You are on page 1of 26

TOUCH SCREEN TECHNOLOGY

A Seminar Report Submitted In Partial fulfillment For the award of the Degree of Bachelor of Technology In Department of Computer Science &Engineering

Submitted By: Srishti Singh Roll no. 1150710919

Department of Computer Science & Engineering


R D Foundation Group of institution, kadrabad (modinagar)

CERTIFICATE
This is to certify that the seminar report entitled, Touch Screen Technology submitted by Ms. Srishti Singh under my supervision is students own work and has not been submitted elsewhere for the award of any other degree, to the best of my knowledge and belief.

Mr. Prashant Verma


Date : 2 /04/2013 Associate Professor (Deptt. of CSE)

ACKNOWLEDGEMENT
I take this opportunity to express my sincere gratitude towards my supervisor Mr. Prashant Verma (Professor and HOD in CSE, R.D.F.G.I.T) for her invaluable support and guidance. It would have never been possible for me to take this work to completion without her innovative ideas and relentless support and encouragement. I consider myself extremely fortunate to have had a chance to work under her supervision. In spite of her hectic schedule she was always approachable and took her time to attend my problem and give the appropriate advice. I extremely obliged to Mrs. Daisy Bhatt (Director) of R.D Foundation Group Of Institutions, Modinagar(Ghaziabad) for inferring their kind and gentle disposition and support. I am amazed by their ability to provide an over reaching vision to various research areas. I wish to thank Mr. Prashant Verma (Professor and HOD in CSE, R.D.F.G.I.T) for their valuable suggestion. Finally, I express my deepest thanks to my family & friends for being supportive in all my endeavors. I am also thankful to all those who have helped me directly or indirectly for accomplishment of this work.

(Srishti Singh)

Abstract
A wide variety of systems requires reliable personal recognisation schemes to either confirm or determine the identity of an individual requesting their services. The purpose of such schemes is to ensure that the rendered services are accessed only by a legitimate user and no one else. Examples of such applications include secure access to buildings, computer systems, laptops, cellular phones, and ATMs. In the absence of robust personal recognition schemes, these systems are vulnerable to the wiles of an impostor. Biometric recognition or, simply, biometrics refers to the automatic recognition of individuals based on their physiological and behavioral characteristics. By using biometrics, it is possible to confirm or establish an individuals identity based on who she is, rather than by what she possesses (e.g., an ID card) or what she remembers (e.g., a password). In this paper, we give a brief overview of the field of biometrics and summarize some of its advantages, disadvantages, strengths, limitations, and related privacy.

Introduction
Before we go any further let us define exactly what we mean when we talk about biometric technologies. The term 'biometrics' refers strictly speaking to a science involving the statistical analysis of biological characteristics. Here biometrics is used in a context of making analysis of human characteristics for security purposes. The distinction can be clarified with following definition: "A biometric is a unique, measurable characteristic or trait of a human being for automatically recognizing or verifying identity." This measurable characteristic, Biometric, can be physical, such as eye, face, finger image, hand and voice or behavioral, like signature and typing rhythm. Biometric system must be able to recognize or verify it quickly and automatically. It is often said that with biometric products you are able to reach the highest level of security. To help illustrate this point, a muchquoted definition is used by the biometrics industry. Three levels of security are:

The lowest level of security is defined as something you have in your possession, such as an ID badge with a photograph on it.

The second level of security is something that you know; such as a password used with computer login or PIN code to use your bank account card on ATM.

The highest level of security is something what you are and something that you do. This is essentially what biometric technology is all about. One has to keep in mind that biometric technologies are not

even at their best the sole key to security problems. Only with proper system design and smart use of strong cryptography biometric identification systems can claim their big promises. On worst scenarios possibilities of whole new kind of fraud is also possible. This is due to the fact that biometric information of large amount of individuals stored on central databases is always a risk to our privacy.

Definitions
Biometrics can be used for identification and verification of different things about human beings. Identification a.k.a recognition is one-to-many comparing process of a biometric sample or a code derived from it against all of the known biometric reference templates on file. If the acquired sample matches a template stored within error marginal the identity of the enrollee is also matched to that of the previously stored reference. The stored identity information really should not reveal the physical identity of the owner of the biometric, but instead a role, which authorizes the use of service or access. Verification is process of comparing a submitted biometric sample against single biometric reference of a single enrollee whose identity or role is being claimed. The reference template doesn't have to reside in large database but can be carried with oneself within a smart card or other security device. If the verification process is well designed the biometric information is not revealed to the system, only the result: match or non-match is confirmed. All biometric identification or

authentication technologies operate using the following four stage procedure:

Capture - A physical or behavioral sample is captured by the system during


enrolment and also in identification or verification process.

Extraction - Unique data is extracted from the sample and a template is created.

Comparison - The template is then compared with a new sample. Match/Non Match - The system then decides if the features extracted from the new sample are a match or a non match.

When comparing different biometrics the probabilities of false rejection (FRR) of true owner of biometric and false acceptance of fraudulent user (FAR) are used to measure the accuracy and performance of biometric technology. Physical Biometric devices have 3 primary components:

An automated mechanism that scans & captures a digital or analog image of a living personal characteristic.

Another entity handles compression, processing, storage, and comparison of the captured data with the stored data.

The third interfaces with application systems.

On biometric systems there are various template storage options. The biometric template can reside in

Biometric device. This is usually the case on small, closed systems. Database on central computer. Plastic card or token (barcode, stripe, optical, pcmcia, smart card)

History
The human beings themselves recognize each other by familiar characteristics of the face and voice, this inbuilt system is very sophisticated. The human beings have noticed the need for verifiable measurements to assure that the human sensors are not cheated. Biometrics as the word we have defined here have existed for centuries in a very simple and non sophisticated way; at the time of pharaohs height measurement was used, study of finger images dates back to ancient China. Also signatures have been an established authentication method throughout the recent history. Automatic Biometric technology was first applied in controlling access in some top secret applications. In the late 1960s famous device

called "Identimat was introduced. It was a machine that measured finger length and shape of the hand and was installed in a time-keeping system at Shearson Hamill, a Wall Street investment firm. It was retired as late as 1987! FBI began automatically check finger images at late 1960s and began larger scale use of automatic finger scanning systems in 70s. Today Automated Fingerprint Identification Systems (AFIS) are used by law enforcement throughout the world. Other technologies are younger and more complex. The uniqueness of human eye, especially on patterns of retina and iris, was used first time in the mid 1980s on a biometric system. Face recognition and dynamic signature verification are even newer issues. Today the emphasis has moved from the basic research towards commercialization and usability.

Biometrics
Biometric systems come in many shapes and sizes. This can range from distinct hardware, software to complete systems. All biometric systems have the principles of capture, extraction and comparison and matching in common. Different biometrics, measures or traits of human body focus on very different features. Only thing common among them is that they are considered unique.

Eye
Biometrics which analysis the eye are generally thought to offer the highest levels of accuracy. They can be divided in two specific technologies: examination of iris and retina patterns. As internal parts of human eye are very well protected the sight being the most important sensor, the biometric data is also safe and immune to degradation in normal life on the contrary to more external parts like fingertips. In medical science examination of the eye is used as one indication that could reveal the

certain illnesses and for example the user excessive usage of drugs and alcohol. This is information the user does not necessarily want to reveal to the operator of the scanning device.

Iris
The iris is the only internal organ normally visible from outside the body. The main feature of iris is that it is protected internal organ of the eye, behind the cornea and the aqueous humour. Visually examined iris is the colored ring of textured tissue that surrounds the pupil of the eye as shown.

Each iris is a unique structure, featuring a complex system which is stable and unchanging throughout life and is not very susceptible to wear and injury. Indeed, an individuals right and left iris patterns are completely different.

Iris scanning takes advantage of random variations in the visible features the iris, the colored part of the eye. The iris consists largely of a system of muscle that expand and contract the pupil in response to changing lighting conditions. After taking a picture of the eye, the system samples the radial and angular variations of each individual iris to form an Iris Code, a digital file that serves as a reference in database. A person using the system simply looks into a camera. The computer program then locates the iris. The monochrome camera uses both visible and infrared (700-900nm) light. The program maps segments of the iris into hundreds of vectors. Then analyze the information density of iris patterns roughly at the rate of 3.4 bits per square millimetre. Position, orientation and spatial frequency provide the basis for calculation of the Iris Code. The system also manages to take into account normal changes in the eye. For example, the system compensates for papillary expansion and contraction. It can also detect reflections from the cornea. There are two types of iris recognition systems: automatic capture and manual capture. In the manual system, the user must adjust the camera forward or backward a few inches in order to bring the iris into focus. Further the user must be within 6 12 inches of the camera. This requires substantial supervision and instruction.

Face

Face recognition technologies analyze the unique shape, pattern and positioning of facial features. The face is natural biometric because it is a key component in the way we humans remember and recognize each other. Face recognition is very complex technology and largely software based. Artificial intelligence is used to simulate human interpretation of faces. The problem with human face is that people do change over time; wrinkles, beard, glasses and position of the head can affect the performance considerably. To increase the accuracy and adapt to these changes some kind of machine learning has to be implemented. There are essentially two methods of capture: using video or thermal imaging. Video is more common as standard video cameras can be used. The complete facial image is usually captured and a number of points on the face can then be mapped, position of the eyes, mouth and nostrils as examples. More advanced technologies make three-dimensional map of the face which multiplies the possible measurements that can be made. Thermal imaging has better accuracy as it uses facial temperature variations caused by vein structure as the distinguishing trait. As the heat pattern is

emitted from the face itself without source of external radiation these systems can capture images despite the lighting conditions, even in the dark. The drawback is cost, thermal cameras are significantly more expensive than standard video. One-to-one verification is mainly used with this method. Certain new systems have announced the possibility to one-tomany identification, even real time from live video feed.

Fingerprint scanning
Fingerprint scanning is one of the most commercially successful biometric technologies used for the identification these days in the world. Systematic classification of fingerprints scanning started in the 1800's and is developed further through extensive use in forensic societies. The technology has got fairly positive user response in the enrolled pilot projects, while drawbacks and disappointments have occurred through the years. Taking ones fingerprints is often associated in the way criminals are treated. The main points for which fingerprints are generally used for scanning are as

Positive identification and tighter security than existing token systems (e.g., proximity cards, magnetic keys, swipe cards, passwords) that can easily be lost, borrowed, stolen, or hacked

Convenience and ease-of-use due to no more hassles with lost or stolen keys, swipe cards, or badges

State-of-the-art biometric technology Lower Maintenance Costs no cards to buy/replace Complete installation "Irrefutable" access information Forensic logging Toll-free customer support Free security audit & analysis Flexible financing- affordable monthly payment options Comprehensive training Significant cost advantages over older, traditional access solutions Traditional finger scanning technique is analysis of small unique

marks of the finger image known as minutiae. Minutiae points such as finger image ridge endings or bifurcations, branches made by ridges. The relative position of minutiae is used for comparison, and according to empirical studies, two individuals will not have eight or more common

minutiae. Because no fingers have identical prints, even from the same person or identical twins.

Hand geometry
When measuring hand geometry biometrics, three-dimensional image of the hand is taken and the shape and length of fingers and knuckles are measured. Hand geometry has been in use for many years in various applications, predominantly for access control. The technology does not achieve the highest levels of accuracy but it is convenient and fast to use. On the capture process a user places a hand on the reader, aligning fingers with specially positioned guides. Cameras, positioned on above and on the side of hand capture images from which measurements are taken at selected points. As the hand geometry is not found to be as unique as for example fingerprints or eye scans it cannot be used as accurate identification. Because of its user-friendliness it is well suited to user id verification.

Palm scanning
Palm biometrics is close to finger scanning and in particular AFIS technology. Ridges, valleys and other minutiae data are found on the palm as with finger images. Main interest in palm biometrics industry is law enforcement as latent images - "palmprints" - found from the crime scenes are equally useful as latent fingerprints. Certain vendors are also looking at the access control market and hope to follow the footsteps of finger scanning.

Signature
Signature is one of the most accepted methods of asserting ones identity. As we normally use it the signature is scrutinized as a static trace of pen on the paper. In digitized form the static geometry of signature is not enough to ensure the uniqueness of its author. Signature biometrics often referred to dynamic signature verification (DSV) and look at the way we sign our names. The dynamic nature differentiates it from the study of static signatures on paper. Within DSV a

number of characteristics can be extracted from the physical signing process. Examples of these behavioral characteristics are the angle of the pen is held, the time taken to sign, velocity and acceleration of the tip of the pen, number of times the pen is lifted from the paper. Despite the fact that the way we sign is mostly learnt during the years it is very hard to forge and replicate. Signature data can be captured via a special sensitive tablet or pen, or both. On some simpler cases equipment found rather cheap from normal computer stores can be used. A variation on these techniques has been developed and is known as acoustic emission. This measures the sound that a pen makes against paper. Because of the behavioral nature of signature, more than one signature enroll is needed so that the system can build a profile of the signing characteristic.

Voice scanning
Voice biometrics examines particularly the sound of the voice. Therefore it has to be distinguished as a technology from the also very much researched field of speech recognition. On the following these few closely related but different terms are explained. Speech recognition can be defined as a

system that recognizes words and phrases that are spoken. Voice identification has been derived from the basic principles of speech recognition.

Speaker recognition focuses on recognizing the speaker, and is accomplished either by speaker verification or speaker identification.

Speaker verification is a means of accepting or rejecting the claimed identity of a speaker.

Speaker identification is the process of determining which speaker is present based solely on the speaker's utterance. The speaker identification application evaluates the input with models stored in a database to determine the speaker's identity.

The sound of a human voice is caused by resonance in the vocal tract. The length of the vocal tract, the shape of the mouth and nasal cavities are all important. Sound is measured, as affected by these specific characteristics. The technique of measuring the voice may use either text dependent or text independent. On the former speech templates are made from a number of words or phrases which are trained in the system. On the latter the voice is analyzed as syllable, phoneme, triphone or more fine-grained part at a time so on the recognition phase speaker doesn't have to use specific words. On most sophisticated systems the factors analyzed are

dependent only on unique physical characteristics of the vocal tract so if you catch a cold or use different tones of speech is not affect the performance of the system. Evident threat to poorly designed speaker recognition/verification system is replay attack especially when text dependent methods are used. The only way to get completely around of it is to combine voice recognition to other biometric methods. The text independent method gives much more freedom in the voice analyzing interaction, the scene is then more alike a challenge-response pair. In applications, such as phone banking and other man-machine interaction which is voice controlled the voice could be constantly monitored and verified to be authorized.

DNA SCANNING
All testing and fastest possible analysis of the human DNA takes at least 10 minutes to complete and it needs human assistance. Thus, it cannot be considered as biometric technology in its sense of being fast and automatic. Additionally current DNA capture mechanisms, taking a blood sample or a test swab inside of the mouth, are extremely intrusive compared to other

biometric systems. Apart from these problems DNA, as a concept, has a lot of potential.

KEYSTROKE DYNAMIC SCANNING


Keystroke dynamics is a strongly behavioral, learnt biometric. As being behavioral, it evolves significantly as the user gets older. One of the many problems includes that highly sophisticated measuring software and statistical calculations have to be made real time if the user actions should be constantly verified. Standard keyboard could be used in simplest cases.

Comparison chart
With the following chart the features of major biometrics can be compared side to side.

Eye/Iris Level accuracy Ease of use Public acceptancy Long-term stability of Very High

Eye/Retina Face Very High High

Finger scan High

Hand geom High

Signature High

Voice High

Medium Medium

Low Medium

Medium High

High Medium

High High

High Very High

High High

High

High

Medium

High

Medium

Medium

Medium

Verification/ Both Identification

Both

Both

both

Verification only

both

verification

Possible interference

Glasses

lightning, aging, glasses, facial hair

Dry, dirty or Diseases such damaged as artiris or finger rheumatism images

Illiteracy, constantly changing or "easy" signatures

Background noise; colds and other factors

Sample target Nuclear facilities, industries medical services, correctional institutions sSingle prr price Single-node $5000 price

see Iris

General

Law Manufacturin industrial enforcemen g/ t, corporate shop floors

remote banking, remote database access

$5000

$1500

$1200

$2100

$1000

$1200

APPLICATIONS OF BIOMETRIC SYSTEMS


The applications of biometrics can be divided into the following three main groups. Commercial applications such as computer network login, electronic data security, e-access, ATM, credit card, physical access control, cellular phone, PDA, medical records management, and distance learning. Government applications such as national ID card, correctional facility, drivers license, social security, welfaredisbursement, border control, and passport control. Forensic applications such as corpse identification, criminal investigation, terrorist identification, parenthood determination, and missing children.

Conclusions
Authorizing the user with secret PIN and physical token is not enough for applications where the importance of user being really the one certified is emphasized. If biometric technologies are not used we accept the possibility that the token and secrecy of PIN can be compromised. On applications like bank account cards the companies count the money lost because of fraud and value the risk with the bottom line. When new uses like electronic idcards which are validated with automation emerge the possible harm done to a individual cannot be paid back to account, it must be prevented. Biometrics itself is not solution to this problem. It just provides means to treat the possible user candidates uniquely. When doing so biometric system handles the unique data scanned from the user. Secrecy of this information has to be ensured by strong cryptographic methods. The best case could still be that the biometric templates would never leave the scanner device, with or without encryption. The result should only be granting the scanning device, which could be special smart card carried by user itself, to complete the challenge-response sequence needed. In that

case your fingerprint may be the password, but the problematics with management of public and secret cryptographic keys stays the same.

You might also like