Computer system identifies cows by their muzzle prints

cow-muzzle-prints

The skin patterns on a cow’s muzzle are as unique as our fingerprints

There are already several methods of identifying cattle – branding, ear tags, tattooing and ear notching all come to mind. Now, however, Egyptian scientists are working on a new biometric system that’s less invasive and more difficult to thwart: electronic muzzle-printing.

Much as the whorls in our fingerprints are unique to ourselves, the ridges and valleys in the skin of each cow’s muzzle (the front of their nose and mouth) is likewise unique to that animal. It’s something that people have known since the 1920s, when ink prints of muzzles were used for keeping track of cattle. Since then, various studies have looked at replacing the ink and paper with high-tech tools.

The latest such technique was developed by Hamdi Mahmoud and Hagar Mohamed Reda El Hadad of Cairo’s Hamdi Mahmoud of BeniSuef University. In their setup, close-up images of cow muzzles are processed utilizing a machine learning system known as a multiclass support vector machine (MSVM). Among other things, support vector machines are known for their ability to classify items based on pattern recognition.

In real-world tests, the MSVM has so far been able to identify cows based on their muzzle prints with 94 percent accuracy. The scientists are now working on improving that figure, along with speeding up the processing time.

References:http://www.gizmag.com/

3-D ultrasonic fingerprint scanning could strengthen smartphone security

3d-fingerprint-scanner

An ultrasonic fingerprint sensor measures a three-dimensional, volumetric image of the finger’s surface and the tissues beneath, making it difficult to spoof

Researchers at the University of California, Davis and Berkeley have managed to miniaturize medical ultrasound technology to create a fingerprint sensor that scans your finger in 3D. This low-power technology, which could improve on the robustness of current-generation capacitive scanners, could soon find its way to our smartphones and tablets.

When Apple announced it was going to include a fingerprint scanner in 2013’s iPhone 5s, questions immediately arose as to just how safe and accurate the scanning would be. As it turned out, the scanning was accurate enough (unless you’ve just gone swimming), and the feature, which was generally well received, soon found its way to many other smartphones.

But even in the best of cases, the capacitive sensors used in the current generation of portable devices are still subject to serious security leaks. These scanners only image your fingers in two dimensions, and so they are easily fooled by placing a printed image of a fingerprint on top of the sensor.

Professor David Horsley and team have now developed a sensor that obviates this issue by using low-depth ultrasound to image the ridges and valleys of the fingerprint’s surface (and the tissue beneath it) in 3D. Though their device is inspired by sophisticated medical equipment, the scanner is reportedly very compact and only requires 1.8 V to function, making it a good candidate for use in all sorts of portable electronics.

The technology started to come together in 2007, when the researchers developed arrays of piezoelectric-micromachined ultrasonic transducers (PMUTs) which would later on turn out to be a good fit for fingerprint sensing.

To fabricate its imager, the group embedded the PMUT arrays inside a chip, and integrated it along with the same kind of microelectromechanical systems (MEMS) that are already being used in today’s smartphones to build effective microphones, gyroscopes and accelerometers.

The chip, Horsley explains, is made from two wafers, a MEMS containing the ultrasound portion and a second circuit that takes care of processing the signal. The wafers are bonded together, and the MEMS portion is partially shaved off to expose the ultrasound transducers.

“Ultrasound images are collected in the same way that medical ultrasound is conducted,” says Horsley. “Transducers on the chip’s surface emit a pulse of ultrasound, and these same transducers receive echoes returning from the ridges and valleys of your fingerprint’s surface.”

Scanning a fingerprint in such a way is expected to be a more secure mechanism, and should be much more challenging to get around – a factor which will assume increasing importance as we transition to mobile payments.

According to Horsley, the use of well known, high volume manufacturing techniques means that his team’s sensor could be produced at a very low cost. The hope for the future is that, besides better fingerprint scanning, the technology could also find use in personal health monitoring, or perhaps even as a low-cost ultrasound medical diagnostics tool.

References:http://www.gizmag.com/

New dimensions of quantum information added through hyperentanglement

hyperentanglement

Using a technique known as hyperentanglement, researchers claim to have increased the quantum-encoded data carrying capacity of photons by more than 30 times

In quantum cryptography, encoding entangled photons with particular spin states is a technique that ensures data transmitted over fiber networks arrives at its destination without being intercepted or changed. However, as each entangled pair is usually only capable of being encoded with one state (generally the direction of its polarization), the amount of data carried is limited to just one quantum bit per photon. To address this limitation, researchers have now devised a way to “hyperentangle” photons that they say can increase the amount of data carried by a photon pair by as much as 32 times.

In this research, a team led by engineers from UCLA has verified that it is possible to break up and entangle photon pairs into many dimensions using properties such as the photons’ energy and spin, with each extra dimension doubling the photons’ data carrying capacity. Using this technique, known as “hyperentanglement”, each photon pair is able to be programmed with far more data than was previously possible with standard quantum encoding methods.

To achieve this, the researchers transmitted hyperentangled photons in the form of a biphoton frequency comb (essentially a series of individual, equidistantly-arranged frequencies) that divided up the entangled photons into smaller parts. An extension of the technique of wavelength-division multiplexing (the process used to simultaneously transmit things such as multiple video signals over a single optical fiber), the biphoton frequency comb demonstrates the useful applications of such methods not just at macro levels, but quantum ones as well.

“We show that an optical frequency comb can be generated at single photon level,” said Zhenda Xie, an associate professor of electrical engineering at UCLA and research scientist on the project. “Essentially, we’re leveraging wavelength division multiplexing concepts at the quantum level.”

Working on previous theories mooted by Professor Jeff Shapiro of MIT on the possibilities of quantum entanglement being utilized in the formation of comb-like properties of light, it is only with recent adaptations of ultrafast photon detectors and the advancement of the various supporting technologies required to generate hyperentanglement that such hypotheses could be physically tested.

“We are fortunate to verify a decades-old theoretical prediction by Professor Jeff Shapiro of MIT, that quantum entanglement can be observed in a comb-like state,” said Chee Wei Wong, a UCLA associate professor of electrical engineering who was the research project’s principal investigator. “With the help of state-of-the-art high-speed single photon detectors at NIST and support from Dr. Franco Wong, Dr. Xie was able to verify the high-dimensional and multi-degrees-of-freedom entanglement of photons. These observations demonstrate a new fundamentally secure approach for dense information processing and communications.”

If this research can be successfully and continuously replicated, quantum encoding will no longer be bound to the limitations of a single quantum bit (qubit). Rather, quantum hyperentanglement research can now move into the realm of the qudit (a unit of quantum information encoded in any number of d states, where d is a variable),where the quantum-encoded information able to be transmitted can theoretically be increased manifold times by simultaneously encoding energy levels, spin states and other parameters inherent in the quantum attributes of a photon.

Aside from the usual applications in secure communication and information processing, and high-capacity, minimal error data transfer, the team believes that a raft of other technologies could benefit from this breakthrough. The enormously data-intensive needs of medical computer servers, government information transfer, financial data, ultra-secure military communications channels, distributed quantum computing, and quantum cloud communications are just a few of the areas the researchers say may usefully employ this new method.

Engineers at UCLA were the research project’s principal investigators, with assistance provided from researchers at MIT, Columbia University, the University of Maryland, and the National Institute of Standards and Technology.

References:http://www.gizmag.com/

Most internet anonymity software leaks users’ details

internet

Virtual Private Networks (VPNs) are legal and increasingly popular for individuals wanting to circumvent censorship, avoid mass surveillance or access geographically limited services like Netflix and BBC iPlayer. Used by around 20 per cent of European internet users they encrypt users’ internet communications, making it more difficult for people to monitor their activities.

The study of fourteen popular VPN providers found that eleven of them leaked information about the user because of a vulnerability known as ‘IPv6 leakage’. The leaked information ranged from the websites a user is accessing to the actual content of user communications, for example comments being posted on forums. Interactions with websites running HTTPS encryption, which includes financial transactions, were not leaked.

The leakage occurs because network operators are increasingly deploying a new version of the protocol used to run the Internet called IPv6. IPv6 replaces the previous IPv4, but many VPNs only protect user’s IPv4 traffic. The researchers tested their ideas by choosing fourteen of the most famous VPN providers and connecting various devices to a WiFi access point which was designed to mimic the attacks hackers might use.

Researchers attempted two of the kinds of attacks that might be used to gather user data – ‘passive monitoring’, simply collecting the unencrypted information that passed through the access point; and DNS hijacking, redirecting browsers to a controlled web server by pretending to be commonly visited websites like Google and Facebook.

The study also examined the security of various mobile platforms when using VPNs and found that they were much more secure when using Apple’s iOS, but were still vulnerable to leakage when using Google’s Android.

Dr Gareth Tyson, a lecturer from QMUL and co-author of the study, said:

“There are a variety of reasons why someone might want to hide their identity online and it’s worrying that they might be vulnerable despite using a service that is specifically designed to protect them.

“We’re most concerned for those people trying to protect their browsing from oppressive regimes. They could be emboldened by their supposed anonymity while actually revealing all their data and online activity and exposing themselves to possible repercussions.”

References:http://phys.org/