SlideShare a Scribd company logo
1 of 23
PALM VEIN TECHNOLOGY
    NAME: SATYAJIT DASH
    ROLL NO:




1
Introduction         Accuracy
                          CONTENTS
    Our current security measures      Practical applications
       Overview of Bio-Tech            Advantages
            How it works               Disadvantages
              Data flow                Conclusion
                                       References




2
INTRODUCTION

    • Palm vein technology is one of the upcoming
      technology.
    • It is the world’s first contactless personal
      identification system that uses the vein patterns in
      human palms to confirm a person’s identity.
    • It is highly secure and accurate.
    • The contact less feature gives it a hygienic advantage
      over other biometric authentication technologies.
    • It uses the vascular patterns of an individual’s palm as
      personal identification data.

3
Our Current Security Measures
     Internal               External
       Building Access –      Customer Access –
        Magnetic Card and      ATM card and PIN
        Pin
       Computer Access –
        User ID and
        Password




4
Overview of Bio-Tech
    Technology                   +                 -
    Fingerprint      •Popular            •Less Accurate
                     •Cheapest
        Voice        •Non invasive       •Least Accurate
    Iris & Retinal   •Very accurate      •Invasive
                                         •Expensive
                                         •Sensitive
     Palm Vein       •Non-invasive       •Unfamiliar
                     •Relatively Cheap
                     •Accurate




5
Palm Vein Technology Usability &
    Accuracy Graph




6
How It Works ?




    •Takes snapshot of palm veins
    •Converts into algorithm (ICP)
    •Compares with database




7
How It Works




8
Continue…




9
PALM VEIN PAATTERN VERIFICATION SYSTEM




     The thermal vein pattern verification system involves the
     following stages:
     • Image Acquisition
     • Image enhancement
     • Vein pattern segmentation
     • Skeletonization
10
     • Matching
User Interface




     •Contactless
     •Non-invasive
     •2.18 seconds recognition
     speed




11
 Available Software Development Kit
      Easy to integrate to current company system
  Small
  Cheap to produce
  Easy to Install
  Wide range of operating condition
      Iris scanners are sensitive to light and temp.




12
                              source
Data Flow




13
Accuracy
                                           FALSE ACCEPTANCE     FALSE REJECTION
                         TECHNOLOGY
                                                  RATE                RATE


                          PalmSecure           .00008%               .01%

                          Fingerprint            1-2%                 3%

                              Iris          .0001% - .94%         .99% - .2%

                             Voice                2%                 10%


      Vein patterns
         Distinctive and unique to individuals, even left and right hands.
         Difficult to steal or forge
      False acceptance rate
         A rate at which someone other than the actual person is falsely recognized.
      False rejection rate
         A rate at which the actual person is not recognized accurately.
14
In comparison with others
          technology
     *note – Chart created using average of data provided by the Table




15
Security Evaluation
     There are several common methods of attacking the system

     • Spoofing attacks
     • Replay and transmission attacks



     Known methods of improving security of biometric system
     a. Multimodal biometric system
     b. Biometrics combined with password
     c. Watermarking




16
Points of attacks in a biometric system




17
Practical Applications
 ‘Palm Secure’ is now widely
     used in various fields.
      ATM
         92% of all Japanese ATMs
         18,000+ ATM machines for Bank
           of Tokyo - Mitsubishi
      School ID, Entry Key to private      ATM Machine
       property, Log-in to PCs or servers
      Potential is limitless
 PalmSecure mouse with a build-
     in sensor in 2007
      easily installed to personal
       computer.



18                                          Portable Mouse
ADVANTAGES

• Hidden characteristics are used as biometric features.
• It is difficult to forge for intruders.
• It is not affected by dryness or roughness of skin or by
  physical injury on surface of the hand.
• It has an FRR of 0.01% and FAR of less than 0.00008%.
  This is based on experiments conducted on 70,000
  individuals in Japan.
• This technology is non-intrusive.



 19
DISADVANTAGES
     • There are numerous factors that can affect the quality of
       the captured image such as body
       temperature, humidity, heat radiation, nearness of vein to
       surface, camera calibration and focus.
     • It is still relatively expensive and not available for mass
       production yet.




20
CONCLUSION
Palm vein pattern recognition is a convenient and easy to
use biometric technology with high security and accuracy
level.
The technology is gaining momentum but it is still
expensive and relatively untested because it has not yet
been marketed globally.




 21
QUESTIONS???




22
End of the Presentation

         Thank You.



23

More Related Content

What's hot

Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein TechnologyManav Mittal
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology bhoovi1239
 
palm vein technology
palm vein technologypalm vein technology
palm vein technologyRAJASHREE B
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint TechnologyJoy Dutta
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein TechnologyAshwani Kumar
 
palm vein technology and its applications
palm vein technology and its applicationspalm vein technology and its applications
palm vein technology and its applicationsAkhil Kumar
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyShubhamLamichane
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmalAkmal Hussain
 
Biometric security system
Biometric security systemBiometric security system
Biometric security systemMithun Paul
 
Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasBasra University, Iraq
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric SystemsPiyush Mittal
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein TechnologyAshwani Kumar
 

What's hot (20)

Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology
 
palm vein technology
palm vein technologypalm vein technology
palm vein technology
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint Technology
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
palm vein technology and its applications
palm vein technology and its applicationspalm vein technology and its applications
palm vein technology and its applications
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
BIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEMBIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEM
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal
 
Biometric security system
Biometric security systemBiometric security system
Biometric security system
 
Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.Abbas
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric Systems
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Biometrics
BiometricsBiometrics
Biometrics
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 

Viewers also liked

Viewers also liked (20)

Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
Braingate technology
Braingate technologyBraingate technology
Braingate technology
 
Daknet ppt
Daknet pptDaknet ppt
Daknet ppt
 
RAIN TECHNOLOGY
RAIN TECHNOLOGYRAIN TECHNOLOGY
RAIN TECHNOLOGY
 
Biometric Voting System
Biometric Voting SystemBiometric Voting System
Biometric Voting System
 
Wibree
Wibree Wibree
Wibree
 
Brain gate technology
Brain gate technologyBrain gate technology
Brain gate technology
 
Brain gate
Brain gateBrain gate
Brain gate
 
Eye Movement based Human Computer Interaction Technique
Eye Movement based Human Computer Interaction TechniqueEye Movement based Human Computer Interaction Technique
Eye Movement based Human Computer Interaction Technique
 
NIGHT VISION TECHNOLOGY
NIGHT VISION TECHNOLOGYNIGHT VISION TECHNOLOGY
NIGHT VISION TECHNOLOGY
 
Sky x technology
Sky x technologySky x technology
Sky x technology
 
Cordect
CordectCordect
Cordect
 
DakNet PPT
DakNet PPTDakNet PPT
DakNet PPT
 
Biometric Voting System
Biometric Voting SystemBiometric Voting System
Biometric Voting System
 
BRAIN GATE
BRAIN GATEBRAIN GATE
BRAIN GATE
 
Brain gate
Brain gateBrain gate
Brain gate
 
Rover Technology
Rover TechnologyRover Technology
Rover Technology
 
human computer interface
human computer interfacehuman computer interface
human computer interface
 
Rain technology
Rain technologyRain technology
Rain technology
 
Night vision technology ppt
Night vision technology pptNight vision technology ppt
Night vision technology ppt
 

Similar to Palm-Vein Technology

49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptxssuserb46d43
 
Matrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein ReaderMatrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein Readerlissapenas123
 
Nguyen nielsenkim palmvein
Nguyen nielsenkim palmveinNguyen nielsenkim palmvein
Nguyen nielsenkim palmveinNikhila07
 
Atm using finger print
Atm using finger printAtm using finger print
Atm using finger printManoranjan Roy
 
Palmvein Technology
Palmvein TechnologyPalmvein Technology
Palmvein TechnologySai Divya
 
palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologypptNaga Dinesh
 
Palmvein authentication
Palmvein authenticationPalmvein authentication
Palmvein authenticationSufiyan Arab
 
Biometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnologyBiometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnologySarvani Mallipeddi
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bmbranjith
 
Computer science ppt
Computer science pptComputer science ppt
Computer science pptbrijesh kumar
 
Palm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentationPalm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentationgagana5017
 
Palm veim technology.pptx
Palm veim technology.pptxPalm veim technology.pptx
Palm veim technology.pptxShamamaIbtesam
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Palak Pandoh
 

Similar to Palm-Vein Technology (20)

49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx
 
Palm vein new
Palm vein newPalm vein new
Palm vein new
 
Palm vein new
Palm vein newPalm vein new
Palm vein new
 
Matrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein ReaderMatrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein Reader
 
Nguyen nielsenkim palmvein
Nguyen nielsenkim palmveinNguyen nielsenkim palmvein
Nguyen nielsenkim palmvein
 
Atm using finger print
Atm using finger printAtm using finger print
Atm using finger print
 
Palmvein Technology
Palmvein TechnologyPalmvein Technology
Palmvein Technology
 
palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologyppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Palmvein authentication
Palmvein authenticationPalmvein authentication
Palmvein authentication
 
Palmsecure
PalmsecurePalmsecure
Palmsecure
 
Biometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnologyBiometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnology
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
Computer science ppt
Computer science pptComputer science ppt
Computer science ppt
 
Biometrics 2.pptx
Biometrics 2.pptxBiometrics 2.pptx
Biometrics 2.pptx
 
Palm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentationPalm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentation
 
Bio metric security
Bio metric securityBio metric security
Bio metric security
 
Palmvein ppt
Palmvein pptPalmvein ppt
Palmvein ppt
 
Palm veim technology.pptx
Palm veim technology.pptxPalm veim technology.pptx
Palm veim technology.pptx
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)
 

Recently uploaded

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 

Recently uploaded (20)

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 

Palm-Vein Technology

  • 1. PALM VEIN TECHNOLOGY NAME: SATYAJIT DASH ROLL NO: 1
  • 2. Introduction  Accuracy CONTENTS Our current security measures  Practical applications Overview of Bio-Tech  Advantages How it works  Disadvantages Data flow  Conclusion  References 2
  • 3. INTRODUCTION • Palm vein technology is one of the upcoming technology. • It is the world’s first contactless personal identification system that uses the vein patterns in human palms to confirm a person’s identity. • It is highly secure and accurate. • The contact less feature gives it a hygienic advantage over other biometric authentication technologies. • It uses the vascular patterns of an individual’s palm as personal identification data. 3
  • 4. Our Current Security Measures  Internal  External  Building Access –  Customer Access – Magnetic Card and ATM card and PIN Pin  Computer Access – User ID and Password 4
  • 5. Overview of Bio-Tech Technology + - Fingerprint •Popular •Less Accurate •Cheapest Voice •Non invasive •Least Accurate Iris & Retinal •Very accurate •Invasive •Expensive •Sensitive Palm Vein •Non-invasive •Unfamiliar •Relatively Cheap •Accurate 5
  • 6. Palm Vein Technology Usability & Accuracy Graph 6
  • 7. How It Works ? •Takes snapshot of palm veins •Converts into algorithm (ICP) •Compares with database 7
  • 10. PALM VEIN PAATTERN VERIFICATION SYSTEM The thermal vein pattern verification system involves the following stages: • Image Acquisition • Image enhancement • Vein pattern segmentation • Skeletonization 10 • Matching
  • 11. User Interface •Contactless •Non-invasive •2.18 seconds recognition speed 11
  • 12.  Available Software Development Kit  Easy to integrate to current company system  Small  Cheap to produce  Easy to Install  Wide range of operating condition  Iris scanners are sensitive to light and temp. 12 source
  • 14. Accuracy FALSE ACCEPTANCE FALSE REJECTION TECHNOLOGY RATE RATE PalmSecure .00008% .01% Fingerprint 1-2% 3% Iris .0001% - .94% .99% - .2% Voice 2% 10%  Vein patterns  Distinctive and unique to individuals, even left and right hands.  Difficult to steal or forge  False acceptance rate  A rate at which someone other than the actual person is falsely recognized.  False rejection rate  A rate at which the actual person is not recognized accurately. 14
  • 15. In comparison with others technology *note – Chart created using average of data provided by the Table 15
  • 16. Security Evaluation There are several common methods of attacking the system • Spoofing attacks • Replay and transmission attacks Known methods of improving security of biometric system a. Multimodal biometric system b. Biometrics combined with password c. Watermarking 16
  • 17. Points of attacks in a biometric system 17
  • 18. Practical Applications  ‘Palm Secure’ is now widely used in various fields.  ATM  92% of all Japanese ATMs  18,000+ ATM machines for Bank of Tokyo - Mitsubishi  School ID, Entry Key to private ATM Machine property, Log-in to PCs or servers  Potential is limitless  PalmSecure mouse with a build- in sensor in 2007  easily installed to personal computer. 18 Portable Mouse
  • 19. ADVANTAGES • Hidden characteristics are used as biometric features. • It is difficult to forge for intruders. • It is not affected by dryness or roughness of skin or by physical injury on surface of the hand. • It has an FRR of 0.01% and FAR of less than 0.00008%. This is based on experiments conducted on 70,000 individuals in Japan. • This technology is non-intrusive. 19
  • 20. DISADVANTAGES • There are numerous factors that can affect the quality of the captured image such as body temperature, humidity, heat radiation, nearness of vein to surface, camera calibration and focus. • It is still relatively expensive and not available for mass production yet. 20
  • 21. CONCLUSION Palm vein pattern recognition is a convenient and easy to use biometric technology with high security and accuracy level. The technology is gaining momentum but it is still expensive and relatively untested because it has not yet been marketed globally. 21
  • 23. End of the Presentation Thank You. 23

Editor's Notes

  1. Henrik
  2. Richard
  3. Iris scanners are sensitive to light and temp.Richard
  4. Richard
  5. YooJin
  6. YooJin
  7. YooJin