Secured E-Voting System Using Two-Factor Biometric Authentication
Secured E-Voting System Using Two-Factor Biometric Authentication
Secured E-Voting System Using Two-Factor Biometric Authentication
Abstract --- Building a secure voting system that offers privacy detecting an individual’s face and then recognizing if it
of conventional voting system with proper voter authentication & matches with any of the voter’s face stored prior in the voter
transparency has been a challenge for a due course of time. The database thereby avoiding duplicate votes.
research work proposes a secured and robust electronic voting
system based on popular machine learning based facial
recognition algorithms and biometric authentication Face recognition undoubtedly stands to be the most
methodologies for the purpose of building a secure voting system.
demanding yet difficult computing method due to various
In particular, it focuses on the potential working of face detection
and recognition and bio-metric authentication namely bio-metric
factors like background of the image, image illumination, facial
scan, and the implementation procedure, which improves the expressions, angles and postures. Many algorithms are
security and decreases the duplicate vote and fraudulent to make available that tend to meet the above purpose yet Eigen-face
the system as more efficient and user friendly in nature. based facial recognition is considered to be more viable
the extracted eigen-faces which is mostly not possible and C. PCA which plays a crucial role in this algorithm is a
only a part of the eigen-faces (important features) are generally method that finds an arrangement of projection vectors
used to limit the computation and computational resources (eigen vectors) comparing to the Eigen estimations of the
thereby resulting in an approximation of the original. original image, performed as follows:
1) Prepare the Voter Dataset:
x All the images (must be of same size) of the registered
voters stored in dataset are to be converted into their
respective vectors and each vector will have its
respective eigen-faces.
x Say there M images I1, I2, I3, ............... IM each of size
NxN and are converted respectively into vectors Г1, Г2,
Г3, ГM.
2) Calculating the mean of Image-vectors:
x Calculating mean of the image-vectors is used in
further calculation of eigen-vectors (oreigen-faces)
using the above process and then find out the weighted- d) Minutiae Matching: Minutiae matching is used to
Eigen sum of images in the database closer to the compare the data stored in the database with the test data using
current weighted eigen-sum and then compare the the below formulae :
eigen-faces of current image with those of the closest
cluster in the database. If a match is found then the
individual is a legal voter else there are high chances of
voter fraud.
x Though facial recognition can do mass identification
there might be cases where this algorithm may be Where xi represents minutiae points of references stored in
fooled like people with same facial features or identical database and Xi represents minutiae points of the voter’s
twins. Hence, it's not the most reliable and efficient
fingerprint that is to be tested or verified.
biometric authentication techniques at times when
compared to others. Thus, in order to make the Voting
system more secure and efficient a two-step
verification of 1. Facial Recognition and 2. Fingerprint
recognition is needed which can never be failed. Matching score varies on a range of 0 to 1 indicating a
complete fingerprint mismatch and a perfect fingerprint match
III. THUMB RECOGNITION respectively.
Fingerprint recognition is the most unique biometric
authentication known so far, as the ridge arrangement on every
finger of every individual is unique and it will not alter
although the dimensions of fingers change with respect to
growth and age. There is never a scenario where any two
fingerprints among billions available are found similar so far.
Thus a 2-factor verification using fingerprint recognition will
make the system more efficient and foolproof. Out of all the
algorithms available minutiae algorithm is widely used for
fingerprint recognition and is described as follows:
3) Minutiae Extraction & Marking: The ridged image is Fig 2. Working of Minutiae based Fingerprint Recognition
further divided into 3x3 matrices and crossing number Algorithm
technique described below is applied to mark the minutiae as:
a) Bifurcation: In a 3x3 matrix if the central pixel and 3 During the time of registration face images and fingerprints
of its neighbors have a value of 1 then the central pixel is a should be taken along with the basic voter details, such that at
branch of bifurcation. the time of polling a two-factor authentication of the voter can
b) Termination: If central pixel and just one of its be done by using Eigen-face based algorithm for facial
neighbors have a value of 1 then the central pixel is a ridge recognition and minutiae algorithm for fingerprint recog nition.
ending or termination. The voter will be allowed to cast his vote only if the eigen -
c) Trifurcation: If both the uppermost pixel and the faces and fingerprints of the voter match with those in the
rightmost pixel have a value of 1 false minutiae points are database. In case of physically challenged people, who
removed and left-over minutiae points are marked.
REFERENCES
[1] Kaur, R., & Himanshi, E. (2015). Face recognition using Principal
Component Analysis. 2015 IEEE International Advance Computing
Conference (IACC). doi:10.1109/iadcc.2015.7154774 .
Fig 3. Working of Secure E-voti ng system using two-
[2] Zhao, X., & Wei, C. (2017). A real-time face recognition system based
factor authentication on the improved LBPH algorithm. 2017 IEEE 2nd International
Conference on Signal and Image Processing
I V. Advantages over the existing system (ICSIP). doi:10.1109/siprocess.2017.8124508
The conventional voting system have plethora of problems, [3] Mil’shtein, S., Pillai, A., Shendye, A., Liessner, C., & Baier, M.
(2008). Fingerprint Recognition Algorithms for Partial and Full
Procedure we follow is time taking, involve more man Fingerprints. 2008 IEEE Conference on Technologies for Homeland
power huge costs and yet not secure, many complaints get Security. doi:10.1109/ths.2008.4534494
registered for every voting cycle organized, vote is the basic [4] Finger Print Algorithm ( https://www.supremasolution.com/T ech2.php)
right of every citizen of the country, due to malpractices [5] Mallipamula Megha Sai Sree et al, International Journal of Computer
that are getting arise leads to the demise of rights of the Science and Mobile Computing, Vol.3 Issue.8, August - 2014, pg. 476-
citizens, major malpractices that occur during the election 481” Finger Print Enhancement Using Minutiae Based Algorithm”
[6] Manisha Redhu and Dr.Balkishan/ International Journal of Engineering
procedures are mainly due to failures of manual Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
authentication the solution proposed can solve the issue of Vol. 3, Issue 4, Jul-Aug 2013,pp .2488-2497 2488 | P a g e Fingerprint
authentication, by dual authentication method the voters Recognition Using Minutiae Extractar
bio-metrics and face are recognized by algorithms that are [7] Bindhu, V. "Biomedical Image Analysis using Semantic
robust, these help in solving the major cases of voter Segmentation." Journal of Innovative Image Processing (JIIP) 1, no. 02
(2019): 91-101.
authentication. During the time of registration face images
[8] Hariyanto, Sudiro, S. A., & Lukman, S. (2015). Minutiae Matching
and fingerprints should be taken along with the basic voter Algorithm Using Artificial Neural Network for Fingerprint Recognition.
details, such that at the time of polling a two -factor 2015 3rd International Conference on Artificial Intelligence, Modelling
authentication of the voter can be done by using Eigen -face and Simulation (AIMS). doi:10.1109/aims.2015.16
based algorithm for facial recognition and minutiae [9] RAVI. J*, K. B. RAJA**, VENUGOPAL. K. R “Fingerprint Recognition
algorithm for fingerprint recognition. The voter will be Using Minutia Score Matching” Ravi.J. et al
/International Journal of Engineering Science and Technology Vol.1(2),
allowed to cast his vote only if the eigen-faces and 2009, 35-42
fingerprints of the voter match with those in the database. [10] N. U. Ain, F. Shaukat, A.S. Nagra and G. Raja, “An Efficient Algorithm
In case of physically challenged people, who cannot submit For Fingerprint Recognition Using Minutiae” Vol. 70 No. 2 June, 2018)
their fingerprints, iris and facial recognition can be do ne.
This secure system thus avoids the vote frauds and
malpractices during elections. In future, this procedure can
be made completely digital on an online platform which can
be connected to live dashboard - making it a secure, rapid,
fraud reductant and dynamic E-voting system which
decreases a lot of mankind and resources put into the
traditional voting system.