Professional Documents
Culture Documents
Seminar Report
Seminar Report
A
Seminar Report
Submitted
In Partial fulfillment
For the award of the Degree of
Bachelor of Technology
In Department of Computer Science &Engineering
CERTIFICATE
This is to certify that the seminar report entitled, Touch Screen
Technology submitted by Ms. Srishti Singh under my
supervision is students own work and has not been submitted
elsewhere for the award of any other degree, to the best of my
knowledge and belief.
Associate Professor
(Deptt. of CSE)
ACKNOWLEDGEMENT
I take this opportunity to express my sincere gratitude towards my
supervisor Mr. Prashant Verma (Professor and HOD in CSE, R.D.F.G.I.T)
for her invaluable support and guidance. It would have never been possible
for me to take this work to completion without her innovative ideas and
relentless support and encouragement. I consider myself extremely fortunate
to have had a chance to work under her supervision. In spite of her hectic
schedule she was always approachable and took her time to attend my
problem and give the appropriate advice.
I extremely obliged to Mrs. Daisy Bhatt (Director) of R.D Foundation
Group Of Institutions, Modinagar(Ghaziabad) for inferring their kind and
gentle disposition and support. I am amazed by their ability to provide an
over reaching vision to various research areas.
I wish to thank Mr. Prashant Verma (Professor and HOD in CSE,
R.D.F.G.I.T) for their valuable suggestion.
Finally, I express my deepest thanks to my family & friends for being
supportive in all my endeavors. I am also thankful to all those who have
helped me directly or indirectly for accomplishment of this work.
(Srishti Singh)
Abstract
A wide variety of systems requires reliable personal
recognisation schemes to either confirm or determine
the identity of an
individual requesting their services. The purpose of
such schemes
is to ensure that the rendered services are accessed
only by a
legitimate user and no one else. Examples of such
applications
include secure access to buildings, computer
systems, laptops,
cellular phones, and ATMs. In the absence of robust
personal
recognition schemes, these systems are vulnerable to
the wiles of
an impostor. Biometric recognition or, simply,
biometrics refers to
the automatic recognition of individuals based on
their
physiological and behavioral characteristics. By using
biometrics, it
is possible to confirm or establish an individuals
identity based on
who she is, rather than by what she possesses
(e.g., an ID card)
or what she remembers (e.g., a password). In this
paper, we give a
Introduction
Before we go any further let us define exactly what we
mean when we talk about biometric technologies. The term
'biometrics' refers strictly speaking to a science involving the
statistical
analysis
of
biological
characteristics.
Here
is a
for
automatically
recognizing
or
verifying
Definitio
ns
biometric
sample
against
single
biometric
system,
only
the
result:
match
or
non-match
is
technologies
operate
using
the
following
four
stage
procedure:
or
analog
image
of
living
personal
characteristic.
Another
entity
handles
compression,
processing,
History
Biometrics
Biometric systems come in many shapes and sizes. This can
range from distinct hardware, software to complete systems.
All biometric systems have the principles of capture,
extraction
and
comparison
and
matching
in
common.
Eye
Biometrics which analysis the eye are generally
thought to offer the highest levels of accuracy. They can be
divided in two specific technologies: examination of iris and
retina patterns. As internal parts of human eye are very well
protected the sight being the most important sensor, the
biometric data is also safe and immune to degradation in
normal life on the contrary to more external parts like
fingertips. In medical science examination of the eye is used
as one indication that could reveal the certain illnesses and
for example the user excessive usage of drugs and alcohol.
This is information the user does not necessarily want to
reveal to the operator of the scanning device.
Iris
The iris is the only internal organ normally visible from outside the
body. The main feature of iris is that it is protected internal organ of the eye,
behind the cornea and the aqueous humour. Visually examined iris is the
colored ring of textured tissue that surrounds the pupil of the eye as shown.
The monochrome camera uses both visible and infrared (700-900nm) light.
The program maps segments of the iris into hundreds of vectors. Then
analyze the information density of iris patterns roughly at the rate of 3.4 bits
per square millimetre. Position, orientation and spatial frequency provide the
basis for calculation of the Iris Code. The system also manages to take into
account normal changes in the eye. For example, the system compensates for
papillary expansion and contraction. It can also detect reflections from the
cornea. There are two types of iris recognition systems: automatic capture
and manual capture. In the manual system, the user must adjust the camera
forward or backward a few inches in order to bring the iris into focus.
Further the user must be within 6 12 inches of the camera. This requires
substantial supervision and instruction.
Face
Fingerprint
scanning
Fingerprint scanning is one of the most commercially
successful biometric technologies used for the identification
these
days
in
the
world.
Systematic
classification
of
Comprehensive training
Significant cost advantages over older, traditional
access solutions
Traditional finger scanning technique is analysis
of small unique marks of the finger image known as
minutiae. Minutiae points such as finger image ridge endings
or bifurcations, branches made by ridges. The relative
position of minutiae is used for comparison, and according to
empirical studies, two individuals will not have eight or more
common minutiae. Because no fingers have identical prints,
even from the same person or identical twins.
Hand geometry
When measuring hand geometry biometrics, threedimensional image of the hand is taken and the shape and
length of fingers and knuckles are measured. Hand geometry
has been in use for many years in various applications,
predominantly for access control. The technology does not
achieve the highest levels of accuracy but it is convenient
as
accurate
identification.
Because
of
its
user-
Palm scanning
Palm biometrics is close to finger scanning and in
particular
AFIS
technology.
Ridges,
valleys
and
Signature
Signature is one of the most accepted methods of asserting
ones identity. As we normally use it the signature is
scrutinized as a static trace of pen on the paper. In digitized
form the static geometry of signature is not enough to
ensure the uniqueness of its author.
Signature biometrics often referred to dynamic
signature verification (DSV) and look at the way we sign our
names. The dynamic nature differentiates it from the study of
static signatures on paper. Within DSV a number of
characteristics can be extracted from the physical signing
process. Examples of these behavioral characteristics are the
angle of the pen is held, the time taken to sign, velocity and
acceleration of the tip of the pen, number of times the pen is
lifted from the paper. Despite the fact that the way we sign is
mostly learnt during the years it is very hard to forge and
replicate.
Voice scanning
Voice biometrics examines particularly the sound of the
voice. Therefore it has to be distinguished as a technology
from the also very much researched field of speech
recognition. On the following these few closely related but
different terms are explained. Speech recognition can be
defined as a system that recognizes words and phrases that
are spoken. Voice identification has been derived from the
basic principles of speech recognition.
The
speaker
identification
application
DNA SCANNING
KEYSTROKE
DYNAMIC
SCANNING
Keystroke dynamics is a strongly behavioral, learnt
biometric. As being behavioral, it evolves significantly
as the user gets older. One of the many problems
includes that highly sophisticated measuring software
and statistical calculations have to be made real time if
the user actions should be constantly verified. Standard
keyboard could be used in simplest cases.
Comparison chart
With the following chart the features of major biometrics can
be compared side to side.
Eye/Iris
Finger
scan
Level
of Very High Very High High
accuracy
High
High
High
High
Low
Medium
High
High
High
High
Public
Medium
acceptancy
Medium
High
Medium
High
Long-term
stability
High
High
Medium
High
Medium
Medium
Verification/ Both
Identificatio
n
Both
Both
both
Verification both
Possible
Glasses
Eye/Retin Face
a
only
lightning, Dry, dirty Diseases
Medium
verificatio
n
Illiteracy, Backgrou
interferenc
e
Sample
target
industries
Nuclear
see Iris
facilities,
medical
services,
aging,
glasses,
facial
hair
or
damaged
finger
images
such
as
artiris
or
rheumatis
m
constantl
y
changing
or "easy"
signature
s
nd noise;
colds and
other
factors
General
Law
Manufacturi industrial remote
enforceme ng/
banking,
nt,
shop floors
remote
corporate
database
access
$1500
$1200
correction
al
institution
s
sSingle
node
price
Single- $5000
prr
$5000
$2100
$1000
$1200
price
APPLICATIONS OF
BIOMETRIC SYSTEMS
The applications of biometrics can be
divided into the following three main
groups.
Commercial applications such as
computer network
login, electronic data security, e-access,
ATM, credit card, physical access control,
cellular phone, PDA, medical records
management, and distance learning.
Conclusions
Authorizing the user with secret PIN and physical token is
not enough for applications where the importance of user
being really the one certified is emphasized. If biometric
technologies are not used we accept the possibility that the
token
and
secrecy
of
PIN
can
be
compromised.
On
money lost because of fraud and value the risk with the
bottom line. When new uses like electronic id-cards which are
validated with automation emerge the possible harm done to
a individual cannot be paid back to account, it must be
prevented.
Biometrics itself is not solution to this problem. It just
provides means to treat the possible user candidates
uniquely. When doing so biometric system handles the
unique data scanned from
the user.
Secrecy of this