A SURVEY OF SECURED VOTING SYSTEM USING FINGERPRINT SCANNER
DOI:
https://doi.org/10.61841/5n69qs19Keywords:
voting, fingerprint scanner, paper voting,, Aadhar ID,, DRE votingAbstract
THE main objective of this project is to avoid the false entry of the voters in the election process. Voting can be done at home by using fingerprint scanner method. The main idea of this project is to provide secure methods of voting through the fingerprint scanner. The election process is mandatory in the world. To develop the voting system based on the finger print acceptance of the voters with the program uploaded in the Arduino. By using the present voting system, it takes more time for the remaining voters to vote as it is necessary to avoid the chaos. Therefore, results in casting less number of votes. Validation of voters become incorrect during this process. People inside the election booth and third person entry may result in false count of voters. Normally elections are conducted for the Indian constitution and parliamentary legislation. This paper discusses different voting techniques and the issues faced there by suggesting techniques to overcome.
Downloads
References
1. “A secure paper-based electronic voting system”, Asghar Tavakoly, Reza Ebrahimi Atani, International Journal of Electronics Engineering Research, vol.9, No.6 2012.
2. ” Vote identification and integrity of ballot in paper based voting system”, Supeno Djanali, International Journal of Advanced Research in Computer and Communication Engineering, vol. 5, no. 6,2018.
3. ” Attacking Paper-based electronic voting systems”, John Kelsey, International Journal of Computer and Electrical Engineering, vol. 2, no. 5,2011.
4. ” Paper based voting system -review”, IEEE vol.8, No. 4Andrew Regenscheid,2010.
5. “Design of secured electronic electoral system using fingerprint technique”, Sanjay Kumar,2014.
6. ” AADHAR based Electronic electoral Machine using Arduino”, R.Murali Prasad,2013.
7. ” Design of Secure Electronic Electoral System Using Fingerprint Biometrics and Crypto Watermarking Approach”, Olayemi M. Olaniyi,2017.
8. . “Design and development of security based voting system” Banupirya.N,2016.
9. ” Highly secured electronic voting using Aadhar ID” S.Snega, International Journal of Computer Applications(0975-8887).Volume 134-No 13,January 20162018.
10. ” Online Voting System for India Based on Aadhar ID”, Himanshu Agarwal ,2017.
11. ” Online voting system”, Mr.Nilhil L.K shemkalyani, IEEE,vol,7,No4,2018.
12. ” Postal voting system”, Danang Prawira Nugraha, International Conference on Information and Intelligent Computing (IPCSIT),2019.
13. ” Online voting system using face recognition”, B. Arun, V, K. Gouthaman,2018.
14. ” Advanced Online Voting System”, Pallavi Divya,2017.
15. ” Online Voting System for India supported on Aadhar ID” Himanshu Agarwal,2016.
16. ” Postal voting in a secure manner”, Piyush Aggarwal,2015.
17. ” Postal voting review”, Taliha A, ACM conference on Computer and Communications security 2014.
18. ” Postal voting”, Polaiah Bojja, International Conference on the Current Trends in Information Technology (CTIT)2013.
19. ” Review of existing Indian Electoral System and hybrid design using Biometric Security in Voting Authentication Process”,2017.
20. “DRE Voting method”, Manpreet Singh, Information Security Technical Report 3.1, pp. 21-322018.
21. ” Smart voting with secure data identification”, Sunitha patil, Amish Bansal, International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME) 2018.
22. Masih, M., & Grant, A. (2017). Chi square feature extraction based SVMS arabic language text categorization system. Talent Development and Excellence, 9(2), 18-26. Retrieved from www.scopus.com
23. Boyd, D. (2017). A semantic image retrieval technique through concept co-occurrence based database organization and deep lab segmentation. Talent Development and Excellence, 9(2), 1-9. Retrieved from www.scopus.com
24. Williams, M. (2019). Management Model: Employee Database model for Spatio-Temporal Relationship. Test Engineering and Management, 81(March-April 2019), 09–16. Retrieved from http://testmagzine.biz/index.php/testmagzine/article/view/13/12
25. Zirmite, R., & Vaidya, R. (2019). The Study of Gesture Recognition by using Gesture Algorithm and Image Processing. Test Engineering and Management, 81(March-April 2019), 01–04. Retrieved from http://testmagzine.biz/index.php/testmagzine/article/view/5/4
26. Thirupathi, V., Sandeep, C., Kumar, S. N., & Kumar, P. P. (2019). A comprehensive review on sdn architecture, applications and major benifits of SDN. International Journal of Advanced Science and Technology, 28(20), 607-614. Retrieved from www.scopus.com
27. Kaur, T., & Pal, P. (2019). Cloud computing network security for various parameters, and its application. International Journal of Advanced Science and Technology, 28(20), 897-904. Retrieved from www.scopus.com
28. Hang, L., Khan, M. S., & Kim, D. -. (2018). Design and implementation of IoT object virtualization for physical devices in smart home. International Journal of Control and Automation, 11(7), 1-10. doi:10.14257/ijca.2018.11.7.01
29. Kim, M. (2018). Signal/power integrity analysis of high-speed memory module with meshed reference plane. International Journal of Control and Automation, 11(7), 119-128. doi:10.14257/ijca.2018.11.7.10
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.