Finger-Print Based Voting System Blackbook
Finger-Print Based Voting System Blackbook
Finger-Print Based Voting System Blackbook
Final-Project Report
On
“Project Name”
Partial Fulfillment of the Requirement for the Diploma in Computer Engineering,
By
1) NAME1 [ENROLL NO]
Guided By
1
Sakeshwar Gramin Vikas Seva Sanstha's
Sau.Sundarbai Manik Adsul Polytechnic
Department Of Computer Engineering.
CERTIFICATE
This is to certify that the project work entitled
“Project Name”
is
Submitted by
1) NAME1 [Enroll No]
Date:
Place: Chas, Nimblak By Pass Road, Ahmednagar,
2
CERTIFICATE
This is to certify that Ms/Mr Name1,Name2,Name3 from Sau.Sundarbai Manik Adsul Polytechnic
Institute having Enrollment No: Enroll No1,Enroll No2,Enroll No3 Has completed project of final year having
title Project Name during the academic year 2023 - 2024. The project completed by individually/ in a group
consisting of 3 person under the guidance of the Faculty Guide.
3
Acknowledgments
I here by take this opportunity to express my heart felt gratitude towards the people whose help is very
useful to complete my dissertation work on the topic of “Project Name”. Inspiration and Guidance are
invaluable in all aspects of life especially on the fields of gratitude and obligation and sympathetic attitude
which I received from my respected project Guide, Prof.Guide Name. whose guidance and
encouragement contributed greatly to the completion of this thesis work.
I would like to thank to all faculty members Prof. Hole P.P HOD of Computer Engineering
Department and all my friends and well-wishers for their co-operation and supports in making this thesis
work successful.
I would also like to thank our Principal Prof.Gadakh R.S. for his warm support and providing all
necessary facilities to us. Under these responsible personalities, I have been efficiently able to complete my
thesis in time with success
NAME1.
NAME2 .
NAME3.
4
ABSTRACT
Our Project aims to present a new voting system employing biometrics in order to avoid rigging and to
enhance the accuracy and speed of the process. The system uses thumb impression for voter identification as we
know that the thumb impression of every human being has a unique pattern. Thus it would have an edge over the
present day voting systems.As a pre-poll procedure, a database consisting of the thumb impressions of all the
eligible voters in a constituency is created. During elections, the thumb impression of a voter is entered as input
to the system. This is then compared with the available records in the database. If the particular pattern matches
with any one in the available record, access to cast a vote is granted. But in case the pattern doesn’t match with
the records of the database or in case of repetition, access to cast a vote is denied or the vote gets rejected.
5
TABLE OF CONTENTS
LIST OF ABBREVATIONS i
LIST OF FIGURES ii
LIST OF TABLES iii
6
LIST OF ABBREVATIONS
ABBREVIATION ILLUSTRATION
EVM Electronic Voting Machiene
DRE Direct-Recording Electronic
PVS Paper-based Voting Systems
PNDRE Public Network Direct-Recording Electronic
PIN Personal Identification Number
JAD Joint Application Design
RAD Rapid Application Development
OTP One – Time Password
7
LIST OF FIGURES
8
LIST OF TABLES
1 Comaparison of Biometrics 12
9
CHAPTER:1
INTRODUCTION
1.1 OVERVIEW:
In today's dynamic world, where technological advancements continually reshape various aspects of
society, the electoral process stands as a cornerstone of democratic governance. Ensuring the integrity, security,
and efficiency of elections is paramount to upholding the democratic principles of representation and
accountability. In response to the evolving challenges facing traditional voting systems, innovative solutions
have emerged, among which the Fingerprint-Based Voting System shines as a beacon of progress and promise.
The Fingerprint-Based Voting System represents a paradigm shift in electoral technology, harnessing the
power of biometric authentication to revolutionize the voting experience. By seamlessly integrating biometric
fingerprint devices with voting machines, this system offers a multifaceted approach to address longstanding
issues such as voter fraud, impersonation, and cumbersome procedures. Gone are the days of manual
verification processes and reliance on physical identification documents; instead, voters now authenticate their
identity effortlessly through their unique fingerprint patterns.
With its emphasis on accuracy, transparency, and accessibility, the Fingerprint-Based Voting System not only
streamlines the voting process but also ensures the sanctity of each ballot cast. By leveraging biometric
technology, this system mitigates the risks of fraudulent activities such as multiple voting and impersonation,
thereby safeguarding the integrity of elections and bolstering public trust in the democratic process.
Voting is a method by which groups of people make decisions. These decisions could be political,
social or public. Voting can also be used to choose between difficult plans of actions or to decide who
is best eligible to be awarded a prize. Voting can thus be defined as a process that allows a group of
individuals to choose between a numbers of options. Most voting systems are based on the concept of
majority rule or plurality. For example, in an election, a candidate with a plurality receives more votes
than any other candidate, but does not necessarily receive the majority of the total votes cast.
Seven different types of voting systems may be identified .
These are:
➢ Punch Card
Direct-recording Electronic (DRE) Voting Systems: record votes by means of a ballot display
provided with mechanical or electronic optical components which could be activated by the voter. Such
systems record voting data and ballot images in computer memory components. Also, data processing
is achieved by the use of computer programs.
Public Network DRE Voting Systems (PNDRE): Make use of electronic ballots and transmit vote
data from the polling stations to other locations over a public network. The votes may be transmitted as
individual ballots as they are cast, or periodically as batches of ballots, or as one single batch, at the end
of voting.
Punch Card: The voter uses metallic hole-punch to punch a hole on the blank ballot. It can count votes
automatically, but if the voter’s perforation is incomplete, the result is probably determined wrongfully.
Optical Voting Machine: After each voter fills a circle correspond to their favorite candidate on the
blank ballot, this machine selects the darkest mark on each ballot for the vote, then computes the total
result. This kind of machine counts up ballots rapidly. However, if the voter fills over the circle, it will
lead to the error means result of optical-scan.
The electronic voting machines are safe and secure only if the source code used in the EVMs is genuine.
Shockingly, the EVM manufacturers, the BEL and ECIL have shared the ‘top secret’ EVM software program
with two foreign companies, Microchip (USA) and Renesas (Japan) to copy it onto microcontrollers used in
EVMs. This process could have been done securely in-house by the Indian manufacturers.
The danger for EVM manipulations is not just from its software. Even the hardware isn’t safe. Dr. Alex
Halderman, professor of computer science in the University of Michigan says, “EVMs used in the West require
software attacks as they are sophisticated voting machines and their hardware cannot be replaced cheaply. In
contrast, the Indian EVMs can easily be replaced either in part or as wholesale units.” One crucial part that can
be faked is microcontrollers used in the EVMs in which the software is copied. EVM manufacturers have greatly
facilitated fraud by using generic microcontrollers rather than more secure ASIC or FPGA microcontrollers. Not
11
just only microcontrollers, mother boards (cards which contain microcontrollers) and entire EVMs can be
replaced.
1.3.2 OBJECTIVES :
The main objective of this paper is design and development of a Fingerprint based Voting System.
The suggested fingerprint voting system allows the user to scan his fingerprint, in order to check his
eligibility by comparing his current fingerprint with the one already stored in the system’s database, Once
the users complete the identification process, they will be allowed to cast their vote using friendly
geographical user interface. The counting of the votes will be immediately and that makes the voting process
efficient, fast, and secure .In this system the voter does not need identity card, voters thumb impressions are
used to identify the voter .
The objective of the Finger Print Based Voting System project is to revolutionize the electoral process by
leveraging advanced biometric technology to ensure the integrity, security, and efficiency of voting
procedures. Here's a detailed elaboration of the project's objectives:
1. Enhanced Security and Authentication: Implementing biometric fingerprint verification enhances
the security of the voting system by ensuring that each vote is cast by a legitimate voter. This reduces
the risk of identity fraud, impersonation, and unauthorized access to the voting process.
2. Efficiency and Accuracy: By utilizing fingerprint authentication, the system aims to streamline the
voting process, reducing the time required for voter verification and ballot casting. This enhances the
overall efficiency of elections while ensuring accurate and tamper-proof voting results.
3. Mitigation of Electoral Misconceptions: The project seeks to address common misconceptions and
irregularities associated with traditional voting systems. By implementing a robust biometric
framework, the system aims to eliminate the possibility of multiple voting, thereby enhancing the
credibility and fairness of elections.
4. Accessibility and Inclusivity: Through the adoption of fingerprint-based voting technology, the
project aims to promote accessibility and inclusivity in the electoral process. This ensures that
individuals from diverse backgrounds, including those with disabilities, can participate in elections
without barriers.
5. Transparency and Trust: By leveraging biometric authentication, the project enhances transparency
and fosters public trust in the electoral process. Voters can have confidence that their votes are
accurately recorded and that the integrity of the election is maintained, thereby reinforcing democratic
principles.
12
1.5 COMPARISON OF BIOMETRICS:
13
CHAPTER:2
LITERATURE SURVEY
Madhuri Namballa (2020) Realtime Fingerprint based Voting System Namballa explores the
implementation of a real-time fingerprint-based voting system, focusing on its practical applications
and challenges [1].
V .Peter (2018) Finger Print Based Smart Voting System Peter discusses the development of a smart
voting system utilizing fingerprint technology to enhance security and mitigate electoral
misconceptions [2].
K. Hasta (2019) Fingerprint Based Secured Voting Hasta examines the integration of fingerprint-based
security measures into voting systems, aiming to enhance the overall security and integrity of elections
[3].
Arduino Team (2018Fingerprint Voting System Using Arduino
The Arduino Team presents a voting system utilizing Arduino technology, highlighting the ease of
use and practicality of fingerprint-based authentication in the electoral process
Chakole et al. (2013) has propounded a design of secure online voting system by making use of
asymmetric and symmetric keys for encryption and decryption of messages that are used for casting
votes [4].
Anand et al. (2012) has proposed a system to overcome the drawback of electronic voting system
websites which will help voters to remotely cast their votes. This system has capability of reducing
human errors and can provide better scalability for large elections. But, this system was not capable
of reducing the conflicts due to fake identity and was even not feasible for rural people who do not
have access to Internet [5].
Udayakumar et al. (2013), has proposed architecture of the Internet voting where user can participate
using their information stored in database while creating the voter ID and all the information need to
be updated at a period of 6-months.The major drawback of this system is that it need high speed
Internet connection [7].
Sridharan (2013) has proposed an architecture in which voting is done by making use of cards [13],
these cards are designed similar to smart cards which have entire details related to the voter embedded
in them.
Kusters et al. (2012) has proposed main idea behind clash attacks i.e. voting machine sometimes
provide same receipt to the different voters because of this election get manipulated without being
detected [14].
Implementation of e-voting on an Android System has been explained by Autade et al. (2012), the
proposed architecture in the paper cannot be used over large scale especially in a country like
Bangladesh which is one of the developing country and whose major percentage of voters comes out
from a rural background. But still the system is very much beneficial for small scale setup such as for
college elections or confidential recruitment [15].
To overcome this, Mohammed (2013) proposed two way systems which came out as much enhanced
14
and efficient alternative system. Twofold system comprises of SMS voting system and website voting
system. The undesirable characteristic of above-mentioned system is lack of verifiability of voter
identity, accuracy &transparency [16].
Garcia et al. (2013) reported that encryption, decryption and cryptography can be used as one of security
measure while data transmission [17].
Malwade et al. (2014) has propounded the idea of smart voting system with voice recognition where
user can vote by using android application which can be downloaded over Internet. The authentication
will be done using SMS confirmation and voice recognition [18].
Swaminathan et al. (2012) has proposed an online voting system with secure user authentication by
providing biometric and password security to voter account, basically merging secret key with the cover
image on the basis of core image [19].
From the above literatures review, we found that most of the research works have tried small scale
implementation and are not practical. On the other hand, some research works emphasize only voter
authentication. We proposed a Biometric voting system using fingerprint
15
CHAPTER:3
SYSTEM DESIGN
1. The DFD is also called as bubble chart. It is a simple graphical formalism that can be used to
represent a system in terms of input data to the system, various processing carried out on this
data, and the output data is generated by this system.
2. The data flow diagram (DFD) is one of the most important modeling tools. It is used to model
the system components. These components are the system process, the data used by the
process, an external entity that interacts with the system and the information flows in the
system.
3. DFD shows how the information moves through the system and how it is modified by a series
of transformations. It is a graphical technique that depicts information flow and the
transformations that are applied as data moves from input to output.
4. DFD is also known as bubble chart. A DFD may be used to represent a system at any level of
abstraction. DFD may be partitioned into levels that represent increasing information flow and
functional detail.
16
Add Election
Add Candidates
Add Voters
Fingerprint
Voting
Voters cast Vote System
Calculate Result
Announce Result
View Results
UML DIAGRAMS
GOALS:
17
The Primary goals in the design of the UML are as follows:
1. Provide users a ready-to-use, expressive visual modeling Language so that they can develop
and exchange meaningful models.
2. Provide extendibility and specialization mechanisms to extend the core concepts.
3. Be independent of particular programming languages and development process.
4. Provide a formal basis for understanding the modeling language.
5. Encourage the growth of OO tools market.
6. Support higher level development concepts such as collaborations, frameworks, patterns and
components.
7. Integrate best practices.
Login
Add Election
Add Candidates
Add Voters
Announce Result
View Results
18
CLASS DIAGRAM:
In software engineering, a class diagram in the Unified Modeling Language (UML) is a type of static
structure diagram that describes the structure of a system by showing the system's classes, their
attributes, operations (or methods), and the relationships among the classes. It explains which class
contains information.
Admin
Login
Create Elections ()
Add Candidates ()
Add Voters ()
Check voters Biometric ()
Voters cast vote ()
Calculate Result ()
Announce Result ()
View Results ()
SEQUENCE DIAGRAM:
A sequence diagram in Unified Modeling Language (UML) is a kind of interaction diagram that
shows how processes operate with one another and in what order. It is a construct of a Message
Sequence Chart. Sequence diagrams are sometimes called event diagrams, event scenarios, and
timing diagrams.
1. Purpose: Sequence diagrams visualize the flow of messages, events, and interactions among
objects or components in a system.
2. Elements:
• Objects: Represent instances of classes or components involved in the interaction.
• Lifelines: Vertical dashed lines representing the lifespan of an object during the
interaction.
• Messages: Arrows indicating communication between objects, denoting method
calls, or passing of information.
• Activation Bars: Horizontal lines on lifelines showing the period when an object is
active during the interaction.
• Focus of Control: Indicates the point in time when an object is performing an
action.
3. Components:
19
• Actor: Represents external entities interacting with the system.
• Boundary, Control, Entity: Different types of objects within the system.
4. Use Cases: Sequence diagrams are often used to depict scenarios, use cases, or system
behaviours, aiding in requirements analysis, design, and documentation.
5. Benefits:
• Clarifies the behaviour and interactions of system components.
• Identifies potential bottlenecks, errors, or inefficiencies in system design.
• Provides a visual aid for communication among stakeholders.
6. Tools: Various UML modelling tools, such as Visual Paradigm, Lucid chart, and Create,
facilitate the creation and analysis of sequence diagrams.
Database
Admin
Add Elections
Add Candidates
Add Voters
Calculate Result
Announce Result
20
ACTIVITY DIAGRAM:
Activity diagrams are graphical representations of workflows of stepwise activities and actions with
support for choice, iteration and concurrency. In the Unified Modeling Language, activity diagrams
can be used to describe the business and operational step-by-step workflows of components in a system.
An activity diagram shows the overall flow of control.
Start
Add Elections
Add Candidates
Add Voters
Check Biometric
Not Matched
Not Allowed
Matched
Calculate Result
Announce Result
View Results
21
CHAPTER:4
IMPLEMENTATION
SOFTWARE ENVIRONMENT: -
FEATURES OF. NET:
Microsoft .NET is a set of Microsoft software technologies for rapidly building and integrating XML
Web services, Microsoft Windows-based applications, and Web solutions. The .NET Framework is a
language-neutral platform for writing programs that can easil y and securely interoperate. There’s no
language barrier with .NET: there are numerous languages available to the developer including
Managed C++, C#, Visual Basic and Java Script. The .NET framework provides the foundation for
components to interact seamlessly, whether locally or remotely on different platforms. It standardizes
common data types and communications protocols so that components created in different languages
can easily interoperate.
“.NET” is also the collective name given to various software components built upon the .NET
platform. These will be both products (Visual Studio.NET and Windows.NET Server, for instance)
and services (like Passport, .NET My Services, and so on).
23
• Memory management, notably including garbage collection.
• Checking and enforcing security restrictions on the running code.
• Loading and executing programs, with version control and other such features.
• The following features of the .NET framework are also worth description:
Managed Code
The code that targets .NET, and which contains certain extra
Information - “metadata” - to describe itself. Whilst both managed and unmanaged code can run in
the runtime, only managed code contains the information that allows the CLR to guarantee, for
instance, safe execution and interoperability.
Managed Data
With Managed Code comes Managed Data. CLR provides memory allocation and Deal location
facilities, and garbage collection. Some .NET languages use Managed Data by default, such as C#,
Visual Basic.NET and JScript.NET, whereas others, namely C++, do not. T argeting CLR can,
depending on the language you’re using, impose certain constraints on the features available. As with
managed and unmanaged code, one can have both managed and unmanaged data in .NET applications
- data that doesn’t get garbage collected but instead is looked after by unmanaged code.
The set of classes is pretty comprehensive, providing collections, file, screen, and network I/O,
threading, and so on, as well as XML and database connectivity.
24
The class library is subdivided into a number of sets (or namespaces), each providing distinct areas
of functionality, with dependencies between the namespaces kept to a minimum.
Visual Basic .NET has been updated to include many new and improved language features that make
it a powerful object-oriented programming language. These features include inheritance, interfaces,
and overloading, among others. Visual Basic also now support s structured exception handling, custom
attributes and also supports multi-threading.
Visual Basic .NET is also CLS compliant, which means that any CLS -compliant language can use the
classes, objects, and components you create in Visual Basic .NET.
Managed Extensions for C++ and attributed programming are just some of the enhancements made to
the C++ language. Managed Extensions simplify the task of migrating existing C++ applications to
the new .NET Framework.
C# is Microsoft’s new language. It’s a C-style language that is essentially “C++ for Rapid Application
Development”. Unlike other languages, its specification is just the grammar of the language. It has no
standard library of its own, and instead has been designed with the intention of using the .NET libraries
as its own.
Microsoft Visual J# .NET provides the easiest transition for Java -language developers into the world
of XML Web Services and dramatically improves the interoperability of Java -language programs with
existing software written in a variety of other programmi ng languages.
Active State has created Visual Perl and Visual Python, which enable .NET -aware applications to be
built in either Perl or Python. Both products can be integrated into the Visual Studio .NET
environment. Visual Perl includes support for Active State’s Perl Dev Kit.
• FORTRAN
• COBOL
• Eiffel
25
Fig .Net Framework
C#.NET is also compliant with CLS (Common Language Specification) and supports structured
exception handling. CLS is set of rules and constructs that are supported by the CLR (Common
Language Runtime). CLR is the runtime environment provided by the .NET Fr amework; it manages
the execution of the code and also makes the development process easier by providing services.
C#.NET is a CLS-compliant language. Any objects, classes, or components that created in C#.NET
can be used in any other CLS-compliant language. In addition, we can use objects, classes, and
components created in other CLS-compliant languages in C#.NET .The use of CLS ensures complete
interoperability among applications, regardless of the languages used to create the application.
GARBAGE COLLECTION
Garbage Collection is another new feature in C#.NET. The .NET Framework monitors allocated
resources, such as objects and variables. In addition, the .NET Framework automatically releases
memory for reuse by destroying objects that are no longer in use.
In C#.NET, the garbage collector checks for the objects that are not currently in use by applications.
When the garbage collector comes across an object that is marked for garbage collection, it releases
the memory occupied by the object.
OVERLOADING
Overloading is another feature in C#. Overloading enables us to define multiple procedures with the
same name, where each procedure has a different set of arguments. Besides using overloading for
26
procedures, we can use it for constructors and properties in a class.
MULTITHREADING:
C#.NET also supports multithreading. An application that supports multithreading can handle multiple
tasks simultaneously, we can use multithreading to decrease the time taken by an application to
respond to user interaction.
FEATURES OF SQL-SERVER
The OLAP Services feature available in SQL Server version 7.0 is now called SQL Server 2000
Analysis Services. The term OLAP Services has been replaced with the term Analysis Services.
Analysis Services also includes a new data mining component. The Reposi tory component available
in SQL Server version 7.0 is now called Microsoft SQL Server 2000 Meta Data Services. References
to the component now use the term Meta Data Services. The term repository is used only in reference
to the repository engine within Meta Data Services
SQL-SERVER database consist of six type of objects,
They are,
1. TABLE
2. QUERY
3. FORM
4. REPORT
5. MACRO
27
TABLE:
A database is a collection of data about a specific topic.
VIEWS OF TABLE:
We can work with a table in two types,
1. Design View
2. Datasheet View
Design View
To build or modify the structure of a table we work in the table design view. We can specify
what kind of data will be hold.
Datasheet View
To add, edit or analyses the data itself we work in tables datasheet view mode.
QUERY:
A query is a question that has to be asked the data. Access gathers data that answers the question
from one or more table. The data that make up the answer is either dynaset (if you edit it) or a snapshot
(it cannot be edited).Each time we run query, we get latest information in the dynaset. Access either
displays the dynaset or snapshot for us to view or perform an action on it, such as deleting or updating.
SOFTWARE SPECIFICATION:-
28
"dot net") is a framework for building and running applications on Windows-based systems,
providing a rich set of libraries and tools for software development.
• Significance: Choosing C#.NET as the coding language enables developers to leverage the
powerful features of the .NET framework, such as memory management, security, and
interoperability with other languages and platforms.
• Benefits: C#.NET offers a clean and expressive syntax, strong type safety, and extensive
documentation and community support, making it well-suited for developing complex and
scalable software solutions like the fingerprint-based voting system.
3. Database: MS SQL Server 2005
• Description: Microsoft SQL Server 2005 is a relational database management system
(RDBMS) developed by Microsoft. It provides a secure and reliable platform for storing,
retrieving, and managing data, with support for features such as transactions, indexing, and
stored procedures.
• Significance: Using MS SQL Server 2005 as the database ensures data integrity, scalability,
and performance for the fingerprint-based voting system. It allows for efficient data storage
and retrieval, crucial for managing voter information, candidate details, and election results.
• Benefits: MS SQL Server 2005 offers advanced security features, robust backup and recovery
options, and seamless integration with .NET applications, making it an excellent choice for
building secure and reliable voting systems.
4. IDE: Microsoft Visual Studio
• Description: Microsoft Visual Studio is an integrated development environment (IDE) used
for developing software applications across various platforms, including Windows, Android,
iOS, and web. It provides a comprehensive set of tools for coding, debugging, testing, and
deploying applications.
• Significance: Visual Studio offers a unified development environment for C#.NET developers,
streamlining the software development process and improving productivity. It includes
features such as code editors, project management tools, and built-in debugging capabilities.
• Benefits: With Visual Studio, developers can write, edit, and debug code efficiently,
collaborate with team members using version control systems, and deploy applications to
multiple platforms seamlessly. Its intuitive user interface and extensive plugin ecosystem
make it the preferred choice for C#.NET development projects.
Using these technologies and tools in combination ensures the development of a robust, secure, and user-friendly
fingerprint-based voting system on the Windows platform
JavaScript: -
CSS:-
Cascading Style Sheets, fondly referred to as CSS, is a simple design language intended to simplify the
29
process of making web pages presentable. CSS handles the look and feel part of a web page. CSS is easy to
learn and understand but it provides powerful control over the presentation of an HTML document. Most
commonly, CSS is combined with the markup languages HTML or XHTML.
ADVANTAGES OF CSS:
• CSS saves time − You can write CSS once and then reuse same sheet in multiple HTML pages. You
can define a style for each HTML element and apply it to as many Web pages as you want.
• Pages load faster − If you are using CSS, you do not need to write HTML tag attributes every time. Just
write one CSS rule of a tag and apply it to all the occurrences of that tag. So less code means faster
download times.
REQUIREMENT ANALYSIS:-
Requirements Analysis is the process of defining the expectations of the users for an application that is
to be built or modified. Requirements analysis involves all the tasks that are conducted to identify the needs of
different stakeholders. Therefore requirements analysis means to analyze, document, validate and manage
software or system requirements. High-quality requirements are documented, actionable, measurable, testable,
traceable, helps to identify business opportunities, and are defined to a facilitate system design.
SYSTEM TESTING: -
The purpose of testing is to discover errors. Testing is the process of trying to discover every
conceivable fault or weakness in a work product. It provides a way to check the functionality of components, sub
assemblies, assemblies and/or a finished product It is the process of exercising software with the intent of ensuring
that the
Software system meets its requirements and user expectations and does not fail in an unacceptable
manner. There are various types of test. Each test type addresses a specific testing requirement.
TYPES OF TESTS:
Unit testing
Unit testing involves the design of test cases that validate that the internal program logic is functioning
properly, and that program inputs produce valid outputs. All decision branches and internal code flow should be
validated. It is the testing of individual software units of the application .it is done after the completion of an
individual unit before integration. This is a structural testing, that relies on knowledge of its construction and is
invasive. Unit tests perform basic tests at component level and test a specific business process, application, and/or
system configuration. Unit tests ensure that each unique path of a business process performs accurately to the
documented specifications and contains clearly defined inputs and expected results.
Integration testing
Integration tests are designed to test integrated software components to determine if they actually run
as one program. Testing is event driven and is more concerned with the basic outcome of screens or fields.
Integration tests demonstrate that although the components were individually satisfaction, as shown by
successfully unit testing, the combination of components is correct and consistent. Integration testing is
specifically aimed at exposing the problems that arise from the combination of components.
30
Functional test
Functional tests provide systematic demonstrations that functions tested are available as specified
by the business and technical requirements, system documentation, and user manuals.
Functional testing is centered on the following items:
Valid Input : identified classes of valid input must be accepted.
Invalid Input : identified classes of invalid input must be rejected.
Functions : identified functions must be exercised.
Output : identified classes of application outputs must be exercised.
Systems/Procedures: interfacing systems or procedures must be invoked.
Organization and preparation of functional tests is focused on requirements, key functions, or special
test cases. In addition, systematic coverage pertaining to identify Business process flows; data fields, predefined
processes, and successive processes must be considered for testing. Before functional testing is complete,
additional tests are identified and the effective value of current tests is determined.
System Test
System testing ensures that the entire integrated software system meets requirements. It tests a
configuration to ensure known and predictable results. An example of system testing is the configuration oriented
system integration test. System testing is based on process descriptions and flows, emphasizing pre-driven
process links and integration points.
Unit testing is usually conducted as part of a combined code and unit test phase of the software
lifecycle, although it is not uncommon for coding and unit testing to be conducted as two distinct phases.
31
Test objectives
• All field entries must work properly.
• Pages must be activated from the identified link.
• The entry screen, messages and responses must not be delayed.
Features to be tested
• Verify that the entries are of the correct format
• No duplicate entries should be allowed
• All links should take the user to the correct page.
Integration Testing
Software integration testing is the incremental integration testing of two or more integrated
software components on a single platform to produce failures caused by interface defects.
The task of the integration test is to check that components or software applications, e.g.
components in a software system or – one step up – software applications at the company level – interact without
error.
Test Results: All the test cases mentioned above passed successfully. No defects encountered.
Acceptance Testing
User Acceptance Testing is a critical phase of any project and requires significant participation by the
end user. It also ensures that the system meets the functional requirements.
Test Results: All the test cases mentioned above passed successfully. No defects encountered.
32
CHAPTER:5
RESULTS
33
34
35
36
37
Chapter 6
CONCLUSION
6.1.CONCLUSION:
Thus the advent of this biometric thumb impression voting system would enable hosting of fair elections
in India. This will preclude the illegal practices like rigging. The citizens can be sure that they alone can choose
their leaders, thus exercising their right in the democracy. E-voting system using biometric is a prototype
Evolution to using finger print module & voice recognition system using MFCC algorithm. As the need for voting
system has started to increase and some countries has started to find for the solutions, this can be the starting
point to improve and deploy in the real world conditions.
In this system I have tried to explain the importance of biometric technique. It is rival properties and its
use areas especially in e-voting. We must to keep in mind that voting is not the only process during the complete
voting operation. There might be some other security concerns that need to be considered when such an
application is built for practical reasons. Proposes a biometric-based design that finds out such challenges and
preserves transparency, secrecy, and anonymity along with other important services, using techniques.
6.2.FUTURE WORK:
➢ This System Can be Used for Electronics since it Provide Complete Security & Will Provide Accurate
Results , Save Time & Expenditure
➢ This Can Be Modify By Interfacing It With a PC Through a serial port in order To Provide Additional
Security
➢ Performance can Be increased in terms of Speed & memory
➢ Biometric Verification of Voters .So That Automatically it can Be Insured That one Person is Voting Once.
➢ The developing of an online voting system that employs fingerprint registration as well as the use of a one-
time password generated for each voter per election, which will allow voters to participate in the elections
regardless of their physical location.
➢ Designing a Biometric Voting system based on fingerprint recognition and faster one to many
identification that manages records for Voting in Election.
38
❖ REFERENCES:
[1] Cranor, L. F., and Cytron, R. K., “Sensus: A Security-Conscious Electronic Polling System for
the Internet”, Proceeding of the Hawaii International Conference on System Sciences, January 7-
10, 1997.
[2] Anisaara, N., Rakhi, B., Ashmita, K., Durgesh, G., and Tushar, N., “An Implementation of Secure
Online Voting System”, International Journal of Engineering Research and General Science, vol. 3,
no 2, March-April, 2015.
[3] Al-Ameen, A., and Talab, S., “The technical feasibility and security of e- voting”, The International
Arab Journal of Information Technology, vol. 10, no. 4, pp. 397- 404, July 2013.
[4] Chakole J., B., and Pardhi, P. R., “The Design of Web Based Secure Internet Voting for Corporate
Election”, International Journal of Science and Research, vol. 2, no 7, pp. 118-122, July 2013.
[5] Anand, A., and Divya, P., “An Efficient Online Voting System”, International Journal of Modern
Engineering Research, vol. 2, no 4, pp. 2631-2634, July- Aug. 2012.
[6] Kumar S., and Singh M., “Design a Secure Electronic Voting System Using Fingerprint
Technique”, International Journal of Computer Science Issues, vol. 10, no 4, pp. 192-199, July 2013.
[7] Kaliyamurthie, K. P., Udayakumar, R., Parameswari, D., and Mugunthan, S. N., “Highly secured
online voting system over Network”, Indian journals of science and technology, vol 6, no 6, pp.
4831-4836, May 2013.
39
[9] Working Committee: Electronic voting challenges and opportunities. Ministry of Local Government and Regional
Development, Norway, 2006.
[10] Working Committee: e-Vote 2011 Security Objectives. Ministry of Local Government and Regional Development, Norway,
2009.
[11] Abdulhamid, S. M., Adebayo, O. S., Ugiomoh, D. O. and Abdul Malik, M. D., “The Design and Development of Real-Time
E-Voting System In Nigeria With Emphasis On Security And Result Veracity”, International Journal Computer Network
and Information Security, vol. 5, no 5, pp. 9-18, April 2013.
[12] Chowdhury, M. J. M., “Comparison of e-Voting Schemes: Estonian and Norwegian Solutions”, International Journal of
Applied Information Systems, vol. 6, no. 2, pp. 19-21, September 2013.
[13] Sridharan, S., “Implementation of authenticated and online voting system”, IEEE International Conference on Computing,
Communication and Networking Technologies, July 4-6, 2013.
[14] Kusters, R., Truderung, T., and Vogt, A., “Clash Attacks on the Verifiability of E -voting System”, IEEE Symposium on
Security and Privacy, pp. 395-409, 2012.
[15] Autade, K., Ghadge, P., Kale, S., Kulkarni, N. J., and Mujgond, S. S., “E- voting on Android System”, International Journal
of Emerging Technology and Advanced Engineering, vol. 2, no. 2, pp. 242-245, February 2012.
[16] Mohamad A. A., “Efficient E-voting Android Based System”, International Journal of Advanced Research in Computer
Science and Software Engineering, vol. 3, no. 11, November 2013.
40
Evaluation Sheet (ESE) for
Capstone Project Planning
Name of Student: ………………………………………………………………………………………
Name of Programme:…………………………………………………. Semester:…………………..
Course Title and Code:…………………………………………………………………………….
Title of the Capstone Project:…………………………………………………………………………
A. POs addressed by the Capstone Project (Mention only those predominant POs)
a) …………………………………………………………………………………………………
b) …………………………………………………………………………………………………
c) …………………………………………………………………………………………………
d) …………………………………………………………………………………………………
B. COs addressed by the Capstone Project (Mention only those predominant POs)
a) …………………………………………………………………………………………………
b) …………………………………………………………………………………………………
c) …………………………………………………………………………………………………
d) …………………………………………………………………………………………………
C. OTHER LEARNING OUTCOMES ACHIEVED THROUGH THIS PROJECT
a) Unit Outcomes (Cognitive Domain)
i. …………………………………………………………………………………………………
ii. …………………………………………………………………………………………………
iii. …………………………………………………………………………………………………
iv. …………………………………………………………………………………………………
b) Practical Outcomes (in Psychomotor Domain)
i. …………………………………………………………………………………………………
ii. …………………………………………………………………………………………………
iii. …………………………………………………………………………………………………
iv. …………………………………………………………………………………………………
c) Affective Domain Outcomes
i. …………………………………………………………………………………………………
ii. …………………………………………………………………………………………………
iii. …………………………………………………………………………………………………
iv. …………………………………………………………………………………………………
41
PROGRESSIVE ASSESSMENT (PA) SHEET
Sr.No Criteria Max Marks
Mark Obtained
1 Problem Identification and Project Title 10
2. Industrial Survey and Literature Review
3. Punctuality and Overall Contribution
4. Project Diary
5. Report Writing Including Documentation 10
6. Presentation 05
Total 25
4 Project Diary Entries for most Entries for some Entries were made everyEntries were made every
weeks are missing. weeks are missing week but are not in week in detail. signed and
There is no proper details are not detail. Signed and approved by guide every
sequence and appropriate, not approved by guide everyweek
details are not signed regularly week
correct. by the guide
42
5 Final Report Very short poor Detailed, correct Conclusions Very detailed, correct, clear
Preparation Quality sketches, and clear Sufficient Graphic description of methods,
Details about description of Description materials, precautions and
Methods, methods, conclusions. Enough tables,
Material Precaution materials, charts and sketches
and conclusions precautions.
omitted,some
details are wrong
6 Presentation Major information Includes major Includes major Well organized, includes
is not included, information but not information and well major information,well
information is not well organized and organized but not presented
well organized. not presented presented well
well
7 Defense Could Not Replay Replied to Replied Properly to Replied to Most of The
to Considerable Considerable Considerable number Questions Properly.
Number Of Number of of Question.
Question. Questions But Not
Very Properly.
43