Abstract This system employs authentication of biometric identifiers in pursuit. Voters pre details as a central database in the country will be maintained by the government. At the time of voting, the rechecking of this data to ensure the identity of voters. For web casting the use of Raspberry Pi completes voting process and display of polling percentage time to time etc. At a cheaper cost less usage of personal and transparency is achieved and with this Raspberry Pi and its peripherals simpler process.Keywords— Fingerprint detection/ recognisation system, Web page/ Server, Database.INTRODUCTIONFor democratic governance Elections are a transformative tool . Voting is a method for a group, such a meeting or an electorate to make a decision or express an opinion, usually following discussions, debates or election campaigns. Democracies elect holders of high office by voting. Residents of a place represented by an elected official are called “constituents”, and those constituents who cast a ballot for their chosen candidate are called “voters”. There are different systems for collecting votesNowadays, in democratic country election process plays a very important role. This is a process for selection of a perfect candidate who will lead the nation. In a democracy, people by giving their vote choose their leader. Recently electronic voting system is used  in India. In this system, availability of a voter at in the city is mandatory. This is main problem of electronic voting system.  The smart voting system is the solution on this problem, as from anywhere voter can vote.           To increase the efficiency and accuracy of voting process . we can use this smart  voting system. By the help of smart voting system, we can increase the voting/polling percentage. To cast the vote and transmit it uses internet. To design system which provides smart way of voting which will prevent from proxy votes. Smart voting system has some important objectives-To develop a system that will help to improve polling percentage.To minimize the human resources.To develop a system that will help to recognize fake voting.To develop a system that will help voter to vote from anywhere.To become a more efficient voting system.SYSTEM DISCRIPTIONThe block diagram of the system has been shown in the figure. The Fingerprint module, Monitor, Keypad, Mouse and printer are interfaced to the Raspberry pi.Fig. 1. Block DiagramThe election process follows some steps beginning with biometric authentication of voter till the voter casting his/her vote. The process of election initializes with biometric system. When the voter enters the polling booth he/she will be asked for biometric authenticationwhich is fingerprint type here. Immediately after taking the template fingerprint from the voter using fingerprint machine, it is processed and sent to a database that is maintained by government.The database maintained  by government comprises of list of voters, corresponding voter details regarding polling and their fingerprint data. For the sake of security issues, this database is not distributed and is very confidential. There itchecks for a match and if the fingerprint match is not found in the database that may be because of any error, the voter will be provided an alternative method. If the match is found, the database returns a unique ID of the voter corresponding to that fingerprint.The value will be returned to the database that is maintained in local polling booth. This database which is stored in Raspberry Pi device consists two tables, one with electoral list named as ELECTORAL DATABASE and the other with the list of names who already casted their votes named as CASTED DATABASE. Raspberry Pi itself after taking the value from the central database will search for the unique ID in the electoral database. Search will tell whether the ID is found in the electoral database or not.If found in database, the voter name with their details will be displayed on the monitor and he/she will be allowed to cast their vote.This will complete the voting process. There occurs two occasions when the match is not found. One may be due to voter already voted and other may be due to the voter belonging to other polling station. Considering the situation, the casted table is searched for the voters ID. And if the ID is found in the casted table, it implies that the voter had already casted his/her vote. The voter is a fraud.The voters ID if not found in any of the tables i.e. in electoral table and casted table, then a request to find the identification of the voter will be sent to district database. Finally it will return the details of the voter to which polling station he/she belongs to. This completes the voting process of a single person. If it could not return any match, it indicates that the particular voter is not eligible to vote and controller refuses his identity. Same process is applicable to all other voters who are willing to cast their vote.Database Management:Database is referred to data of voters.  Central database maintains details of all the voters residing in the country. Details comprises of particular voters unique ID to identify, personal details, photographs and most importantly biometric details of the voter. These details are in general not revealed to any other organization and so these are maintained in additional servers with promising security. This data is used for matching of the voters details at the time of verification process. Apart from this database, at each polling station and district or zone level, a local database is maintained which gives his or her unique ID and personal details only forreference.This local database need not contain any confidential information like biometrics. These are the two main databases from which we collect information and the prime deciding factor for the voter whether eligible to vote or not. For reference, the local database is parted to two tables 1. Electoral table 2. Casted table. After each ballot, these tables are updated so that voted person details are moved from electoral table to casted table. This table is maintained by Raspberry Pi I. At Raspberry Pi II which is used at RVM, a Ballot table is maintained to count and update the casted votes against the contestants.IV. ALGORITHMAlgorithm for Verification of Voter in RVSThe process of election initializes with biometric system. When the voter enters the polling booth he/she will be asked for biometric authentication which is fingerprint type here.Immediately after taking the template fingerprint from the voter using fingerprint machine, it is processed and sent to a database that is maintained by government.The database maintained by government comprises of list of voters, corresponding voter details regarding polling and their fingerprint data. For the sake of security issues, this database is not distributed and is very confidential.There it checks for a match and if the fingerprint match is not found in the database that may be because of any error, the voter will be provided an alternative method. If the match is found, the database returns a unique ID of the voter corresponding to that fingerprint.The value will be returned to the database that is maintained in local polling booth. This database which is stored in Raspberry Pi device consists two tables, one with electoral list named as ELECTORAL DATABASE and the other with the list of names who already casted their votes named as CASTED DATABASE.Raspberry Pi itself after taking the value from the central database will search for the unique ID in the electoral database. Search will tell whether the ID is found in the electoral database or not.If found in database, the voter name with their details will be displayed on the monitor and he/she will be allowed to cast their vote. This will complete the voting process.There occurs two occasions when the match is not found. One may be due to voter already voted and other may be due to the voter belonging to other polling station.Considering the situation, the casted table is searched for the voters ID. And if the ID is found in the casted table, it implies that the voter had already casted his/her vote. The voter is a fraud.The voters ID if not found in any of the tables i.e. in electoral table and casted table, then a request to find the identification of the voter will be sent to district database.Finally it will return the details of the voter to which polling station he/she belongs to. This completes the voting process of a single person.If it could not return any match, it indicates that the particular voter is not eligible to vote and controller refuses his identity.Same process is applicable to all other voters who are willing to cast their vote.B: Algorithm for RVS WorkingAfter successful biometric authentication, valid voter comes to cast his vote in RVM. Now, Control Manager gives initialization signal by pressing the control switch of RVM. Control switch should be in adequate distance from RVM to ensure privacy of voter while voting.On Initialization of RVM, GPIO pins of Raspberry Pi 17, 18 gets activated to input modeIn RVM, all the GPIO pins are connected to buttons present in line with all the contestants. In input mode, GPIO pins wait for any button to be pressed to receive input.Voter casts his vote in RVM by pressing the button corresponding to the contestant name of his choice.As soon as the voter presses any button, vote count of that contestant should be increased and updated in the database.This process can be explained as a separate sub process as follows:In input mode, GPIO pins are all set to low level logic (0 Volts).When voter presses any button, GPIO pin connected tocorresponding button will be raised to high level logic (5 Volts) due to switching action of button.Now, only one GPIO pin is in high level logic. Rest of the pins are in low level logic.GPIO pin giving the value 1 (high level lo gic) is determined by Raspberry Pi with the help of coding.Corresponding contestant name is also identified by using this pin number, using input dictionary which consists of matching pin number with contestant name.After a voter casts his vote once, GPIO pins are deactivated. Even if voter tries to cast another vote, it wont be valid.Deactivated GPIO pins are again activated only by initialization of RVM by Control Manager.Control manager gives initialization when next valid voter comes from biometric check only and this process continues repeatedly till voting process terminates.FLOWCHART(A)(B)VI. HARDWARERASPBERRY PI:The Raspberry Pi 3 Model B is the third generation Raspberry Pi. This powerful credit-card sized single board computer can be used for many applications and supersedes the original Raspberry Pi Model B+ and Raspberry Pi 2 Model B. Whilst maintaining the popular board format the Raspberry Pi 3 Model B brings you a more powerful processer, 10x faster than the first generation Raspberry Pi. Additionally it adds wireless LAN & Bluetooth connectivity making it the ideal solution for powerful connected designs.FINGERPRINT MODULE:IX.  FUTURE SCOPEWe can also use camera with fingerprint sensor for face recognisationAlso we can create app for showing a voting percentage to everyoneCONCLUSIONThe Smart Voting System is designed to improve reliability, efficiency and transparency in election process. Considering the problems of already existing system, this system developed in such a way to overcome that problem. We aimed at extending this system to an advanced model in future in such a way to maximize the polling percentage. The people who work in distance places from home towns are the ones who may not use their right to vote. If these people cast their vote, that can drastically change the result. We thought of designing this system so that any voter can utilize his/her vote from any workplace.          A fingerprint processing includes two parts, fingerprint enrollment and fingerprint matching (the matching can be 1:1 or 1:N). When enrolling, user needs to enter the finger two times. The system will process the two time finger images, generate a template of the finger based on processing results and store the template.                           When matching, user enters the finger through optical sensor and system will generate a template of the finger and compare it with templates of the finger library.             For 1:1 matching, system will compare the live finger with specific template designated in the Module; for 1:N matching, or searching, system will search the whole finger library for the matching finger. In both circumstances, system will return the matching result, success or failure.            The database of prints can even be downloaded from the unit and distributed to other modules. As well as the fingerprint template, the analyzed version of the print, you can also retrieve the image of a fingerprint and even pull raw images from the optical sensor.VII. ADVANTAGESVoters can cast their votes from anywhereImproving the polling percentageMore efficientHuman Resources are reducedRecognise and avoid fake votingVIII. APPLICATIONSElectronics voting machineAccess control using person recognisationAttendance systemMedical FieldXI.  REFERENCEChaum D., Secret-ballot receipts: True voter-v erifiable elections, IEEE Security and Privacy, 2(1):38-47, 2004.J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.6873.Ashok Kumar D., Ummal Sariba Begum T., A Novel design of Electronic Voting System Using Fingerprint, International Journal of Innovative Technology & Creative Engineering (ISSN:2045- 8711),Vol.1,No.1. pp: 12 19, January 2011. R. Nicole, Title of paper with only first word capitalized, J. Name Stand. Abbrev., in press.Tigran Antonyan, Seda Davtyan, Sotirios Kentros, Aggelos Kiayias, Laurent Michel, Nicolas Nicolaou, Alexander Russell, and Alexander A. Shvartsman, State-Wide Elections, Optical Scan Voting Systems, and the Pursuit of Integrity, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, Vol.4, NO.4, pp. 597-610, December,2009Ye Wang, Member, IEEE, Shantanu Rane, Member, IEEE, Stark C. Draper, Member, IEEE, and Prakash Ishwar, Senior Member, IEEE, A Theoretical Analysis of Authentication, Privacy and Reusability Across Secure Biometric Systems, IEEE TRANSACTIONS ONINFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 6, pp: 1825 1840 DECEMBER 2012.J. Bannet, D. W. Price, A. Rudys, J. Singer, and D. S. Wallach, Hack-avote: Security issues with electron ic voting systems, IEEE Security Privacy, vol. 2, no. 1, pp. 3237, Jan./Feb. 2004.