In developing countries like \"INDIA\", the election commission follows manual voting mechanism which is done by the electronic voting machine. But instead of this, The poll rate of India has only increased by 4 percent from 1952 to 2014. So a machine was required to automate the process and can be avail machine is placed in the poll booth center and is monitored by higher officials, due to some illegal activities the polling center are misused and people\'s right to has been denied. This seldom occurs in rural areas as well as in urban cities because the educated people are not interested in casting their votes to candidates who represent their respective areas. To ensure 100% voting, automation came into play. But this automated system has been approved only on some developed countries since security have not been ensured to a large extent. The poll percentage of India has never exceeded 67% till date.
This paper presents the enhancement ofElectronicVotingMachine(EVM)performanceusingfingerprint and face recognition. In democratic countries, the EVM plays a vital role in the election process. Even though it has more benefits; still the malpractices are continued due to manual verification of electoral documents for all elections in democratic countries.In this proposed method EVM with biometric fingerprint and face recognition devices are used to overcomethis problem. To conquer the issues existing in the electionprocessfor voter identificationthe biometric fingerprint andweb cameras are introduced in the EVMs. The people at the polling booth need to put the finger in the fingerprint equipment andface to be captured by the web camera provided to recognize them. The controller fetches the data from the input devices and compares it with the database to enable the polling device to cast their votes. In practice, due to some technical issue either in the input devices or from the voter side the election process will be continued by document verification. In the polling booths, the presiding officersare havingtheright toenablethepollingdevice by pressing the enable button after document verification.The performance of the proposed method was validated with EVM successfully.
Introduction
The Fingerprint Voting System is a modern electronic voting approach that uses biometric authentication (fingerprint and face recognition) to ensure secure, accurate, and tamper-proof elections. It aims to overcome issues in traditional voting systems such as impersonation, invalid votes, fraud, high cost, and time consumption.
Earlier, voting relied on paper ballots, which were slow and prone to malpractice. The introduction of Electronic Voting Machines (EVMs) improved efficiency, but concerns about security and trust still remain. To address these issues, the proposed system enhances EVMs by integrating fingerprint and face recognition technologies.
Key Features of the Proposed System
Uses face recognition first, followed by fingerprint verification if needed.
If both fail, manual document verification is performed.
Built using components like Raspberry Pi, fingerprint sensor, webcam, LCD, and push buttons.
Stores voter data securely and prevents duplicate voting by detecting fraud attempts.
Maintains a read-only record of votes for transparency.
Working Process
Voter enters name and face is scanned.
If face matches → allowed to vote.
If not → fingerprint is checked.
If still not verified → manual verification is done.
Once a vote is cast, the system blocks repeat voting and shows a fraud alert if attempted.
Results and Findings
The system successfully reduces fake voting and malpractices.
Ensures secure, fast, and accurate voting.
Stores voting details confidentially with time and voter identity.
Advantages
High security through biometric authentication
Prevents duplicate and unauthorized voting
Saves time and reduces manpower
Cost-effective and efficient
Disadvantages
Requires prior voter registration
Fingerprint sensor may have sensitivity issues
Conclusion
The work is mainlyintended to develop a fingerprint and face-recognition-based advanced EVM. This helps to conduct free and fair elections in democratic countries like India. To ensure the security of the voter and preserve the sanctity of the method, a two-layer security scheme has been introduced. The pushbuttons are used to select the person to whom the candidates are going to vote. Initially, the finger of the voter is placed on the fingerprint sensor and if the voter is authorized then the signals are sent to the controller and then the second step is facial detection in this the web camera is used to detect facial details like iris or the retina scanning and once the voter is authorized then the voter is eligible to mark his vote using the pushbuttons given separately. Finally, all data is stored in an excel sheet and the results are announced for the particular election.
References
[1] Caltech-MIT. ( 2001 ) Voting: what is, what could be. Cal Tech-MIT Voting technology Project Report.
[2] J. Bohli, C. Henrich, C. Kempka, J. Muller-Quade and S. Rohrich,\"Enhancing Electronic Voting Machines on the Example of BingoVoting,\" in IEEE Transactions on Information Forensics and Security,vol. 4, no. 4, pp. 745-750, Dec. 2009, doi: 10.1109/TIFS.2009.2033755
[3] R. A. Fink, A. T. Sherman and R. Carback, \"TPM Meets DRE:Reducing the Trust Base for Electronic Voting Using Trusted PlatformModules,\" in IEEE Transactions on Information Forensics and Security,vol. 4, no. 4, pp. 628-637, Dec. 2009, doi: 10.1109/TIFS.2009.2034900.
[4] T.Antonyan etal., \"State-WideElections,OpticalScan VotingSystems,and the Pursuit of Integrity,\" in IEEE Transactions on InformationForensics and Security, vol. 4, no. 4, pp. 597-610, Dec. 2009, doi:10.1109/TIFS.2009.2033232.
[5] F. Ye, Z. Zhang, K. Chakrabarty and X. Gu, \"Board-Level FunctionalFault Diagnosis Using Artificial Neural Networks, Support-VectorMachines, and Weighted-Majority Voting,\" in IEEE Transactions onComputer-AidedDesign ofIntegrated Circuitsand Systems, vol.32, no.5, pp. 723-736, May 2013, doi: 10.1109/TCAD.2012.2234827.
[6] E. Maggiori, P. Lotito, H. L. Manterola and M. d. Fresno, \"Commentson “A Closed-Form Solution to Tensor Voting: Theory andApplications”, in IEEE Transactions on Pattern Analysis and MachineIntelligence, vol. 36, no. 12, pp. 2567-2568, 1 Dec. 2014, doi:10.1109/TPAMI.2014.2342233.
[7] Ramesh Jayaraman and Aruldoss Albert Victoire, “Implementation ofDifferential Equation of Single-Phase Source-Load System BasedControlAlgorithmforThree-PhaseDSTATCOMunderStiffSource,”ElectricPowerComponentsandSystems, 45:18,1985-1995, DOI: 10.1080/15325008.2017.1362606
[8] J. Yerramsetti, D. S. Paritala and Ramesh Jayaraman, \"Design andImplementation of Automatic Robot for Floating Solar Panel CleaningSystem using AI Technique,\" IEEE 2021 International Conference onComputerCommunicationandInformatics(ICCCI),2021,pp.1-4,DOI:10.1109/ICCCI50826.2021.9402482.
[9] P.Eekshita,N.S. V.NarayanaandRameshJayaraman,\"WirelessPowerTransmission System,\" IEEE 2021 International Conference onComputerCommunicationandInformatics(ICCCI),2021,pp.1-4,DOI:10.1109/ICCCI50826.2021.9402575.
[10] A. A. Anik, R. Jameel, A. F. Anik and N. Akter, \"Design of a solarpower Electronic Voting Machine,\" 2017 International Conference onNetworking, Systems and Security (NSysS), 2017, pp. 127-131, doi:10.1109/NSysS.2017.7885813.
[11] K. Randhawa, C. K. Loo, M. Seera, C. P. Lim and A. K. Nandi, \"CreditCard Fraud Detection Using AdaBoost and Majority Voting,\" in IEEEAccess, vol. 6, pp. 14277-14284, 2018, doi:10.1109/ACCESS.2018.2806420.
[12] N. J. Avinash, R. Chethan, S. Bhat and R. Pinto, \"High PerformanceElectronic Voting Machine (EVM) Implementation Using ARM CortexM3,\" 2020 Fourth International Conference on I-SMAC (IoT in Social,Mobile, Analytics and Cloud) (I-SMAC), 2020, pp. 1-5, doi: 10.1109/I-SMAC49090.2020.9243321.
[13] Aishwarya Karra, Bhuvana Kondi and Ramesh Jayaraman,“Implementation of Wireless Communication to Transfer Temperatureand Humidity Monitoring Data using Arduino Uno,” in Proc. 9th IEEEInternational Conference on Communication and Signal Processing(ICCSP’20) Sep-2020,pp.1101-1105.DOI:10.1109/ICCSP48568.2020.9182139
[14] V. K. Priya, V. Vimaladevi, B. Pandimeenal and T. Dhivya, \"Arduinobased smart electronic voting machine,\" 2017 International ConferenceonTrendsin ElectronicsandInformatics(ICEI),2017,pp.641-644,doi:10.1109/ICOEI.2017.8300781.
[15] V. Cortier, C. C. Dragan, F. Dupressoir and B. Warinschi, \"Machine-Checked Proofs for Electronic Voting: Privacy and Verifiability forBelenios,\" 2018 IEEE 31st Computer Security Foundations Symposium(CSF), 2018, pp. 298-312, doi: 10.1109/CSF.2018.00029.
[16] S. S. Kadam, R. N. Choudhary, S. Dandekar, D. Bardhan and N. B.Vaidya, \"Electronic Voting Machine with Enhanced Security,\"2018 3rdInternational Conference on Communication and Electronics Systems(ICCES), 2018, pp. 403-406, doi: 10.1109/CESYS.2018.8723921.
[17] Ramesh Jayaraman and AlbertVictoire TAruldoss,“AnAdaptiveHysteresis Band Current Controller Based DSTATCOM forEnhancement of Power Quality with Various Load”, InternationalReview on Modeling and Simulations (I.RE.MO.S), ISSN 1974-9821,Vol.6, No. 06, 2013, pp. 1814-1820.
[18] B. Jaya Deepthi, J. Ramesh and P. Chandra Babu Naidu, \"Detection ofElectricity Theft in the Distribution System using Arduino and GSM,\"2019 International Conference on Computation of Power, Energy,Information and Communication (ICCPEIC), 2019, pp. 174-179, doi:10.1109/ICCPEIC45300.2019.9082397.
[19] A. Villafiorita, K. Weldemariam and R. Tiella, \"Development, FormalVerification, and Evaluation of an E-Voting System With VVPAT,\" inIEEE Transactions on Information Forensics and Security, vol. 4, no. 4,
[20] pp.651-661,Dec.2009,doi: 10.1109/TIFS.2009.2034903.
[21] S. V., A. Sarkar, A. Paul and S. Mishra, \"Block Chain Based CloudComputing Model on EVM Transactions for Secure Voting,\" 2019 3rdInternational Conference on Computing Methodologies andCommunication (ICCMC), 2019, pp. 1075-1079, doi:10.1109/ICCMC.2019.8819649.
[22] K. Patidar and S. Jain, \"Decentralized E-Voting Portal UsingBlockchain,\" 2019 10th International Conference on Computing,Communication and Networking Technologies (ICCCNT), 2019, pp. 1-4, doi: 10.1109/ICCCNT45670.2019.8944820.
[23] A. K. Tyagi, T. F. Fernandez and S. U. Aswathy, \"Blockchain andAadhaar based Electronic Voting System,\" 2020 4th InternationalConference on Electronics, Communication and Aerospace Technology(ICECA),2020,pp.498-504, doi:10.1109/ICECA49313.2020.9297655.
[24] J. Manoharan Samuel, \"A Novel User Layer Cloud Security Modelbased on Chaotic Arnold Transformation using Fingerprint BiometricTraits,\" Journal of Innovative Image Processing (JIIP), vol 3, no.1,pp.36-51, , Apri 2021, DOI: https://doi.org/10.36548/jiip.2021.1.004.
[25] AkeySungheetha and R.Rajesh Sharma. \"3D Image Processing usingMachine Learning based Input Processing for Man-MachineInteraction.\" Journal of Innovative Image Processing (JIIP), vol 3, no.01,pp.1-6, Feb 2021, DOI: https://doi.org/10.36548/jiip.2021.1.001.
[26] Sayantan Dutta,and Ayan Banerjee, \"Highly Precise Modified BlueWhaleMethod Framed byBlendingBatandLocalSearch Algorithmforthe Optimality of Image Fusion Algorithm.\" Journal of Soft ComputingParadigm (JSCP), vol. 2, no. 04, pp. 195-208, Sept. 2020. DOI:https://doi.org/10.36548/jscp.2020.4.001.
[27] Anandaraj S, Anish R and Devakumar P.V, \"Secured electronic votingmachineusingbiometric,\"2015InternationalConferenceonInnovationsin Information, Embedded and Communication Systems (ICIIECS),2015, pp. 1-5, doi: 10.1109/ICIIECS.2015.7192976.
[28] S. M. Hasan, M. T. Rashid, M. S. S. Chowdhury and M. K. Rhaman,\"Development of a credible and integrated electronic voting machinebased on contactlessIC cards, biometriefingerprint credentialsand POSprinter,\" 2016 IEEE Canadian Conference on Electrical and ComputerEngineering (CCECE), 2016, pp. 1-5, doi:10.1109/CCECE.2016.7726821.
[29] R. Rezwan, H. Ahmed, M. R. N. Biplob, S. M. Shuvo and M. A.Rahman, \"Biometricallysecuredelectronicvotingmachine,\"2017 IEEERegion 10 Humanitarian Technology Conference(R10-HTC), 2017, pp.510-512, doi: 10.1109/R10-HTC.2017.8289010.
[30] A. M. Jagtap, V. Kesarkar and A. Supekar, \"Electronic Voting Systemusing Biometrics, Raspberry Pi and TFT module,\" 2019 3rdInternational Conference on Trends in Electronics and Informatics(ICOEI), 2019, pp. 977-982, doi: 10.1109/ICOEI.2019.8862671.
[31] X. Zhang, J. Wang, Y. Li, R. Jäntti, M. Pan and Z. Han, \"Catching AllPokémon: Virtual Reward Optimization With Tensor Voting BasedTrajectory Privacy,\" in IEEE Transactions on Vehicular Technology,vol.68, no.1, pp. 883-892,Jan.2019,doi:10.1109/TVT.2018.2882733.