Computational Theory based Non Invasive Biometric Finger Vein Pattern Extraction and Authentication for Electoral System

N. Shivaanivarsha*, V. S. Selvakumar **
* Department of Electronics and Communication Engineering, Sri Sairam Engineering College, Chennai, Tamil Nadu, India.
** Department of Electronics and Communication Engineering, Rajalakshmi Engineering College, Chennai, Tamil Nadu, India.
Periodicity:July - December'2020
DOI : https://doi.org/10.26634/jdp.8.2.18230

Abstract

In India, electoral voting is done using electronically operated voting machines. Currently, the identity of the voter is validated by non-biometric process. Implementation of technology through computerized process has scope for using biometrics to validate voter's identity. Physiological or behavioral features of human are used as a biometric for personal identification. There is a large dataset of biometric patterns available, and many software systems have been developed and implemented, for recognition of face, hand shape, fingerprint, palm, iris, etc. The system proposed in this paper is implemented using embedded technology to utilize finger-vein image recognition. The system also has a MATLAB section, which will capture the vein in finger of the voter and their sample is registered to the controller. In order to cast a vote, the captured finger vein image must match the image already stored in the database along with the voter's RFID card. It the image identification failed to match with the authorized person, the system will send alert to authorities.

Keywords

Electronic Voting Machine, Finger Veins, Personal Identification Number, Finger-Vein Recognition Algorithm.

How to Cite this Article?

Shivaanivarsha, N., and Selvakumar, V. S. (2020). Computational Theory based Non Invasive Biometric Finger Vein Pattern Extraction and Authentication for Electoral System. i-manager's Journal on Digital Signal Processing, 8(2), 24-30. https://doi.org/10.26634/jdp.8.2.18230

References

[1]. Bhattacharyya, D., Ranjan, R., Alisherov, F., & Choi, M. (2009). Biometric authentication: A review. International Journal of u-and e-Service, Science and Technology, 2(3), 13-28.
[2]. Bhuvanapriya, R., Sivapriya, P., & Kalaiselvi, V. K. G. (2017, February). Smart voting. In 2017, 2nd International Conference on Computing and Communications Technologies (ICCCT) (pp. 143-147). IEEE. https:/doi.org/ 10.1109/ICCCT2.2017.7972261
[3]. Krishnamurthy, S., & Gayathri, S. (2017, November). Prevention of poaching of tigers using wireless sensor network. In 2017, IEEE International Conference on Antenna Innovations & Modern Technologies for Ground, Aircraft and Satellite Applications (iAIM) (pp. 1-7). IEEE. https://doi.org/10.1109/IAIM.2017.8402602
[4]. Jain, T., & Kumar, R. (2019). A study of vein recognition system. Acta Informatica Malaysia (AIM), 3(1), 13-15.
[5]. Liu, W., Li, W., Sun, L., Zhang, L., & Chen, P. (2017, June). Finger vein recognition based on deep learning. In 2017, 12th IEEE Conference on Industrial Electronics and Applications (ICIEA) (pp. 205-210). IEEE. https://doi.org/ 10.1109/ICIEA.2017.8282842
[6]. Musiał-Karg, M. (2014). The use of e-voting as a new tool of e-participation in modern democracies. Przegląd Politologiczny, 2014(4), 99-110.
[7]. Sapkale, M., & Rajbhoj, S. M. (2016, June). A finger vein recognition system. In 2016, Conference on Advances in Signal Processing (CASP) (pp. 306-310). IEEE. https:// doi.org/10.1109/CASP.2016.7746185
[8]. Waluś, M., Bernacki, K., & Konopacki, J. (2017). Impact of NIR wavelength lighting in image acquisition on finger vein biometric system effectiveness. Opto- Electronics Review, 25(4), 263-268. https://doi.org/10.101 6/j.opelre.2017.07.003
[9]. Wolchok, S., Wustrow, E., Isabel, D., & Halderman, J. A. (2012, February). Attacking the Washington, DC Internet voting system. In International Conference on Financial Cryptography and Data Security (pp. 114-128). Heidelberg, Berlin: Springer. https://doi.org/10.1007/978-3- 642-32 946-3_10
[10]. Wu, T. P., Yeung, S. K., Jia, J., Tang, C. K., & Medioni, G. (2011). A closed-form solution to tensor voting: Theory and applications. IEEE Transactions on Pattern Analysis and Machine Intelligence, 34(8), 1482-1495. https://doi.org/ 10.1109/TPAMI.2011.250
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.