Sunday, February 14, 2010

Working of Night Vision Technology

How Night Vision Works

nightvision binoculars

Gyro-stabilized day/night binoculars manufactured by B.E. Meyers Company.
­ The first thing you probably think of when you see the words night vision is a spy or action movie you've seen, in which someone straps on a pair of night-vision goggles to find someone else in a dark building on a moonless night. And you may have wondered "Do those things really work? Can you actually see in the dark?"


The answer is most definitely yes. With the proper night-vision equipment, you can see a person standing over 200 yards (183 m) away on a moonless, cloudy night! Night vision can work in two very different ways, depending on the technology used.
  • Image enhancement - This works by collecting the tiny amounts of light, including the lower portion of the infrared light spectrum, that are present but may be imperceptible to our eyes, and amplifying it to the point that we can easily observe the image.
  • Thermal imaging - This technology operates by capturing the upper portion of the infrared light spectrum, which is emitted as heat by objects instead of simply reflected as light. Hotter objects, such as warm bodies, emit more of this light than cooler objects like trees or buildings.
Here, you will learn about the two major night-vision technologies. We'll also discuss the various types of night-vision equipment and applications. But first, let's talk about infrared light.


Infrared Light

In order to understand night vision, it is important to understand something about light. The amount of energy in a light wave is related to its wavelength: Shorter wavelengths have higher energy. Of visible light, violet has the most energy, and red has the least. Just next to the visible light spectrum is the infrared spectrum.


light spectrum
Infrared light is a small part of the light spectrum.
Infrared light can be split into three categories:
  • Near-infrared (near-IR) - Closest to visible light, near-IR has wavelengths that range from 0.7 to 1.3 microns, or 700 billionths to 1,300 billionths of a meter.
  • Mid-infrared (mid-IR) - Mid-IR has wavelengths ranging from 1.3 to 3 microns. Both near-IR and mid-IR are used by a variety of electronic devices, including remote controls.
  • Thermal-infrared (thermal-IR) - Occupying the largest part of the infrared spectrum, thermal-IR has wavelengths ranging from 3 microns to over 30 microns.
The key difference between thermal-IR and the other two is that thermal-IR is emitted by an object instead of reflected off it. Infrared light is emitted by an object because of what is happening at the atomic level.
Atoms
Atoms are constantly in motion. They continuously vibrate, move and rotate. Even the atoms that make up the chairs that we sit in are moving around. Solids are actually in motion! Atoms can be in different states of excitation. In other words, they can have different energies. If we apply a lot of energy to an atom, it can leave what is called the ground-state energy level and move to an excited level. The level of excitation depends on the amount of energy applied to the atom via heat, light or electricity.
An atom consists of a nucleus (containing the protons and neutrons) and an electron cloud. Think of the electrons in this cloud as circling the nucleus in many different orbits. Although more modern views of the atom do not depict discrete orbits for the electrons, it can be useful to think of these orbits as the different energy levels of the atom. In other words, if we apply some heat to an atom, we might expect that some of the electrons in the lower energy orbitals would transition to higher energy orbitals, moving farther from the nucleus.

atom
An atom has a nucleus and an electron cloud.
Once an electron moves to a higher-energy orbit, it eventually wants to return to the ground state. When it does, it releases its energy as a photon -- a particle of light. You see atoms releasing energy as photons all the time. For example, when the heating element in a toaster turns bright red, the red color is caused by atoms excited by heat, releasing red photons. An excited electron has more energy than a relaxed electron, and just as the electron absorbed some amount of energy to reach this excited level, it can release this energy to return to the ground state. This emitted energy is in the form of photons (light energy). The photon emitted has a very specific wavelength (color) that depends on the state of the electron's energy when the photon is released.
Anything that is alive uses energy, and so do many inanimate items such as engines and rockets. Energy consumption generates heat. In turn, heat causes the atoms in an object to fire off photons in the thermal-infrared spectrum. The hotter the object, the shorter the wavelength of the infrared photon it releases. An object that is very hot will even begin to emit photons in the visible spectrum, glowing red and then moving up through orange, yellow, blue and eventually white. Be sure to read How Light Bulbs Work, How Lasers Work and How Light Works for more detailed information on light and photon emission.
In night vision, thermal imaging takes advantage of this infrared emission. Next, we'll see just how it does this.


Thermal Imaging

Here's how thermal imaging works:
  1. A special lens focuses the infrared light emitted by all of the objects in view.
  2. The focused light is scanned by a phased array of infrared-detector elements. The detector elements create a very detailed temperature pattern called a thermogram. It only takes about one-thirtieth of a second for the detector array to obtain the temperature information to make the thermogram. This information is obtained from several thousand points in the field of view of the detector array.
  3. The thermogram created by the detector elements is translated into electric impulses.
  4. The impulses are sent to a signal-processing unit, a circuit board with a dedicated chip that translates the information from the elements into data for the display.
  5. The signal-processing unit sends the information to the display, where it appears as various colors depending on the intensity of the infrared emission. The combination of all the impulses from all of the elements creates the image.

thermal imaging system

The basic components of a thermal-imaging system
Types of Thermal Imaging Devices
Most thermal-imaging devices scan at a rate of 30 times per second. They can sense temperatures ranging from -4 degrees Fahrenheit (-20 degrees Celsius) to 3,600 F (2,000 C), and can normally detect changes in temperature of about 0.4 F (0.2 C).

day

It is quite easy to see everything during the day...
night

...but at night, you can see very little.
thermal imaging

Thermal imaging lets you see again.
There are two common types of thermal-imaging devices:
  • Un-cooled - This is the most common type of thermal-imaging device. The infrared-detector elements are contained in a unit that operates at room temperature. This type of system is completely quiet, activates immediately and has the battery built right in.
  • Cryogenically cooled - More expensive and more susceptible to damage from rugged use, these systems have the elements sealed inside a container that cools them to below 32 F (zero C). The advantage of such a system is the incredible resolution and sensitivity that result from cooling the elements. Cryogenically-cooled systems can "see" a difference as small as 0.2 F (0.1 C) from more than 1,000 ft (300 m) away, which is enough to tell if a person is holding a gun at that distance!
While thermal imaging is great for detecting people or working in near-absolute darkness, most night-vision equipment uses image-enhancement technology.

Image Enhancement

Image-enhancement technology is what most people think of when you talk about night vision. In fact, image-enhancement systems are normally called night-vision devices (NVDs). NVDs rely on a special tube, called an image-intensifier tube, to collect and amplify infrared and visible light.
image intensifier tube
The image-intensifier tube changes photons to electrons and back again.
Here's how image enhancement works:
  1. A conventional lens, called the objective lens, captures ambient light and some near-infrared light.
  2. The gathered light is sent to the image-intensifier tube. In most NVDs, the power supply for the image-intensifier tube receives power from two N-Cell or two "AA" batteries. The tube outputs a high voltage, about 5,000 volts, to the image-tube components.
  3. The image-intensifier tube has a photocathode, which is used to convert the photons of light energy into electrons.
  4. As the electrons pass through the tube, similar electrons are released from atoms in the tube, multiplying the original number of electrons by a factor of thousands through the use of a microchannel plate (MCP) in the tube. An MCP is a tiny glass disc that has millions of microscopic holes (microchannels) in it, made using fiber-optic technology. The MCP is contained in a vacuum and has metal electrodes on either side of the disc. Each channel is about 45 times longer than it is wide, and it works as an electron multiplier. When the electrons from the photo cathode hit the first electrode of the MCP, they are accelerated into the glass microchannels by the 5,000-V bursts being sent between the electrode pair. As electrons pass through the microchannels, they cause thousands of other electrons to be released in each channel using a process called cascaded secondary emission. Basically, the original electrons collide with the side of the channel, exciting atoms and causing other electrons to be released. These new electrons also collide with other atoms, creating a chain reaction that results in thousands of electrons leaving the channel where only a few entered. An interesting fact is that the microchannels in the MCP are created at a slight angle (about a 5-degree to 8-degree bias) to encourage electron collisions and reduce both ion and direct-light feedback from the phosphors on the output side.




    night vision image

    Night-vision images are known for their eerie green tint.
  5. At the end of the image-intensifier tube, the electrons hit a screen coated with phosphors. These electrons maintain their position in relation to the channel they passed through, which provides a perfect image since the electrons stay in the same alignment as the original photons. The energy of the electrons causes the phosphors to reach an excited state and release photons. These phosphors create the green image on the screen that has come to characterize night vision.
  6. The green phosphor image is viewed through another lens, called the ocular lens, which allows you to magnify and focus the image. The NVD may be connected to an electronic display, such as a monitor, or the image may be viewed directly through the ocular lens.

Saturday, February 13, 2010

Working of RFID

How RFID Works



RFID tag

An RFID tag.
Long checkout lines at the grocery store are one of the biggest complaints about the shopping experience. Soon, these lines could disappear when the ubiquitous Universal Product Code (UPC) bar code is replaced by smart labels, also called radio frequency identification (RFID) tags. RFID tags are intelligent bar codes that can talk to a networked system to track every product that you put in your shopping cart.
Imagine going to the grocery store, filling up your cart and walking right out the door. No longer will you have to wait as someone rings up each item in your cart one at a time. Instead, these RFID tags will communicate with an electronic reader that will detect every item in the cart and ring each up almost instantly. The reader will be connected to a large network that will send information on your products to the retailer and product manufacturers. Your bank will then be notified and the amount of the bill will be deducted from your account. No lines, no waiting.

RFID tags, a technology once limited to tracking cattle, are tracking consumer products worldwide. Many manufacturers use the tags to track the location of each product they make from the time it's made until it's pulled off the shelf and tossed in a shopping cart.
Outside the realm of retail merchandise, RFID tags are tracking vehicles, airline passengers, Alzheimer's patients and pets. Soon, they may even track your preference for chunky or creamy peanut butter. Some critics say RFID technology is becoming too much a part of our lives -- that is, if we're even aware of all the parts of our lives that it affects.
In this article, you'll learn about the types of RFID tags and how these tags can be tracked through the entire supply chain. We'll also look at the non-commercial uses of RFID tags and how the Departments of State and Homeland Security are using them. Lastly, we'll examine what some critics consider an Orwellian application of RFID tags in animals, humans and our society.

Reinventing the Bar Code


Barcodes, like this one found on a soda can, are found on almost everything we buy.

­Almost everything that you buy from retailers has a UPC bar code printed on it. These bar codes help manufacturers and retailers keep track of inventory. They also give valuable ­information about the quantity of products being bought and, to some extent, by whom the products are being bought. These codes serve as product fingerprints made of machine-readable parallel bars that store binary code.
Created in the early 1970s to speed up the check out process, bar codes have a few disadvantages:
  • In order to keep up with inventories, companies must scan each bar code on every box of a particular product.
  • Going through the checkout line involves the same process of scanning each bar code on each item.
  • Bar code is a read-only technology, meaning that it cannot send out any information.
RFID tags are an improvement over bar codes because the tags have read and write capabilities. Data stored on RFID tags can be changed, updated and locked. Some stores that have begun using RFID tags have found that the technology offers a better way to track merchandise for stocking and marketing purposes. Through RFID tags, stores can see how quickly the products leave the shelves and who's buying them.

In addition to retail merchandise, RFID tags have also been added to transportation devices like highway toll passcards and subway passes. Because of their ability to store data so efficiently, RFID tags can tabulate the cost of tolls and fares and deduct the cost electronically from the amount of money that the user places on the card. Rather than waiting to pay a toll at a tollbooth or shelling out coins at a token counter, passengers use RFID chip-embedded passes like debit cards.

But would you entrust your medical history to an RFID tag? How about your home address or your baby's safety? Let's look at two types of RFID tags and how they store and transmit data before we move past grocery store purchase­s to human lives.
­
Bar Code History
At 8:01 a.m. on June 26, 1974, a customer at Marsh's supermarket in Troy, OH, made the first purchase of a product with a barcode, a 10-pack of Wrigley's Juicy Fruit Gum. This began a new era in retail that sped up checkout lines and gave companies a more efficient method for inventory control. That pack of gum took its place in American history and is currently on display at the Smithsonian Institution's National Museum of American History. That historical purchase was the culmination of nearly 30 years of research and development. The first system for automatic product coding was patented by Bernard Silver and Norman Woodland, both graduate students at the Drexel Institute of Technology (now Drexel University). They used a pattern of ink that glowed under ultraviolet light. This system was too expensive and the ink wasn't very stable. The system we use today was unveiled by IBM in 1973 and uses readers designed by NCR.
 

Working of GPS Receivers




gps handheld

A GPS receiver uses satellites to pinpoint locations.

How GPS Receivers Work

Our ancestors had to go to pretty extreme measures to keep from getting lost. They erected monumental landmarks, laboriously drafted detailed maps and learned to read the stars in the night sky.
Things are much, much easier today. For less than $100, you can get a pocket-sized gadget that will tell you exactly where you are on Earth at any moment. As long as you have a GPS receiver and a clear view of the sky, you'll never be lost again.
In this article, we'll find out how these handy guides pull off this amazing trick. As we'll see, the Global Positioning System is vast, expensive and involves a lot of technical ingenuity, but the fundamental concepts at work are quite simple and intuitive.
­When people talk about "a GPS," they usually mean a GPS receiver. The Global Positioning System (GPS) is actually a constellation of 27 Earth-orbiting satellites(24 in operation and three extras in case one fails). The U.S. military developed and implemented this satellite network as a military navigation system, but soon opened it up to everybody else.
Each of these 3,000- to 4,000-pound solar-powered satellites circles the globe at about 12,000 miles (19,300 km), making two complete rotations every day. The orbits are arranged so that at any time, anywhere on Earth, there are at least four satellites "visible" in the sky.
A GPS receiver's job is to locate four or more of these satellites, figure out the distanc­e to each, and use this information to deduce its own location. This operation is based on a simple mathematical principle called trilateration. Trilateration in three-dimensional space can be a little tricky, so we'll start with an explanation of simple two-dimensional trilateration.

2-D Trilateration

Imagine you are somewhere in the United States and you are TOTALLY lost -- for whatever reason, you have absolutely no clue where you are. You find a friendly local and ask, "Where am I?" He says, "You are 625 miles from Boise, Idaho."
This is a nice, hard fact, but it is not particularly useful by itself. You could be anywhere on a circle around Boise that has a radius of 625 miles, like this:


You ask somebody else where you are, and she says, "You are 690 miles from Minneapolis, Minnesota." Now you're getting somewhere. If you combine this information with the Boise information, you have two circles that intersect. You now know that you must be at one of these two intersection points, if you are 625 miles from Boise and 690 miles from Minneapolis.


If a third person tells you that you are 615 miles from Tucson, Arizona, you can eliminate one of the possibilities, because the third circle will only intersect with one of these points. You now know exactly where you are -- Denver, Colorado.


This same concept works in three-dimensional space, as well, but you're dealing with spheres instead of circles. Next, we'll look at this type of trilateration.

Working of Location Tracing Mechanism

How Location Tracking Works



These days, even traffic lights are keeping an eye on you.
As children playing hide and seek, there seemed to be so many places where we could hide and never be found. With the world bec­oming ever smaller through technology, hiding is increasingly difficult. Cameras peer down on us at red lights, in our workplace, in stores and even at home. Now, those cameras are being augmented by new technologies that track our cars, cell phones and possibly any product we buy.
This location-tracking technology also is being used to streamline supply chains for corporations, seeking to move products to the market faster, and to monitor assets and prevent inventory loss.

­Soon, companies also will be able to track your location. Imagine walking through your local supermarkets, and as you pass through the aisle, an electronic coupon for your favorite cereal is beamed to your phone.
However, many privacy advocates are worried about the implications of these new surveillan­ce systems. Such technology means that marketers and others could know your whereabouts at any time.



Tracking Technology

­ Location tracking is not one, single technology. Rather, it is the convergence of several technologies that can be merged to create systems that track inventory, livestock or ­vehicle fleets. Similar systems can be created to deliver location-based services to wireless devices.
Current technologies being used to create location-tracking and location-based systems include:
  • Geographic Information Systems (GIS) - For large-scale location-tracking systems, it is necessary to capture and store geographic information. Geographic information systems can capture, store, analyze and report geographic information.
  • Global Positioning System (GPS) - A constellation of 27 Earth-orbiting satellites (24 in operation and three extras in case one fails). A GPS receiver, like the one in your mobile phone, can locate four or more of these satellites, figure out the distance to each, and deduce your location through trilateration. For trilateration to work, it must have a clear line of sight to these four or more satellites. GPS is ideal for outdoor positioning, such as surveying, farming, transportation or military use (for which it was originally designed). See How GPS Receivers Work for more information.




    Artist's concept of the GPS satellite constellation
    ­
  • Radio Frequency Identification (RFID) - Small, battery-less microchips that can be attached to consumer goods, cattle, vehicles and other objects to track their movements. RFID tags are passive and only transmit data if prompted by a reader. The reader transmits radio waves that activate the RFID tag. The tag then transmits information via a pre-determined radio frequency. This information is captured and transmitted to a central database. Among possible uses for RFID tags are a replacement for traditional UPC bar codes. See How RFIDs Work for more information.
  • Wireless Local Area Network (WLAN) - Network of devices that connect via radio frequency, such as 802.11b. These devices pass data over radio waves and provide users with a network with a range of 70 to 300 feet (21.3 to 91.4 meters).
­ Any location tracking or location-based service system will use one or a combination of these technologies. The system requires that a node or tag be placed on the object, animal or person being tracked. For example, the GPS receiver in a cell phone or an RFID tag on a DVD can be used to track those devices with a detection system such as GPS satellites or RFID receivers.
Next , we'll take a look at how location tracking can be used to streamline supply chains and track fleets of trucks, ships and planes.

Types of Tracking

­Companies are finding location-tracking technologies ideal for better managing inventories or fleets of vehicles. Knowing the exact location of each piece of inventory helps to control the supply chain and saves money by not losing those assets that are in transit. Companies, such as retailers, must consider how to track inventory across a wide area, either country or state, and in a smaller area, such as the warehouse or store.
Wide-Area Tracking
On a large scale, companies must track their vehicle fleets across the country or the world. GPS is the ideal tracking technology for tracking over large areas. To do this, every vehicle needs to be equipped with a GPS receiver. As the vehicle crosses the country, the GPS satellites track the truck's position. With GPS, the operator can request positioning at anytime. However, GPS is limited in smaller areas or indoors.
Local-Area and Indoor Tracking
A good example of where GPS would not be suitable for tracking items is in a warehouse or hospitals. The accuracy provided by GPS is not sufficient for such a small scale. Consider all of the medical equipment, wheelchairs, gurneys and even patients that need to be tracked. GPS is not a practical or cost-effective solution.





­For smaller areas, companies and healthcare organizations would likely use a network of RFID tags and readers to monitor the location of assets or inventory. A wireless LAN also would be more suitable. In such a system, each asset would be tagged with an RFID tag, and readers would be placed in strategic locations to be able to accurately read those tags within a matter of inches. A hospital worker would be able to find the exact room a wheelchair is located and retailers would be able to locate an item on any given shelf.
Another example of how this technology is already being deployed is in tracking children in some amusement parks. A child can wear a wristband with an embedded RFID tag. Park staff can track that tag through location receivers positioned around the park. One system in use at Legoland in Denmark even allows for the tag identification number to be registered with the parents' mobile phone.
Location tracking isn't limited to just allowing an organization to know where its assets are, these technologies also will help retailers and marketers find you to better target their key markets.

Working of Facial Recognition Systems

How Facial Recognition Systems Work

Identix's FaceIt software measures nodal points on the human face to create a faceprint and find a match.
Anyone who has seen the TV show "Las Vegas" has seen facial recognition software in action. In any given episode, the security department at the fictional Montecito Hotel and Casino uses its video surveillance system to pull an image of a card counter, thief or blacklisted individual. It then runs that image through the database to find a match and identify the person. By the end of the hour, all bad guys are escorted from the casino or thrown in jail. But what looks so easy on TV doesn't always translate as well in the real world.


In 2001, the Tampa Police Department installed police cameras equipped with facial recognition technology in their Ybor City nightlife district in an attempt to cut down on crime in the area. The system failed to do the job, and it was scrapped in 2003 due to ineffectiveness. People in the area were seen wearing masks and making obscene gestures, prohibiting the cameras from getting a clear enough shot to identify anyone.
Boston's Logan Airport also ran two separate tests of facial recognition systems at its security checkpoints using volunteers. Over a three month period, the results were disappointing. According to the Electronic Privacy Information Center, the system only had a 61.4 percent accuracy rate, leading airport officials to pursue other security options.
Humans have always had the innate ability to recognize and distinguish between faces, yet computers only recently have shown the same ability. In the mid 1960s, scientists began work on using the computer to recognize human faces. Since then, facial recognition software has come a long way.
In this article, we will look at the history of facial recognition systems, the changes that are being made to enhance their capabilities and how governments and private companies use (or plan to use) them.

Facial Recognition Technology

facial recognition software

FaceIt software compares the faceprint with other images in the database.
­Identix®, a company based in Minnesota, is one of many developers of facial recognition technology. Its software, FaceIt®, can pick someone's face out of a crowd, extract the face from the rest of the scene and compare it to a database of stored images. In order for this software to work, it has to know how to differentiate between a basic face and the rest of the background. Facial recognition software is based on the ability to recognize a face and then measure the various features of the face.
Every face has numerous, distinguishable landmarks, the different peaks and valleys that make up facial features. FaceIt defines these landmarks as nodal points. Each human face has approximately 80 nodal points. Some of these measured by the software are:
  • Distance between the eyes
  • Width of the nose
  • Depth of the eye sockets
  • The shape of the cheekbones
  • The length of the jaw line
These nodal points are measured creating a numerical code, called a faceprint, representing the face in the database.In the past, facial recognition software has relied on a 2D image to compare or identify another 2D image from the database. To be effective and accurate, the image captured needed to be of a face that was looking almost directly at the camera, with little variance of light or facial expression from the image in the database. This created quite a problem.
In most instances the images were not taken in a controlled environment. Even the smallest changes in light or orientation could reduce the effectiveness of the system, so they couldn't be matched to any face in the database, leading to a high rate of failure.

Working of Fingerprint Scanners

How Fingerprint Scanners Work




A computer mouse with a built-in fingerprint scanner
Computerized fingerprint scanners have been a mainstay of spy thrillers for decades, but up until recently, they were pretty exotic technology in the real world. In the past few years, however, scanners have started popping up all over the place -- in police stations, high-security buildings and even on PC keyboards. You can pick up a personal USB fingerprint scanner for less than $100, and just like that, your computer's guarded by high-tech biometrics. Instead of, or in addition to, a password, you need your distinctive print to gain access. In this article, we'll examine the secrets behind this exciting development in law enforcement and identity security. We'll also see how fingerprint scanner security systems stack up to conventional password and identity card systems, and find out how they can fail.

 

Fingerprint Basics

Fingerprints are one of those bizarre twists of nature. Human beings happen to have built-in, easily accessible identity cards. You have a unique design, which represents you alone, literally at your fingertips. How did this happen? People have tiny ridges of skin on their fingers because this particular adaptation was extremely advantageous to the ancestors of the human species. The pattern of ridges and "valleys" on fingers make it easier for the hands to grip things, in the same way a rubber tread pattern helps a tire grip the road.


The other function of fingerprints is a total coincidence. Like everything in the human body, these ridges form through a combination of genetic and environmental factors. The genetic code in DNA gives general orders on the way skin should form in a developing fetus, but the specific way it forms is a result of random events. The exact position of the fetus in the womb at a particular moment and the exact composition and density of surrounding amniotic fluid decides how every individual ridge will form.
So, in addition to the countless things that go into deciding your genetic make-up in the first place, there are innumerable environmental factors influencing the formation of the fingers. Just like the weather conditions that form clouds or the coastline of a beach, the entire development process is so chaotic that, in the entire course of human history, there is virtually no chance of the same exact pattern forming twice.
Consequently, fingerprints are a unique marker for a person, even an identical twin. And while two prints may look basically the same at a glance, a trained investigator or an advanced piece of software can pick out clear, defined differences.
This is the basic idea of fingerprint analysis, in both crime investigation and security. A fingerprint scanner's job is to take the place of a human analyst by collecting a print sample and comparing it to other samples on record. Next , we'll find out how scanners do this.

Working of CAPTCHA

How CAPTCHA Works

 

You're using your computer to purchase tickets to see They Might Be Giants play a concert at a local venue. Before you can buy the tickets, you first have to pass a test. It's not a hard test -- in fact, that's the point. For you, the test should be simple and straightforward. But for a computer, the test should be almost impossible to solve.
This sort of test is a CAPTCHA, an acronym that stands for Completely Automated Public Turing Test to Tell Computers and Humans Apart. They're also known as a type of Human Interaction Proof (HIP). You've probably seen CAPTCHA tests on lots of Web sites. The most common form of CAPTCHA is an image of several distorted letters. It's your job to type the correct series of letters into a form. If your letters match the ones in the distorted image, you pass the test.



Gmail CAPTCHA
Google's Gmail service requires new users to enter a CAPTCHA before creating an account.

Why would anyone need to create a test that can tell humans and computers apart? It's because of people trying to game the system -- they want to exploit weaknesses in the computers running the site. While these individuals probably make up a minority of all the people on the Internet, their actions can affect millions of users and Web sites. For example, a free e-mail service might find itself bombarded by account requests from an automated program. That automated program could be part of a larger attempt to send out spam mail to millions of people. The CAPTCHA test helps identify which users are real human beings and which ones are computer programs.

Greetings, Program!
One of the ironies of the CAPTCHA program is that a CAPTCHA application can generate a test that even it can't solve without already knowing the answer.
­One interesting thing about CAPTCHA tests is that the people who design the tests aren't always upset when their tests fail. That's because for a CAPTCHA test to fail, someone has to find a way to teach a computer how to solve the test. In other words, every CAPTCHA failure is really an advance in artificial intelligence.
Let's take a closer look at exactly what a CAPTCHA .­


CAPTCHAs and the Turing Test

CAPTCHA technology has its foundation in an experiment called the Turing Test. Alan Turing, sometimes called the father of modern computing, proposed the test as a way to examine whether or not machines can think -- or appear to think -- like humans. The classic test is a game of imitation. In this game, an interrogator asks two participants a series of questions. One of the participants is a machine and the other is a human. The interrogator can't see or hear the participants and has no way of knowing which is which. If the interrogator is unable to figure out which participant is a machine based on the responses, the machine passes the Turing Test.
Of course, with a CAPTCHA, the goal is to create a test that humans can pass easily but machines can't. It's also important that the CAPTCHA application is able to present different CAPTCHAs to different users. If a visual CAPTCHA presented a static image that was the same for every user, it wouldn't take long before a spammer spotted the form, deciphered the letters, and programmed an application to type in the correct answer automatically.


Image CAPTCHA

Not all CAPTCHAs require you to type in text. This version asks users to use a mouse to trace certain shapes found in photographs.
Most, but not all, CAPTCHAs rely on a visual test. Computers lack the sophistication that human beings have when it comes to processing visual data. We can look at an image and pick out patterns more easily than a computer. The human mind sometimes perceives patterns even when none exist, a quirk we call pareidolia. Ever see a shape in the clouds or a face on the moon? That's your brain trying to associate random information into patterns and shapes.
I'm Sorry, I'll Read That Again
Now and then, a CAPTCHA presents an image or sound that's so distorted, even humans can't decipher it. That's why many CAPTCHA applications provide users with an option to generate a new CAPTCHA and try again. Hopefully the second time around won't be as confusing as the first.


But not all CAPTCHAs rely on visual patterns. In fact, it's important to have an alternative to a visual CAPTCHA. Otherwise, the Web site administrator runs the risk of disenfranchising any Web user who has a visual impairment. One alternative to a visual test is an audible one. An audio CAPTCHA usually presents the user with a series of spoken letters or numbers. It's not unusual for the program to distort the speaker's voice, and it's also common for the program to include background noise in the recording. This helps thwart voice recognition programs.
Another option is to create a CAPTCHA that asks the reader to interpret a short passage of text. A contextual CAPTCHA quizzes the reader and tests comprehension skills. While computer programs can pick out key words in text passages, they aren't very good at understanding what those words actually mean.

Next , we'll take a closer look at the kinds of sites that use CAPTCHA to verify whether or not you have a pulse.

Working of Code Breakers

How Code Breakers Work

Information is an important commodity. Nations, corporations and individuals protect secret information with encryption, using a variety of methods ranging from substituting one letter for another to using a complex algorithm to encrypt a message. On the other side of the information equation are people who use a combination of logic and intuition to uncover secret information. These people are cryptanalysts, also known as code breakers.
Binary Code
Binary code is the basis for many modern ciphers.
A person who communicates through secret writing is called a cryptographer. Cryptographers might use codes, ciphers or a combination of both to keep messages safe from others. What cryptographers create, cryptanalysts attempt to unravel.
Throughout the history of cryptography, people who created codes or ciphers were often convinced their systems were unbreakable. Cryptanalysts have proven these people wrong by relying on everything from the scientific method to a lucky guess. Today, even the amazingly complex encryption schemes common in Internet transactions may have a limited useful lifetime -- quantum computing might make solving such difficult equations a snap.

You Say Cryptology, I Say Cryptography
In English, the words cryptology and cryptography are often interchangeable -- both refer to the science of secret writing. Some people prefer to differentiate the words, using cryptology to refer to the science and cryptography to refer to the practice of secret writing.
In this article, we'll look at some of the most popular codes and cipher systems used throughout history. We'll learn about the techniques cryptanalysts use to break codes and ciphers, and what steps cryptographers can take to make their messages more difficult to figure out. At the end, you'll get the chance to take a crack at an enciphered message.

To learn how code breakers crack secret messages, you need to know how people create codes. we'll learn about some of the earliest attempts at hiding messages.


Polybius Squares and Caesar Shifts

Although historical findings show that several ancient civilizations used elements of ciphers and codes in their writing, code experts say that these examples were meant to give the message a sense of importance and formality. The person writing the message intended for his audience to be able to read it.
The Greeks were one of the first civilizations to use ciphers to communicate in secrecy. A Greek scholar named Polybius proposed a system for enciphering a message in which a cryptographer represented each letter with a pair of numbers ranging from one to five using a 5-by-5 square (the letters I and J shared a square). The Polybius Square (sometimes called the checkerboard) looks like this:
1
2
3
4
5
1
A
B
C
D
E
2
F
G
H
I/J
K
3
L
M
N
O
P
4
Q
R
S
T
U
5
V
W
X
Y
Z
A cryptographer would write the letter "B" as "12". The letter O is "34". To encipher the phrase "How Stuff Works," the cryptographer would write "233452 4344452121 5234422543." Because he replaces each letter with two numbers, it's difficult for someone unfamiliar with the code to determine what this message means. The cryptographer could make it even more difficult by mixing up the order of the letters instead of writing them out alphabetically.
Julius Caesar invented another early cipher -- one that was very simple and yet confounded his enemies. He created enciphered messages by shifting the order of the alphabet by a certain number of letters. For example, if you were to shift the English alphabet down three places, the letter "D" would represent the letter "A," while the letter "E" would mean "B" and so forth. You can visualize this code by writing the two alphabets on top of one another with the corresponding plaintext and cipher matching up like this:
Plaintext
a
b
c
d
e
f
g
h
i
j
k
l
m
Cipher
D
E
F
G
H
I
J
K
L
M
N
O
P
Plaintext
n
o
p
q
r
s
t
u
v
w
x
y
z
Cipher
Q
R
S
T
U
V
W
X
Y
Z
A
B
C

Notice that the cipher alphabet wraps around to "A" after reaching "Z." Using this cipher system, you could encipher the phrase "How Stuff Works" as "KRZ VWXII ZRUNV."
Both of these systems, the Polybius Square and the Caesar Shift, formed the basis of many future cipher systems.
In the next section, we'll look at a few of these more advanced methods of encryption.

Deciphering the Language
To encipher a message means to replace the letters in the text with the replacement alphabet. The readable message is called the plaintext. The cryptographer converts the plaintext into a cipher and sends it on. The recipient of the message uses the proper technique, called the key, to decipher the message, changing it from a cipher back into a plaintext.

Working of encryption

How Encryption Works



E-commerce relies on the ability to send information securely -- encryption tries to make that possible.
E-commerce relies on the ability to send information securely -- encryption tries to make that possible.
When we use the Internet, we're not always just clicking around and passively taking in information, such as reading news articles or blog posts -- a great deal of our time online involves sending others our own information. Ordering something over the Internet, whether it's a book, a CD or anything else from an online vendor, or signing up for an online account, requires entering in a good deal of sensitive personal information. A typical transaction might include not only our names, e-mail addresses and physical address and phone number, but also passwords and personal identification numbers (PINs).
The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live and work. It's extremely easy to buy and sell goods all over the world while sitting in front of a laptop. But security is a major concern on the Internet, especially when you're using it to send sensitive information between parties.


Let's face it, there's a whole lot of information that we don't want other people to see, such as:
  • Credit-card information
  • Social Security numbers
  • Private correspondence
  • Personal details
  • Sensitive company information
  • Bank-account information ­
­ Information security is provided on computers and over the Internet by a variety of methods. A simple but straightforward security method is to only keep sensitive information on removable storage media like portable flash memory drives or external hard drives. But the most popular forms of security all rely on encryption, the process of encoding information in such a way that only the person (or computer) with the key can decode it.
In this article, you will learn about encryption and authentication. You will also learn about public-key and symmetric-key systems, as well as hash algorithms. ­


Security Encryption Systems

Computer encryption is based on the science of cryptography, which has been used as long as humans have wanted to keep information secret. Before the digital age, the biggest users of cryptography were governments, particularly for military purposes.
An encrypted document is surrounded by an array of commercially available encryption products at the FBI office in Washington, D.C.

An encrypted document is surrounded by an array of commercially available encryption products at the FBI office in Washington, D.C.
The Greek historian Plutarch wrote, for example, about Spartan generals who sent and received sensitive messages using a scytale, a thin cylinder made out of wood. The general would wrap a piece of parchment around the scytale and write his message along its length. When someone removed the paper from the cylinder, the writing appeared to be a jumble of nonsense. But if the other general receiving the parchment had a scytale of similar size, he could wrap the paper around it and easily read the intended message.

The Greeks were also the first to use ciphers, specific codes that involve substitutions or transpositions of letters and numbers. Here's an example of a typical cipher, with a grid of letters and their corresponding numbers:
 


12 3 4 5
1AB C D E
2F GHI/J K
3L MNOP
4Q RST U
5V W XY Z

If a Spartan general wished to send the message I AM SPARTA to another general, he would write this series of numbers:
42 11 23 34 53 11 24 44 11
As long as both generals had the correct cipher, they could decode any message the other sent. To make the message more difficult to decipher, they could arrange the letters inside the grid in any combination.
Most forms of cryptography in use these days rely on computers, simply because a human-based code is too easy for a computer to crack. Ciphers are also better known today as algorithms, which are the guides for encryption -- they provide a way in which to craft a message and give a certain range of possible combinations. A key, on the other hand, helps a person or computer figure out the one possibility on a given occasion.
Computer encryption systems generally belong in one of two categories:
  • Symmetric-key encryption
  • Public-key encryption

Working of Biometrics

How Biometrics Works

Imagine you're James Bond, and you have to get into a secret laboratory to disarm a deadly biological weapon and save the world. But first, you have to get past the security system. It requires more than just a key or a password -- you need to have the villain's irises, his voice and the shape of his hand to get inside.
You might also encounter this scenario, minus the deadly biological weapon, during an average day on the job. Airports, hospitals, hotels, grocery stores and even Disney theme parks increasingly use biometrics -- technology that identifies you based on your physical or behavioral traits -- for added security.


In this article, you'll learn about biometric systems that use handwriting, hand geometry, voiceprints, iris structure and vein structure. You'll also learn why more businesses and governments use the technology and whether Q's fake contact lenses, recorded voice and silicone hand could really get James Bond into the lab (and let him save the world).

You take basic security precautions every day -- you use a key to get into your house and log on to your computer with a username and password. You've probably also experienced the panic that comes with misplaced keys and forgotten passwords. It isn't just that you can't get what you need -- if you lose your keys or jot your password on a piece of paper, someone else can find them and use them as though they were you.
Biometrics vs. Forensics
Biometrics and forensics have a lot in common, but they're not exactly the same. Biometrics uses your physical or behavioral characteristics to determine your identity or to confirm that you are who you claim to be. Forensics uses the same kind of information to establish facts in civil or criminal investigations.
Instead of using something you have (like a key) or something you know (like a password), biometrics uses who you are to identify you. Biometrics can use physical characteristics, like your face, fingerprints, irises or veins, or behavioral characteristics like your voice, handwriting or typing rhythm. Unlike keys and passwords, your personal traits are extremely difficult to lose or forget. They can also be very difficult to copy. For this reason, many people consider them to be safer and more secure than keys or passwords.

Biometric devices can use the human iris for identification

Biometrics uses unique features,
like the iris of your eye, to identify you.

Biometric systems can seem complicated, but they all use the same three steps:
  • Enrollment: The first time you use a biometric system, it records basic information about you, like your name or an identification number. It then captures an image or recording of your specific trait.
  • Storage: Contrary to what you may see in movies, most systems don't store the complete image or recording. They instead analyze your trait and translate it into a code or graph. Some systems also record this data onto a smart card that you carry with you.
  • Comparison: The next time you use the system, it compares the trait you present to the information on file. Then, it either accepts or rejects that you are who you claim to be.
Laptop fingerprint scanner


Systems also use the same three components:
  • A sensor that detects the characteristic being used for identification
  • A computer that reads and stores the information
  • Software that analyzes the characteristic, translates it into a graph or code and performs the actual comparisons
Biometric security systems, like the fingerprint scanner available on the IBM ThinkPad T43 (right), is becoming more common for home use. You can read other  articles to learn about face recognition and fingerprint scanning.
Next, we'll examine how biometrics provides security using other traits, starting with handwriting.


Pictures & Codes
Movies and television shows often depict the process of comparing traits in a way that is fun to watch, but not accurate. For example, you may see a whole fingerprint compared to other whole fingerprints until a computer finds a match. This method would be slow and difficult. Instead of comparing actual pictures, biometric systems use various algorithms to analyze and encode information about the trait. This information takes up only a few bits of space.

Handwriting

At first glance, using handwriting to identify people might not seem like a good idea. After all, many people can learn to copy other people's handwriting with a little time and practice. It seems like it would be easy to get a copy of someone's signature or the required password and learn to forge it. But biometric systems don't just look at how you shape each letter; they analyze the act of writing. They examine the pressure you use and the speed and rhythm with which you write. They also record the sequence in which you form letters, like whether you add dots and crosses as you go or after you finish the word.

Tablet PC signature verification

This Tablet PC has a signature verification system.
Unlike the simple shapes of the letters, these traits are very difficult to forge. Even if someone else got a copy of your signature and traced it, the system probably wouldn't accept their forgery.
A handwriting recognition system's sensors can include a touch-sensitive writing surface or a pen that contains sensors that detect angle, pressure and direction. The software translates the handwriting into a graph and recognizes the small changes in a person's handwriting from day to day and over time.



Determining Accuracy
All biometric systems use human traits that are, to some degree, unique. Which system is best depends on the necessary level of security, the population who will use the system and the system's accuracy. Most manufacturers use measurements like these to describe accuracy:
  • False Accept Rate (FAR): How many imposters the system accepts
  • False Reject Rate (FRR): How many authorized users the system rejects
  • Failure to Enroll Rate (FTE): How many people's traits are of insufficient quality for the system to use
  • Failure to Acquire Rate (FTA): How many times a user must present the trait before the system correctly accepts or rejects them