SlideShare a Scribd company logo
1 of 23
PALM VEIN TECHNOLOGY
    NAME: SATYAJIT DASH
    ROLL NO:




1
Introduction         Accuracy
                          CONTENTS
    Our current security measures      Practical applications
       Overview of Bio-Tech            Advantages
            How it works               Disadvantages
              Data flow                Conclusion
                                       References




2
INTRODUCTION

    • Palm vein technology is one of the upcoming
      technology.
    • It is the world’s first contactless personal
      identification system that uses the vein patterns in
      human palms to confirm a person’s identity.
    • It is highly secure and accurate.
    • The contact less feature gives it a hygienic advantage
      over other biometric authentication technologies.
    • It uses the vascular patterns of an individual’s palm as
      personal identification data.

3
Our Current Security Measures
     Internal               External
       Building Access –      Customer Access –
        Magnetic Card and      ATM card and PIN
        Pin
       Computer Access –
        User ID and
        Password




4
Overview of Bio-Tech
    Technology                   +                 -
    Fingerprint      •Popular            •Less Accurate
                     •Cheapest
        Voice        •Non invasive       •Least Accurate
    Iris & Retinal   •Very accurate      •Invasive
                                         •Expensive
                                         •Sensitive
     Palm Vein       •Non-invasive       •Unfamiliar
                     •Relatively Cheap
                     •Accurate




5
Palm Vein Technology Usability &
    Accuracy Graph




6
How It Works ?




    •Takes snapshot of palm veins
    •Converts into algorithm (ICP)
    •Compares with database




7
How It Works




8
Continue…




9
PALM VEIN PAATTERN VERIFICATION SYSTEM




     The thermal vein pattern verification system involves the
     following stages:
     • Image Acquisition
     • Image enhancement
     • Vein pattern segmentation
     • Skeletonization
10
     • Matching
User Interface




     •Contactless
     •Non-invasive
     •2.18 seconds recognition
     speed




11
 Available Software Development Kit
      Easy to integrate to current company system
  Small
  Cheap to produce
  Easy to Install
  Wide range of operating condition
      Iris scanners are sensitive to light and temp.




12
                              source
Data Flow




13
Accuracy
                                           FALSE ACCEPTANCE     FALSE REJECTION
                         TECHNOLOGY
                                                  RATE                RATE


                          PalmSecure           .00008%               .01%

                          Fingerprint            1-2%                 3%

                              Iris          .0001% - .94%         .99% - .2%

                             Voice                2%                 10%


      Vein patterns
         Distinctive and unique to individuals, even left and right hands.
         Difficult to steal or forge
      False acceptance rate
         A rate at which someone other than the actual person is falsely recognized.
      False rejection rate
         A rate at which the actual person is not recognized accurately.
14
In comparison with others
          technology
     *note – Chart created using average of data provided by the Table




15
Security Evaluation
     There are several common methods of attacking the system

     • Spoofing attacks
     • Replay and transmission attacks



     Known methods of improving security of biometric system
     a. Multimodal biometric system
     b. Biometrics combined with password
     c. Watermarking




16
Points of attacks in a biometric system




17
Practical Applications
 ‘Palm Secure’ is now widely
     used in various fields.
      ATM
         92% of all Japanese ATMs
         18,000+ ATM machines for Bank
           of Tokyo - Mitsubishi
      School ID, Entry Key to private      ATM Machine
       property, Log-in to PCs or servers
      Potential is limitless
 PalmSecure mouse with a build-
     in sensor in 2007
      easily installed to personal
       computer.



18                                          Portable Mouse
ADVANTAGES

• Hidden characteristics are used as biometric features.
• It is difficult to forge for intruders.
• It is not affected by dryness or roughness of skin or by
  physical injury on surface of the hand.
• It has an FRR of 0.01% and FAR of less than 0.00008%.
  This is based on experiments conducted on 70,000
  individuals in Japan.
• This technology is non-intrusive.



 19
DISADVANTAGES
     • There are numerous factors that can affect the quality of
       the captured image such as body
       temperature, humidity, heat radiation, nearness of vein to
       surface, camera calibration and focus.
     • It is still relatively expensive and not available for mass
       production yet.




20
CONCLUSION
Palm vein pattern recognition is a convenient and easy to
use biometric technology with high security and accuracy
level.
The technology is gaining momentum but it is still
expensive and relatively untested because it has not yet
been marketed globally.




 21
QUESTIONS???




22
End of the Presentation

         Thank You.



23

More Related Content

What's hot

Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology Anurag Chitti
 
palm vein technology and its applications
palm vein technology and its applicationspalm vein technology and its applications
palm vein technology and its applicationsAkhil Kumar
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology bhoovi1239
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein TechnologyManav Mittal
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein TechnologyAshwani Kumar
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentationrs2003
 
Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/TechnologyRahulSingh3034
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein TechnologyAshwani Kumar
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmalAkmal Hussain
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system pptRavi Kumar
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyShubhamLamichane
 
Design and development of dorsal hand vein recognition biometric system usin...
Design and development of dorsal hand vein recognition  biometric system usin...Design and development of dorsal hand vein recognition  biometric system usin...
Design and development of dorsal hand vein recognition biometric system usin...Raghavendra DC
 

What's hot (20)

Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology
 
palm vein technology and its applications
palm vein technology and its applicationspalm vein technology and its applications
palm vein technology and its applications
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/Technology
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
PALM VEIN TECHNOLOGY..ppt
PALM VEIN TECHNOLOGY..pptPALM VEIN TECHNOLOGY..ppt
PALM VEIN TECHNOLOGY..ppt
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system ppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Palm vein new
Palm vein newPalm vein new
Palm vein new
 
Design and development of dorsal hand vein recognition biometric system usin...
Design and development of dorsal hand vein recognition  biometric system usin...Design and development of dorsal hand vein recognition  biometric system usin...
Design and development of dorsal hand vein recognition biometric system usin...
 

Viewers also liked

Viewers also liked (20)

Braingate technology
Braingate technologyBraingate technology
Braingate technology
 
Daknet ppt
Daknet pptDaknet ppt
Daknet ppt
 
RAIN TECHNOLOGY
RAIN TECHNOLOGYRAIN TECHNOLOGY
RAIN TECHNOLOGY
 
Biometric Voting System
Biometric Voting SystemBiometric Voting System
Biometric Voting System
 
Wibree
Wibree Wibree
Wibree
 
Brain gate technology
Brain gate technologyBrain gate technology
Brain gate technology
 
Brain gate
Brain gateBrain gate
Brain gate
 
Eye Movement based Human Computer Interaction Technique
Eye Movement based Human Computer Interaction TechniqueEye Movement based Human Computer Interaction Technique
Eye Movement based Human Computer Interaction Technique
 
NIGHT VISION TECHNOLOGY
NIGHT VISION TECHNOLOGYNIGHT VISION TECHNOLOGY
NIGHT VISION TECHNOLOGY
 
Sky x technology
Sky x technologySky x technology
Sky x technology
 
Cordect
CordectCordect
Cordect
 
DakNet PPT
DakNet PPTDakNet PPT
DakNet PPT
 
Biometric Voting System
Biometric Voting SystemBiometric Voting System
Biometric Voting System
 
BRAIN GATE
BRAIN GATEBRAIN GATE
BRAIN GATE
 
Brain gate
Brain gateBrain gate
Brain gate
 
Rover Technology
Rover TechnologyRover Technology
Rover Technology
 
human computer interface
human computer interfacehuman computer interface
human computer interface
 
Rain technology
Rain technologyRain technology
Rain technology
 
Night vision technology ppt
Night vision technology pptNight vision technology ppt
Night vision technology ppt
 
Seminar Presentation Hadoop
Seminar Presentation HadoopSeminar Presentation Hadoop
Seminar Presentation Hadoop
 

Similar to Palm-Vein Technology

49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptxssuserb46d43
 
Matrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein ReaderMatrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein Readerlissapenas123
 
Nguyen nielsenkim palmvein
Nguyen nielsenkim palmveinNguyen nielsenkim palmvein
Nguyen nielsenkim palmveinNikhila07
 
Atm using finger print
Atm using finger printAtm using finger print
Atm using finger printManoranjan Roy
 
Palmvein Technology
Palmvein TechnologyPalmvein Technology
Palmvein TechnologySai Divya
 
palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologypptNaga Dinesh
 
Palmvein authentication
Palmvein authenticationPalmvein authentication
Palmvein authenticationSufiyan Arab
 
Biometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnologyBiometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnologySarvani Mallipeddi
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bmbranjith
 
Computer science ppt
Computer science pptComputer science ppt
Computer science pptbrijesh kumar
 
Palm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentationPalm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentationgagana5017
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint TechnologyJoy Dutta
 
Palm veim technology.pptx
Palm veim technology.pptxPalm veim technology.pptx
Palm veim technology.pptxShamamaIbtesam
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Palak Pandoh
 

Similar to Palm-Vein Technology (20)

49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx
 
Palm vein new
Palm vein newPalm vein new
Palm vein new
 
Matrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein ReaderMatrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein Reader
 
Nguyen nielsenkim palmvein
Nguyen nielsenkim palmveinNguyen nielsenkim palmvein
Nguyen nielsenkim palmvein
 
Atm using finger print
Atm using finger printAtm using finger print
Atm using finger print
 
Palmvein Technology
Palmvein TechnologyPalmvein Technology
Palmvein Technology
 
palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologyppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Palmvein authentication
Palmvein authenticationPalmvein authentication
Palmvein authentication
 
Palmsecure
PalmsecurePalmsecure
Palmsecure
 
Biometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnologyBiometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnology
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
Computer science ppt
Computer science pptComputer science ppt
Computer science ppt
 
Biometrics 2.pptx
Biometrics 2.pptxBiometrics 2.pptx
Biometrics 2.pptx
 
Palm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentationPalm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentation
 
Bio metric security
Bio metric securityBio metric security
Bio metric security
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint Technology
 
Palmvein ppt
Palmvein pptPalmvein ppt
Palmvein ppt
 
Palm veim technology.pptx
Palm veim technology.pptxPalm veim technology.pptx
Palm veim technology.pptx
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)
 

Recently uploaded

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 

Recently uploaded (20)

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 

Palm-Vein Technology

  • 1. PALM VEIN TECHNOLOGY NAME: SATYAJIT DASH ROLL NO: 1
  • 2. Introduction  Accuracy CONTENTS Our current security measures  Practical applications Overview of Bio-Tech  Advantages How it works  Disadvantages Data flow  Conclusion  References 2
  • 3. INTRODUCTION • Palm vein technology is one of the upcoming technology. • It is the world’s first contactless personal identification system that uses the vein patterns in human palms to confirm a person’s identity. • It is highly secure and accurate. • The contact less feature gives it a hygienic advantage over other biometric authentication technologies. • It uses the vascular patterns of an individual’s palm as personal identification data. 3
  • 4. Our Current Security Measures  Internal  External  Building Access –  Customer Access – Magnetic Card and ATM card and PIN Pin  Computer Access – User ID and Password 4
  • 5. Overview of Bio-Tech Technology + - Fingerprint •Popular •Less Accurate •Cheapest Voice •Non invasive •Least Accurate Iris & Retinal •Very accurate •Invasive •Expensive •Sensitive Palm Vein •Non-invasive •Unfamiliar •Relatively Cheap •Accurate 5
  • 6. Palm Vein Technology Usability & Accuracy Graph 6
  • 7. How It Works ? •Takes snapshot of palm veins •Converts into algorithm (ICP) •Compares with database 7
  • 10. PALM VEIN PAATTERN VERIFICATION SYSTEM The thermal vein pattern verification system involves the following stages: • Image Acquisition • Image enhancement • Vein pattern segmentation • Skeletonization 10 • Matching
  • 11. User Interface •Contactless •Non-invasive •2.18 seconds recognition speed 11
  • 12.  Available Software Development Kit  Easy to integrate to current company system  Small  Cheap to produce  Easy to Install  Wide range of operating condition  Iris scanners are sensitive to light and temp. 12 source
  • 14. Accuracy FALSE ACCEPTANCE FALSE REJECTION TECHNOLOGY RATE RATE PalmSecure .00008% .01% Fingerprint 1-2% 3% Iris .0001% - .94% .99% - .2% Voice 2% 10%  Vein patterns  Distinctive and unique to individuals, even left and right hands.  Difficult to steal or forge  False acceptance rate  A rate at which someone other than the actual person is falsely recognized.  False rejection rate  A rate at which the actual person is not recognized accurately. 14
  • 15. In comparison with others technology *note – Chart created using average of data provided by the Table 15
  • 16. Security Evaluation There are several common methods of attacking the system • Spoofing attacks • Replay and transmission attacks Known methods of improving security of biometric system a. Multimodal biometric system b. Biometrics combined with password c. Watermarking 16
  • 17. Points of attacks in a biometric system 17
  • 18. Practical Applications  ‘Palm Secure’ is now widely used in various fields.  ATM  92% of all Japanese ATMs  18,000+ ATM machines for Bank of Tokyo - Mitsubishi  School ID, Entry Key to private ATM Machine property, Log-in to PCs or servers  Potential is limitless  PalmSecure mouse with a build- in sensor in 2007  easily installed to personal computer. 18 Portable Mouse
  • 19. ADVANTAGES • Hidden characteristics are used as biometric features. • It is difficult to forge for intruders. • It is not affected by dryness or roughness of skin or by physical injury on surface of the hand. • It has an FRR of 0.01% and FAR of less than 0.00008%. This is based on experiments conducted on 70,000 individuals in Japan. • This technology is non-intrusive. 19
  • 20. DISADVANTAGES • There are numerous factors that can affect the quality of the captured image such as body temperature, humidity, heat radiation, nearness of vein to surface, camera calibration and focus. • It is still relatively expensive and not available for mass production yet. 20
  • 21. CONCLUSION Palm vein pattern recognition is a convenient and easy to use biometric technology with high security and accuracy level. The technology is gaining momentum but it is still expensive and relatively untested because it has not yet been marketed globally. 21
  • 23. End of the Presentation Thank You. 23

Editor's Notes

  1. Henrik
  2. Richard
  3. Iris scanners are sensitive to light and temp.Richard
  4. Richard
  5. YooJin
  6. YooJin
  7. YooJin