You are on page 1of 29

TOUCH SCREEN TECHNOLOGY

A
Seminar Report
Submitted
In Partial fulfillment
For the award of the Degree of
Bachelor of Technology
In Department of Computer Science &Engineering

Submitted By: Srishti Singh


Roll no. 1150710919

Department of Computer Science & Engineering


R D Foundation Group of institution, kadrabad
(modinagar)

CERTIFICATE
This is to certify that the seminar report entitled, Touch Screen
Technology submitted by Ms. Srishti Singh under my
supervision is students own work and has not been submitted
elsewhere for the award of any other degree, to the best of my
knowledge and belief.

Mr. Prashant Verma


Date : 2 /04/2013

Associate Professor
(Deptt. of CSE)

ACKNOWLEDGEMENT
I take this opportunity to express my sincere gratitude towards my
supervisor Mr. Prashant Verma (Professor and HOD in CSE, R.D.F.G.I.T)
for her invaluable support and guidance. It would have never been possible
for me to take this work to completion without her innovative ideas and
relentless support and encouragement. I consider myself extremely fortunate
to have had a chance to work under her supervision. In spite of her hectic
schedule she was always approachable and took her time to attend my
problem and give the appropriate advice.
I extremely obliged to Mrs. Daisy Bhatt (Director) of R.D Foundation
Group Of Institutions, Modinagar(Ghaziabad) for inferring their kind and
gentle disposition and support. I am amazed by their ability to provide an
over reaching vision to various research areas.
I wish to thank Mr. Prashant Verma (Professor and HOD in CSE,
R.D.F.G.I.T) for their valuable suggestion.
Finally, I express my deepest thanks to my family & friends for being
supportive in all my endeavors. I am also thankful to all those who have
helped me directly or indirectly for accomplishment of this work.

(Srishti Singh)

Abstract
A wide variety of systems requires reliable personal
recognisation schemes to either confirm or determine
the identity of an
individual requesting their services. The purpose of
such schemes
is to ensure that the rendered services are accessed
only by a
legitimate user and no one else. Examples of such
applications
include secure access to buildings, computer
systems, laptops,
cellular phones, and ATMs. In the absence of robust
personal
recognition schemes, these systems are vulnerable to
the wiles of
an impostor. Biometric recognition or, simply,
biometrics refers to
the automatic recognition of individuals based on
their
physiological and behavioral characteristics. By using
biometrics, it
is possible to confirm or establish an individuals
identity based on
who she is, rather than by what she possesses
(e.g., an ID card)
or what she remembers (e.g., a password). In this
paper, we give a

brief overview of the field of biometrics and


summarize some of its
advantages, disadvantages, strengths, limitations,
and related
privacy.

Introduction
Before we go any further let us define exactly what we
mean when we talk about biometric technologies. The term
'biometrics' refers strictly speaking to a science involving the
statistical

analysis

of

biological

characteristics.

Here

biometrics is used in a context of making analysis of human


characteristics for security purposes. The distinction can be
clarified with following definition: "A biometric

is a

unique, measurable characteristic or trait of a human


being

for

automatically

recognizing

or

verifying

identity." This measurable characteristic, Biometric, can be


physical, such as eye, face, finger image, hand and voice or
behavioral, like signature and typing rhythm. Biometric
system must be able to recognize or verify it quickly and
automatically. It is often said that with biometric products
you are able to reach the highest level of security. To help
illustrate this point, a much-quoted definition is used by the
biometrics industry. Three levels of security are:
The lowest level of security is defined as something you
have in your possession, such as an ID badge with a
photograph on it.
The second level of security is something that you
know; such as a password used with computer login or
PIN code to use your bank account card on ATM.
The highest level of security is something what you are
and something that you do. This is essentially what
biometric technology is all about.

One has to keep in mind that biometric


technologies are not even at their best the sole key to
security problems. Only with proper system design and
smart use of strong cryptography biometric identification
systems can claim their big promises. On worst scenarios
possibilities of whole new kind of fraud is also possible.
This is due to the fact that biometric information of large
amount of individuals stored on central databases is
always a risk to our privacy.

Definitio
ns

Biometrics can be used for identification and verification of


different things about human beings. Identification a.k.a
recognition is one-to-many comparing process of a biometric
sample or a code derived from it against all of the known
biometric reference templates on file. If the acquired sample
matches a template stored within error marginal the identity
of the enrollee is also matched to that of the previously
stored reference. The stored identity information really
should not reveal the physical identity of the owner of the
biometric, but instead a role, which authorizes the use of
service or access.
Verification is process of comparing a
submitted

biometric

sample

against

single

biometric

reference of a single enrollee whose identity or role is being


claimed. The reference template doesn't have to reside in
large database but can be carried with oneself within a smart
card or other security device. If the verification process is
well designed the biometric information is not revealed to
the

system,

only

the

result:

match

or

non-match

is

confirmed. All biometric identification or authentication

technologies

operate

using

the

following

four

stage

procedure:

Capture - A physical or behavioral sample is captured by the


system during enrolment and also in identification or
verification process.
Extraction - Unique data is extracted from the sample
and a template is created.
Comparison - The template is then compared with a
new sample.
Match/Non Match - The system then decides if the
features extracted from the new sample are a match or
a non match.
When comparing different biometrics the probabilities of
false rejection (FRR) of true owner of biometric and false
acceptance of fraudulent user (FAR) are used to
measure the accuracy and performance of biometric
technology. Physical Biometric devices have 3 primary
components:

An automated mechanism that scans & captures a


digital

or

analog

image

of

living

personal

characteristic.
Another

entity

handles

compression,

processing,

storage, and comparison of the captured data with the


stored data.
The third interfaces with application systems.
On biometric systems there are various template storage
options. The

biometric template can reside in

Biometric device. This is usually the case on small,


closed systems.
Database on central computer.
Plastic card or token (barcode, stripe, optical, pcmcia,
smart card)

History

The human beings themselves recognize each other by


familiar characteristics of the face and voice, this inbuilt
system is very sophisticated. The human beings have noticed
the need for verifiable measurements to assure that the
human sensors are not cheated. Biometrics as the word we
have defined here have existed for centuries in a very simple
and non sophisticated way; at the time of pharaohs height
measurement was used, study of finger images dates back to
ancient China. Also signatures have been an established
authentication method throughout the recent history.
Automatic Biometric technology was first
applied in controlling access in some top secret applications.
In the late 1960s famous device called "Identimat was
introduced. It was a machine that measured finger length
and shape of the hand and was installed in a time-keeping
system at Shearson Hamill, a Wall Street investment firm. It
was retired as late as 1987! FBI began automatically check
finger images at late 1960s and began larger scale use of
automatic finger scanning systems in 70s. Today Automated
Fingerprint Identification Systems (AFIS) are used by law
enforcement throughout the world. Other technologies are

younger and more complex. The uniqueness of human eye,


especially on patterns of retina and iris, was used first time in
the mid 1980s on a biometric system. Face recognition and
dynamic signature verification are even newer issues. Today
the emphasis has moved from the basic research towards
commercialization and usability.

Biometrics
Biometric systems come in many shapes and sizes. This can
range from distinct hardware, software to complete systems.
All biometric systems have the principles of capture,
extraction

and

comparison

and

matching

in

common.

Different biometrics, measures or traits of human body focus


on very different features. Only thing common among them
is that they are considered unique.

Eye
Biometrics which analysis the eye are generally
thought to offer the highest levels of accuracy. They can be
divided in two specific technologies: examination of iris and
retina patterns. As internal parts of human eye are very well
protected the sight being the most important sensor, the
biometric data is also safe and immune to degradation in
normal life on the contrary to more external parts like
fingertips. In medical science examination of the eye is used
as one indication that could reveal the certain illnesses and
for example the user excessive usage of drugs and alcohol.
This is information the user does not necessarily want to
reveal to the operator of the scanning device.

Iris

The iris is the only internal organ normally visible from outside the
body. The main feature of iris is that it is protected internal organ of the eye,
behind the cornea and the aqueous humour. Visually examined iris is the
colored ring of textured tissue that surrounds the pupil of the eye as shown.

Each iris is a unique structure, featuring a complex system which is stable


and unchanging throughout life and is not very susceptible to wear and
injury. Indeed, an individuals right and left iris patterns are completely
different.
Iris scanning takes advantage of random variations in the visible features the
iris, the colored part of the eye. The iris consists largely of a system of
muscle that expand and contract the pupil in response to changing lighting
conditions. After taking a picture of the eye, the system samples the radial
and angular variations of each individual iris to form an Iris Code, a digital
file that serves as a reference in database. A person using the system simply
looks into a camera. The computer program then locates the iris.

The monochrome camera uses both visible and infrared (700-900nm) light.
The program maps segments of the iris into hundreds of vectors. Then
analyze the information density of iris patterns roughly at the rate of 3.4 bits
per square millimetre. Position, orientation and spatial frequency provide the
basis for calculation of the Iris Code. The system also manages to take into
account normal changes in the eye. For example, the system compensates for
papillary expansion and contraction. It can also detect reflections from the
cornea. There are two types of iris recognition systems: automatic capture
and manual capture. In the manual system, the user must adjust the camera
forward or backward a few inches in order to bring the iris into focus.
Further the user must be within 6 12 inches of the camera. This requires
substantial supervision and instruction.

Face

Face recognition technologies analyze the unique shape,


pattern and positioning of facial features. The face is
natural biometric because it is a key component in the way

we humans remember and recognize each other. Face


recognition is very complex technology and largely software
based. Artificial intelligence is used to simulate human
interpretation of faces. The problem with human face is that
people do change over time; wrinkles, beard, glasses and
position of the head can affect the performance considerably.
To increase the accuracy and adapt to these changes some
kind of machine learning has to be implemented.
There are essentially two methods of capture:
using video or thermal imaging. Video is more common as
standard video cameras can be used. The complete facial
image is usually captured and a number of points on the face
can then be mapped, position of the eyes, mouth and nostrils
as examples. More advanced technologies make threedimensional map of the face which multiplies the possible
measurements that can be made. Thermal imaging has
better accuracy as it uses facial temperature variations
caused by vein structure as the distinguishing trait. As the
heat pattern is emitted from the face itself without source of
external radiation these systems can capture images despite
the lighting conditions, even in the dark. The drawback is

cost, thermal cameras are significantly more expensive than


standard video. One-to-one verification is mainly used with
this method. Certain new systems have announced the
possibility to one-to-many identification, even real time from
live video feed.

Fingerprint
scanning
Fingerprint scanning is one of the most commercially
successful biometric technologies used for the identification
these

days

in

the

world.

Systematic

classification

of

fingerprints scanning started in the 1800's and is developed


further through extensive use in forensic societies. The
technology has got fairly positive user response in the
enrolled pilot projects, while drawbacks and disappointments
have occurred through the years. Taking ones fingerprints is
often associated in the way criminals are treated. The main

points for which fingerprints are generally used for scanning


are as
Positive identification and tighter security than existing
token systems (e.g., proximity cards, magnetic keys,
swipe cards, passwords) that can easily be lost,
borrowed, stolen, or hacked
Convenience and ease-of-use due to no more hassles
with lost or stolen keys, swipe cards, or badges
State-of-the-art biometric technology
Lower Maintenance Costs no cards to buy/replace
Complete installation
"Irrefutable" access information
Forensic logging
Toll-free customer support
Free security audit & analysis
Flexible financing- affordable monthly payment options

Comprehensive training
Significant cost advantages over older, traditional
access solutions
Traditional finger scanning technique is analysis
of small unique marks of the finger image known as
minutiae. Minutiae points such as finger image ridge endings
or bifurcations, branches made by ridges. The relative
position of minutiae is used for comparison, and according to
empirical studies, two individuals will not have eight or more
common minutiae. Because no fingers have identical prints,
even from the same person or identical twins.

Hand geometry
When measuring hand geometry biometrics, threedimensional image of the hand is taken and the shape and
length of fingers and knuckles are measured. Hand geometry
has been in use for many years in various applications,
predominantly for access control. The technology does not
achieve the highest levels of accuracy but it is convenient

and fast to use. On the capture process a user places a hand


on the reader, aligning fingers with specially positioned
guides. Cameras, positioned on above and on the side of
hand capture images from which measurements are taken at
selected points. As the hand geometry is not found to be as
unique as for example fingerprints or eye scans it cannot be
used

as

accurate

identification.

Because

of

its

user-

friendliness it is well suited to user id verification.

Palm scanning
Palm biometrics is close to finger scanning and in
particular

AFIS

technology.

Ridges,

valleys

and

other minutiae data are found on the palm as with


finger images. Main interest in palm biometrics industry
is law enforcement as latent images - "palmprints" found from the crime scenes are equally useful as
latent fingerprints. Certain vendors are also looking at
the access control market and hope to follow the
footsteps of finger scanning.

Signature
Signature is one of the most accepted methods of asserting
ones identity. As we normally use it the signature is
scrutinized as a static trace of pen on the paper. In digitized
form the static geometry of signature is not enough to
ensure the uniqueness of its author.
Signature biometrics often referred to dynamic
signature verification (DSV) and look at the way we sign our
names. The dynamic nature differentiates it from the study of
static signatures on paper. Within DSV a number of
characteristics can be extracted from the physical signing
process. Examples of these behavioral characteristics are the
angle of the pen is held, the time taken to sign, velocity and
acceleration of the tip of the pen, number of times the pen is
lifted from the paper. Despite the fact that the way we sign is
mostly learnt during the years it is very hard to forge and
replicate.

Signature data can be captured via a special


sensitive tablet or pen, or both. On some simpler cases
equipment found rather cheap from normal computer stores
can be used. A variation on these techniques has been
developed and is known as acoustic emission. This measures
the sound that a pen makes against paper. Because of the
behavioral nature of signature, more than one signature
enroll is needed so that the system can build a profile of the
signing characteristic.

Voice scanning
Voice biometrics examines particularly the sound of the
voice. Therefore it has to be distinguished as a technology
from the also very much researched field of speech
recognition. On the following these few closely related but
different terms are explained. Speech recognition can be
defined as a system that recognizes words and phrases that
are spoken. Voice identification has been derived from the
basic principles of speech recognition.

Speaker recognition focuses on recognizing the speaker,


and is accomplished either by speaker verification or
speaker identification.
Speaker verification is a means of accepting or rejecting
the claimed identity of a speaker.
Speaker identification is the process of determining
which speaker is present based solely on the speaker's
utterance.

The

speaker

identification

application

evaluates the input with models stored in a database to


determine the speaker's identity.
The sound of a human voice is caused by resonance in the
vocal tract. The length of the vocal tract, the shape of the
mouth and nasal cavities are all important. Sound is
measured, as affected by these specific characteristics. The
technique of measuring the voice may use either text
dependent or text independent. On the former speech
templates are made from a number of words or phrases
which are trained in the system. On the latter the voice is
analyzed as syllable, phoneme, triphone or more fine-grained
part at a time so on the recognition phase speaker doesn't

have to use specific words. On most sophisticated systems


the factors analyzed are dependent only on unique physical
characteristics of the vocal tract so if you catch a cold or use
different tones of speech is not affect the performance of the
system.
Evident threat to poorly
designed speaker recognition/verification system is replay
attack especially when text dependent methods are used.
The only way to get completely around of it is to combine
voice recognition to other biometric methods. The text
independent method gives much more freedom in the voice
analyzing interaction, the scene is then more alike a
challenge-response pair. In applications, such as phone
banking and other man-machine interaction which is voice
controlled the voice could be constantly monitored and
verified to be authorized.

DNA SCANNING

All testing and fastest possible analysis of the human DNA


takes at least 10 minutes to complete and it needs human
assistance. Thus, it cannot be considered as biometric
technology in its sense of being fast and automatic.
Additionally current DNA capture mechanisms, taking a blood
sample or a test swab inside of the mouth, are extremely
intrusive compared to other biometric systems. Apart from
these problems DNA, as a concept, has a lot of potential.

KEYSTROKE

DYNAMIC

SCANNING
Keystroke dynamics is a strongly behavioral, learnt
biometric. As being behavioral, it evolves significantly
as the user gets older. One of the many problems
includes that highly sophisticated measuring software
and statistical calculations have to be made real time if
the user actions should be constantly verified. Standard
keyboard could be used in simplest cases.

Comparison chart
With the following chart the features of major biometrics can
be compared side to side.
Eye/Iris

Finger
scan

Hand geom Signature Voice

Level
of Very High Very High High
accuracy

High

High

High

High

Ease of use Medium

Low

Medium

High

High

High

High

Public
Medium
acceptancy

Medium

High

Medium

High

Very High High

Long-term
stability

High

High

Medium

High

Medium

Medium

Verification/ Both
Identificatio
n

Both

Both

both

Verification both

Possible

Glasses

Eye/Retin Face
a

only
lightning, Dry, dirty Diseases

Medium

verificatio
n

Illiteracy, Backgrou

interferenc
e

Sample
target
industries

Nuclear
see Iris
facilities,
medical
services,

aging,
glasses,
facial
hair

or
damaged
finger
images

such
as
artiris
or
rheumatis
m

constantl
y
changing
or "easy"
signature
s

nd noise;
colds and
other
factors

General

Law
Manufacturi industrial remote
enforceme ng/
banking,
nt,
shop floors
remote
corporate
database
access

$1500

$1200

correction
al
institution
s
sSingle
node
price

Single- $5000
prr

$5000

$2100

$1000

$1200

price

APPLICATIONS OF
BIOMETRIC SYSTEMS
The applications of biometrics can be
divided into the following three main
groups.
Commercial applications such as
computer network
login, electronic data security, e-access,
ATM, credit card, physical access control,
cellular phone, PDA, medical records
management, and distance learning.

Government applications such as


national ID card, correctional facility,
drivers license, social security,
welfaredisbursement, border control, and
passport control.
Forensic applications such as corpse
identification, criminal investigation,
terrorist identification, parenthood
determination, and missing children.

Conclusions
Authorizing the user with secret PIN and physical token is
not enough for applications where the importance of user
being really the one certified is emphasized. If biometric
technologies are not used we accept the possibility that the
token

and

secrecy

of

PIN

can

be

compromised.

On

applications like bank account cards the companies count the

money lost because of fraud and value the risk with the
bottom line. When new uses like electronic id-cards which are
validated with automation emerge the possible harm done to
a individual cannot be paid back to account, it must be
prevented.
Biometrics itself is not solution to this problem. It just
provides means to treat the possible user candidates
uniquely. When doing so biometric system handles the
unique data scanned from

the user.

Secrecy of this

information has to be ensured by strong cryptographic


methods. The best case could still be that the biometric
templates would never leave the scanner device, with or
without encryption. The result should only be granting the
scanning device, which could be special smart card carried
by user itself, to complete the challenge-response sequence
needed. In that case your fingerprint may be the password,
but the problematics with management of public and secret
cryptographic keys stays the same.

You might also like