SlideShare a Scribd company logo
PALM VEIN TECHNOLOGY
SUBMITTED BY:
MANAV MITTAL
1
INTRODUCTION
• Palm vein technology is one of the upcoming
technology.
• It is the world’s first contactless personal
identification system that uses the vein patterns in
human palms to confirm a person’s identity.
• It is highly secure and accurate.
• The contact less feature gives it a hygienic advantage
over other biometric authentication technologies.
• It uses the vascular patterns of an individual’s palm as
personal identification data.
2
Our Current Security Measures
• Internal
– Building Access –
Magnetic Card
and Pin
– Computer Access
– User ID and
Password
• External
– Customer Access
– ATM card and
PIN
3
Technology + -
Fingerprint •Popular
•Cheapest
•Less Accurate
Voice •Non invasive •Least Accurate
Iris & Retinal •Very accurate •Invasive
•Expensive
•Sensitive
Palm Vein •Non-invasive
•Relatively Cheap
•Accurate
•Unfamiliar
source
source
source
Overview of Bio-Tech
4
HOW IT WORKS
•Takes snapshot of palm veins
•Converts into algorithm (ICP)
•Compares with database
source
5
PALM VEIN PAATTERN VERIFICATION SYSTEM
The thermal vein pattern verification system involves
the following stages:
• Image Acquisition
• Image enhancement
• Vein pattern segmentation
• Skeletonization
• Matching
6
User Interface
•Contactless
•Non-invasive
•2.18 seconds recognition
speed
source
7
• Available Software Development Kit
– Easy to integrate to current company
system
• Small
• Cheap to produce
• Easy to Install
• Wide range of operating condition
– Iris scanners are sensitive to light and
temp.
source
8
Data Flow
9
Accuracy
TECHNOLOGY
FALSE ACCEPTANCE
RATE
FALSE REJECTION
RATE
PalmSecure .00008% .01%
Fingerprint 1-2% 3%
Iris .0001% - .94% .99% - .2%
Voice 2% 10%
• Vein patterns
– Distinctive and unique to individuals, even left and right hands.
– Difficult to steal or forge
• False acceptance rate
– A rate at which someone other than the actual person is falsely recognized.
• False rejection rate
– A rate at which the actual person is not recognized accurately.
10
In comparison with others
technology
*note – Chart created using average of data provided by the Table
11
Security Evaluation
There are several common methods of attacking the system
• Spoofing attacks
• Replay and transmission attacks
Known methods of improving security of biometric system
a. Multimodal biometric system
b. Biometrics combined with password
c. Watermarking
12
Practical Applications
Portable Mouse
ATM Machine
• ‘Palm Secure’ is now widely
used in various fields.
– ATM
• 92% of all Japanese ATMs
• 18,000+ ATM machines for
Bank of Tokyo - Mitsubishi
– School ID, Entry Key to
private property, Log-in to
PCs or servers
– Potential is limitless
• PalmSecure mouse with a
build-in sensor in 2007
– easily installed to personal
computer.
13
• Hidden characteristics are used as biometric features.
• It is difficult to forge for intruders.
• It is not affected by dryness or roughness of skin or by
physical injury on surface of the hand.
• It has an FRR of 0.01% and FAR of less than 0.00008%.
This is based on experiments conducted on 70,000
individuals in Japan.
• This technology is non-intrusive.
ADVANTAGES
14
• There are numerous factors that can affect the
quality of the captured image such as body
temperature, humidity, heat radiation, nearness of
vein to surface, camera calibration and focus.
• It is still relatively expensive and not available for
mass production yet.
DISADVANTAGES
15
CONCLUSION
Palm vein pattern recognition is a convenient and
easy to use biometric technology with high security
and accuracy level.
The technology is gaining momentum but it is still
expensive and relatively untested because it has not
yet been marketed globally.
16
QUESTIONS???
17
End of the Presentation
Thank You.
18

More Related Content

What's hot

Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology
Anurag Chitti
 
palm vein technology and its applications
palm vein technology and its applicationspalm vein technology and its applications
palm vein technology and its applications
Akhil Kumar
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
sathyakawthar
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal
Akmal Hussain
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
International Journal of Engineering Inventions www.ijeijournal.com
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
Ashwani Kumar
 
biometric technology
biometric technologybiometric technology
biometric technology
RAHUL SRIVASTAVA
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
Augustine Micahel
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
Ashwani Kumar
 
Design and development of dorsal hand vein recognition biometric system usin...
Design and development of dorsal hand vein recognition  biometric system usin...Design and development of dorsal hand vein recognition  biometric system usin...
Design and development of dorsal hand vein recognition biometric system usin...
Raghavendra DC
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
Alfred Oboi
 
Presentation Fingervein Authentication
Presentation Fingervein AuthenticationPresentation Fingervein Authentication
Presentation Fingervein Authentication
ANEESH SASIDHARAN
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
sravya raju
 
implementation of finger vein authentication technique
implementation of finger vein authentication techniqueimplementation of finger vein authentication technique
implementation of finger vein authentication technique
Viraj Rajopadhye
 
Bio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdkBio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdk
Mahesh Shitole
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
ranjit banshpal
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
Sudip Sadhukhan
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
Pavan Kumar MT
 
Biometrics
BiometricsBiometrics
Biometrics
King Kamal
 
Finger vein technology
Finger vein technologyFinger vein technology
Finger vein technology
Shamili Nookala
 

What's hot (20)

Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology
 
palm vein technology and its applications
palm vein technology and its applicationspalm vein technology and its applications
palm vein technology and its applications
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Design and development of dorsal hand vein recognition biometric system usin...
Design and development of dorsal hand vein recognition  biometric system usin...Design and development of dorsal hand vein recognition  biometric system usin...
Design and development of dorsal hand vein recognition biometric system usin...
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
 
Presentation Fingervein Authentication
Presentation Fingervein AuthenticationPresentation Fingervein Authentication
Presentation Fingervein Authentication
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
implementation of finger vein authentication technique
implementation of finger vein authentication techniqueimplementation of finger vein authentication technique
implementation of finger vein authentication technique
 
Bio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdkBio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdk
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
 
Biometrics
BiometricsBiometrics
Biometrics
 
Finger vein technology
Finger vein technologyFinger vein technology
Finger vein technology
 

Viewers also liked

PPT (2)
PPT (2)PPT (2)
PALM VEIN TECHNOLOGY
PALM VEIN TECHNOLOGYPALM VEIN TECHNOLOGY
PALM VEIN TECHNOLOGY
Sagar Pudi
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
Bhavin Solanki
 
Plam vein technology
Plam vein technologyPlam vein technology
Plam vein technology
Dinesh Ediga
 
Elliptic Curve Cryptography: Arithmetic behind
Elliptic Curve Cryptography: Arithmetic behindElliptic Curve Cryptography: Arithmetic behind
Elliptic Curve Cryptography: Arithmetic behind
Ayan Sengupta
 
Elliptic curvecryptography Shane Almeida Saqib Awan Dan Palacio
Elliptic curvecryptography Shane Almeida Saqib Awan Dan PalacioElliptic curvecryptography Shane Almeida Saqib Awan Dan Palacio
Elliptic curvecryptography Shane Almeida Saqib Awan Dan Palacio
Information Security Awareness Group
 
ECC vs RSA: Battle of the Crypto-Ninjas
ECC vs RSA: Battle of the Crypto-NinjasECC vs RSA: Battle of the Crypto-Ninjas
ECC vs RSA: Battle of the Crypto-Ninjas
James McGivern
 
Elliptic Curves and Elliptic Curve Cryptography
Elliptic Curves and Elliptic Curve CryptographyElliptic Curves and Elliptic Curve Cryptography
Elliptic Curves and Elliptic Curve Cryptography
Md. Al-Amin Khandaker Nipu
 
Palmvein ppt
Palmvein pptPalmvein ppt
Palmvein ppt
vedabobbala
 
Elliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge ProofElliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge Proof
Arunanand Ta
 
Matrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein ReaderMatrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein Reader
lissapenas123
 
Night Vision Technology.Final
Night Vision Technology.FinalNight Vision Technology.Final
Night Vision Technology.Final
pratik665
 
Blue Brain
Blue Brain Blue Brain
Blue Brain
Nikhil Vyas
 
NIGHT VISION TECHNOLOGY
NIGHT VISION TECHNOLOGYNIGHT VISION TECHNOLOGY
NIGHT VISION TECHNOLOGY
Mihika Shah
 
Night vision technology ppt
Night vision technology pptNight vision technology ppt
Night vision technology ppt
Ekta Singh
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
Ankita Vanage
 
Seminar on night vision technology ppt
Seminar on night vision technology pptSeminar on night vision technology ppt
Seminar on night vision technology ppt
deepakmarndi
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
Mandy Suzanne
 

Viewers also liked (18)

PPT (2)
PPT (2)PPT (2)
PPT (2)
 
PALM VEIN TECHNOLOGY
PALM VEIN TECHNOLOGYPALM VEIN TECHNOLOGY
PALM VEIN TECHNOLOGY
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
Plam vein technology
Plam vein technologyPlam vein technology
Plam vein technology
 
Elliptic Curve Cryptography: Arithmetic behind
Elliptic Curve Cryptography: Arithmetic behindElliptic Curve Cryptography: Arithmetic behind
Elliptic Curve Cryptography: Arithmetic behind
 
Elliptic curvecryptography Shane Almeida Saqib Awan Dan Palacio
Elliptic curvecryptography Shane Almeida Saqib Awan Dan PalacioElliptic curvecryptography Shane Almeida Saqib Awan Dan Palacio
Elliptic curvecryptography Shane Almeida Saqib Awan Dan Palacio
 
ECC vs RSA: Battle of the Crypto-Ninjas
ECC vs RSA: Battle of the Crypto-NinjasECC vs RSA: Battle of the Crypto-Ninjas
ECC vs RSA: Battle of the Crypto-Ninjas
 
Elliptic Curves and Elliptic Curve Cryptography
Elliptic Curves and Elliptic Curve CryptographyElliptic Curves and Elliptic Curve Cryptography
Elliptic Curves and Elliptic Curve Cryptography
 
Palmvein ppt
Palmvein pptPalmvein ppt
Palmvein ppt
 
Elliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge ProofElliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge Proof
 
Matrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein ReaderMatrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein Reader
 
Night Vision Technology.Final
Night Vision Technology.FinalNight Vision Technology.Final
Night Vision Technology.Final
 
Blue Brain
Blue Brain Blue Brain
Blue Brain
 
NIGHT VISION TECHNOLOGY
NIGHT VISION TECHNOLOGYNIGHT VISION TECHNOLOGY
NIGHT VISION TECHNOLOGY
 
Night vision technology ppt
Night vision technology pptNight vision technology ppt
Night vision technology ppt
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Seminar on night vision technology ppt
Seminar on night vision technology pptSeminar on night vision technology ppt
Seminar on night vision technology ppt
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Similar to Palm Vein Technology

49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx
ssuserb46d43
 
Computer science ppt
Computer science pptComputer science ppt
Computer science ppt
brijesh kumar
 
finger print based door lock.pptx
finger print based door lock.pptxfinger print based door lock.pptx
finger print based door lock.pptx
Pooja541216
 
Palmvein authentication
Palmvein authenticationPalmvein authentication
Palmvein authentication
Sufiyan Arab
 
Palm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentationPalm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentation
gagana5017
 
Bank locker system
Bank locker systemBank locker system
Bank locker system
Rahul Wagh
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint Technology
Joy Dutta
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprint
Sagar Verma
 
palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologyppt
Naga Dinesh
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)
Palak Pandoh
 
project ppt.pptx
project ppt.pptxproject ppt.pptx
project ppt.pptx
BhavanaKs10
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
Jeffrey Funk
 
Atm using finger print
Atm using finger printAtm using finger print
Atm using finger print
Manoranjan Roy
 
Access controls
Access controlsAccess controls
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffffSeminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
kantharajubn600
 
Bio metric security
Bio metric securityBio metric security
Bio metric security
Mohamed Safraz
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
branjith
 
Finger print ATM
Finger print ATMFinger print ATM
Finger print ATM
Ankan Biswas
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
IJRTEMJOURNAL
 
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
inventionjournals
 

Similar to Palm Vein Technology (20)

49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx
 
Computer science ppt
Computer science pptComputer science ppt
Computer science ppt
 
finger print based door lock.pptx
finger print based door lock.pptxfinger print based door lock.pptx
finger print based door lock.pptx
 
Palmvein authentication
Palmvein authenticationPalmvein authentication
Palmvein authentication
 
Palm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentationPalm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentation
 
Bank locker system
Bank locker systemBank locker system
Bank locker system
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint Technology
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprint
 
palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologyppt
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)
 
project ppt.pptx
project ppt.pptxproject ppt.pptx
project ppt.pptx
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 
Atm using finger print
Atm using finger printAtm using finger print
Atm using finger print
 
Access controls
Access controlsAccess controls
Access controls
 
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffffSeminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
 
Bio metric security
Bio metric securityBio metric security
Bio metric security
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
Finger print ATM
Finger print ATMFinger print ATM
Finger print ATM
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
 

More from Manav Mittal

Intelligent road roller
Intelligent road rollerIntelligent road roller
Intelligent road roller
Manav Mittal
 
Scada monitoring system
Scada monitoring systemScada monitoring system
Scada monitoring system
Manav Mittal
 
Green computing
Green computingGreen computing
Green computing
Manav Mittal
 
Moving object detection
Moving object detectionMoving object detection
Moving object detection
Manav Mittal
 
NTPC training
NTPC trainingNTPC training
NTPC training
Manav Mittal
 
Siemag training
Siemag trainingSiemag training
Siemag training
Manav Mittal
 
Electronic Walking Stick
Electronic Walking StickElectronic Walking Stick
Electronic Walking Stick
Manav Mittal
 

More from Manav Mittal (7)

Intelligent road roller
Intelligent road rollerIntelligent road roller
Intelligent road roller
 
Scada monitoring system
Scada monitoring systemScada monitoring system
Scada monitoring system
 
Green computing
Green computingGreen computing
Green computing
 
Moving object detection
Moving object detectionMoving object detection
Moving object detection
 
NTPC training
NTPC trainingNTPC training
NTPC training
 
Siemag training
Siemag trainingSiemag training
Siemag training
 
Electronic Walking Stick
Electronic Walking StickElectronic Walking Stick
Electronic Walking Stick
 

Recently uploaded

Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
Techgropse Pvt.Ltd.
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 

Palm Vein Technology

  • 1. PALM VEIN TECHNOLOGY SUBMITTED BY: MANAV MITTAL 1
  • 2. INTRODUCTION • Palm vein technology is one of the upcoming technology. • It is the world’s first contactless personal identification system that uses the vein patterns in human palms to confirm a person’s identity. • It is highly secure and accurate. • The contact less feature gives it a hygienic advantage over other biometric authentication technologies. • It uses the vascular patterns of an individual’s palm as personal identification data. 2
  • 3. Our Current Security Measures • Internal – Building Access – Magnetic Card and Pin – Computer Access – User ID and Password • External – Customer Access – ATM card and PIN 3
  • 4. Technology + - Fingerprint •Popular •Cheapest •Less Accurate Voice •Non invasive •Least Accurate Iris & Retinal •Very accurate •Invasive •Expensive •Sensitive Palm Vein •Non-invasive •Relatively Cheap •Accurate •Unfamiliar source source source Overview of Bio-Tech 4
  • 5. HOW IT WORKS •Takes snapshot of palm veins •Converts into algorithm (ICP) •Compares with database source 5
  • 6. PALM VEIN PAATTERN VERIFICATION SYSTEM The thermal vein pattern verification system involves the following stages: • Image Acquisition • Image enhancement • Vein pattern segmentation • Skeletonization • Matching 6
  • 8. • Available Software Development Kit – Easy to integrate to current company system • Small • Cheap to produce • Easy to Install • Wide range of operating condition – Iris scanners are sensitive to light and temp. source 8
  • 10. Accuracy TECHNOLOGY FALSE ACCEPTANCE RATE FALSE REJECTION RATE PalmSecure .00008% .01% Fingerprint 1-2% 3% Iris .0001% - .94% .99% - .2% Voice 2% 10% • Vein patterns – Distinctive and unique to individuals, even left and right hands. – Difficult to steal or forge • False acceptance rate – A rate at which someone other than the actual person is falsely recognized. • False rejection rate – A rate at which the actual person is not recognized accurately. 10
  • 11. In comparison with others technology *note – Chart created using average of data provided by the Table 11
  • 12. Security Evaluation There are several common methods of attacking the system • Spoofing attacks • Replay and transmission attacks Known methods of improving security of biometric system a. Multimodal biometric system b. Biometrics combined with password c. Watermarking 12
  • 13. Practical Applications Portable Mouse ATM Machine • ‘Palm Secure’ is now widely used in various fields. – ATM • 92% of all Japanese ATMs • 18,000+ ATM machines for Bank of Tokyo - Mitsubishi – School ID, Entry Key to private property, Log-in to PCs or servers – Potential is limitless • PalmSecure mouse with a build-in sensor in 2007 – easily installed to personal computer. 13
  • 14. • Hidden characteristics are used as biometric features. • It is difficult to forge for intruders. • It is not affected by dryness or roughness of skin or by physical injury on surface of the hand. • It has an FRR of 0.01% and FAR of less than 0.00008%. This is based on experiments conducted on 70,000 individuals in Japan. • This technology is non-intrusive. ADVANTAGES 14
  • 15. • There are numerous factors that can affect the quality of the captured image such as body temperature, humidity, heat radiation, nearness of vein to surface, camera calibration and focus. • It is still relatively expensive and not available for mass production yet. DISADVANTAGES 15
  • 16. CONCLUSION Palm vein pattern recognition is a convenient and easy to use biometric technology with high security and accuracy level. The technology is gaining momentum but it is still expensive and relatively untested because it has not yet been marketed globally. 16
  • 18. End of the Presentation Thank You. 18

Editor's Notes

  1. Henrik
  2. Richard
  3. Iris scanners are sensitive to light and temp.Richard
  4. Richard
  5. YooJin
  6. YooJin
  7. YooJin