CITATIONS
READS
4
1,790
3 authors, including:
Sandeep Kumar
Deepika Ghai
Sreyas Institute Of Engineering and Technology
Lovely Professional University
47 PUBLICATIONS 174 CITATIONS
24 PUBLICATIONS 124 CITATIONS
SEE PROFILE
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
Multimodal Biometric View project
Zigbee Based Communication System for Future Micro-Grids Using Http and MQTT Protocols View project
All content following this page was uploaded by Sandeep Kumar on 08 July 2020.
The user has requested enhancement of the downloaded file.
Secured Electronic Voting Machine Using
Biometric Technique with Unique
Identity Number and IOT
Kone Srikrishnaswetha, Sandeep Kumar and Deepika Ghai
Abstract Elections play an important role in our democratic country as people
can select a person as a leader for the government. This paper was about a new
proposed methodology having a highly secured process. This consists of mainly
Aadhar, biometric and IOT. Aadhar ID is a unique card for everyone, biometric face
recognition for security and IOT for the safe and immediate results. This proposed
system has automatic counting of votes: highly data secured system, sending of data
immediately and safe voting.
Keywords EVM · Secured components · Face recognition · Unique ID card ·
Cascade classifier technique · IOT
1 Introduction
India is a country where elections play a major part in the government. It is a method
of selecting a candidate for the government to rule [1–6]. This paper explains about
secured voting and the process of using biometric for better elections. Selecting a
candidate for the government was important, so people have trust in the electronic
voting machine as it gives the correct voting [5–12]. So the EVM should be designed
so has to be highly secured and safe. They are many technologies like polling booths,
ballots and punch cards, e-voting, block chains, using a microcontroller, network
security, i-voting, online voting, and GSM module. But still, they are many challenges
in EVM at present days [13–22]. So this paper explains a proposed methodology of
secured EVM using face recognition biometric, a unique card with IOT [15, 24–28].
Biometric face recognition is useful for the identification of people, and voter cannot
K. Srikrishnaswetha (B) · S. Kumar
Department of Electronics and Communications, Sreyas Institute of Engineering and Technology,
Hyderabad, Telangana, India
e-mail: Srikrishnaswetha24@gmail.com
S. Kumar
e-mail: er.sandeepsahratia@gmail.com
D. Ghai
School of Electrical and Electronics Engineering, Lovely Professional University, Jalandhar, India
e-mail: deepika.21507@lpu.co.in
© Springer Nature Singapore Pte Ltd. 2020
H. S. Saini et al. (eds.), Innovations in Electronics and Communication Engineering,
Lecture Notes in Networks and Systems 107,
https://doi.org/10.1007/978-981-15-3172-9_31
311
312
K. Srikrishnaswetha et al.
Fig. 1 Data for using EVM past 20 years
repeat their voting. Aadhar was the unique ID number for everyone. IOT is useful
for sending of results immediately [22, 23, 29–31].
Data for using the technology in EVM from the last 20 years in the research
community were increasing as shown in Fig. 1, and data are taken from Science
Direct.
2 Literature Analysis
See Table 1.
3 Problem Statement
According to the literature analysis, there are a few major technical problems in the
voting process. First, manually counting of vote’s process is not accurate and secure
as shown in Fig. 2 [4, 6, 21].
Second, fingerprint biometric is not safe and secured at present days due to fake
fingerprint as shown in Fig. 3. A person who does not have hands is not allowed for
voting due to this process [12, 15].
Third, missing of votes was a great loss for the voting process. In India, 2019
elections, nearly 21 billion people lost their vote and few got a chance of double
voting in few places. This happened due to the improper registration of voter’s details
and no proper ID proof of a person as shown in Fig. 4a, b.
Another problem is recounting and declaration of delay in voting. In the gap of the
voting process and results, there is a chance of hacking [7–11]. Existing machines
are not connected to the online. So the transportation also takes time after the polling
of all the phases is completed.
Secured Electronic Voting Machine Using Biometric …
313
Table 1 Comparison of literature work of voting machine
S. No.
Author name
Year
Methodology
Remarks
1
Shahzad et al. [1]
2019
EVM, blockchain,
i-voting, e-voting
This is about blockchain
which is a solution at the
polling process and
security purpose. It is
useful at the
authentication of votes
2
Salah et al. [2]
2018
IOT, Network and data
security
This paper explains about
three levels of high-, lowand intermediate-level
layers
3
Han et al. [3]
2018
Online voting, privacy
preservation, end-to-end
verification.
Here, it was about the
process of the e-voting
system
4
Karim et al. [4]
2017
Automatic calculation of
results, integrated
database, and EVM.
In this, the system is used
for smart voting. They
used fingerprint by
Arduino. Registration was
good, and it generates
SMS to the voter. It gives
high data security
5
Rahman et al. [5]
2017
EVM, Arduino and
fingerprint scanner
This is for mainly
securing purpose and to
make the process faster.
The fingerprint is used for
detecting the voter is
authorized or not
6
Kalaiselvi et al. [6]
2016
EVM, identity card and
biometric
Fingerprint and Aadhar
used for the transparent
voting process
7
Anish et al. [7]
2015
GSM module, Arm 7
Cortex
This is used for sending
and receiving results
8
Ashok et al. [8]
2014
LCD, microcontroller,
sensors
This explains the
accuracy of votes and
display of results
9
Pandey et al. [9]
2013
EVM and online process
Aadhar was for
identifying people. The
easy process online
4 Proposed Methodology
The proposed methodology consists of two steps, namely registration of voter details
and voting process, as shown in Figs. 5 and 6. The hardware components used
are Raspberry Pi3 works by using virtual network computing (VNC) viewer which
is visual desktop-sharing system of PI, webcam, buttons for voting, monitor and
connecting cable and software used was Python version 3.5 and (SSH) Secure Shell
314
(a)
K. Srikrishnaswetha et al.
(b)
Fig. 2 a Hand counting, b digital ballots
(a)
(b)
Fig. 3 a Fake fingerprint, b improper fingerprint
(a)
Fig. 4 a Voter ID, b voter ID for the same person
(b)
Secured Electronic Voting Machine Using Biometric …
315
for access to the PI terminal. From the above literature analysis, we proposed a new
methodology for counting problems, biometric, registration of voter and declaration
of results.
In the proposed methodology, the webcam with good quality is used to build a realtime face detector and achieve better accuracy. Monitor/screen is used for entering
Aadhar number, face recognition and to identifying the authorized & unauthorized
voters with automatic counting of votes. Hardware consists of monitor, voting
buttons, connecting cable and wires and webcam as shown in Fig. 7. VNC viewer
works by connecting to the server with IP address using username and password as
shown in Fig. 8.
Algorithm (Registration)
Step1
Step2
Step3
Enter ID number
Capturing of images of face
Captured successfully
Fig. 5 Registration method
Start
Enter ID
Face
Detection
Training
Storing of
trained images
316
Fig. 6 Voting process of the
proposed methodology
K. Srikrishnaswetha et al.
Start
Wro
Enter
Aadhar
Number
Unauthorized
Correct
Wro
Face
Recogni
-tion
Unauthorized
Corre
Select
candidate by
pressing on
button
Voting display
on screen
Fig. 7 Hardware setup
Result saved
& stored by
using PI
Result sent
by IOT
Secured Electronic Voting Machine Using Biometric …
317
Fig. 8 Connection with IP address
Step4 Images are stored with IDs in haarcascade path.
Step5 Successfully trained
Steps6 Registration completed
Registration of voter details: Registration was important step and is used to register
details of the voter. Figure 9 shows the entering of ID number in register process,
and Fig. 10 shows the capturing of images while registering of details, and after
that, the captured images are trained and stored in the dataset. These are used for
the voting process for face recognition. Voting process: According to the proposed
methodology, voting process consists of three steps ,i.e., entering of Aadhar, face
recognition, storing and sending of data using IOT.
(1) Entering of Aadhar: The process starts by clicking on the start button.
Immediately it displays to enter Aadhar number; if it is correct, we can go
with the next step or else the person is unauthorized.
(2) Face recognition: After entering the Aadhar number, if the person is authorized
immediately the webcam will on and face recognition starts. If the face was
matched with the registered images, then it displays authorized and the person
can go with voting by clicking on one of the voting buttons. After this, the result
will display on the screen. Face recognition works by using Haarcascade frontal
face algorithm (Fig. 11).
318
K. Srikrishnaswetha et al.
Fig. 9 Entering of ID number
Fig. 10 Results of successfully capturing of images
(3) Haarcascade frontal face algorithm: It is an object or human face detecting
algorithm in which cascade can train images from many of positive images
and negative images. Every image has 24 × 24 base windows to calculate
features. Haarcascade identifies features with rectangular boxes; white indicates
the lighter position and black indicates darker positions. Integral images are that
which can calculate the images pixel values at origin (x, y) and can calculate by
adding of all image pixel values of the present pixel. How the pixel calculation
is carried out is explained below:
Secured Electronic Voting Machine Using Biometric …
319
Fig. 11 Storing and training of images
6
3
2
8
5
3
9
1
2
1
1
6
0
5
8
4
3
6
5
7
5
3
1
7
3
The first table is the numerical values from the image of the left side.
9 + 1 + 2 + 6 + 0 + 5 + 3 + 6 + 5 = 37; 37/9 = 4.11
It requires nine operations. 100 * 9 = 900.
1
7
13
21
22
7
20
25
35
15
36
40
55
72
23
46
56
76
111
24
48
60
79
107
41
The second table is the integral image values of the left side.
(76 − 20) − (24 − 5) = 37; 37/9 = 4.11
It requires four operations. 56 + 100 * 4 = 456 (operations)
The image can be reduced by using this integral image. By converting a large image
into small, accuracy increases. The rectangular frame on the image is calculated by
(x, y) coordinates, width and height of the frame.
[Y : y + h, X : x + w]
320
K. Srikrishnaswetha et al.
Algorithm (IOT)
Step1
Step2
Step3
Step4
Step5
After voting process, the data is stored in Raspberry Pi in Excel format
Data are sent to the main location through e-mail.
If else, data can be checked in Raspberry Pi by the authorized person.
It can be send manually also.
Results are released without delay.
Algorithm (Voting Process)
Step1
Step2
Step3
Step4
Enter Aadhar ID number
Immediately opening of webcam.
Capturing of live face and recognizing
Display of authorized or an unauthorized by matching the trained
images and live data.
Step5 Selecting of voting button
Step6 Voting done successfully if authorized.
Step7 Display of results.
Storing and sending of data using IOT: By using IOT, data of result are stored and
immediately sent to the office through mail. By this, late declaration of results can
be avoided.
5 Result
Experimental results is performed in three categories, i.e., authorized, unauthorized
and face spoofing as shown in Figs. 12, 13, 14, 15, 16 and 17.
1. Authorized
The process starts with entering Aadhar number as shown in Fig. 12. If the number
entered was correct, then immediately face recognition starts. If the person was
authorized, he/she can go with voting process as shown in Fig. 13. Finally, votes are
stored in excel format as in Fig. 14, and the result was sent through a mail immediately
after voting as shown in Fig. 15.
2. Unauthorized person as shown in Fig. 16.
3. Figure 17 proved that images are not detectable; only live detection was possible
in this methodology. In the process, if a person was unauthorized, then he/she
was not eligible for voting, and even though they click on voting button, it does
not take the vote as shown in Fig. 16.
Secured Electronic Voting Machine Using Biometric …
Fig. 12 Enter Aadhar ID
Fig. 13 Display of authorized and voting
321
322
K. Srikrishnaswetha et al.
Fig. 14 Result stored in Excel format
Finally, the proposed methodology works better than the existing technology for
the identification of a human face. The results are shown in Table 2.
Accuracy = 100 ∗ ((TP + TN)/N)
(FAR) = TP/(TP + FN)
(FRR) = TP/(TP + FP)
From the above comparison, we can say that our proposed methodology was better
in accuracy, and it reduces error percentage.
6 Conclusions
In our country still, the process of elections is not secured. This paper proposed a
highly secured process for fair voting. This proposed method can go with automatic
counting of votes, face recognition, better registration process, storing and sending
of results and declaration of results. So, by this, we can avoid duplicate voting, wrong
registration, fake biometric and late declaration of results for the better elections for
the better country.
Secured Electronic Voting Machine Using Biometric …
Fig. 15 Receiving of mail
323
324
Fig. 16 Unauthorized person
Fig. 17 Images cannot be detectable
K. Srikrishnaswetha et al.
Secured Electronic Voting Machine Using Biometric …
325
Table 2 Comparison of different techniques parameters
S. no.
Method
Accuracy %
Error %
FAR (precision) %
FRR (recall) %
1
Skin + edge
66.2
33.78
19.8
–
2
E + skin + edge
82.7
17.2
22.8
–
3
RGB
69
–
43.05
–
4
RGB + CBCR
77
–
36.14
–
5
RGB + H
83.5
–
33.82
–
6
RGB + H +
CBCR
90.83
–
28.29
–
7
Proposed
96.2
3.8
0.04
0.02
Acknowledgement The authors acknowledge that the photographs/images used in this paper are
their own and approved for publishing online.
References
1. B. Shahzad, J. Crowcroft, Trustworthy electronic voting using adjusted blockchain technology.
IEEE Access 7, 24477–24488 (2019)
2. M. Ahmad Khan, K. Salah, IoT security: review, blockchain solutions, and open challenges.
Future Gener. Comput. Syst. 82, 395–411 (2018)
3. X. Yang, X. Yi, S. Nepal, A. Kelarev, F. Han, A secure verifiable ranked choice online voting
system based on homomorphic encryption. IEEE Access 6, 20506–20519 (2018)
4. M. Karim, S. Khan, A proposed framework for the biometric electronic voting system, IEEE
International Conference on Telecommunications and Photonics, vol. 1(1) (2017), pp. 12–19
5. R. Rezwan, A. Rahman, Biometrically secured electronic voting machine, in IEEE Region 10
Humanitarian Technology Conference (2017), pp. 127–131
6. V.K. Kalaiselvi, F. Trindade, J. Porfirio A. de Carvalho, R. Cantanhede, Smart voting, in Second
International Conference On Computing and Communications Technologies(ICCCT’17)
(2016), pp. 1–10
7. S. Anandaraj, R. Anish, P.V. Devakumar, Secured electronic voting machine using biometric, in
IEEE International Conference on Innovations in Information, Embedded and Communication
Systems (ICIIECS) (2015), pp. 15
8. Kumar, D. Ashok, T. Ummal Sariba Begum, A novel design of an electronic voting system
using a fingerprint. Int. J. Innov. Technol. Creative Eng. 1(1), 12–19 (2011)
9. A. Himanshu, G.N. Pandey, Online voting system for India based on AADHAAR ID, in 11th
International Conference on ICT and Knowledge Engineering (ICT&KE) (2013), pp. 1–4
10. Kumar, D. Ashok, T. Ummal Sariba Begum, Electronic voting machine—a review, in IEEE
International Conference on Pattern Recognition, Informatics and Medical Engineering
(PRIME) (2012), pp. 41–48
11. K. Srikrishna Swetha, S. Kumar, A study on smart electronics voting machine using face
recognition and Aadhar verification with IOT, in 7th International Conference on Innovations
in Electronics & Communication Engineering (ICIECE—2018), vol. 65, (Springer, 2018),
p. 8795
12. K. Srikrishna Swetha, S. Kumar, Comparison study on various face detection techniques, in
4th International Conference on Computing, Communication, and Automation (ICCCA-2018)
(IEEE, 2018), pp. 95–99
326
K. Srikrishnaswetha et al.
13. R.P. Jacobi, F. Trindade, J.P.A. de Carvalho, R. Cantanhede, JPEG decoding in an electronic
voting machine, in IEEE 13th Symposium on Integrated Circuits and Systems Design (2000),
pp. 177–182
14. M.M. Islam, M.S.U. Azad, M.A. Alam, N. Hassan. Raspberry Pi and image processing based
electronic voting machine (EVM). Int. J. Sci. Eng. Res. 5(1), 1506–1510 (2014)
15. D. Karima, Pr. T. Victor, Dr. R. Faycal, An improved electronic voting machine using a
microcontroller and a smart card, in 9th International Design and Test Symposium (IEEE,
2014), pp. 219–224
16. S.M. Hussain, C. Ramaiah, R. Asuncion, S. Azeemuddin Nizamuddin, R. Veerabhadrappa,
An RFID based smart EVM system for reducing electoral frauds, in 5th International
Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and
Future Directions) (2016), pp. 371–374
17. A. Das, M. Pratim Dutta, S. Banerjee, C.T Bhunia, Cutting edge multi stratum secured electronic
voting machine design with inclusion of biometrics RFID and GSM module, in IEEE 6th
International Conference on Advanced Computing (2016), 667–673
18. S. Lavanya, Trusted secure electronic voting machine, in International Conference on
Nanoscience, Engineering, and Technology (2011), pp. 507–209
19. S. Gawhale, V. Mulik, P. Patil, N. Raut, IOT based E-voting system. Int. J. Res. Appl. Sci. Eng.
Technol. (IJRASET) 5(5) (2017)
20. S. Kumar, S. Singh, J. Kumar, Live detection of face using machine learning with multi-feature
method, in Wireless Personal Communication Springer Journal (SCI) Published https://doi.
org/10.1007/s11277-018-5913-0
21. S. Kumar, S. Singh, J. Kumar Automatic live facial expression detection using genetic algorithm
with Haar wavelet features and SVM, in Wireless Personal Communication Springer Journal
(SCI) Published https://doi.org/10.1007/s11277-018-5923-y
22. Soumya, S. Kumar, Health care monitoring based on internet of things, in The (Springer)
International Conference on Artificial Intelligence & Cognitive Computing (AICC), 2nd–3rd
Feb. 2018 Hyderabad (Scopus Indexed-Published)
23. S. Kumar, S. Singh, J. Kumar, A study on face recognition techniques with age and
gender classification, in IEEE International Conference on Computing, Communication and
Automation (ICCCA) (2017), pp. 1001–1006
24. S. Kumar, S. Singh J. Kumar, A comparative study on face spoofing attacks, in IEEE
International Conference on Computing, Communication and Automation (ICCCA) (2017),
pp. 1104–1108
25. S. Kumar, S. Singh J. Kumar, Gender classification using machine learning with multi-feature
method, in IEEE 9th Annual Computing and Communication Workshop and Conference
(CCWC), Las Vegas, USA, 7th–9th Jan. 2019
26. S. Kumar, A. Sony, R. Hooda, Y. Singh, Multimodel biometric authentication system for
automatic certificate generation, in J. Adv. Sch. Res. Allied Educ. 16(3) (2019)
27. S. Kumar, S. Singh J. Kumar, Automatic face detection using genetic algorithm for various
challenges. Int. J. Sci. Res. Mod. Educ. 2(1) (2017), 197–203. ISSN: 2538-4155
28. S. Kumar, Deepika, M. Kumar, An improved face detection technique for a long distance and
near-infrared images. Int. J. Eng. Res. Mod. Educ. 2(1), (2017), pp. 176–181. ISSN: 2455–4200
29. S. Kumar, S. Singh J. Kumar, A multiple face detection using hybrid features with SVM
classifier, in The Springer Conference on Data Communication and Networks (Co-located
with GUCON 2018). ISBN: 978-981-13-2254-9 (Springer Journal- Published)
30. S. Kumar, S. Sharma, Image Compression Based on Improved Spiht and Region of Interest. M.
Tech diss. (2011)
31. S. Kumar, H. Dalmia, A study on internet of things applications and related issues. Int. J. Appl.
Adv. Sci. Res. 2(2), 273–277 (2017). ISSN: 2456-3080
View publication stats
Download