project rough report

22
FINGER PRINT AUTHENTICATED VOTING MACHINE Dept of ECE, SIST 1 1 INTRODUCTION Electronic voting is probably the most security sensitive process handled electronically now a day. The main aim in designing this product is to provide the concept of the personal identity for each individual. This is extended to a special case of electronic voting machine concept. The summary of the design can be briefly explained diagrammatically as fo ll ows. The project is a microcontroller based system which employs a fingerprint sensor to authenticate the voter. As a pre-polling procedure the finger prints of all the voters are collected and stored in a dat abase initially at time of distributing voting cards. At the time of voting, the option of the voter is taken along with the finger print. The finger print taken by the biometric sensor is sent to the transmitter of the master room. A  provision for saving and transmitting the polled votes to a centralized station is also made, thus enabling to monitor the results insolently. That is, either after the completion of the  polling or else as decided b y the concerned authority.

Upload: athulya331

Post on 06-Apr-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Project Rough Report

8/3/2019 Project Rough Report

http://slidepdf.com/reader/full/project-rough-report 1/21

FINGER PRINT AUTHENTICATED VOTING MACHINE

Dept of ECE, SIST

1

1 INTRODUCTION

Electronic voting is probably the most security sensitive process handledelectronically now a day. The main aim in designing this product is to provide the concept of 

the personal identity for each individual. This is extended to a special case of electronic

voting machine concept. The summary of the design can be briefly explained

diagrammatically as follows.

The project is a microcontroller based system which employs a fingerprint sensor to

authenticate the voter. As a pre-polling procedure the finger prints of all the voters are

collected and stored in a database initially at time of distributing voting cards.

At the time of voting, the option of the voter is taken along with the finger print. The

finger print taken by the biometric sensor is sent to the transmitter of the master room. A

 provision for saving and transmitting the polled votes to a centralized station is also made,

thus enabling to monitor the results insolently. That is, either after the completion of the

 polling or else as decided by the concerned authority.

Page 2: Project Rough Report

8/3/2019 Project Rough Report

http://slidepdf.com/reader/full/project-rough-report 2/21

FINGER PRINT AUTHENTICATED VOTING MACHINE

Dept of ECE, SIST

2

2 HISTORY OF FINGERPRINT SYSTEM

Fingerprints offer an infallible means of personal identification. That is the essential

explanation for fingerprints having replaced other methods of establishing the identities of 

criminals reluctant to admit previous arrests. The science of fingerprint Identification stands

out among all other forensic sciences for many reasons, including the following:

y  Has served governments worldwide for over 100 years to provide accurate

identification of criminals. No two fingerprints have ever been found alike in many

  billions of human and automated computer comparisons. Fingerprints are the very

 basis for criminal history foundation at every police agency on earth.

y  Established the first forensic professional organization, the International Association

for Identification (IAI), in 1915.

y  Established the first professional certification program for forensic scientists, the

IAI's Certified Latent Print Examiner program (in 1977), issuing certification to those

meeting stringent criteria and revoking certification for serious errors such as

erroneous identifications.

y  Remains the most commonly used forensic evidence worldwide - in most

  jurisdictions fingerprint examination cases match or outnumber all other forensic

examination casework combined.

y  Continues to expand as the premier method for positively identifying persons, with

tens of thousands of persons added to fingerprint repositories daily in America alone -

far outdistancing similar databases in growth.

y  Worldwide, fingerprints harvested from crime "scenes lead to more suspects and

generate more evidence in court than all other forensic laboratory techniques

combined"

Page 3: Project Rough Report

8/3/2019 Project Rough Report

http://slidepdf.com/reader/full/project-rough-report 3/21

FINGER PRINT AUTHENTICATED VOTING MACHINE

Dept of ECE, SIST

3

Other visible human characteristics tend to change - fingerprints do not. Barring

injuries or surgery causing deep scarring, or diseases such as leprosy damaging the formative

layers of friction ridge skin (injuries, scarring and diseases tend to exhibit telltale indicators

of unnatural change), finger and palm print features have never been shown to move about or 

change their unit relationship throughout the life or a person.

In earlier civilizations, branding and even maiming were used to mark the criminal

for what he or she was. The thief was deprived of the hand which committed the thievery.

Ancient Romans employed the tattoo needle to identify and prevent desertion of mercenary

soldiers. Before the mid-1800s, law enforcement officers with extraordinary visual

memories, so-called "camera eyes," identified previously arrested offenders by sight.

Photography lessened the burden on memory but was not the answer to the criminalidentification problem. Personal appearances change.

Around 1870, French anthropologist Alphonse Bertillon devised a system to measure

and records the dimensions of certain bony parts of the body. These measurements were

reduced to a formula which, theoretically, would apply only to one person and would not

change during his/her adult life.

The Bertillon System was generally accepted for thirty years. But it never recoveredfrom the events of 1903, when a man named Will West was sentenced to the U.S.

Penitentiary at Leavenworth, Kansas. It was discovered that there was already a prisoner at

the penitentiary at the time, whose Bertillon measurements were nearly the same, and his

name wasWilliamWest. Upon investigation, there were indeed two men who looked exactly

alike. Their names were Will and William West respectively. Their Bertillon measurements

were close enough to identify them as the same person. However, a fingerprint comparison

quickly and correctly identified them as two different people. (Per prison records discovered

later, the West men were apparently identical twin brothers and each had a record of 

correspondence with the same immediate family relatives.)

Page 4: Project Rough Report

8/3/2019 Project Rough Report

http://slidepdf.com/reader/full/project-rough-report 4/21

FINGER PRINT AUTHENTICATED VOTING MACHINE

Dept of ECE, SIST

4

3 OBJECTIVE OF THE PROJECT 

The project demands the user to submit his Finger print at the polling booth. The

 project uses the Finger print technology and Embedded Systems to design this application.

The main objective of this project is to design a system that asks the user to show his Finger 

 print as an identity proof. The system reads the data from the Finger print and verifies this

data with the already stored data in its database. If the details present in the data base it

matches with the stored data, the system allows the person to enter into and poll his vote. If 

the details of the Finger do not match with the stored data, the system immediately activates

the display and the security authorities can come and take the further action. This project is a

device that collects data from the tag and codes the data into a format that can be understood

 by the controlling section. This system also collects information from the master device and

implements commands that are directed by the master. The objective of the project is to

develop a microcontroller based security and alert system. It consists of a Finger print reader,

microcontroller, the interfacing unit to allow the communication between the microcontroller 

and Finger print module, and the LCD.

Page 5: Project Rough Report

8/3/2019 Project Rough Report

http://slidepdf.com/reader/full/project-rough-report 5/21

FINGER PRINT AUTHENTICATED VOTING MACHINE

Dept of ECE, SIST

5

4 OVERVIEW OF THE TECHNOLOGIES USED

An embedded system can be defined as a computing device that does a specific

focused job. Appliances such as the air-conditioner, VCD player, DVD player, printer, fax

machine, mobile phone etc. are examples of embedded systems. Each of these appliances

will have a processor and special hardware to meet the specific requirement of the

application along with the embedded software that is executed by the processor for meeting

that specific requirement. The embedded software is also called ³firm ware´. The

desktop/laptop computer is a general purpose computer. You can use it for a variety of 

applications such as playing games, word processing, accounting, software development and

soon. In contrast, the software in the embedded systems is always fixed listed below:Embedded systems do a very specific task they cannot be programmed to do different things.

Embedded systems have very limited resources, particularly the memory. Generally, they do

not have secondary storage devices such as the CDROM or the floppy disk. Embedded

systems have to work against some deadlines. A specific job has to be completed within a

specific time. In some embedded systems, called real-time systems, the deadlines are

stringent. Missing a deadline may cause a catastrophe-loss of life or damage to property.

Embedded systems are constrained for power. As many embedded systems operate through a

 battery, the power consumption has to be very low. Some embedded systems have to operate

in extreme environmental conditions such as very high temperatures and humidity. Following

are the advantages of Embedded Systems:

1. They are designed to do a specific task and have real time performance constraints which

must be met.

2. They allow the system hardware to be simplified so costs are reduced.

3. They are usually in the form of small computerized parts in larger devices which serve ageneral purpose.

4. The program instructions for embedded systems run with limited computer hardware

resources, little memory and small or even non-existent keyboard or screen.

Page 6: Project Rough Report

8/3/2019 Project Rough Report

http://slidepdf.com/reader/full/project-rough-report 6/21

FINGER PRINT AUTHENTICATED VOTING MACHINE

Dept of ECE, SIST

6

5 BACKGROUND OF THE PROJECT

The software application and the hardware implementation help the microcontroller 

read the data from the Finger print verify the data with the already stored data and take the

next action. The system is totally designed using Finger print module and embedded systems

technology. The Controlling unit has an application program to allow the microcontroller 

interface with the Finger print module, the reader reads the data from the tag, passes the data

to the microcontroller and the controller verifies this data with the already existing data in the

controller¶s memory and then implement the commands directed by the controller section.

The performance of the design is maintained by controlling unit.

Page 7: Project Rough Report

8/3/2019 Project Rough Report

http://slidepdf.com/reader/full/project-rough-report 7/21

FINGER PRINT AUTHENTICATED VOTING MACHINE

Dept of ECE, SIST

7

6 COMPARISONS OF DIFFERENT BIOMETRIC SYSTEMS

The following table compares some of the biometric systems used lately, from the

 point of view of accuracy, cost, device required and social acceptability.

Table 6.1 Comparison of Different Biometric Systems

Each one of the Technologies used in our days bring us a manner to restrict the access

to a system, allowing the entrance only to those persons who know a specific code, own acard or have determined physic marks. The more complex is the system, the most difficult is

to be attacked, although it will be more expensive and will require more software and

hardware resources. When a new authentication system is implanted, it is essential a

 judgment between simplicity, price and efficiency, as well as social acceptability.

The password method is the cheapest and simplest technology, because it only

requires elementary software resources. On the other hand, this system is easily attackable,

since he is quite simple to obtain the data from a person, either extracting the information to

the person itself using deceits, or attacking the software of the system. For example, it can be

easily installed in the computer, a program that simulates the ³user name and password´

window, so that when the user introduces his data in that window, that will be collected by

the ³Spy´ program. Immediately after this, it appears the true window, identical, and the user 

Page 8: Project Rough Report

8/3/2019 Project Rough Report

http://slidepdf.com/reader/full/project-rough-report 8/21

FINGER PRINT AUTHENTICATED VOTING MACHINE

Dept of ECE, SIST

8

will simply believe that he has been mistaken. So, this method, in spite of being usually used,

for example, to access banking accounts, is not at all the most indicated if we want a safe

system, and in a short-time future is tried to be changed by most immune methods.

The Smart Cards are very useful since they can be easily combined with other 

authentication systems, serving as storage system. Self-containment of smart card makes it

resistant to attack as it does not need to depend upon potentially vulnerable external

resources. But it¶s small size and bends requirements (which are designed to protect the card

  physically), limits the memory and processing resources. And used like the only

identification system, is not excessively trustworthy, since it can be easily stolen, lost or 

simply forgotten at home. Besides, sometimes they are combined with cryptography

methods, which makes them more difficult (more expensive) to implement

The Digital Signature is very difficult to falsify, since is encrypted by complicated

mathematic operations. It is considered that is even less falsifiable than the manual signature

recognition (although this last is already enough trustworthy). The advantage that Biometrics

  presents is that the information is unique for each individual and that it can identify the

individual in spite of variations in the time (it does not matter if the first biometric sample

was taken year ago).The pillars of e-learning security are: authentication, privacy (data

confidentiality) authorization (access control), data integrity and non-repudiation. Biometric

is a technique that can provide all this requirements with quite lot reliability.

Although biometrics is considered the most effective and safe method (is very

difficult to falsify), we have to bear in mind its disadvantages, for example, that since it is a

relative new technology, it is not still integrated in PC, so IT departments need to make a

conscious decision before making the purchase and change its structure. We also have to

consider the advantages and disadvantages of each individual system. In the next paragraphs,

we will make an enumeration of the problems that these techniques can present.

Page 9: Project Rough Report

8/3/2019 Project Rough Report

http://slidepdf.com/reader/full/project-rough-report 9/21

FINGER PRINT AUTHENTICATED VOTING MACHINE

Dept of ECE, SIST

9

7 BLOCK DIAGRAM

Fig 7.1 Block diagram of Fingerprint Authenticated Voting Machine

The block diagram consist of two sections

(a) Polling booth station

(b) Counting station

Polling booth station side consists of the blocks:

Page 10: Project Rough Report

8/3/2019 Project Rough Report

http://slidepdf.com/reader/full/project-rough-report 10/21

FINGER PRINT AUTHENTICATED VOTING MACHINE

Dept of ECE, SIST

10

1.Microcontroller 

Here in this circuit we are using the microcontroller PIC16F877A manufactured by

microchip. It is a 40 pin IC. A Parallel Slave Port is implemented in this microcontroller. The

relevance of PIC16F877A is its low cost, availability. More number of I/O ports provides

more interfacing connectivity. More than a single timer is present in it.

2. Fingerprint Module

A fingerprint module is used to verify the fingerprint of the voters. We are using

fingerprint module manufactured by Sunrome technologies. The fingerprint module hasa

memory for storing the fingerprints during the data collecting phase. It is interfaced with the

microcontroller. The fingerprint module matches the fingerprints of the voters during the

  polling and compares it with the already stored fingerprints, collected during the data

collecting phase.

3. Keypad

Here the keypad is used for voting, in this the candidates name and symbol is placed

with a button.

4. Buzzer 

The buzzer is used to produce sound after the voting and it will produce another 

sound if malpractices are reported.

5. Transceiver 

It is a combination of transmitters and receivers. Here a transmitter is used to send the

votes to the counting station and the receiver is used for receiving the acknowledgement

signal from the counting station. Here we are using a transceiver of 433MHz.

6. Key

A key is used to enable and lock the counting station.

Page 11: Project Rough Report

8/3/2019 Project Rough Report

http://slidepdf.com/reader/full/project-rough-report 11/21

FINGER PRINT AUTHENTICATED VOTING MACHINE

Dept of ECE, SIST

11

The counting station consists of the blocks:

1. Microcontroller 

Here in this circuit we are using the microcontroller PIC16F877A manufactured bymicrochip. It is a 40 pin IC. A Parallel Slave Port is implemented in this microcontroller. The

relevance of PIC16F877A is its low cost, availability. More number of I/O ports provides

more interfacing connectivity. More than a single timer is present in it. It is used for counting

 process after counting the votes it activates the transceiver for sending the acknowledgement

signal.

2. Transceiver 

It is a combination of transmitters and receivers. Here a transmitter is used to transmit

the acknowledgement signal after receiving the votes by the receiver at the counting station.

Here we are using a transceiver of 433MHz.

3. LCD screen

An LCD screen is used for displaying the votes for each candidate.

Page 12: Project Rough Report

8/3/2019 Project Rough Report

http://slidepdf.com/reader/full/project-rough-report 12/21

FINGER PRINT AUTHENTICATED VOTING MACHINE

Dept of ECE, SIST

12

8 CIRCUIT DIAGRAM

8.1 Polling booth side

Fig 8.1 Circuit diagram at polling booth side

The polling booth side acts as the transmitter section. The polling station consist of an

LCD screen, for displaying the voting details for the polling officer, RF transmitter and

receiver, a fingerprint module and the PIC16F877A microcontroller which acts as the heart

Page 13: Project Rough Report

8/3/2019 Project Rough Report

http://slidepdf.com/reader/full/project-rough-report 13/21

FINGER PRINT AUTHENTICATED VOTING MACHINE

Dept of ECE, SIST

13

of the circuit. First of all when a person comes to poll his vote, the polling officer check his

details and then he is allowed to enter into the polling booth. Here inside the polling booth

there is a fingerprint module and the person coming inside has to place his finger on the

fingerprint scanner. The scanner scans his fingerprint and the compares it with already stored

fingerprints and if it matches then the voting is allowed, after comparing this fingerprint it

sends a voter ID which is assigned during the fingerprint collection phase, to the

PIC16F877A and it will examine the number and allows the vote to be send to the counting

station, via an RF transmitter.

If a person who already made his vote comes again and tries to vote again, then from

the voter ID obtained from the fingerprint scanner, the microcontroller finds the repetition of 

the voter ID and it triggers an alarm to alert the polling officer.

A long beep is placed for informing the polling officer that the vote is correctly

recorded and for informing that vote, receiver (counting station) will give a token to the

  polling station and according to that the token receiver will record the vote and for 

conformation a receiver is placed in the polling station for receiving an acknowledgement

from the counting station.

Since there is independent transmitters (voting booths) using a common RF

communication channel, there are chances for collisions caused by multiple stations

transmitting at the same time.

8.2 Counting station

The counting station consists of the devices used for the counting program. The

counting of votes is being a biggest problem in the election process. The malpractices make

the vote counting more and more complex. This automatic counting station can eliminate the

 problems regarding to the counting process to a great extent. This counting station consists of 

a receiver which is receiving the votes and PIC16F877A for the counting programming, anLCD for displaying the output. There are changes for the votes of different polling booth to

get mixed and this problem is eliminated by using a master and slave arrangement.

Page 14: Project Rough Report

8/3/2019 Project Rough Report

http://slidepdf.com/reader/full/project-rough-report 14/21

FINGER PRINT AUTHENTICATED VOTING MACHINE

Dept of ECE, SIST

14

Fig 8.2 Circuit diagram at counting station

A particular time slot is given to a particular polling station for reporting its vote in

the counting station. Thus we can avoid the collision of date from receivers of different

 polling station. If an acknowledgement signal is not received by the station and its time has

entered, then this transmitter has to wait for the next slot. Thus the votes are reached at the

counting station and the voter¶s finger number also. And by using this finger print number 

the malpractices votes are eliminated. That is if a person poll his vote from two different

 polling booth then the votes can be eliminated at the counting station using this details.

Page 15: Project Rough Report

8/3/2019 Project Rough Report

http://slidepdf.com/reader/full/project-rough-report 15/21

Page 16: Project Rough Report

8/3/2019 Project Rough Report

http://slidepdf.com/reader/full/project-rough-report 16/21

FINGER PRINT AUTHENTICATED VOTING MACHINE

Dept of ECE, SIST

16

9 BLINKING AN LED USING ISIS 7 PROFESSIONAL

1.select component mode from the list of icons and then select the required

component from the list.make sure the component selected is active.

2.select the power supply and ground from terminal mode.

3.select the connecting wires from selection mode.

4.connect the components using wires and play the circuit.

Page 17: Project Rough Report

8/3/2019 Project Rough Report

http://slidepdf.com/reader/full/project-rough-report 17/21

FINGER PRINT AUTHENTICATED VOTING MACHINE

Dept of ECE, SIST

17

10 ADVANTAGES AND DISADVANTAGES

9.1 Advantages:

y  Very high accuracy.

y  Is the most economical biometric PC user authentication technique.

y  It is one of the most developed biometrics.

y  Easy to use.

y  Small storage space required for the biometric template, reducing the size of the

database memory required.

y  It is standardized.

9.2 Disadvantages:

y  For some people it is very intrusive, because is still related to criminal identification.

y  It can make mistakes with the dryness or dirty of the finger¶s skin, as well as with the

age (is not appropriate with children, because the size of their fingerprint changes

quickly).

y  Image captured at 500 dots per inch (dpi). Resolution: 8 bits per pixel. A 500 dpi

fingerprint image at 8 bits per pixel demands a large memory space, 240 Kbytes

approximately Compression required (a factor of 10 approximately).

Page 18: Project Rough Report

8/3/2019 Project Rough Report

http://slidepdf.com/reader/full/project-rough-report 18/21

FINGER PRINT AUTHENTICATED VOTING MACHINE

Dept of ECE, SIST

18

11 COMPONENT DESCRIPTIONS

10.1 Microcontroller - PIC16F877A:

y  Only 35 single-word instructions to learn

y  All single-cycle instructions except for program branches, which are two-cycle

y  Operating speed: DC ± 20 MHz clock input DC ± 200 ns instruction cycle

y  Up to 8K x 14 words of Flash Program Memory,

y  Up to 368 x 8 bytes of Data Memory (RAM),

y  Up to 256 x 8 bytes of EEPROM Data Memory

y  Pin out compatible to other 28-pin or 40/44-pin

y  PIC16CXXX and PIC16FXXX microcontrollers

y  Timer0: 8-bit timer/counter with 8-bit prescaler 

y  Timer1: 16-bit timer/counter with prescaler, can be incremented during Sleep via

external crystal/clock 

y  Timer2: 8-bit timer/counter with 8-bit period register, prescaler and postscaler 

y  Two Capture, Compare, PWM modules

-  Capture is 16-bit, max. resolution is 12.5 ns

-  Compare is 16-bit, max. resolution is 200 ns

-  PWM max resolution is 10-bit

y  Synchronous Serial Port (SSP) with SPI (Master mode) and I2C (Master/Slave)

y  Universal Synchronous Asynchronous Receiver Transmitter (USART/SCI) with 9-bit

address detection

y  Parallel Slave Port (PSP) ± 8 bits wide with external RD,WR and CS controls (40/44-

 pin only)

y  Brown-out detection circuitry for Brown-out Reset (BOR)

Page 19: Project Rough Report

8/3/2019 Project Rough Report

http://slidepdf.com/reader/full/project-rough-report 19/21

Page 20: Project Rough Report

8/3/2019 Project Rough Report

http://slidepdf.com/reader/full/project-rough-report 20/21

FINGER PRINT AUTHENTICATED VOTING MACHINE

Dept of ECE, SIST

20

Fig 10.3 Transmitter 

10.4 Receiver ± OS-RX04

y  Low power consumption.

y  Easy for application.

y  On-Chip VCO with integrated PLL using crystal oscillator reference.

y  Integrated IF and data filters.

y  Operation voltage : 5 Volts.

y  Available frequency at : 315/434 MHz

Fig 10.4 Receiver 

Page 21: Project Rough Report

8/3/2019 Project Rough Report

http://slidepdf.com/reader/full/project-rough-report 21/21

FINGER PRINT AUTHENTICATED VOTING MACHINE

Dept of ECE, SIST

21

12 COMPONENT COST

Table 11.1 List of component cost

COMPONENTS COST

PIC 16F877A Rs 225

Fingerprint module Rs 5500

LCD Displays Rs 600

Crystal Oscillators (20MHz) Rs 30

RF transceiver (433MHz) Rs 550