PALM V EIN TECHNOLOGY
CONTENTS•   INDRODUCTION•   Biometrics•   Palm Vein Technology•   REASONS FOR CONSIDERING THE PALM AREA FOR    IDENTIFICAT...
INTRODUCTION• Palm vein technology is one of the upcoming   technology.• It is the world’s first contactless personal   id...
Biometrics Automated measurement of Physiological and/or  behavioral characteristics to determine or authenticate  identi...
BIOMETRIC FEATURES• It becomes obsolete to beware passwords safely  or to remember to all of them.• Abuse of stolen id car...
DIFFERENT BIOMETRIC TECHNOLOGIES Physical Biometrics• Iris• Retina• Vein Pattern• Hand Geometry• Face• Fingerprint• Ear s...
Biometric Systems
Biometrics Process                    new biometric sample is requested.                                                  ...
VOICE PRINTVoice Recognition: is the Identification using the acoustic features  of speech that have been found to differ ...
Voice Identification System         Construct voice         reference         template          Database
 FINGER PRINT• Fingerprint Recognition is the identification by using patterns of  friction ridges and valleys on an indi...
Fingerprint Recognition steps:                            Database
FACE RECOGNITIONFace recognition uses the visible physical structure of the faceand analyses the spatial geometry of dis...
Face recognition process:Input face                                 Extraction of                           Extraction of ...
 IRIS SCAN• The iris is the colored ring of textured tissue that surrounds the  pupil of the eye.• ADVANTAGES Very high ...
Iris Identification Steps:Input of face                                      Recognition of                Detection ofima...
Signature Identification:•   Signature identification: is the analyses of the way a user    signs his or her name.•   The...
DISADVANTAGES Signature of a person may change after a long time, like ifan user gone through an accident and he cannot u...
Palm Vein Technology• In this technology ONE’S PALM is used as the  “PASSWORD” for verification• The veins present in the ...
First the individual places his PALM on the sensor, thus the sensor takes the “PALM VEIN IMAGE” and compares it with the ...
REASONS FOR CONSIDERING THE PALM AREA FOR             IDENTIFICATION :• A palm has wide area and more complicated vascular...
REASONS FOR CONSIDERING THE PALM       AREA FOR IDENTIFICATION ….• In palm vein authentication we use sensing and matching...
SENSING TECHNOLOGY           : The sensing technology used for vein patterns is based onnear-infrared ray spectroscopy (NI...
Fig1: visible ray           Fig2:infrared ray       Fig 3 :Extracted vein      image                       image          ...
IMAGING METHODS:There are two imaging methods used for veins     1.Reflection     2.Transmission.Reflection Method:The ref...
Matching: The palm vein pattern is extracted from infrared-ray images as dark lines. This Matching involves 1. Capture 2. ...
HOW IT WORKSWorking of Palm Vein SystemsWe Rest our palm on Vein ScannerPalm Vein Scanner – near Infra Red RaysInfra re...
WORKING•
Step 1:Palm vein authenticationtechnology consists of a small Palm veinscanner thats easy and natural to use,fast and High...
Step 2:The registered palm pattern is stored into thedatabase along with the personal details of theclient
1. One should place his/her palmnear to scanner.
• 2. The scanner makes use of a special characteristic of the reduced  hemoglobin coursing through the palm veins — it abs...
• 3. The integrated optical system in the palm vein sensor uses this  phenomenon to generate an image of the palm vein pat...
Data Flow            35
Palm vein authentication    Palm has to be                    Sensor emits near             Oxygen reduced blood    positi...
PALM VEIN PAATTERN VERIFICATION SYSTEMThe thermal vein pattern verification system involvesthe following stages:• Image Ac...
User Interface                     •Contactless                     •Non-invasive                     •2.18 seconds recogn...
How Secure is the Technology?          How Secure is the Technology?• On the basis of testing the technology on more than ...
Overview of BiometricsTechnology                   +                          - Fingerprint     •Popular                 •...
accuracy     TECHNOLOGY                 FALSE ACCEPTANCE RATE         FALSE REJECTION RATE    Palm Secure                 ...
In comparison with otherstechnology*note – Chart created using average of data provided by the Table                      ...
Need Of ItNo more problems of forgotten passwords and id codes - biometrics is the technology taking care of it.Apart fr...
ADVANTAGES:• Contactless, hygienic and non-invasive .• It is difficult to forge for intruders because blood  vessels are h...
DISADVANTAGES:• There are numerous factors that can effect the quality of  the captured image. They are body temperature, ...
APPLICATIONS:    Palm vein authentication is utilized in various    Fields such as•   Security systems - Door lock and int...
applications
Practical Application    ATM:•  Palm vein pattern is captured by  using the palm vein sensor on the  ATM. The palm vein pa...
Login authentication:• Palm vein authentication can be  integrated into laptop PCs by  USB .• It is used to control access...
Door security system:• The palm vein authentication access  control unit can be used to control  entry and exit into and o...
Palm vein pattern authentication technologydeveloped by Fujitsu was being used in a widerange in japan . If this technol...
Palm vein technology
Palm vein technology
Palm vein technology
Palm vein technology
Upcoming SlideShare
Loading in …5
×

Palm vein technology

24,126
-1

Published on

5 Comments
21 Likes
Statistics
Notes
  • pls send me this ppt 2 my mail.......rohitjoseph.325@gmail.com
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • simply best
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • pls send me this ppt 2 my mail............sruthipavithran1991@gmail.com
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • pls send me this ppt 2 my mail........ akshayaaki89@gmail.com
    with in 2 days..........
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • nice ppt
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Views
Total Views
24,126
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
2,113
Comments
5
Likes
21
Embeds 0
No embeds

No notes for slide
  • Richard
  • Richard
  • YooJin
  • Palm vein technology

    1. 1. PALM V EIN TECHNOLOGY
    2. 2. CONTENTS• INDRODUCTION• Biometrics• Palm Vein Technology• REASONS FOR CONSIDERING THE PALM AREA FOR IDENTIFICATION :• Accuracy• Practical applications• Advantages• Disadvantages• Conclusion• References 3
    3. 3. INTRODUCTION• Palm vein technology is one of the upcoming technology.• It is the world’s first contactless personal identification system that uses the vein patterns in human palms to confirm a person’s identity.• It is highly secure and accurate.• The contact less feature gives it a hygienic advantage over other biometric authentication technologies.• It uses the vascular patterns of an individual’s palm as personal identification data.• biometric authentication technology, which identifies people by their unique biological 4 information
    4. 4. Biometrics Automated measurement of Physiological and/or behavioral characteristics to determine or authenticate identity is known as Biometrics Increasing necessity of e-mail, Internet resources etc, offers serious security concerns. Biometrics can be defined as recognizing and identifying a person based on physiological or behavioral characteristics The behavioral characteristics measure the movement of a user, when users walk, speak, type on a keyboard or sign their name. The physiological characteristics would be the physical human traits like fingerprints, hand shape, eyes and face, veins, etc
    5. 5. BIOMETRIC FEATURES• It becomes obsolete to beware passwords safely or to remember to all of them.• Abuse of stolen id cards and passports will be reduced enormously.• Abuse of stolen credit cards will be prevented.• Taking over foreign identities will be impossible.• Building access right to people without the right of admittance will be prevented.• Access to devices/computers will be not possible for persons without the right of admittance.• Unnecessary costs will be drastically reduced.• Level of common convenience and safety will grow.
    6. 6. DIFFERENT BIOMETRIC TECHNOLOGIES Physical Biometrics• Iris• Retina• Vein Pattern• Hand Geometry• Face• Fingerprint• Ear shape Behavioral Biometrics• Keystroke dynamics• Signature dynamics• Walking Gait• Voice
    7. 7. Biometric Systems
    8. 8. Biometrics Process new biometric sample is requested. No Signal Processing, Quality Biometric Transmission Feature Extraction, Sufficient? Data Collection Representation Yes Generate Template Database Template Match Yes Decision Confidence? No
    9. 9. VOICE PRINTVoice Recognition: is the Identification using the acoustic features of speech that have been found to differ between individuals.ADVANTAGES• Easy to use and requires no special training or equipment.• Relatively inexpensive compared to other biometrics.• Consumers prefer to use voiceprints over other biometric technology for identification according to a Chase bank’s research study.DISADVANTAGES• When processing a person’s voice over multiple channels such a microphone and then over a telephone reduces the recognition rate.• Physical conditions of the voice, such as those due to sickness, affect the voice verification process.• Environment noise reduces the overall accuracy and effectiveness of the recognition.• The storage requirement for voiceprint database can be very large.• A person’s voice changes over time.
    10. 10. Voice Identification System Construct voice reference template Database
    11. 11.  FINGER PRINT• Fingerprint Recognition is the identification by using patterns of friction ridges and valleys on an individuals fingertips which are unique to that individual. ADVANTAGES• Since fingerprints are the composition of protruding sweat glands, everyone has unique fingerprints. They do not change naturally.• Its reliability and stability is higher compared to the iris, voice, and face recognition method.• Fingerprint recognition equipment is relatively low-priced compared to other biometric system DISADVANTAGES• Vulnerable to noise and distortion brought on by dirt and twists.• Some people may feel offended about placing their fingers on the same place where many other people have continuously touched.• Some people have damaged or eliminated fingerprints.• Since users have to touch the sensing device, so it gets damaged on scratches on it
    12. 12. Fingerprint Recognition steps: Database
    13. 13. FACE RECOGNITIONFace recognition uses the visible physical structure of the faceand analyses the spatial geometry of distinguishing features in itto identify an individual.ADVANTAGESNon intrusive, privacy cannot be invaded easily.Cheap technology.DISADVANTAGES 2D recognition is affected by changes in lighting, the person’s hair, the age,and ifthe person wear glasses.It also depends on orientation/angle of user’s face with camera. Requires camera equipment for user identification; thus, it is not likely tobecomepopular until most PCs include good resolution cameras as standardequipment.Even the expressions on the face also affect the recognition process. Forexample:in Canada passport size photo with neutral face expression areaccepted.
    14. 14. Face recognition process:Input face Extraction of Extraction of face featuresimage face image Positive Database negative
    15. 15.  IRIS SCAN• The iris is the colored ring of textured tissue that surrounds the pupil of the eye.• ADVANTAGES Very high accuracy. Verification time is generally less than 5 seconds. The eye from a dead person would deteriorate too fast to be useful, so no extra precautions have to been taken with retinal scans to be sure the user is a living human being.• DISADVANTAGES Intrusive. A lot of memory for the data to be stored. Very expensive. Difficult to use because of positioning eye. Requires more time for matching with database stored
    16. 16. Iris Identification Steps:Input of face Recognition of Detection ofimage Put iris in focus iris pattern eye regions accept Database reject
    17. 17. Signature Identification:• Signature identification: is the analyses of the way a user signs his or her name.• The process used by a biometric system to verify a signature is called dynamic signature verification (DSV).• the angle at which the pen is held• the number of times the pen is lifted,• the time it takes to write the entire signature,• the pressure exerted by the person while signing,• the variations in the speed with which different parts of the signature are written.• ADVANTAGES Unique for every individual and user himself can decide the identity. Lesser false acceptance rate. Relatively cheap technology. No expert training required
    18. 18. DISADVANTAGES Signature of a person may change after a long time, like ifan user gone through an accident and he cannot use hishand and then he signs after a long time, his sign andpressure points may change. High false rejection rate.Pressure points may change because of weather or somedisease. System can be fooled by imitating Profile Database
    19. 19. Palm Vein Technology• In this technology ONE’S PALM is used as the “PASSWORD” for verification• The veins present in the palm of the individual are scanned & verified thus providing the access• Palm vein authentication is one of the vascular pattern authentication technologies.• Vascular pattern authentication includes vein pattern authentication using the vein patterns of the palm, back of the hand or fingers as personal identification data• The palm vein authentication uses the vascular patterns of the palm as personal identification data
    20. 20. First the individual places his PALM on the sensor, thus the sensor takes the “PALM VEIN IMAGE” and compares it with the pre-registered one with the help of INFRA RED RAYS.If there is a match then access is allowed, if not access is denied.This system is not at all dangerous. A near infrared ray is a component of sunlight, whose effect is much less than walking in sunlight.
    21. 21. REASONS FOR CONSIDERING THE PALM AREA FOR IDENTIFICATION :• A palm has wide area and more complicated vascular pattern and contains some differentiating features for personal identification when compared with the patterns present in the back of the hand and the ventral side or dorsal side of the fingers.• The palm normally has no hair and thus eliminates an obstacle to capturing the vein pattern and it is less susceptible to a change in skin color.• For this purpose the contactless palm vein authentication device was launched by Fujitsu in Japan. This is also known as palm secure.
    22. 22. REASONS FOR CONSIDERING THE PALM AREA FOR IDENTIFICATION ….• In palm vein authentication we use sensing and matching technology.• when near-infrared light passes, deoxygenated hemoglobin in the blood flowing through the veins absorbs near-infrared rays, causing it to be visible as black regions to the scanner.• Arteries and capillaries, whose blood contains oxygenated hemoglobin,which does not absorb near-infrared light, are invisible to the sensor, hence “VEINS” are chosen
    23. 23. SENSING TECHNOLOGY : The sensing technology used for vein patterns is based onnear-infrared ray spectroscopy (NIRS) and imagingDeoxygenated hemoglobin in vein vessels absorbs lighthaving a wavelength of about 760 nm within near-infraredarea (Fig. 1).When capturing a body using near-infrared rays only theblood vessel pattern containing the deoxidized hemoglobinis visible as a series of dark lines (Fig.2).The vein authentication device translates the black lines ofthe infrared ray image as the blood vessel pattern of thepalm (Fig. 3), and then matches it with the previouslyregistered blood vessel pattern of the individual.
    24. 24. Fig1: visible ray Fig2:infrared ray Fig 3 :Extracted vein image image patternBlood vessel patterns are unique to every individual. Even the vein patternson each hand are different.
    25. 25. IMAGING METHODS:There are two imaging methods used for veins 1.Reflection 2.Transmission.Reflection Method:The reflection method illuminates the target part from the front In this method, an illumination device and a capturing device can be combined because the direction of illumination and capturing is the same.Transmission method: The transmission method illuminates the target part from the back, the side or the surface around the target. but in this method, those devices must be used separately because the direction of illumination and capturing differs
    26. 26. Matching: The palm vein pattern is extracted from infrared-ray images as dark lines. This Matching involves 1. Capture 2. Extraction of palm vein pattern features 3. Storing of palm vein pattern features 1. Capture: Decide whether or not the user will hold his/her palm over the palm vein authentication sensor. If the palm is held, capture the infrared-ray image 2. Extraction of palm vein pattern features: Extract the palm vein pattern from the captured infrared-ray image by image processing. Convert the palm vein pattern to palm vein feature data following the algorithm to determine the correspondence between the two palm vein patterns. 3. Storing of palm vein pattern features: Store the palm vein feature data to storage, smart card or hard disk, depending on the application.
    27. 27. HOW IT WORKSWorking of Palm Vein SystemsWe Rest our palm on Vein ScannerPalm Vein Scanner – near Infra Red RaysInfra red rays will pass through veinsVeins carry Deoxygenated HemoglobinDeoxygenated blood absorbs Infra Red RaysArteries and capillaries reflects infra red raysVein patterns are captured for Authentication If Authorized, the requested Application gets Activated•Extract the vein patterns from the infrared image and convert intovein pattern data.•Now Compares it with database 28
    28. 28. WORKING•
    29. 29. Step 1:Palm vein authenticationtechnology consists of a small Palm veinscanner thats easy and natural to use,fast and Highly accurate . Simply holdyour palm a few centimeters Over thescanner and within a second it readsyour unique vein pattern. A vein pictureis taken and palm pattern is registered.
    30. 30. Step 2:The registered palm pattern is stored into thedatabase along with the personal details of theclient
    31. 31. 1. One should place his/her palmnear to scanner.
    32. 32. • 2. The scanner makes use of a special characteristic of the reduced hemoglobin coursing through the palm veins — it absorbs near- infrared light. This makes it possible to take a snapshot of whats beneath the outer skin, something very hard to read or steal.
    33. 33. • 3. The integrated optical system in the palm vein sensor uses this phenomenon to generate an image of the palm vein pattern and the generated image is digitized, encrypted and finally stored as a registered template in the database.
    34. 34. Data Flow 35
    35. 35. Palm vein authentication Palm has to be Sensor emits near Oxygen reduced blood positioned infrared within the veins absorbs the 3-8 cm over the beam to the palm near infrared light sensorThe generated template can The sensors template library The sensors wide angular nearbe stored in either a database SW changes the raw image infrared camera takes a raw into template data image of the palm vein pattern
    36. 36. PALM VEIN PAATTERN VERIFICATION SYSTEMThe thermal vein pattern verification system involvesthe following stages:• Image Acquisition• Image enhancement• Vein pattern segmentation• Skeletonization• Matching 37
    37. 37. User Interface •Contactless •Non-invasive •2.18 seconds recognition speedsource 38
    38. 38. How Secure is the Technology? How Secure is the Technology?• On the basis of testing the technology on more than 70,000 individuals, Fujitsu declared that the new system had a false rejection rate of 0.01%(i.e., only one out of 10,000 scans were incorrect denials for access).• And a false acceptance rate of less than 0.00008% (i.e., incorrect approval for access in one in over a millio scans).• And if you registered your profile as a child, itll still be recognized as you grow, as an individuals patterns of veins are established in utero• No two people in the world share a palm vein pattern -even those of identical twins will differ.
    39. 39. Overview of BiometricsTechnology + - Fingerprint •Popular •Less Accurate •Cheapest Voice •Non invasive •Least AccurateIris & Retinal •Very accurate •Invasive •Expensive •Sensitive Palm Vein •Non-invasive •Unfamiliar •Relatively Cheap •Accurate
    40. 40. accuracy TECHNOLOGY FALSE ACCEPTANCE RATE FALSE REJECTION RATE Palm Secure .00008% .01% Fingerprint 1-2% 3% Iris .0001% - .94% .99% - .2% Voice 2% 10%• Vein patterns – Distinctive and unique to individuals, even left and right hands. – Difficult to steal or forge• False acceptance rate – A rate at which someone other than the actual person is falsely recognized.• False rejection rate – A rate at which the actual person is not recognized accurately.
    41. 41. In comparison with otherstechnology*note – Chart created using average of data provided by the Table 43
    42. 42. Need Of ItNo more problems of forgotten passwords and id codes - biometrics is the technology taking care of it.Apart from other techniques like IRIS scan in which Cataract replacement, Finger scan during Injuries etc can be an disadvantage, this technique has no problems.
    43. 43. ADVANTAGES:• Contactless, hygienic and non-invasive .• It is difficult to forge for intruders because blood vessels are hidden within the body.• This technology is non- intrusive; It does not involve any physical contact between the user and the system .• Vein patterns are unique to each individual; even identical twins have different vein patterns .• Palm vein technology has an FRR of 0.01% and FAR of less than 0.00008%.this is based on the experiments conducted on 70,000 individuals in Japan. It is Highly accurate
    44. 44. DISADVANTAGES:• There are numerous factors that can effect the quality of the captured image. They are body temperature, ambient temperature, humidity, unevenly distribution of heat, heat radiation, nearness of vein to surface, camera calibration and focus.• Palm vein recognition is invasive because it creates fear among the users that it can be a painful process• It is relatively expensive and not available for mass production yet.• It is not applicable to people who lost their palms.
    45. 45. APPLICATIONS: Palm vein authentication is utilized in various Fields such as• Security systems - Door lock and integrated building security systems• Log-in control – login into pc’s or servers, network data access, etc.• Healthcare - ID verification for medical equipment, electronic record management, etc.• Financial services - ATM,Banks, vault access, etc.
    46. 46. applications
    47. 47. Practical Application ATM:• Palm vein pattern is captured by using the palm vein sensor on the ATM. The palm vein pattern is converted to palm vein features and transferred to the user’s smart card a• The matching between the palm vein features stored on the smart card and those transferred from the sensor is executed on the smart card.• The result is the output from the card. ATM MACHINES WITH PALM VEIN SENSOR UNIT 49
    48. 48. Login authentication:• Palm vein authentication can be integrated into laptop PCs by USB .• It is used to control access to electronically stored information.• Because login authentication using palm vein authentication can also be used for authentication using conventional IDs and passwords
    49. 49. Door security system:• The palm vein authentication access control unit can be used to control entry and exit into and out of rooms and buildings.• This unit consists of operation and control sections. The operation section has a key pad, indicators , contactless smart card reader and palm vein sensor• The control section has a processing unit for the authentication and stores palm vein features of enrollees• This unit executes verification when a user input his or her ID
    50. 50. Palm vein pattern authentication technologydeveloped by Fujitsu was being used in a widerange in japan . If this technology is introduced in our country wecan solve many problems such as passwordprotection in ATM security in various fields and if we implement thistechnology in government offices we can make theemployees to work according the governmenttimings surely this technology will bring a revolution in thefield of science and technology in the near future.
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×