SlideShare a Scribd company logo
1 of 9
Introduction to Techsphere Hand   V ascular  P attern   R ecognition
[object Object],[object Object],[object Object],[object Object],Biometrics  01 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
VP-ll System 02 1. Best usability -VP-II technology provides ultimate system  Usability of  99.98% -Verification Speed:  0.4sec/person 2. Robustness to Forgery -Vascular pattern does not leave residual pattern as it is the  only feature which is located inside of human body.  3. Psychological acceptance -Out of a poll of more than a thousand users who have experienced multiple biometric technologies, VP-II system has been chosen as  psychologically the most well accepted system. 4. Robustness to inferior environment -VP-II system demonstrates its  great tolerance in harsh environment,  such as construction sites, army, factories, etc.
03 Algorithm * ISO/IEC 19794-9 (Published in 2007) Information technology: Biometric data interchange formats – Part 9: Vascular image data VP-II system obtains the vascular pattern image as the highest quality applying HVPE (Hand Vascular Pattern Emphasizing) algorithm  for compensating the weak vascular vessel images and enhancing the pattern recognition performance.   Process for extracting vascular pattern information Vascular Pattern Encryption and Storing VP-II encrypt the features by AES algorithm and store with ISO 19794-9 CBEFF  international standards. Back-of-hand Raw image Enhanced vascular pattern Feature Points
04 Specification ,[object Object],[object Object],[object Object],[object Object],▶ ▶ ▶ ,[object Object],[object Object]
Reference sites 05 > Travel & Transportation > Finance & Banking
06 > Government > IBS Reference sites
07 > Construction > Hospital > Private Security Reference sites
> School 08 Reference sites

More Related Content

Viewers also liked (20)

Bizcrowd Google+ Growth Report
Bizcrowd Google+ Growth ReportBizcrowd Google+ Growth Report
Bizcrowd Google+ Growth Report
 
revista microsoft
revista microsoftrevista microsoft
revista microsoft
 
Presentación ¿Que es ratealo?
Presentación ¿Que es ratealo?Presentación ¿Que es ratealo?
Presentación ¿Que es ratealo?
 
Trabajit000 de eilencita )
Trabajit000 de eilencita )Trabajit000 de eilencita )
Trabajit000 de eilencita )
 
Tigre blanco
Tigre blancoTigre blanco
Tigre blanco
 
WorldCat Local Webinar WSULibs May2011
WorldCat Local Webinar WSULibs May2011WorldCat Local Webinar WSULibs May2011
WorldCat Local Webinar WSULibs May2011
 
εικονες ελλαδα
εικονες ελλαδαεικονες ελλαδα
εικονες ελλαδα
 
Tutorial 3
Tutorial 3Tutorial 3
Tutorial 3
 
Examen quimica
Examen quimicaExamen quimica
Examen quimica
 
Paola2
Paola2Paola2
Paola2
 
Nascita
NascitaNascita
Nascita
 
graficas
graficas graficas
graficas
 
Hera
HeraHera
Hera
 
Feliz navidad
Feliz navidadFeliz navidad
Feliz navidad
 
La prosodia
La prosodiaLa prosodia
La prosodia
 
Potenciales de acción cardiacos
Potenciales de acción cardiacosPotenciales de acción cardiacos
Potenciales de acción cardiacos
 
Mun abraham adrian_matias_duran_sampol_fernandez_guillermofrancisco_usbfirewi...
Mun abraham adrian_matias_duran_sampol_fernandez_guillermofrancisco_usbfirewi...Mun abraham adrian_matias_duran_sampol_fernandez_guillermofrancisco_usbfirewi...
Mun abraham adrian_matias_duran_sampol_fernandez_guillermofrancisco_usbfirewi...
 
Debate
DebateDebate
Debate
 
Antiguo regimen
Antiguo regimenAntiguo regimen
Antiguo regimen
 
Fitbit form S1 IPO
Fitbit form S1 IPOFitbit form S1 IPO
Fitbit form S1 IPO
 

Similar to 090422 Techsphere X

VP-II X VascularBiometrics
VP-II X VascularBiometricsVP-II X VascularBiometrics
VP-II X VascularBiometrics기성 문
 
Identica Vascular Biometrics
Identica Vascular BiometricsIdentica Vascular Biometrics
Identica Vascular Biometricsatmaiv64
 
Palmvein Technology
Palmvein TechnologyPalmvein Technology
Palmvein TechnologySai Divya
 
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUEPALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUEJournal For Research
 
Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)Bhargav Amin
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and SecurityShreyans Jain
 
CSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxCSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxLol36
 
Infrared Vein Detection System For Person Identification – An Image Processin...
Infrared Vein Detection System For Person Identification – An Image Processin...Infrared Vein Detection System For Person Identification – An Image Processin...
Infrared Vein Detection System For Person Identification – An Image Processin...IRJET Journal
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology bhoovi1239
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEMxiaomi5
 
ITU Standardization of Telebiometric applications
ITU Standardization of Telebiometric applications ITU Standardization of Telebiometric applications
ITU Standardization of Telebiometric applications ITU
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)JIEMS Akkalkuwa
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition TechnologyRutikBhoyar
 
Imagus_Whitepaper_250515
Imagus_Whitepaper_250515Imagus_Whitepaper_250515
Imagus_Whitepaper_250515Melissa Olsen
 

Similar to 090422 Techsphere X (20)

VP-II X VascularBiometrics
VP-II X VascularBiometricsVP-II X VascularBiometrics
VP-II X VascularBiometrics
 
Identica Vascular Biometrics
Identica Vascular BiometricsIdentica Vascular Biometrics
Identica Vascular Biometrics
 
Palmvein Technology
Palmvein TechnologyPalmvein Technology
Palmvein Technology
 
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUEPALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
 
Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
J1076975
J1076975J1076975
J1076975
 
Security
SecuritySecurity
Security
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and Security
 
CSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxCSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptx
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
 
Infrared Vein Detection System For Person Identification – An Image Processin...
Infrared Vein Detection System For Person Identification – An Image Processin...Infrared Vein Detection System For Person Identification – An Image Processin...
Infrared Vein Detection System For Person Identification – An Image Processin...
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEM
 
ITU Standardization of Telebiometric applications
ITU Standardization of Telebiometric applications ITU Standardization of Telebiometric applications
ITU Standardization of Telebiometric applications
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition Technology
 
Imagus_Whitepaper_250515
Imagus_Whitepaper_250515Imagus_Whitepaper_250515
Imagus_Whitepaper_250515
 

Recently uploaded

Navigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiNavigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiRaviKumarDaparthi
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxMasterG
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxMarkSteadman7
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهMohamed Sweelam
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfOverkill Security
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfAnubhavMangla3
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)Wonjun Hwang
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 

Recently uploaded (20)

Navigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiNavigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi Daparthi
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 

090422 Techsphere X

  • 1. Introduction to Techsphere Hand V ascular P attern R ecognition
  • 2.
  • 3. VP-ll System 02 1. Best usability -VP-II technology provides ultimate system Usability of 99.98% -Verification Speed: 0.4sec/person 2. Robustness to Forgery -Vascular pattern does not leave residual pattern as it is the only feature which is located inside of human body. 3. Psychological acceptance -Out of a poll of more than a thousand users who have experienced multiple biometric technologies, VP-II system has been chosen as psychologically the most well accepted system. 4. Robustness to inferior environment -VP-II system demonstrates its great tolerance in harsh environment, such as construction sites, army, factories, etc.
  • 4. 03 Algorithm * ISO/IEC 19794-9 (Published in 2007) Information technology: Biometric data interchange formats – Part 9: Vascular image data VP-II system obtains the vascular pattern image as the highest quality applying HVPE (Hand Vascular Pattern Emphasizing) algorithm for compensating the weak vascular vessel images and enhancing the pattern recognition performance. Process for extracting vascular pattern information Vascular Pattern Encryption and Storing VP-II encrypt the features by AES algorithm and store with ISO 19794-9 CBEFF international standards. Back-of-hand Raw image Enhanced vascular pattern Feature Points
  • 5.
  • 6. Reference sites 05 > Travel & Transportation > Finance & Banking
  • 7. 06 > Government > IBS Reference sites
  • 8. 07 > Construction > Hospital > Private Security Reference sites
  • 9. > School 08 Reference sites