SlideShare a Scribd company logo
PALM VEIN TECHNOLOGY
What is biometrics??
Biometrics can be defined as
recognizing and identifying a
person based on
physiological or behavioral
characteristics
The behavioral
characteristics measure the
movement of a user, when
users walk, speak, type on a
keyboard or sign their name.
The physiological
characteristics would be the
physical human traits like
fingerprints, hand shape,
eyes and face, veins, etc
Disadvantages of other technologies
1 )Finger print
• Some people may feel offended about placing
their fingers on the same place where many
other people have continuously touched
• Wrong results if the finger is dirty.
2)Face recognition
• 2D recognition is affected by changes in
lighting, the person’s hair, the age ,and if the
person wear glasses.
Disadvantages of other technologies
1 )Finger print
• Some people may feel
offended about placing
their fingers on the same
place where many other
people have continuously
touched
• Wrong results if the finger is
dirty.
2)Face recognition
• 2D recognition is affected
by changes in lighting, the
person’s hair, the age ,and if
the person wear glasses.
• It also depends on orientation/angle of user’s
face with camera
3)IRIS scan
• Difficult to use because of positioning eye.
Requires more time for matching with database
stored
• Many commercial Iris scanners can be easily
fooled by a high quality image of an iris or face in
place of the real thing
INTRODUCTION
• Palm vein technology is the upcoming
technology in this world
• It is the worlds first contactless personal
identification system that uses the vein
pattern in human palm to confirm persons
identity
• It is one of the biometric authentication
technology, which identifies people by their
unique biological information
How does it work?
Simply hold your palm a few
centimeters over the scanner and with
a second it reads your unique vein
pattern .
when near-infrared light passes,
deoxygenated hemoglobin in the blood
flowing through the veins absorbs near-
infrared rays, causing it to be visible as
black regions to the scanner
• Then it compares it with the pre registered
one with the help of infra red rays
• Generated image is digitized,encrypted &
finally stored as a registered image template
in database
• If there is a match found then access is
allowed else access is denied
How secure is this technology?
• On the basis of testing the technology on more
than 70,000 individuals, Fujitsu declared that the
new system had a false rejection rate of 0.01%
• And a false acceptance rate of less than 0.00008%
(i.e., incorrect approval for access in one in over a
million scan
• And if you registered your profile as a child, itll
still be recognized as you grow, as an individuals
patterns of veins are established in utero
What happens if hands get damaged
• There may be a chance that the palm we had
registered may get damaged then we cannot use
this technology.
• During the time of registration we take the veins
of both the hands so that if one gets damaged we
can access through the second hand.
• When hand get damaged upto large extent we
can get veins because deeper into the hand veins
are obtained
Applications
• ATM & BANKING
• PERSONAL COMPUTERS
• HOSPITALS &LIBRARIES
ATM & BANKING
• The Bank of Tokyo launched its
“Super –IC Card”.
• This card combines the functions
of a bankcard, credit card,
electronic money and palm vein
authentication.
• This system is advantageous
because the customer’s
information is not stored at the
bank.
• To activate the palm vein
authentication function, the
customer brings the card and his
passbook and seal to the bank
counter where the customers
vein information is registered on
the card .
PERSONALCOMPUTERS
In personal computers palm vein technology can be
applied by inserting the vein sensor inside mouse or
on the keyboard. When power is supplied to system
the mouse/keyboard also gets power and the sensor
in the mouse/keyboard will be ready to sense palm
veins
IN HOSPITALS AND LIBRARYS
Palm Secure device can also be used in hospitals for
doctor and patient’s identification and where the high
level of security is required
ADVANTAGES
• This technology is,
— More Reliable, More Accurate
— Fast
— Small
— Relatively cheap to implemented and operate
• —No more problems of forgotten passwords
and id codes.
• —No two people in the world share a palm vein
pattern- even those of identical twins differ.
Conclusion
• Palm vein pattern authentication technology
developed by Fujitsu was being used in a wide range
• If this technology is introduced in our country we can
solve many problems such as password protection in
ATM , security in various fields and if we implement
this technology in government offices we can make
the employees to work according the government
timings. surely this technology will bring a revolution
in the field of science and technology in the near
future.

More Related Content

What's hot

Palm-Vein Technology
Palm-Vein TechnologyPalm-Vein Technology
Palm-Vein Technology
Papun Papun
 
palm vein technology and its applications
palm vein technology and its applicationspalm vein technology and its applications
palm vein technology and its applications
Akhil Kumar
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
Augustine Micahel
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology
Anurag Chitti
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
Manav Mittal
 
Palm vein new
Palm vein newPalm vein new
Palm vein new
Rohit Kumar
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
Dhara k
 
Biometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnologyBiometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnology
Sarvani Mallipeddi
 
PALM VEIN TECHNOLOGY
PALM VEIN TECHNOLOGYPALM VEIN TECHNOLOGY
PALM VEIN TECHNOLOGY
Sagar Pudi
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
Chitrachedu Dada Kalandar
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
Ashwani Kumar
 
Palm vein technology latest ppt
Palm vein technology latest pptPalm vein technology latest ppt
Palm vein technology latest ppt
vishesh2969
 
Palmvein ppt
Palmvein pptPalmvein ppt
Palmvein ppt
vedabobbala
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
sathyakawthar
 
Palmvein Technology
Palmvein TechnologyPalmvein Technology
Palmvein Technology
Sai Divya
 
Palmsecure
PalmsecurePalmsecure
Palmsecure
Arshad Shareef
 
Biometrics
BiometricsBiometrics
Biometrics
Adothu Ram Babu
 
Palm vein-technology.doc
Palm vein-technology.docPalm vein-technology.doc
Palm vein-technology.doc
Gadwal Mounika Mudhiraj
 
palm vein technology
palm vein technologypalm vein technology
palm vein technology
RAJASHREE B
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology
bhoovi1239
 

What's hot (20)

Palm-Vein Technology
Palm-Vein TechnologyPalm-Vein Technology
Palm-Vein Technology
 
palm vein technology and its applications
palm vein technology and its applicationspalm vein technology and its applications
palm vein technology and its applications
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Palm vein new
Palm vein newPalm vein new
Palm vein new
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
 
Biometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnologyBiometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnology
 
PALM VEIN TECHNOLOGY
PALM VEIN TECHNOLOGYPALM VEIN TECHNOLOGY
PALM VEIN TECHNOLOGY
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Palm vein technology latest ppt
Palm vein technology latest pptPalm vein technology latest ppt
Palm vein technology latest ppt
 
Palmvein ppt
Palmvein pptPalmvein ppt
Palmvein ppt
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Palmvein Technology
Palmvein TechnologyPalmvein Technology
Palmvein Technology
 
Palmsecure
PalmsecurePalmsecure
Palmsecure
 
Biometrics
BiometricsBiometrics
Biometrics
 
Palm vein-technology.doc
Palm vein-technology.docPalm vein-technology.doc
Palm vein-technology.doc
 
palm vein technology
palm vein technologypalm vein technology
palm vein technology
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology
 

Viewers also liked

Li fi technology
Li fi technologyLi fi technology
Li fi technology
swapnil bagul
 
1st part
1st part1st part
LI-FI Technology
LI-FI Technology LI-FI Technology
LI-FI Technology
Srinivasa Rao Gurram
 
DGCT Lifi-Light Fidelity
DGCT Lifi-Light Fidelity DGCT Lifi-Light Fidelity
DGCT Lifi-Light Fidelity
J S Vinoth
 
User story mapping workshop slideshare
User story mapping workshop slideshareUser story mapping workshop slideshare
User story mapping workshop slideshare
Pankaj Kanchankar
 
Li-Fi Vs. Wi-Fi (Light Fidelity Vs. Wireless Fiedlity)
Li-Fi Vs. Wi-Fi (Light Fidelity Vs. Wireless Fiedlity)Li-Fi Vs. Wi-Fi (Light Fidelity Vs. Wireless Fiedlity)
Li-Fi Vs. Wi-Fi (Light Fidelity Vs. Wireless Fiedlity)
Abhishek Shukla
 
Li-Fi Technology (Perfect slides)
Li-Fi Technology (Perfect slides)Li-Fi Technology (Perfect slides)
Li-Fi Technology (Perfect slides)
UzmaRuhy
 
Teaching Students with Emojis, Emoticons, & Textspeak
Teaching Students with Emojis, Emoticons, & TextspeakTeaching Students with Emojis, Emoticons, & Textspeak
Teaching Students with Emojis, Emoticons, & Textspeak
Shelly Sanchez Terrell
 

Viewers also liked (8)

Li fi technology
Li fi technologyLi fi technology
Li fi technology
 
1st part
1st part1st part
1st part
 
LI-FI Technology
LI-FI Technology LI-FI Technology
LI-FI Technology
 
DGCT Lifi-Light Fidelity
DGCT Lifi-Light Fidelity DGCT Lifi-Light Fidelity
DGCT Lifi-Light Fidelity
 
User story mapping workshop slideshare
User story mapping workshop slideshareUser story mapping workshop slideshare
User story mapping workshop slideshare
 
Li-Fi Vs. Wi-Fi (Light Fidelity Vs. Wireless Fiedlity)
Li-Fi Vs. Wi-Fi (Light Fidelity Vs. Wireless Fiedlity)Li-Fi Vs. Wi-Fi (Light Fidelity Vs. Wireless Fiedlity)
Li-Fi Vs. Wi-Fi (Light Fidelity Vs. Wireless Fiedlity)
 
Li-Fi Technology (Perfect slides)
Li-Fi Technology (Perfect slides)Li-Fi Technology (Perfect slides)
Li-Fi Technology (Perfect slides)
 
Teaching Students with Emojis, Emoticons, & Textspeak
Teaching Students with Emojis, Emoticons, & TextspeakTeaching Students with Emojis, Emoticons, & Textspeak
Teaching Students with Emojis, Emoticons, & Textspeak
 

Similar to palm vein technology

Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
Chitrachedu Dada Kalandar
 
palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologyppt
Naga Dinesh
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal
Akmal Hussain
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
Praween Lakra
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprint
Sagar Verma
 
Palm veim technology.pptx
Palm veim technology.pptxPalm veim technology.pptx
Palm veim technology.pptx
ShamamaIbtesam
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
Sudip Sadhukhan
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
scg121433
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
CoreGaming3
 
Biometrics
BiometricsBiometrics
Biometrics
Shivani Gautam
 
Biometrics
BiometricsBiometrics
Biometrics
shweta-sharma99
 
Biometrics
BiometricsBiometrics
Biometrics
shweta-sharma99
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition Technology
RutikBhoyar
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
mmubashirkhan
 
palm vein technology (1).pptx
palm vein technology (1).pptxpalm vein technology (1).pptx
palm vein technology (1).pptx
Pallavi Goli
 
Biometric by amin
Biometric by aminBiometric by amin
Biometric by amin
aminpathan11
 
It's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfIt's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdf
preethi3173
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
TrushaKyada
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
Vishak Illath veed
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
branjith
 

Similar to palm vein technology (20)

Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologyppt
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprint
 
Palm veim technology.pptx
Palm veim technology.pptxPalm veim technology.pptx
Palm veim technology.pptx
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition Technology
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
 
palm vein technology (1).pptx
palm vein technology (1).pptxpalm vein technology (1).pptx
palm vein technology (1).pptx
 
Biometric by amin
Biometric by aminBiometric by amin
Biometric by amin
 
It's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfIt's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdf
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 

Recently uploaded

Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
Techgropse Pvt.Ltd.
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 

Recently uploaded (20)

Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 

palm vein technology

  • 2. What is biometrics?? Biometrics can be defined as recognizing and identifying a person based on physiological or behavioral characteristics The behavioral characteristics measure the movement of a user, when users walk, speak, type on a keyboard or sign their name. The physiological characteristics would be the physical human traits like fingerprints, hand shape, eyes and face, veins, etc
  • 3. Disadvantages of other technologies 1 )Finger print • Some people may feel offended about placing their fingers on the same place where many other people have continuously touched • Wrong results if the finger is dirty. 2)Face recognition • 2D recognition is affected by changes in lighting, the person’s hair, the age ,and if the person wear glasses.
  • 4. Disadvantages of other technologies 1 )Finger print • Some people may feel offended about placing their fingers on the same place where many other people have continuously touched • Wrong results if the finger is dirty. 2)Face recognition • 2D recognition is affected by changes in lighting, the person’s hair, the age ,and if the person wear glasses.
  • 5. • It also depends on orientation/angle of user’s face with camera 3)IRIS scan • Difficult to use because of positioning eye. Requires more time for matching with database stored • Many commercial Iris scanners can be easily fooled by a high quality image of an iris or face in place of the real thing
  • 6. INTRODUCTION • Palm vein technology is the upcoming technology in this world • It is the worlds first contactless personal identification system that uses the vein pattern in human palm to confirm persons identity • It is one of the biometric authentication technology, which identifies people by their unique biological information
  • 7. How does it work? Simply hold your palm a few centimeters over the scanner and with a second it reads your unique vein pattern .
  • 8. when near-infrared light passes, deoxygenated hemoglobin in the blood flowing through the veins absorbs near- infrared rays, causing it to be visible as black regions to the scanner
  • 9. • Then it compares it with the pre registered one with the help of infra red rays • Generated image is digitized,encrypted & finally stored as a registered image template in database • If there is a match found then access is allowed else access is denied
  • 10. How secure is this technology? • On the basis of testing the technology on more than 70,000 individuals, Fujitsu declared that the new system had a false rejection rate of 0.01% • And a false acceptance rate of less than 0.00008% (i.e., incorrect approval for access in one in over a million scan • And if you registered your profile as a child, itll still be recognized as you grow, as an individuals patterns of veins are established in utero
  • 11. What happens if hands get damaged • There may be a chance that the palm we had registered may get damaged then we cannot use this technology. • During the time of registration we take the veins of both the hands so that if one gets damaged we can access through the second hand. • When hand get damaged upto large extent we can get veins because deeper into the hand veins are obtained
  • 12. Applications • ATM & BANKING • PERSONAL COMPUTERS • HOSPITALS &LIBRARIES
  • 13. ATM & BANKING • The Bank of Tokyo launched its “Super –IC Card”. • This card combines the functions of a bankcard, credit card, electronic money and palm vein authentication. • This system is advantageous because the customer’s information is not stored at the bank. • To activate the palm vein authentication function, the customer brings the card and his passbook and seal to the bank counter where the customers vein information is registered on the card .
  • 14. PERSONALCOMPUTERS In personal computers palm vein technology can be applied by inserting the vein sensor inside mouse or on the keyboard. When power is supplied to system the mouse/keyboard also gets power and the sensor in the mouse/keyboard will be ready to sense palm veins
  • 15. IN HOSPITALS AND LIBRARYS Palm Secure device can also be used in hospitals for doctor and patient’s identification and where the high level of security is required
  • 16. ADVANTAGES • This technology is, — More Reliable, More Accurate — Fast — Small — Relatively cheap to implemented and operate • —No more problems of forgotten passwords and id codes. • —No two people in the world share a palm vein pattern- even those of identical twins differ.
  • 17. Conclusion • Palm vein pattern authentication technology developed by Fujitsu was being used in a wide range • If this technology is introduced in our country we can solve many problems such as password protection in ATM , security in various fields and if we implement this technology in government offices we can make the employees to work according the government timings. surely this technology will bring a revolution in the field of science and technology in the near future.