This document discusses finger vein authentication technology. It begins with an introduction and overview of biometrics and finger vein authentication. It then describes the four components of finger vein detection and authentication: image acquisition, pre-processing, extraction, and matching. It highlights benefits of finger vein authentication such as accuracy, speed, security, compact size, and difficulty to forge. It concludes with examples of applications for finger vein authentication such as PC login, identity management, time/attendance tracking, cashless catering, banking, and access control for secure areas.
3. Guided by,
Mrs.Minimol L
Head of the department
Mrs.Bhama Devi
Class tutor
Special thanks to,
Mr.Arun T pillai
Lecture
Dept of computer
4. Introduction
Biometrics
Types of Biometrics
Finger vein authentication technology
Working
Comparison with other techniques
Applications
Conclusion
References
5. The use of electronic systems in day today life is increasing.
Identity theft is increasing and impact on society is growing.
Majority identity fraud are bank card and financial account
related.
Information era is coming,People pay much more attention on the
information security.
Passwords and tokens are highly vulnerable to being lost or
stolen. A weak or compromised password is the primary reason for
the rising cases of security and data breaches.
Passwords are the weakest link in an organization’s security
system and even strong passwords cannot resist sophisticated
hacker attacks. Further, the costs of maintaining password and
token based systems are very high and inefficient.
6. A human being is a single being,unique and
unrepeatable.
Biometrics refers to the measurement of
biological characteristics unique to each individual
for the purpose of verifying identity.
Verification and identification are the two ways
in which an individual’s identity can be
determined using biometric technology.
The global biometrics market is growing at an
exponential rate and is forecasted to reach $23.54
billion by 2020.
9. A promising biometric pattern for personal
identification in terms of its Security and
convenience.
Takes only about 0.8 seconds to identify one
input finger vein sample.
It captures images of the vein pattern inside
our finger.
Like other biometric patterns it is
unique,secure & virtually impossible to
replicate.
10. The working of finger vein detection and
authentication is classified into four components:
1) Image Acquisition
2) Pre-Processing or Image Enhancement
3) Extraction
4) Matching
12. Image Acquisition
The pattern of blood vessels is captured by
transmitting near infrared light at different
angles through the finger usually the middle
finger.
The light is partially absorbed by the
haemoglobin in the vein and the image is
captured by the camera.
If we shine near infrared (NIR) light
through fingers, human tissues pass through
most of them whereas haemoglobin in our
blood blocks it.
Thus veins become visible darker in the
image. The vein image of each finger has
different properties such as brightness and
contrast.
13. Pre-Processing
In image pre-processing the part
of an image which is captured by
the camera is cropped and the rest
of the part is deleted.
The cropped portion of that
image is enhanced to achieve more
clarity of the veins.
14. Extraction
The important step in finger-vein recognition is the vein extraction from the
background. The finger-vein images are acquired by the use of NIR
spectroscopy.
The finger-vein image obtained from the NIR spectroscopy appears to be
darker than the other regions of the finger. This is because the blood vessels
alone will absorb the rays.
The finger-vein patterns are extracted by calculating various parameters like
vein Width, Length, Position, Pixels and Intersection points of vein. Then they
are stored as featured templates
15. Matching
The users of this system need to register their vein patterns in the
database.
While matching two types of errors results in the finger-vein based
biometric verification security system.
The errors are false rejection rate and the false acceptance
rate.False rejection is a claim that a genuine image is considered as
impostor.
False acceptance is a claim that an impostor image is considered as
genuine.
When the false rejection rate and the false acceptance rate are
equal, then the performance of the system is evaluated as equal error
rate.
16.
17. Accurate
Rates for acceptance of false users or rejection of true users are
among the lowest for biometric technologies, making finger vein
authentication a reliable security solution. Unique vein patterns plus
leading-edge technology means high accuracy rates (very low FTE,
FRR and FAR). Small amount of data is required (400 bytes),
allowing fast authentication (< 1 second) and increased portability.
Fast
Vein pattern matching is completed within the blink of an eye,
affording users a speedy authentication experience without the hassle
and without the wait.
Secure
As finger vein patterns are found internally within the body, forgery
is extremely difficult. Dryness or roughness on the surface of the skin
also has no effect on the accuracy of vein pattern authentication.
18. Small
Finger vein authentication devices are compact and therefore
applicable as embedded devices in a variety of applications.
Non Traceable
Veins are inside the body, invisible to the eye, and not accessible.
Therefore, it is extremely difficult to forge and impossible to
manipulate. The use of light transmission to gather biometric data
means that the condition of the skin surface does not affect accurate
processing.
User-Friendly
The vein patterns of each finger are unique, so each individual can
register multiple fingers as "back-up" for authentication purposes.
Registration is possible even for sweaty, oily or dirty fingers.
19.
20. Continuing….
PC Login
PC users can now guard against illegitimate access or leakage of
information on their computers by using the vein patterns in their
fingers as their computer login.
Identity Management -Single Sign on
It gives users simple access to applications without the need for
multiple passwords, and without compromising security.
Time and Attendance
An easy-to-use, Fast, accurate and system to record employees' hours
of working and site security.
Cashless Catering
A cashless catering system greatly improves security, save money and
time, increase efficiency and even help boost meal uptake.
Banking and Finance
This strengthens access control security by requiring two-factor
authentication. Allowing identification of who is entering rooms
within the building and to control access to computers and files is an
essential element for all financial institutions.
21. The proposed system can be implemented wherever the
security is main consent such as military zones entry,
confidential sectors, ATM centres etc.
It can be embedded with various real time consumer
applications like PCs (Personal Computers), cellular phones,
vehicles, door access etc
It can reduce computational complexity, improve security
as well as low power consumption.