project rough report
TRANSCRIPT
8/3/2019 Project Rough Report
http://slidepdf.com/reader/full/project-rough-report 1/21
FINGER PRINT AUTHENTICATED VOTING MACHINE
Dept of ECE, SIST
1
1 INTRODUCTION
Electronic voting is probably the most security sensitive process handledelectronically now a day. The main aim in designing this product is to provide the concept of
the personal identity for each individual. This is extended to a special case of electronic
voting machine concept. The summary of the design can be briefly explained
diagrammatically as follows.
The project is a microcontroller based system which employs a fingerprint sensor to
authenticate the voter. As a pre-polling procedure the finger prints of all the voters are
collected and stored in a database initially at time of distributing voting cards.
At the time of voting, the option of the voter is taken along with the finger print. The
finger print taken by the biometric sensor is sent to the transmitter of the master room. A
provision for saving and transmitting the polled votes to a centralized station is also made,
thus enabling to monitor the results insolently. That is, either after the completion of the
polling or else as decided by the concerned authority.
8/3/2019 Project Rough Report
http://slidepdf.com/reader/full/project-rough-report 2/21
FINGER PRINT AUTHENTICATED VOTING MACHINE
Dept of ECE, SIST
2
2 HISTORY OF FINGERPRINT SYSTEM
Fingerprints offer an infallible means of personal identification. That is the essential
explanation for fingerprints having replaced other methods of establishing the identities of
criminals reluctant to admit previous arrests. The science of fingerprint Identification stands
out among all other forensic sciences for many reasons, including the following:
y Has served governments worldwide for over 100 years to provide accurate
identification of criminals. No two fingerprints have ever been found alike in many
billions of human and automated computer comparisons. Fingerprints are the very
basis for criminal history foundation at every police agency on earth.
y Established the first forensic professional organization, the International Association
for Identification (IAI), in 1915.
y Established the first professional certification program for forensic scientists, the
IAI's Certified Latent Print Examiner program (in 1977), issuing certification to those
meeting stringent criteria and revoking certification for serious errors such as
erroneous identifications.
y Remains the most commonly used forensic evidence worldwide - in most
jurisdictions fingerprint examination cases match or outnumber all other forensic
examination casework combined.
y Continues to expand as the premier method for positively identifying persons, with
tens of thousands of persons added to fingerprint repositories daily in America alone -
far outdistancing similar databases in growth.
y Worldwide, fingerprints harvested from crime "scenes lead to more suspects and
generate more evidence in court than all other forensic laboratory techniques
combined"
8/3/2019 Project Rough Report
http://slidepdf.com/reader/full/project-rough-report 3/21
FINGER PRINT AUTHENTICATED VOTING MACHINE
Dept of ECE, SIST
3
Other visible human characteristics tend to change - fingerprints do not. Barring
injuries or surgery causing deep scarring, or diseases such as leprosy damaging the formative
layers of friction ridge skin (injuries, scarring and diseases tend to exhibit telltale indicators
of unnatural change), finger and palm print features have never been shown to move about or
change their unit relationship throughout the life or a person.
In earlier civilizations, branding and even maiming were used to mark the criminal
for what he or she was. The thief was deprived of the hand which committed the thievery.
Ancient Romans employed the tattoo needle to identify and prevent desertion of mercenary
soldiers. Before the mid-1800s, law enforcement officers with extraordinary visual
memories, so-called "camera eyes," identified previously arrested offenders by sight.
Photography lessened the burden on memory but was not the answer to the criminalidentification problem. Personal appearances change.
Around 1870, French anthropologist Alphonse Bertillon devised a system to measure
and records the dimensions of certain bony parts of the body. These measurements were
reduced to a formula which, theoretically, would apply only to one person and would not
change during his/her adult life.
The Bertillon System was generally accepted for thirty years. But it never recoveredfrom the events of 1903, when a man named Will West was sentenced to the U.S.
Penitentiary at Leavenworth, Kansas. It was discovered that there was already a prisoner at
the penitentiary at the time, whose Bertillon measurements were nearly the same, and his
name wasWilliamWest. Upon investigation, there were indeed two men who looked exactly
alike. Their names were Will and William West respectively. Their Bertillon measurements
were close enough to identify them as the same person. However, a fingerprint comparison
quickly and correctly identified them as two different people. (Per prison records discovered
later, the West men were apparently identical twin brothers and each had a record of
correspondence with the same immediate family relatives.)
8/3/2019 Project Rough Report
http://slidepdf.com/reader/full/project-rough-report 4/21
FINGER PRINT AUTHENTICATED VOTING MACHINE
Dept of ECE, SIST
4
3 OBJECTIVE OF THE PROJECT
The project demands the user to submit his Finger print at the polling booth. The
project uses the Finger print technology and Embedded Systems to design this application.
The main objective of this project is to design a system that asks the user to show his Finger
print as an identity proof. The system reads the data from the Finger print and verifies this
data with the already stored data in its database. If the details present in the data base it
matches with the stored data, the system allows the person to enter into and poll his vote. If
the details of the Finger do not match with the stored data, the system immediately activates
the display and the security authorities can come and take the further action. This project is a
device that collects data from the tag and codes the data into a format that can be understood
by the controlling section. This system also collects information from the master device and
implements commands that are directed by the master. The objective of the project is to
develop a microcontroller based security and alert system. It consists of a Finger print reader,
microcontroller, the interfacing unit to allow the communication between the microcontroller
and Finger print module, and the LCD.
8/3/2019 Project Rough Report
http://slidepdf.com/reader/full/project-rough-report 5/21
FINGER PRINT AUTHENTICATED VOTING MACHINE
Dept of ECE, SIST
5
4 OVERVIEW OF THE TECHNOLOGIES USED
An embedded system can be defined as a computing device that does a specific
focused job. Appliances such as the air-conditioner, VCD player, DVD player, printer, fax
machine, mobile phone etc. are examples of embedded systems. Each of these appliances
will have a processor and special hardware to meet the specific requirement of the
application along with the embedded software that is executed by the processor for meeting
that specific requirement. The embedded software is also called ³firm ware´. The
desktop/laptop computer is a general purpose computer. You can use it for a variety of
applications such as playing games, word processing, accounting, software development and
soon. In contrast, the software in the embedded systems is always fixed listed below:Embedded systems do a very specific task they cannot be programmed to do different things.
Embedded systems have very limited resources, particularly the memory. Generally, they do
not have secondary storage devices such as the CDROM or the floppy disk. Embedded
systems have to work against some deadlines. A specific job has to be completed within a
specific time. In some embedded systems, called real-time systems, the deadlines are
stringent. Missing a deadline may cause a catastrophe-loss of life or damage to property.
Embedded systems are constrained for power. As many embedded systems operate through a
battery, the power consumption has to be very low. Some embedded systems have to operate
in extreme environmental conditions such as very high temperatures and humidity. Following
are the advantages of Embedded Systems:
1. They are designed to do a specific task and have real time performance constraints which
must be met.
2. They allow the system hardware to be simplified so costs are reduced.
3. They are usually in the form of small computerized parts in larger devices which serve ageneral purpose.
4. The program instructions for embedded systems run with limited computer hardware
resources, little memory and small or even non-existent keyboard or screen.
8/3/2019 Project Rough Report
http://slidepdf.com/reader/full/project-rough-report 6/21
FINGER PRINT AUTHENTICATED VOTING MACHINE
Dept of ECE, SIST
6
5 BACKGROUND OF THE PROJECT
The software application and the hardware implementation help the microcontroller
read the data from the Finger print verify the data with the already stored data and take the
next action. The system is totally designed using Finger print module and embedded systems
technology. The Controlling unit has an application program to allow the microcontroller
interface with the Finger print module, the reader reads the data from the tag, passes the data
to the microcontroller and the controller verifies this data with the already existing data in the
controller¶s memory and then implement the commands directed by the controller section.
The performance of the design is maintained by controlling unit.
8/3/2019 Project Rough Report
http://slidepdf.com/reader/full/project-rough-report 7/21
FINGER PRINT AUTHENTICATED VOTING MACHINE
Dept of ECE, SIST
7
6 COMPARISONS OF DIFFERENT BIOMETRIC SYSTEMS
The following table compares some of the biometric systems used lately, from the
point of view of accuracy, cost, device required and social acceptability.
Table 6.1 Comparison of Different Biometric Systems
Each one of the Technologies used in our days bring us a manner to restrict the access
to a system, allowing the entrance only to those persons who know a specific code, own acard or have determined physic marks. The more complex is the system, the most difficult is
to be attacked, although it will be more expensive and will require more software and
hardware resources. When a new authentication system is implanted, it is essential a
judgment between simplicity, price and efficiency, as well as social acceptability.
The password method is the cheapest and simplest technology, because it only
requires elementary software resources. On the other hand, this system is easily attackable,
since he is quite simple to obtain the data from a person, either extracting the information to
the person itself using deceits, or attacking the software of the system. For example, it can be
easily installed in the computer, a program that simulates the ³user name and password´
window, so that when the user introduces his data in that window, that will be collected by
the ³Spy´ program. Immediately after this, it appears the true window, identical, and the user
8/3/2019 Project Rough Report
http://slidepdf.com/reader/full/project-rough-report 8/21
FINGER PRINT AUTHENTICATED VOTING MACHINE
Dept of ECE, SIST
8
will simply believe that he has been mistaken. So, this method, in spite of being usually used,
for example, to access banking accounts, is not at all the most indicated if we want a safe
system, and in a short-time future is tried to be changed by most immune methods.
The Smart Cards are very useful since they can be easily combined with other
authentication systems, serving as storage system. Self-containment of smart card makes it
resistant to attack as it does not need to depend upon potentially vulnerable external
resources. But it¶s small size and bends requirements (which are designed to protect the card
physically), limits the memory and processing resources. And used like the only
identification system, is not excessively trustworthy, since it can be easily stolen, lost or
simply forgotten at home. Besides, sometimes they are combined with cryptography
methods, which makes them more difficult (more expensive) to implement
The Digital Signature is very difficult to falsify, since is encrypted by complicated
mathematic operations. It is considered that is even less falsifiable than the manual signature
recognition (although this last is already enough trustworthy). The advantage that Biometrics
presents is that the information is unique for each individual and that it can identify the
individual in spite of variations in the time (it does not matter if the first biometric sample
was taken year ago).The pillars of e-learning security are: authentication, privacy (data
confidentiality) authorization (access control), data integrity and non-repudiation. Biometric
is a technique that can provide all this requirements with quite lot reliability.
Although biometrics is considered the most effective and safe method (is very
difficult to falsify), we have to bear in mind its disadvantages, for example, that since it is a
relative new technology, it is not still integrated in PC, so IT departments need to make a
conscious decision before making the purchase and change its structure. We also have to
consider the advantages and disadvantages of each individual system. In the next paragraphs,
we will make an enumeration of the problems that these techniques can present.
8/3/2019 Project Rough Report
http://slidepdf.com/reader/full/project-rough-report 9/21
FINGER PRINT AUTHENTICATED VOTING MACHINE
Dept of ECE, SIST
9
7 BLOCK DIAGRAM
Fig 7.1 Block diagram of Fingerprint Authenticated Voting Machine
The block diagram consist of two sections
(a) Polling booth station
(b) Counting station
Polling booth station side consists of the blocks:
8/3/2019 Project Rough Report
http://slidepdf.com/reader/full/project-rough-report 10/21
FINGER PRINT AUTHENTICATED VOTING MACHINE
Dept of ECE, SIST
10
1.Microcontroller
Here in this circuit we are using the microcontroller PIC16F877A manufactured by
microchip. It is a 40 pin IC. A Parallel Slave Port is implemented in this microcontroller. The
relevance of PIC16F877A is its low cost, availability. More number of I/O ports provides
more interfacing connectivity. More than a single timer is present in it.
2. Fingerprint Module
A fingerprint module is used to verify the fingerprint of the voters. We are using
fingerprint module manufactured by Sunrome technologies. The fingerprint module hasa
memory for storing the fingerprints during the data collecting phase. It is interfaced with the
microcontroller. The fingerprint module matches the fingerprints of the voters during the
polling and compares it with the already stored fingerprints, collected during the data
collecting phase.
3. Keypad
Here the keypad is used for voting, in this the candidates name and symbol is placed
with a button.
4. Buzzer
The buzzer is used to produce sound after the voting and it will produce another
sound if malpractices are reported.
5. Transceiver
It is a combination of transmitters and receivers. Here a transmitter is used to send the
votes to the counting station and the receiver is used for receiving the acknowledgement
signal from the counting station. Here we are using a transceiver of 433MHz.
6. Key
A key is used to enable and lock the counting station.
8/3/2019 Project Rough Report
http://slidepdf.com/reader/full/project-rough-report 11/21
FINGER PRINT AUTHENTICATED VOTING MACHINE
Dept of ECE, SIST
11
The counting station consists of the blocks:
1. Microcontroller
Here in this circuit we are using the microcontroller PIC16F877A manufactured bymicrochip. It is a 40 pin IC. A Parallel Slave Port is implemented in this microcontroller. The
relevance of PIC16F877A is its low cost, availability. More number of I/O ports provides
more interfacing connectivity. More than a single timer is present in it. It is used for counting
process after counting the votes it activates the transceiver for sending the acknowledgement
signal.
2. Transceiver
It is a combination of transmitters and receivers. Here a transmitter is used to transmit
the acknowledgement signal after receiving the votes by the receiver at the counting station.
Here we are using a transceiver of 433MHz.
3. LCD screen
An LCD screen is used for displaying the votes for each candidate.
8/3/2019 Project Rough Report
http://slidepdf.com/reader/full/project-rough-report 12/21
FINGER PRINT AUTHENTICATED VOTING MACHINE
Dept of ECE, SIST
12
8 CIRCUIT DIAGRAM
8.1 Polling booth side
Fig 8.1 Circuit diagram at polling booth side
The polling booth side acts as the transmitter section. The polling station consist of an
LCD screen, for displaying the voting details for the polling officer, RF transmitter and
receiver, a fingerprint module and the PIC16F877A microcontroller which acts as the heart
8/3/2019 Project Rough Report
http://slidepdf.com/reader/full/project-rough-report 13/21
FINGER PRINT AUTHENTICATED VOTING MACHINE
Dept of ECE, SIST
13
of the circuit. First of all when a person comes to poll his vote, the polling officer check his
details and then he is allowed to enter into the polling booth. Here inside the polling booth
there is a fingerprint module and the person coming inside has to place his finger on the
fingerprint scanner. The scanner scans his fingerprint and the compares it with already stored
fingerprints and if it matches then the voting is allowed, after comparing this fingerprint it
sends a voter ID which is assigned during the fingerprint collection phase, to the
PIC16F877A and it will examine the number and allows the vote to be send to the counting
station, via an RF transmitter.
If a person who already made his vote comes again and tries to vote again, then from
the voter ID obtained from the fingerprint scanner, the microcontroller finds the repetition of
the voter ID and it triggers an alarm to alert the polling officer.
A long beep is placed for informing the polling officer that the vote is correctly
recorded and for informing that vote, receiver (counting station) will give a token to the
polling station and according to that the token receiver will record the vote and for
conformation a receiver is placed in the polling station for receiving an acknowledgement
from the counting station.
Since there is independent transmitters (voting booths) using a common RF
communication channel, there are chances for collisions caused by multiple stations
transmitting at the same time.
8.2 Counting station
The counting station consists of the devices used for the counting program. The
counting of votes is being a biggest problem in the election process. The malpractices make
the vote counting more and more complex. This automatic counting station can eliminate the
problems regarding to the counting process to a great extent. This counting station consists of
a receiver which is receiving the votes and PIC16F877A for the counting programming, anLCD for displaying the output. There are changes for the votes of different polling booth to
get mixed and this problem is eliminated by using a master and slave arrangement.
8/3/2019 Project Rough Report
http://slidepdf.com/reader/full/project-rough-report 14/21
FINGER PRINT AUTHENTICATED VOTING MACHINE
Dept of ECE, SIST
14
Fig 8.2 Circuit diagram at counting station
A particular time slot is given to a particular polling station for reporting its vote in
the counting station. Thus we can avoid the collision of date from receivers of different
polling station. If an acknowledgement signal is not received by the station and its time has
entered, then this transmitter has to wait for the next slot. Thus the votes are reached at the
counting station and the voter¶s finger number also. And by using this finger print number
the malpractices votes are eliminated. That is if a person poll his vote from two different
polling booth then the votes can be eliminated at the counting station using this details.
8/3/2019 Project Rough Report
http://slidepdf.com/reader/full/project-rough-report 15/21
8/3/2019 Project Rough Report
http://slidepdf.com/reader/full/project-rough-report 16/21
FINGER PRINT AUTHENTICATED VOTING MACHINE
Dept of ECE, SIST
16
9 BLINKING AN LED USING ISIS 7 PROFESSIONAL
1.select component mode from the list of icons and then select the required
component from the list.make sure the component selected is active.
2.select the power supply and ground from terminal mode.
3.select the connecting wires from selection mode.
4.connect the components using wires and play the circuit.
8/3/2019 Project Rough Report
http://slidepdf.com/reader/full/project-rough-report 17/21
FINGER PRINT AUTHENTICATED VOTING MACHINE
Dept of ECE, SIST
17
10 ADVANTAGES AND DISADVANTAGES
9.1 Advantages:
y Very high accuracy.
y Is the most economical biometric PC user authentication technique.
y It is one of the most developed biometrics.
y Easy to use.
y Small storage space required for the biometric template, reducing the size of the
database memory required.
y It is standardized.
9.2 Disadvantages:
y For some people it is very intrusive, because is still related to criminal identification.
y It can make mistakes with the dryness or dirty of the finger¶s skin, as well as with the
age (is not appropriate with children, because the size of their fingerprint changes
quickly).
y Image captured at 500 dots per inch (dpi). Resolution: 8 bits per pixel. A 500 dpi
fingerprint image at 8 bits per pixel demands a large memory space, 240 Kbytes
approximately Compression required (a factor of 10 approximately).
8/3/2019 Project Rough Report
http://slidepdf.com/reader/full/project-rough-report 18/21
FINGER PRINT AUTHENTICATED VOTING MACHINE
Dept of ECE, SIST
18
11 COMPONENT DESCRIPTIONS
10.1 Microcontroller - PIC16F877A:
y Only 35 single-word instructions to learn
y All single-cycle instructions except for program branches, which are two-cycle
y Operating speed: DC ± 20 MHz clock input DC ± 200 ns instruction cycle
y Up to 8K x 14 words of Flash Program Memory,
y Up to 368 x 8 bytes of Data Memory (RAM),
y Up to 256 x 8 bytes of EEPROM Data Memory
y Pin out compatible to other 28-pin or 40/44-pin
y PIC16CXXX and PIC16FXXX microcontrollers
y Timer0: 8-bit timer/counter with 8-bit prescaler
y Timer1: 16-bit timer/counter with prescaler, can be incremented during Sleep via
external crystal/clock
y Timer2: 8-bit timer/counter with 8-bit period register, prescaler and postscaler
y Two Capture, Compare, PWM modules
- Capture is 16-bit, max. resolution is 12.5 ns
- Compare is 16-bit, max. resolution is 200 ns
- PWM max resolution is 10-bit
y Synchronous Serial Port (SSP) with SPI (Master mode) and I2C (Master/Slave)
y Universal Synchronous Asynchronous Receiver Transmitter (USART/SCI) with 9-bit
address detection
y Parallel Slave Port (PSP) ± 8 bits wide with external RD,WR and CS controls (40/44-
pin only)
y Brown-out detection circuitry for Brown-out Reset (BOR)
8/3/2019 Project Rough Report
http://slidepdf.com/reader/full/project-rough-report 19/21
8/3/2019 Project Rough Report
http://slidepdf.com/reader/full/project-rough-report 20/21
FINGER PRINT AUTHENTICATED VOTING MACHINE
Dept of ECE, SIST
20
Fig 10.3 Transmitter
10.4 Receiver ± OS-RX04
y Low power consumption.
y Easy for application.
y On-Chip VCO with integrated PLL using crystal oscillator reference.
y Integrated IF and data filters.
y Operation voltage : 5 Volts.
y Available frequency at : 315/434 MHz
Fig 10.4 Receiver
8/3/2019 Project Rough Report
http://slidepdf.com/reader/full/project-rough-report 21/21
FINGER PRINT AUTHENTICATED VOTING MACHINE
Dept of ECE, SIST
21
12 COMPONENT COST
Table 11.1 List of component cost
COMPONENTS COST
PIC 16F877A Rs 225
Fingerprint module Rs 5500
LCD Displays Rs 600
Crystal Oscillators (20MHz) Rs 30
RF transceiver (433MHz) Rs 550