M-Polling with QR-Code Scanning and Verification

Similar documents
Online Voting System Using Aadhar Card and Biometric

SMART VOTING. Bhuvanapriya.R#1, Rozil banu.s#2, Sivapriya.P#3 Kalaiselvi.V.K.G# /17/$31.00 c 2017 IEEE ABSTRACT:

M-Vote (Online Voting System)

Smart Voting System using UIDAI

SMS based Voting System

AADHAAR BASED VOTING SYSTEM USING FINGERPRINT SCANNER

Aadhaar Based Voting System Using Android Application

Electronic Online Voting via Smart Phone App

Implementation of aadhar based voting machine using

Election Campaigner Through Android Application

General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia

E- Voting System [2016]

Electronic Voting For Ghana, the Way Forward. (A Case Study in Ghana)

IMPLEMENTATION OF SECURE PLATFORM FOR E- VOTING SYSTEM

City of Toronto Election Services Internet Voting for Persons with Disabilities Demonstration Script December 2013

Blind Signatures in Electronic Voting Systems

Voting Protocol. Bekir Arslan November 15, 2008

Case Study. MegaMatcher Accelerator

Ballot Reconciliation Procedure Guide

SECURE REMOTE VOTER REGISTRATION

THE PROPOSAL OF GIVING TWO RECEIPTS FOR VOTERS TO INCREASE THE SECURITY OF ELECTRONIC VOTING

Novel E-Voting System with Biometric Authentication and Distributed Server System

ONLINE VOTING SYSTEM POWERED BY AADHAR AUTHENTICATION

Estonian National Electoral Committee. E-Voting System. General Overview

AADHAR BASED ELECTRONIC VOTING SYSTEM USING BIOMETRIC AUTHENTICATION AND IOT

Statement on Security & Auditability

E-Voting, a technical perspective

EFFICACIOUS ELECTRONIC VOTING USING BIOMETRY

L9. Electronic Voting

Secure Electronic Voting: New trends, new threats, new options. Dimitris Gritzalis

Voting Corruption, or is it? A White Paper by:

Union Elections. Online Voting. for Credit. Helping increase voter turnout & provide accessible, efficient and secure election processes.

Life in the. Fast Lane PREPARED BY ELECTION SYSTEMS & SOFTWARE ELECTION SYSTEMS & SOFTWARE

Elections at Your Fingertips: App-ortunities to Connect with Wisconsin Voters

CHAPTER 2 LITERATURE REVIEW

Addressing the Challenges of e-voting Through Crypto Design

ONLINE VOTING PORTAL BASED ON AADHAAR CARD VERIFICATION

DESIGN AND ANALYSIS OF SECURED ELECTRONIC VOTING PROTOCOL

Security Analysis on an Elementary E-Voting System

SECURITY, ACCURACY, AND RELIABILITY OF TARRANT COUNTY S VOTING SYSTEM

EXPERIENCING SMALL-SCALE E-DEMOCRACY IN IRAN. Mohsen Kahani Department of Computer Engineering,

The usage of electronic voting is spreading because of the potential benefits of anonymity,

6. Voting for the Program will be available for five (5) weeks from Monday 13 June 2016.

INSTRUCTIONS AND INFORMATION

Yes, my name's Priit, head of the Estonian State Election Office. Right. So how secure is Estonia's online voting system?

Scytl Secure Electronic Voting

Secured Electronic Voting Protocol Using Biometric Authentication

The Use of New Technologies in Electoral Process in Bosnia and Herzegovina: Where we started and where we are going

Trusted Logic Voting Systems with OASIS EML 4.0 (Election Markup Language)

Biometric voting Machine using UID(Aadhar)

SMART VOTING SYSTEM USING ANDROID

JUDICIARY OF GUAM ELECTRONIC FILING RULES 1

Act means the Municipal Elections Act, 1996, c. 32 as amended;

Guide to Electronic Voting Election Runner

Research Article. ISSN (Print)

UTAH LEGISLATIVE BILL WATCH

Electronic Voting in Belgium Past, Today and Future

Secure Electronic Voting

Design and Implementation of Electronic Voting System (EVS)

The problems with a paper based voting

Voting System Examination Election Systems & Software (ES&S)

Digital Signature and DIN

Frequently Asked Questions

CPSC 467b: Cryptography and Computer Security

Procedures for the Use of Optical Scan Vote Tabulators

Attachment 1. Workflow Designs. NOTE: These workflow designs are for reference only and should not be considered exact specifications or requirements.

^Sfl^.t f I I THE MUNICIPAL EXPERTS. The Voters' Guide to. Accessible Voting. ^' Ontario. .c^>_

An Application of time stamped proxy blind signature in e-voting

A Study on Ways to Apply the Blockchain-based Online Voting System 1

The Economist Case Study: Blockchain-based Digital Voting System. Team UALR. Connor Young, Yanyan Li, and Hector Fernandez

Additional Case study UK electoral system

Petition for Declaratory Ruling Regarding Use of Electronic Signatures on Petition for an Unaffiliated Candidate for Federal Office

A Prescriptive Policy Paper on E-Governance Use of Wireless Technology in Electronic Voting Machine

Utilization of Information Technology for Electoral Management. Mr.Cholaraj Phewban Inspector General, Office of The Election Commission of Thailand

process will save judges, sheriffs, clerks, and attorneys' time and money.

ELECTION PLAN TOWN OF GODERICH MUNICIPAL ELECTIONS. January 2014

202.5-b. Electronic Filing in Supreme Court; Consensual Program.

DESIGN AND IMPLEMENTATION OF ADVANCED VOTING SYSTEM USING MATLAB IMAGE PROCESSING WITH PICTURE PASSWORDS

Privacy of E-Voting (Internet Voting) Erman Ayday

Internet Voting: Experiences From Five Elections in Estonia

High Court of Judicature at Allahabad. Notice

EVM BROCHURE FOR candidates

Electronic Voting: Challenges and Prospects in Nigeria s Democracy

IC Chapter 15. Ballot Card and Electronic Voting Systems; Additional Standards and Procedures for Approving System Changes

Internet Voting Process for The City of Greater Sudbury 2018 Municipal Election

2016 Election Judges Manual. Casting Ballots. At the Scanning Unit Inserting a Ballot into the Ballot Scanner

Introduction of Electronic Voting In Namibia

Chief Electoral Officer Directives for the Counting of Ballots (Elections Act, R.S.N.B. 1973, c.e-3, ss.5.2(1), s.87.63, 87.64, 91.1, and 91.

User Guide for the electronic voting system

Secure Electronic Voting: Capabilities and Limitations. Dimitris Gritzalis

Canada s FASTER-PrivBio Project Biometrics at the Virtual Border to enhance security and facilitation

A paramount concern in elections is how to regularly ensure that the vote count is accurate.

CROSS USER GUIDE. Global Remittance Service Your Remiitance Hero, CROSS

Kane County Local Rule

January Caux Initiatives for Business Global Secretariat Asia Plateau Panchgani India

German Federal Ministry of the Interior 20 August / 6

PROCEDURES FOR THE USE OF VOTE COUNT TABULATORS

Enhanced Automated Biometric Web-Based Electronic Voting System for Nigeria

Xournals. Indian Electoral System & EVM. Udit Singh 1. Abstract: Authors:

Designing issues and requirement to develop online e- voting system systems having a voter verifiable audit trail.

Transcription:

IJSTE - International Journal of Science Technology & Engineering Volume 3 Issue 09 March 2017 ISSN (online): 2349-784X M-Polling with QR-Code Scanning and Verification Jaichithra K Subbulakshmi S B. Tech Student Assistant Professor Department of Information Technology Department of Information Technology KCG College of Technology KCG College of Technology Abstract Voting is the vital part of democratic process to ensure one s decisions to elect the leaders in a transparent way. So it s becoming very important to make the voting process more easy and efficient. Traditional voting process includes hand counted paper ballots and then the electronic voting machines. These traditional methods have many drawbacks. In order to overcome these drawbacks, an android based M-Voting system, which gives the privacy in expressing the voter s decisions to elect the representatives. The android platform gives the portability to the application. In the M-Voting system, the voter votes using the android application which can be downloaded over the internet. The voter is given the facility to view the history of the previous elections and come to a conclusion of the state s fate. The voter registers by giving the personal details and AADHAR ID which contains the QR-code. Once the election date and time is announced, the voter gets notification via SMS or E-mail. Only then the voter is allowed to enter into the poll by entering the OTP (One Time Password) and scanning the QR-code. If the voter is validated then, permitted to enter into the poll. If not, then the app exits automatically from the poll. Keywords: Android, Polling, QR-code, etc I. INTRODUCTION Since it s a 21 st century and there were more advancement in the field of technology, yet there is no solution to people standing in long queues to cast the vote and elect the leaders. This is a drawback in a developing nation. The earlier methods like handcounted paper ballots and electronic voting system many a times irritate the people to perform the national duty. In many countries even now women are not allowed to go outside for a social cause. Senior citizens, women and transgendered find it very difficult to go to the polling booths and cast the vote. In-order to find a solution for these drawbacks an android application for the voting process should be introduced by the electoral board in the society. The M-Polling android application gives an independent platform to the citizens of the county to perform the national rights without any struggle and inconvenience. To validate the voters the AADHAR-ID plays a major role in the application. The android platform gives the portability to the application. In the M-Voting system, the voter votes using the android application which can be downloaded over the internet. The voter is given the facility to view the history of the previous elections and come to a conclusion of the state s fate. The voter registers by giving the personal details and AADHAR ID which contains the QR-code. Once the election date and time is announced, the voter gets notification via SMS or E-mail. Only then the voter is allowed to enter into the poll by entering the OTP and scanning the QR-code. If the voter is valid then, permitted to enter into the poll. If not, then the app exits automatically from the poll. The security constraint is maintained keenly in the application. II. RELATED WORK In earlier method, voter has to cast the vote by putting the stamp in front of the favourite candidate name [2]. And then by folding that ballot paper, it is inserted into the ballot box. This is very time consuming. So during the next election, Election Commission of India, has introduced a new method of polling i.e., EVM (Electronic Voting Machine). The Electronic Voting Machines (EVM) consists of 2 components: 1) Control Unit. 2) Ballot Unit. Control unit stores and assembles votes. And the Ballot Unit is used by Voter and it is placed at the election booth. These both units are connected via a five meter cable [2]. In the proposed system a battery pack is present inside the control unit. It is a six volt alkaline battery, which means they can easily be used in rural areas where there is no electricity. [3] Making use of the AADHAR-ID.A voter has to simply press a button in front of the favourite candidate to cast vote [2]. Only six votes in a minute can be accepted by the machine, and after each vote, machine locks itself and can be unlocked using a new ballot number. The polling booth is always presided by a government officer who is the in charge of the controlling unit of the EVM. To accept another ballot the machine is unlocked by the in charge officer. [4] Implements the usage of the AADHAR card. This system is tamper-proof and a person won t be able to cast more than one vote. One machine is able to accept up to 3,840 votes, and cater to 16 candidates each. [6] Usage of minutiae algorithm. Using Blind signature by D. Chaum, it mainly lies on simplifying the All rights reserved by www.ijste.org 316

algorithm used in the voting process and it can secure voting data during the transmission. When in this Proposed system use blind signature in the election, its intractability is the major issue as voters might not be able to track the votes [1]. Fig 1 represents the architecture of E-Voting application using android smart phone. Fig. 1: Architecture of E-Voting application using Android smart phone. III. ARCHITECTURE The application has two stages which is pre-election and election. The pre-election stage has two modules that is History of TN elections and the Candidate list. Then election has one module which is vote casting that will open on the day of the election that too only once after the election date and time has announced. The user registers and login into the application and has the rights to view the pre-election modules and after that once the election has been announced the app generates OTP to the voter and then the AADHAR-Id is scanned after which the vote casting is done. Fig 2 represents the M-Polling application. Fig. 2: Architecture of M-Polling application. All rights reserved by www.ijste.org 317

IV. QR CODE A QR code is any code that users find on most of any items that they buy from the store. QR codes have come a long way and now that they are integrated into the online world it s a true phenomenon. Fig2 is the description of the QR code. It makes searching for online products, shopping and buying much easier. Now, users are going to use it for buying tickets. Creates an image in real world and acts like a web link for the smart phones. It actually grabs the code scans the item and goes online searches for the item which then give users so many details about the product. The user gets specific details as per user choice and reviews about the product that has been just scanned from the scanner. When user scans a QR code a magazine, a newspaper or wherever the iphone or Android will to go to a website where the user will find much of promos, coupons, maps and many more information. QR codes now are used in a much broader context, including both business tracking applications and convenience-oriented applications aimed at mobile phone users, to open a Uniform Resource Identifier (URI), or to compose an e-mail or text message. Users can generate and print their own QR codes for others to scan and use by visiting one of several paid and free QR code generating websites or applications. It has then become one of the most-used types of two-dimensional barcode. Encryption Fig. 3: Structure example of QR code Encrypted QR codes, which are not very common, have a few implementations. An Android application, for example, manages encryption and decryption of QR codes. Encoding The format information records two things: the error correction level and the mask pattern used for the symbol. The mask patterns are displayed as a grid that is repeated as necessary to cover the whole symbols. Modules corresponding to the dark portion of the mask are inverted. Risks Malicious QR codes combined with a permissive reader can put a computer's contents and user's privacy at risk. This practice is known as "attagging. They are easily created and can be affixed over legitimate QR codes. The following are the modules of the M-Polling application. 1) User details 2) History of TN elections. 3) Candidate list. 4) Vote casting- OTP generation, AADHAR-ID scanning. User Details: V. PROPOSED SYSTEM This is the first module of the application wherein if the application is installed for the first time, the voter has to register and then login has to be done. Fig 4 represents the user details module of the M-Polling application. All rights reserved by www.ijste.org 318

Fig 4: Registration Screen Fig 5: Login Screen History of TN Elections History of TN elections is the second module which gives a detailed description of the previous election and the good and bad done to the people of Tamil Nadu by the elected parties. Fig 6 represents the History of TN elections. This module was developed to bring awareness to the voters of Tamil Nadu about the elected leaders. Candidate List: Fig. 6: History of TN Elections This module contains the candidate list of parties lining up in the election according to the area and city. Fig 7 represents the candidate list module. It is used to alert the voters about the parties and the candidate to whom the vote has to be casted. Fig. 7: Candidate list All rights reserved by www.ijste.org 319

VOTE CASTING: M-Polling with QR-Code Scanning and Verification Once the election date is announced the voter can click the vote casting button. An One Time Password (OTP) will be sent to the voter. After entering the OTP the mobile IMEI number will be retrieved from the mobile and stored in the election side database. After entering the OTP, the voter has to scan the AADHAR-ID. If the voter is validated then only vote casting can be done. Else the app exists automatically. Fig 8,9,10,11 represents the vote casting module. Fig 8: OTP Fig 9: QR code scanning Fig 10: Verification Fig 11: Vote Casting VI. IMPLEMENTATION Generally implementation of the software is considered as the actual creation of the software. Since system design stage usually suggest that the interface, data and actual output are created, the implementation stage brings them all together. Once the three different types of designs are complete, it is time for the developers to put place them together. Although it has been tested while the designs were created, it is the final construction of the designs as they are combined by the project manager or the assigned developers. From this point, developers have to stand with what they work for. In the previous stages, developers can freely make some changes in their software design plans simple because it is still in the designing phase. In this stage however, there is no going back as everybody's effort will now be tested. The project manager or the supervisor will take a responsible role during this stage since the project manager decides when to get them all together. In systems design, project managers oversee the project. Since they have practically seen everything about the application, they know when the correct time is to get them all together. It is not all about getting them all together that is important. It is also the time during which developers have the first glimpse of their actual work making it a perfect moment for evaluation. During this time, developers become users as they try out the software to determine if it is up to their expected performance and output. This stage becomes an important phase of the application since it will be the first time that bugs and errors in the system are determined. Of course everyone has been working on the plans and design for sometimes and their familiarity guarantees they have created something as planned. However, bugs will always be there since each design is created. All rights reserved by www.ijste.org 320

VII. RESULTS Finally the vote is casted which is stored in the electoral database. This makes the counting process and result analysis process easier. VIII. CONCLUSION A mobile voting application is developed for Android 1.5 using Java, SQLite, MySQL, and XML on the server side which can change the way people casting the votes in future. This kind of application can be applied to any kind of election system. The android app is one of the huge applications to cast votes from a single application. IX. FUTURE IMPLEMENTATION This application can be enhanced in the future by connecting it with a person s google account, so that if the mobile has been stolen unfortunately, then with the help of the mobile phone s google location the lost mobile can be tracked very easily. This inturn prevents the misuse of this application by a third person. Fingerprint authentication can be used to provide more security to the application. REFERENCES [1] Haijun Pan, Edwin Hou, and Nirwan Ansari, E-NOTE: An E-voting System That Ensures Voter Confidentiality and Voting Accuracy, IEEE (ICC) June 2012 [2] Dr. Aree Ali Mohammed, Ramyar Abdolrahman Timour, Efficient E-voting Android Based System, International Journal of Advanced Research in Computer Science and Software Engineering,Volume 3, Issue 11, November 2013 [3] Rakesh S Raj, Raghavendra A, Madhushree K R and Bhargavi D, "An Online Voting System Using Biometric Fingerprint and Aadhaar Card", IJCAT International Journal of Computing and Technology, Volume 1, Issue 4, May 2014 [4] M.S.Sai Mohit, M.Karthik, T.Rajavel, Ms. J.Sangeetha, "EVoting system using android application", IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 2, Issue 2, Apr-May, 2014 [5] S. Hashimi, S. Komatineni, and D. MacLean Pro Android 2, in Pro Android 2.New York, US: Apress, 2010, ch. 1, pp. 10-11. [6] N. Ansari, P. Sakarindr, E. Haghani, C. Zhang, A.K. Jain, and Y.Q.Shi, Evaluating electronic voting systems equipped with voter verified paper records, IEEE Security and Privacy, vol. 6, no.3, May 2008. All rights reserved by www.ijste.org 321