- Open Access
- Authors : Nisha P. Pooja, T. Anuja
- Paper ID : IJERTCONV10IS08006
- Volume & Issue : ETEDM – 2022 (Volume 10 – Issue 08)
- Published (First Online): 30-07-2022
- ISSN (Online) : 2278-0181
- Publisher Name : IJERT
- License: This work is licensed under a Creative Commons Attribution 4.0 International License
Smart Voting System using Deep Learning Techniques
M. Nisha P. Pooja
(Student)
Department of Information Technology, Jeppiaar Engineering College, Chennai
Ms. T. Anuja
Assistant Professor Department Of Information Technology, Jeppiaar Engineering College, Chennai
AbstractElectronic voting (e-voting) presents a convenient and cost-effective alternative to current paper ballot-based voting. It provides many benefits such as increased voter turnout and accuracy in the decision-making process. While presenting many improvements, e-voting still faces serious security challenges that hinder its adoption, especially when designed to be run over mobile devices. In this paper, we propose a novel remote evoting model for large-scale elections by proposing the participation of two conflicting parties to ensure election integrity and accountability. Our scheme can be implemented in IoT devices such as smartphones, which we believe can significantly increase voter turnout of the election process. Our proposed work is secure and preserves voter privacy through secure multi- party computations performed by parties of differing allegiances. It also leverages a blockchain running smart contracts as a publicly accessible and tamper-resistant bulletin board to permanently store votes and prevent double-voting. In our security and privacy analysis, we show that our proposed scheme is secure against potential security threats and provides voter anonymity. We show orthogonality between universal verifiability and coercionresistance in our proposed scheme, allowing an election to favor one over the other. Our performance analysis and smartphone simulation results show that the proposed scheme is practical for large-scale elections.
Index TermsRemote e-voting, voter anonymity, universal verifiability, coercion-resistant, unlinkability, blockchain
I.INTRODUCTION
More than half the worlds countries are classified as democratic nations, employing governments that enforce and secure their democracies. While these governments may vary in structure, they all grant eligible members the ability to exercise their power by voting. However, guaranteeing that a democratic election is free and fair still remains a challenge for most governments. Let alone, proving the freeness and fairness of the election to everyone, especially to the losing candidates, is an even bigger challenge.
A free election should entail multiple imperative features [1]. Before voting, proper voter registration is required to grant voting rights only to eligible voters. Voters should be able to remain anonymous, maintaining an election free of ballots that could be linked to their voters. Furthermore, to ensure that votes are tallied properly, verifiability should also be integrated to prove to everyone the legitimacy of the election results and avoid controversy. Concurrently, for an election to be fair, all eligible voters should have equal registration and
ballot casting availability and accessibility regardless of any limitations such as geographical location or economic status. This means that voters that are unable to physically access their poll-sites, for example, absent personnel serving in the military, should be able to cast their ballots remotely while maintaining the equivalent requirements of a free election. A fair election should also maintain the secrecy of the cast ballots throughout the voting phase to prevent last-minutes voters from skewing the final count.
-
RELATED WORK
Previous work that achieves coercion-resistance and remote e-voting date back to 2005 when the work by Juels et al. [6] was introduced and later refined resulting in Civitas [7]. Although proven to be secure, the security came at the price of tabulation which is quadratic in respect to the total number of ballots being submitted in an election. Shortly, Helios [8] was proposed as a web- based open-audit voting system for elections where coercion is not a serious problem. The system achieves privacy using mixnets [9] and was later improved by Demirel et al. [10] by replacing the mixnets with homomorphic encryption and multi-party tallying. However, these systems primarily focus on universal verifiability while intentionally not taking coercion- resistance into account.
In contrast, Selections [11] is a system that was proposed in which voter authentication relies on possession of certain voter passwords, allowing them to generate panic passwords in cases of coercion. This system relies on zero-knowledge proofs during the vote casting phase. Other systems such as [12], use a linear- time scheme to remove duplicated votes which may be submitted by voters to avoid coercion. This system also relies on voters indicating which electoral roll their votes belong to so that tallying authorities can identify which votes should be included in the total count. This results in faster tallying during the tabulation process. However, it requires additional trust in the elected trustees to add dummy ballots to make the system coercion-resistant.
Based on concepts from [11] and [12], a protocol was introduced in [16] that requires voters to specify an anonymity set where each voter claims to be one of the voters within the set. This resulted in additional voter overhead costs during the authentication phase. Later, Zeus [17] was proposed following the initial framework of Helios [8] where mixing is performed using external agents. Although it provides universal
verifiability, the system is not coercion- resistant as it provides voters with receipts at the end of voting.
-
PROPOSED SYSTEM
System is used cast your vote through online via website using facial authentication and machine learning techniques . To get a high degree of accuracy from what is called training data. Haar Cascades use the Adaboost learning algorithm. which selects a small number of important features from a large set to give an efficient result of classifiers. Initially, the algorithm needs a lot of positive images (images of faces) and negative images (images without faces) to train the classifier. Then we need to extract features from it. For this, haar features shown in below image are used. They are just like our convolutional kernel. Each feature is a single value obtained by subtracting sum of pixels under white rectangle from sum of pixels under black rectangle..
Figure 2: Work Of The Proposed System
Proposed Algorithms involved
Haarcascade algorithm
Working of Algorithm
Convolutional neural network (ConvNets or CNNs) is one of the main categories to do images recognition, images classifications. Objects detections, recognition faces etc., are some of the areas where CNNs are widely used. In work project we are going to detect and classify drone in video using CNN algorithm.
Steps
-
Provide input image into convolution layer
-
Choose parameters, apply filters with strides, padding if requires. Perform convolution on the image and apply ReLU activation to the matrix.
-
Perform pooling to reduce dimensionality size
-
Add as many convolutional layers until satisfied
-
Flatten the output and feed into a fully connected layer
(FC Layer)
Output the class using an activation function and classifies images
Figure 2 : Shows The Algorithm Work Design
-
-
EXPERIMENTAL ANALYSIS
Register Registration module is the starting point of this project where a user gone make use of this system by registering him self into it.In this module user will a unique voter id nd user gone register with some basic information about him after the user gone complete the registration by
giving his face as input and system will read the face and load it in datasets after that registration
Data Preprocessing
In this module the collected dataset from user in the time of registration will be stored in folder and all image are resized to standard and unique size and the image are converted to gray scale image and noise are remo
Admin upload candidates and assign election
Admin is the one who monitor the entire system.First admin has a standard login id and password . Admin can upload election candidates the candidates list must be in a csv file where the candidates detail like part name email and area the he gone compete with this detail the file will be uploaded from data the details will be uploaded to system.Admin can also monitor the registered user.Admin can also assign election on the upcoming dates .
Face Recognition
Ever time a new user register or the existing user vote his face will be recognition to check weather user is authorized or not.
See the result
After the user voted his vote now the result will be automatic updated with the vote count .
TEST CASE
Testing, as already explained earlier, is the process of discovering all possible weak-points in the finalized software product. Testing helps to counter the working
of sub-assemblies, components, assembly and the complete result. The software is taken through different exercises with the main aim of making sure that software meets the business requirement and user- expectations and doesnt fails abruptly. Several types of tests are used today. Each test type addresses a specific testing requirement.
Testing Techniques
A test plan is a document which describes approach, its scope, its resources and the schedule of aimed testing exercises. It helps to identify almost other test item, the features which are to be tested, its tasks, how will everyone do each task, how much the tester is independent, the environment in which the test is taking place, its technique of design plus the both the end criteria which is used, also rational of choice of theirs, and whatever kind of risk which requires emergency planning. It can be also referred to as the record of the process of test planning. Test plans are usually prepared with signification input from tes
CONCLUSION
Smart Voting is primarily responsible for the majority of India's city . It should be considered as the main issue for the majority of us. The existing methods for Voting involves manual work with lot of human work and man power and also if convert voting to online it need secured voting system to cast voters vote . The Machine Learning technique. Are use to recognize person face and check whether voter is a authorized or not
ACKNOWLEDGMENT
We thank the Management, Jeppiaar Engineering College for providing the opportunity.
We would like to thank the Principal, HOD of Information technology and the Department Professors for their Guidance and Support.
We would also like to thank our friends for their help and Motivation throughout this project.
REFERENCES
[1] Moez Baccouche, et al. Sequential deep learning for human action recognition. International Workshop on Human Behavior Understanding. Springer Berlin Heidelberg, 2011. 2 [2] Samir K. Bandyopadhyay, Biswajita Datta, andSudipta Roy Identifications of concealed weapon in a Human Body Department of Computer Science and Engineer, University of Calcutta, 2012. 2 [3] Aaron Damashek and John Doherty Detecting guns using parametric edge matching Project for Computer Vision Course: CS231A, Stanford University, 2015. [4] Claire-Hlne Demarty, et. al The MediaEval 2012 affect task: violent scenes detection Working Notes Proceedings of the MediaEval 2012 Workshop. 2012. [5] Roberto Olmos, Siham Tabik, and Francisco Herrera Automatic Handgun Detection Alarm in Videos Using Deep Learning Soft Computing and Intelligent Information Systems research group, Department of Computer Science and Artificial Intelligence,University of Granada, 2017. 1, 2
[6] K. Simonyan, A. Zisserman Very Deep Convolutional Networks for Large-Scale Image Recognition Visual Geometry Group, Department of Engineering Science, University of Oxford, 2015. 1, 2 [7] Russell Stewart Tensorbox https://github.com/TensorBox/TensorBox. 1, 2 [8] Pierre Sermanet, et. al Overfeat: Integrated recognition, localization and detection using convolutional networks Courant Institute of Mathematical Sciences, New York University, 2013. 2 [9] Pierre Sermanet, et. al You only look once: Unified, real-time object detection Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2016. 2 [10] Dumitru Erhan, et al Scalable object detection using deep neural networks Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2014. [11] Shaoqing Ren, Kaiming He, Ross Girshick, Jian Sun Faster r- cnn: Towards real-time object detection with region proposal networks Advances in neural information processing systems, 2015. 2 [12] Joseph Redmon and Anelia Angelova Real-time Grasp Detection Using Convolutional Neural Networks Robotics and Automation (ICRA), 2015 IEEE International Conference on.IEEE, 2015. 2
[13] Chung Yu Wang and Cheng-Yue Royce Traffic Sign Detection using You Only Look Once Framework Technical Report Project for Computer Vision Course: CS231N, Stanford University, 2015. 2 [14] Deng, Jia, et al. Imagenet: A large-scale hierarchical image database Computer Vision and Pattern Recognition, 2009. CVPR 2009. IEEE Conference on. IEEE, 2009. [15] Suresh Babu V, Anu George, Image Forgery Detection using Global, Local and Histogram Features, Technology and Future Journal of Science and Technology, Volume 1, Issue 1, page no.52-58, June 2014. [16] Parthasarathy C Ezhilarasu P, Prakash J, Krishnaraj N, Satheesh Kumar D, V Suresh Babu, A Novel Approach to Design the Finite Automata to Accept the Palindrome with the Three Input Characters, Indian Journal Of Science And Technology,Volumw 8, Issue 28,page no1-8,2015