SlideShare a Scribd company logo
1 of 23
Guided by,
Mrs.Minimol L
Head of the department
Mrs.Bhama Devi
Class tutor
Special thanks to,
Mr.Arun T pillai
Lecture
Dept of computer
 Introduction
 Biometrics
 Types of Biometrics
 Finger vein authentication technology
 Working
 Comparison with other techniques
 Applications
 Conclusion
 References
The use of electronic systems in day today life is increasing.
Identity theft is increasing and impact on society is growing.
Majority identity fraud are bank card and financial account
related.
Information era is coming,People pay much more attention on the
information security.
Passwords and tokens are highly vulnerable to being lost or
stolen. A weak or compromised password is the primary reason for
the rising cases of security and data breaches.
Passwords are the weakest link in an organization’s security
system and even strong passwords cannot resist sophisticated
hacker attacks. Further, the costs of maintaining password and
token based systems are very high and inefficient.
A human being is a single being,unique and
unrepeatable.
Biometrics refers to the measurement of
biological characteristics unique to each individual
for the purpose of verifying identity.
Verification and identification are the two ways
in which an individual’s identity can be
determined using biometric technology.
The global biometrics market is growing at an
exponential rate and is forecasted to reach $23.54
billion by 2020.
Continuing….
A promising biometric pattern for personal
identification in terms of its Security and
convenience.
Takes only about 0.8 seconds to identify one
input finger vein sample.
It captures images of the vein pattern inside
our finger.
Like other biometric patterns it is
unique,secure & virtually impossible to
replicate.
The working of finger vein detection and
authentication is classified into four components:
1) Image Acquisition
2) Pre-Processing or Image Enhancement
3) Extraction
4) Matching
Continuing….
Image Acquisition
The pattern of blood vessels is captured by
transmitting near infrared light at different
angles through the finger usually the middle
finger.
The light is partially absorbed by the
haemoglobin in the vein and the image is
captured by the camera.
If we shine near infrared (NIR) light
through fingers, human tissues pass through
most of them whereas haemoglobin in our
blood blocks it.
 Thus veins become visible darker in the
image. The vein image of each finger has
different properties such as brightness and
contrast.
Pre-Processing
In image pre-processing the part
of an image which is captured by
the camera is cropped and the rest
of the part is deleted.
The cropped portion of that
image is enhanced to achieve more
clarity of the veins.
Extraction
The important step in finger-vein recognition is the vein extraction from the
background. The finger-vein images are acquired by the use of NIR
spectroscopy.
The finger-vein image obtained from the NIR spectroscopy appears to be
darker than the other regions of the finger. This is because the blood vessels
alone will absorb the rays.
The finger-vein patterns are extracted by calculating various parameters like
vein Width, Length, Position, Pixels and Intersection points of vein. Then they
are stored as featured templates
Matching
The users of this system need to register their vein patterns in the
database.
While matching two types of errors results in the finger-vein based
biometric verification security system.
The errors are false rejection rate and the false acceptance
rate.False rejection is a claim that a genuine image is considered as
impostor.
False acceptance is a claim that an impostor image is considered as
genuine.
When the false rejection rate and the false acceptance rate are
equal, then the performance of the system is evaluated as equal error
rate.
Accurate
Rates for acceptance of false users or rejection of true users are
among the lowest for biometric technologies, making finger vein
authentication a reliable security solution. Unique vein patterns plus
leading-edge technology means high accuracy rates (very low FTE,
FRR and FAR). Small amount of data is required (400 bytes),
allowing fast authentication (< 1 second) and increased portability.
Fast
Vein pattern matching is completed within the blink of an eye,
affording users a speedy authentication experience without the hassle
and without the wait.
 Secure
As finger vein patterns are found internally within the body, forgery
is extremely difficult. Dryness or roughness on the surface of the skin
also has no effect on the accuracy of vein pattern authentication.
Small
Finger vein authentication devices are compact and therefore
applicable as embedded devices in a variety of applications.
Non Traceable
Veins are inside the body, invisible to the eye, and not accessible.
Therefore, it is extremely difficult to forge and impossible to
manipulate. The use of light transmission to gather biometric data
means that the condition of the skin surface does not affect accurate
processing.
User-Friendly
The vein patterns of each finger are unique, so each individual can
register multiple fingers as "back-up" for authentication purposes.
Registration is possible even for sweaty, oily or dirty fingers.
Continuing….
PC Login
PC users can now guard against illegitimate access or leakage of
information on their computers by using the vein patterns in their
fingers as their computer login.
Identity Management -Single Sign on
It gives users simple access to applications without the need for
multiple passwords, and without compromising security.
Time and Attendance
An easy-to-use, Fast, accurate and system to record employees' hours
of working and site security.
Cashless Catering
A cashless catering system greatly improves security, save money and
time, increase efficiency and even help boost meal uptake.
Banking and Finance
This strengthens access control security by requiring two-factor
authentication. Allowing identification of who is entering rooms
within the building and to control access to computers and files is an
essential element for all financial institutions.
The proposed system can be implemented wherever the
security is main consent such as military zones entry,
confidential sectors, ATM centres etc.
It can be embedded with various real time consumer
applications like PCs (Personal Computers), cellular phones,
vehicles, door access etc
It can reduce computational complexity, improve security
as well as low power consumption.
https://www.google.co.in
https://phys.org/news/2014-12-finger-vein-authentication-
technology-smooth.html
http://www.hitachi.eu/veinid/loginaccessapp.html
https://en.wikipedia.org/wiki/Finger_vein_recognition
http://www.mofiria.com/en/about
https://www.slideshare.net/cognizant/finger-vein-
authentication
Presentation Fingervein Authentication

More Related Content

What's hot

Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
Rekha Yadav
 
Vein Recognition Method
Vein Recognition MethodVein Recognition Method
Vein Recognition Method
Hafsa Tahir
 
Iris Biometric for Person Identification
Iris Biometric for Person IdentificationIris Biometric for Person Identification
Iris Biometric for Person Identification
Manish Kumar
 

What's hot (20)

Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Design of a hand geometry based biometric system
Design of a hand geometry based biometric systemDesign of a hand geometry based biometric system
Design of a hand geometry based biometric system
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
Pattern recognition Hand Geometry
Pattern recognition Hand GeometryPattern recognition Hand Geometry
Pattern recognition Hand Geometry
 
Vein Recognition Method
Vein Recognition MethodVein Recognition Method
Vein Recognition Method
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric system
 
Iris ppt
Iris pptIris ppt
Iris ppt
 
Iris scan.ppt 1
Iris scan.ppt 1Iris scan.ppt 1
Iris scan.ppt 1
 
Fingerprints recognition
Fingerprints recognitionFingerprints recognition
Fingerprints recognition
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technology
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Iris Biometric for Person Identification
Iris Biometric for Person IdentificationIris Biometric for Person Identification
Iris Biometric for Person Identification
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition Technology
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 

Similar to Presentation Fingervein Authentication

Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
SonuSawant
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
Sampat Patnaik
 

Similar to Presentation Fingervein Authentication (20)

hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authentication
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Seetu
SeetuSeetu
Seetu
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUEPALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
Biometrics
BiometricsBiometrics
Biometrics
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
Palmvein Technology
Palmvein TechnologyPalmvein Technology
Palmvein Technology
 
Poster on biometrics
Poster on biometricsPoster on biometrics
Poster on biometrics
 

Recently uploaded

Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotecAbortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
Abortion pills in Riyadh +966572737505 get cytotec
 
Abortion Clinic in Kempton Park +27791653574 WhatsApp Abortion Clinic Service...
Abortion Clinic in Kempton Park +27791653574 WhatsApp Abortion Clinic Service...Abortion Clinic in Kempton Park +27791653574 WhatsApp Abortion Clinic Service...
Abortion Clinic in Kempton Park +27791653574 WhatsApp Abortion Clinic Service...
mikehavy0
 
如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证
acoha1
 
Simplify hybrid data integration at an enterprise scale. Integrate all your d...
Simplify hybrid data integration at an enterprise scale. Integrate all your d...Simplify hybrid data integration at an enterprise scale. Integrate all your d...
Simplify hybrid data integration at an enterprise scale. Integrate all your d...
varanasisatyanvesh
 
如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证
acoha1
 
sourabh vyas1222222222222222222244444444
sourabh vyas1222222222222222222244444444sourabh vyas1222222222222222222244444444
sourabh vyas1222222222222222222244444444
saurabvyas476
 
Abortion pills in Jeddah |+966572737505 | get cytotec
Abortion pills in Jeddah |+966572737505 | get cytotecAbortion pills in Jeddah |+966572737505 | get cytotec
Abortion pills in Jeddah |+966572737505 | get cytotec
Abortion pills in Riyadh +966572737505 get cytotec
 
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
pwgnohujw
 
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
yulianti213969
 
一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格
一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格
一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格
q6pzkpark
 

Recently uploaded (20)

Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotecAbortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
 
Abortion Clinic in Kempton Park +27791653574 WhatsApp Abortion Clinic Service...
Abortion Clinic in Kempton Park +27791653574 WhatsApp Abortion Clinic Service...Abortion Clinic in Kempton Park +27791653574 WhatsApp Abortion Clinic Service...
Abortion Clinic in Kempton Park +27791653574 WhatsApp Abortion Clinic Service...
 
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
 
如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证
 
Predictive Precipitation: Advanced Rain Forecasting Techniques
Predictive Precipitation: Advanced Rain Forecasting TechniquesPredictive Precipitation: Advanced Rain Forecasting Techniques
Predictive Precipitation: Advanced Rain Forecasting Techniques
 
Harnessing the Power of GenAI for BI and Reporting.pptx
Harnessing the Power of GenAI for BI and Reporting.pptxHarnessing the Power of GenAI for BI and Reporting.pptx
Harnessing the Power of GenAI for BI and Reporting.pptx
 
社内勉強会資料_Object Recognition as Next Token Prediction
社内勉強会資料_Object Recognition as Next Token Prediction社内勉強会資料_Object Recognition as Next Token Prediction
社内勉強会資料_Object Recognition as Next Token Prediction
 
Simplify hybrid data integration at an enterprise scale. Integrate all your d...
Simplify hybrid data integration at an enterprise scale. Integrate all your d...Simplify hybrid data integration at an enterprise scale. Integrate all your d...
Simplify hybrid data integration at an enterprise scale. Integrate all your d...
 
如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证
 
DATA SUMMIT 24 Building Real-Time Pipelines With FLaNK
DATA SUMMIT 24  Building Real-Time Pipelines With FLaNKDATA SUMMIT 24  Building Real-Time Pipelines With FLaNK
DATA SUMMIT 24 Building Real-Time Pipelines With FLaNK
 
Seven tools of quality control.slideshare
Seven tools of quality control.slideshareSeven tools of quality control.slideshare
Seven tools of quality control.slideshare
 
sourabh vyas1222222222222222222244444444
sourabh vyas1222222222222222222244444444sourabh vyas1222222222222222222244444444
sourabh vyas1222222222222222222244444444
 
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
 
Abortion pills in Jeddah |+966572737505 | get cytotec
Abortion pills in Jeddah |+966572737505 | get cytotecAbortion pills in Jeddah |+966572737505 | get cytotec
Abortion pills in Jeddah |+966572737505 | get cytotec
 
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
 
Identify Rules that Predict Patient’s Heart Disease - An Application of Decis...
Identify Rules that Predict Patient’s Heart Disease - An Application of Decis...Identify Rules that Predict Patient’s Heart Disease - An Application of Decis...
Identify Rules that Predict Patient’s Heart Disease - An Application of Decis...
 
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
 
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
 
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptx
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptxRESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptx
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptx
 
一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格
一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格
一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格
 

Presentation Fingervein Authentication

  • 1.
  • 2.
  • 3. Guided by, Mrs.Minimol L Head of the department Mrs.Bhama Devi Class tutor Special thanks to, Mr.Arun T pillai Lecture Dept of computer
  • 4.  Introduction  Biometrics  Types of Biometrics  Finger vein authentication technology  Working  Comparison with other techniques  Applications  Conclusion  References
  • 5. The use of electronic systems in day today life is increasing. Identity theft is increasing and impact on society is growing. Majority identity fraud are bank card and financial account related. Information era is coming,People pay much more attention on the information security. Passwords and tokens are highly vulnerable to being lost or stolen. A weak or compromised password is the primary reason for the rising cases of security and data breaches. Passwords are the weakest link in an organization’s security system and even strong passwords cannot resist sophisticated hacker attacks. Further, the costs of maintaining password and token based systems are very high and inefficient.
  • 6. A human being is a single being,unique and unrepeatable. Biometrics refers to the measurement of biological characteristics unique to each individual for the purpose of verifying identity. Verification and identification are the two ways in which an individual’s identity can be determined using biometric technology. The global biometrics market is growing at an exponential rate and is forecasted to reach $23.54 billion by 2020.
  • 7.
  • 9. A promising biometric pattern for personal identification in terms of its Security and convenience. Takes only about 0.8 seconds to identify one input finger vein sample. It captures images of the vein pattern inside our finger. Like other biometric patterns it is unique,secure & virtually impossible to replicate.
  • 10. The working of finger vein detection and authentication is classified into four components: 1) Image Acquisition 2) Pre-Processing or Image Enhancement 3) Extraction 4) Matching
  • 12. Image Acquisition The pattern of blood vessels is captured by transmitting near infrared light at different angles through the finger usually the middle finger. The light is partially absorbed by the haemoglobin in the vein and the image is captured by the camera. If we shine near infrared (NIR) light through fingers, human tissues pass through most of them whereas haemoglobin in our blood blocks it.  Thus veins become visible darker in the image. The vein image of each finger has different properties such as brightness and contrast.
  • 13. Pre-Processing In image pre-processing the part of an image which is captured by the camera is cropped and the rest of the part is deleted. The cropped portion of that image is enhanced to achieve more clarity of the veins.
  • 14. Extraction The important step in finger-vein recognition is the vein extraction from the background. The finger-vein images are acquired by the use of NIR spectroscopy. The finger-vein image obtained from the NIR spectroscopy appears to be darker than the other regions of the finger. This is because the blood vessels alone will absorb the rays. The finger-vein patterns are extracted by calculating various parameters like vein Width, Length, Position, Pixels and Intersection points of vein. Then they are stored as featured templates
  • 15. Matching The users of this system need to register their vein patterns in the database. While matching two types of errors results in the finger-vein based biometric verification security system. The errors are false rejection rate and the false acceptance rate.False rejection is a claim that a genuine image is considered as impostor. False acceptance is a claim that an impostor image is considered as genuine. When the false rejection rate and the false acceptance rate are equal, then the performance of the system is evaluated as equal error rate.
  • 16.
  • 17. Accurate Rates for acceptance of false users or rejection of true users are among the lowest for biometric technologies, making finger vein authentication a reliable security solution. Unique vein patterns plus leading-edge technology means high accuracy rates (very low FTE, FRR and FAR). Small amount of data is required (400 bytes), allowing fast authentication (< 1 second) and increased portability. Fast Vein pattern matching is completed within the blink of an eye, affording users a speedy authentication experience without the hassle and without the wait.  Secure As finger vein patterns are found internally within the body, forgery is extremely difficult. Dryness or roughness on the surface of the skin also has no effect on the accuracy of vein pattern authentication.
  • 18. Small Finger vein authentication devices are compact and therefore applicable as embedded devices in a variety of applications. Non Traceable Veins are inside the body, invisible to the eye, and not accessible. Therefore, it is extremely difficult to forge and impossible to manipulate. The use of light transmission to gather biometric data means that the condition of the skin surface does not affect accurate processing. User-Friendly The vein patterns of each finger are unique, so each individual can register multiple fingers as "back-up" for authentication purposes. Registration is possible even for sweaty, oily or dirty fingers.
  • 19.
  • 20. Continuing…. PC Login PC users can now guard against illegitimate access or leakage of information on their computers by using the vein patterns in their fingers as their computer login. Identity Management -Single Sign on It gives users simple access to applications without the need for multiple passwords, and without compromising security. Time and Attendance An easy-to-use, Fast, accurate and system to record employees' hours of working and site security. Cashless Catering A cashless catering system greatly improves security, save money and time, increase efficiency and even help boost meal uptake. Banking and Finance This strengthens access control security by requiring two-factor authentication. Allowing identification of who is entering rooms within the building and to control access to computers and files is an essential element for all financial institutions.
  • 21. The proposed system can be implemented wherever the security is main consent such as military zones entry, confidential sectors, ATM centres etc. It can be embedded with various real time consumer applications like PCs (Personal Computers), cellular phones, vehicles, door access etc It can reduce computational complexity, improve security as well as low power consumption.