SlideShare a Scribd company logo
AVANTHI SCIENTIFIC AND TECHNOLIGICAL REASEARCH
ACADAMY
ELECTRICAL & ELECTRONICS ENGINEERING
PRESENTED BY:-
T.HEMANTH REDDY
20PT5A0244.
PALM VEIN TECHNOLOGY
CONTENTS
•INTRODUTION
•OVERVIEW OF BIOMETRICS
•WHAT IS PALM VEIN TECHNOLOGY?
•HOW DOES THE PALM VEIN RECOGNITION
SYSTEM WORK?
•APPLICATIONS
•ADVANTAGES
•DISADVANTAGES
•CONCLUSION
•REFERENCES
INTODUCTION
•In the present network society, where individuals can easily access
their information any time and anywhere.
•People are also faced with the risk that others can easily access the
same information anytime and anywhere.
•Currently, passwords, identification cards are used for personal
identification.
•However, cards can be stolen, and passwords and numbers can be
guessed or forgotten.
OVERVIEW OF BIOMETRICS
Technology + -
Fingerprint •Popular
•Cheapest
•Less Accurate
Voice •Non invasive •Least Accurate
Iris & Retinal •Very accurate •Invasive
•Expensive
•Sensitive
Palm Vein •Non-invasive
•Relatively Cheap
•Accurate
•Unfamiliar
WHAT IS PALM VEIN TECHNOLOGY???
• Palm vein technologies are one of the technologies which is
highly secure.
• Palm vein authentication works by comparing the pattern of veins
in the palm of a person being authenticated with a pattern stored
in a database.
• In this technology ONE’S PALM is used as
the “PASSWORD” for verification
• The venis present in the palm of the
individual are scanned and verified thus
providing the access
Working of palm vein recognization system
 Simply hold your palm a few centimeters over the scanner.
 Sensor scans vein patterns.
 Vein pattern along with personal details are stored in database.
What happens if the registered palm gets damaged?
• There may be a chance that the palm we had registered may
get damaged then we cannot use this technology.
• So during the time of registration we take the veins of both the
hands so that if one gets damaged we can access through the
second hand.
• When we apply this method we can maintain complete privacy .
APPLICATIONS
• ATM’s
• BANKS
• PERSONAL COMPUTERS
• HOSPITALS
• LIBRARY
• AUTHENTICATION
ADVANTAGES
•Vein patterns are not easily manipulated, observed, damaged or
changed.
•Palm veins are most complex & present inside the superficial skin.
So impossible to copy the palm veins.
•It is highly secure and accurate.
•This technology is also fast and easy to install.
DISADVANTAGES
•There are numerous factors that can affect the quality of the
captured image.
•For example body temperature, heat radiation, humidity, nearness
of vein to surface, camera,calibration, humidity and focus.
•It is relatively expensive.
• Palm vein pattern recognition is a convenient
and easy to use biometric technology with high security and
accuracy level.
• Surely this technology will bring a revolution in the field of
science and technology in the near future.
CONCLUSION
PALM VEIN TECHNOLOGY..ppt

More Related Content

What's hot

Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
Mohammad Azhar
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
sathyakawthar
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal
Akmal Hussain
 
ECG BIOMETRICS
ECG BIOMETRICSECG BIOMETRICS
ECG BIOMETRICS
Alpana Ingale
 
Eye Movement based Human Computer Interaction Technique
Eye Movement based Human Computer Interaction TechniqueEye Movement based Human Computer Interaction Technique
Eye Movement based Human Computer Interaction Technique
Jobin George
 
Finger print based door access system
Finger print based door access systemFinger print based door access system
Finger print based door access system
Akshay Govekar
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
prachi
 
ATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSM
Alpesh Kurhade
 
palm vein technology and its applications
palm vein technology and its applicationspalm vein technology and its applications
palm vein technology and its applications
Akhil Kumar
 
gsk Invisible eye advanced security system ppt
gsk Invisible eye advanced security system pptgsk Invisible eye advanced security system ppt
gsk Invisible eye advanced security system ppt
G Santhosh kumar gsk
 
Fingerprint Based Security System
Fingerprint Based Security SystemFingerprint Based Security System
Fingerprint Based Security System
Trijendra Singh
 
biometric technology
biometric technologybiometric technology
biometric technology
Anmol Bagga
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
International Journal of Engineering Inventions www.ijeijournal.com
 
Palm vein technology.pptx
Palm vein technology.pptxPalm vein technology.pptx
Palm vein technology.pptx
schetan202
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
Dhara k
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
Manav Mittal
 
Invisible Eye
Invisible EyeInvisible Eye
Invisible Eye
Vikas Yadav
 
Biometric security system
Biometric security systemBiometric security system
Biometric security system
Mithun Paul
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
Pavan Kumar MT
 
biometrics and cyber security
biometrics and cyber securitybiometrics and cyber security
biometrics and cyber security
Karthiga Manisekaran
 

What's hot (20)

Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal
 
ECG BIOMETRICS
ECG BIOMETRICSECG BIOMETRICS
ECG BIOMETRICS
 
Eye Movement based Human Computer Interaction Technique
Eye Movement based Human Computer Interaction TechniqueEye Movement based Human Computer Interaction Technique
Eye Movement based Human Computer Interaction Technique
 
Finger print based door access system
Finger print based door access systemFinger print based door access system
Finger print based door access system
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
ATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSM
 
palm vein technology and its applications
palm vein technology and its applicationspalm vein technology and its applications
palm vein technology and its applications
 
gsk Invisible eye advanced security system ppt
gsk Invisible eye advanced security system pptgsk Invisible eye advanced security system ppt
gsk Invisible eye advanced security system ppt
 
Fingerprint Based Security System
Fingerprint Based Security SystemFingerprint Based Security System
Fingerprint Based Security System
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
 
Palm vein technology.pptx
Palm vein technology.pptxPalm vein technology.pptx
Palm vein technology.pptx
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Invisible Eye
Invisible EyeInvisible Eye
Invisible Eye
 
Biometric security system
Biometric security systemBiometric security system
Biometric security system
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
 
biometrics and cyber security
biometrics and cyber securitybiometrics and cyber security
biometrics and cyber security
 

Similar to PALM VEIN TECHNOLOGY..ppt

1.palm vein technology(final)
1.palm vein technology(final)1.palm vein technology(final)
1.palm vein technology(final)
Ojal Katiyar
 
49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx
ssuserb46d43
 
Seguridad de la Información y Controles contra Hackers - Getting hacked 101 ...
Seguridad de la Información y Controles contra Hackers - Getting hacked 101  ...Seguridad de la Información y Controles contra Hackers - Getting hacked 101  ...
Seguridad de la Información y Controles contra Hackers - Getting hacked 101 ...
Asociación de Ejecutivos de Cooperativas de Puerto Rico
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology
Anurag Chitti
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
Augustine Micahel
 
palm vein technology
palm vein technologypalm vein technology
palm vein technology
Srinivasa Rao Gurram
 
Palm vein Technology
Palm vein TechnologyPalm vein Technology
Palm vein Technology
Srinivasa Rao Gurram
 
palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologyppt
Naga Dinesh
 
palm vein technology (1).pptx
palm vein technology (1).pptxpalm vein technology (1).pptx
palm vein technology (1).pptx
Pallavi Goli
 
Palmsecure
PalmsecurePalmsecure
Palmsecure
Arshad Shareef
 
Biometrics
BiometricsBiometrics
Biometrics
Don Caeiro
 
1 ICT in Society
1 ICT in Society1 ICT in Society
1 ICT in Society
Cik Na Shohaili
 
experience_and_perspective_of_security_installation.ppt
experience_and_perspective_of_security_installation.pptexperience_and_perspective_of_security_installation.ppt
experience_and_perspective_of_security_installation.ppt
PawachMetharattanara
 
Bio metric security
Bio metric securityBio metric security
Bio metric security
Mohamed Safraz
 
070327 biometrics
070327 biometrics070327 biometrics
070327 biometrics
Hamza Boucenna
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint Technology
Joy Dutta
 
managingyouraccesscontrolsystems-130223182036-phpapp01
managingyouraccesscontrolsystems-130223182036-phpapp01managingyouraccesscontrolsystems-130223182036-phpapp01
managingyouraccesscontrolsystems-130223182036-phpapp01
Walter Sinchak,
 
Access Control
Access ControlAccess Control
Access Control
Waseem Hamid Hussain
 
Advanced Technology
Advanced TechnologyAdvanced Technology
Advanced Technology
cpngai
 
Palm veim technology.pptx
Palm veim technology.pptxPalm veim technology.pptx
Palm veim technology.pptx
ShamamaIbtesam
 

Similar to PALM VEIN TECHNOLOGY..ppt (20)

1.palm vein technology(final)
1.palm vein technology(final)1.palm vein technology(final)
1.palm vein technology(final)
 
49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx
 
Seguridad de la Información y Controles contra Hackers - Getting hacked 101 ...
Seguridad de la Información y Controles contra Hackers - Getting hacked 101  ...Seguridad de la Información y Controles contra Hackers - Getting hacked 101  ...
Seguridad de la Información y Controles contra Hackers - Getting hacked 101 ...
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
palm vein technology
palm vein technologypalm vein technology
palm vein technology
 
Palm vein Technology
Palm vein TechnologyPalm vein Technology
Palm vein Technology
 
palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologyppt
 
palm vein technology (1).pptx
palm vein technology (1).pptxpalm vein technology (1).pptx
palm vein technology (1).pptx
 
Palmsecure
PalmsecurePalmsecure
Palmsecure
 
Biometrics
BiometricsBiometrics
Biometrics
 
1 ICT in Society
1 ICT in Society1 ICT in Society
1 ICT in Society
 
experience_and_perspective_of_security_installation.ppt
experience_and_perspective_of_security_installation.pptexperience_and_perspective_of_security_installation.ppt
experience_and_perspective_of_security_installation.ppt
 
Bio metric security
Bio metric securityBio metric security
Bio metric security
 
070327 biometrics
070327 biometrics070327 biometrics
070327 biometrics
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint Technology
 
managingyouraccesscontrolsystems-130223182036-phpapp01
managingyouraccesscontrolsystems-130223182036-phpapp01managingyouraccesscontrolsystems-130223182036-phpapp01
managingyouraccesscontrolsystems-130223182036-phpapp01
 
Access Control
Access ControlAccess Control
Access Control
 
Advanced Technology
Advanced TechnologyAdvanced Technology
Advanced Technology
 
Palm veim technology.pptx
Palm veim technology.pptxPalm veim technology.pptx
Palm veim technology.pptx
 

Recently uploaded

6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
Madhumitha Jayaram
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
Ratnakar Mikkili
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt
PuktoonEngr
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
Mukeshwaran Balu
 

Recently uploaded (20)

6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
 

PALM VEIN TECHNOLOGY..ppt

  • 1. AVANTHI SCIENTIFIC AND TECHNOLIGICAL REASEARCH ACADAMY ELECTRICAL & ELECTRONICS ENGINEERING PRESENTED BY:- T.HEMANTH REDDY 20PT5A0244.
  • 3. CONTENTS •INTRODUTION •OVERVIEW OF BIOMETRICS •WHAT IS PALM VEIN TECHNOLOGY? •HOW DOES THE PALM VEIN RECOGNITION SYSTEM WORK? •APPLICATIONS •ADVANTAGES •DISADVANTAGES •CONCLUSION •REFERENCES
  • 4. INTODUCTION •In the present network society, where individuals can easily access their information any time and anywhere. •People are also faced with the risk that others can easily access the same information anytime and anywhere. •Currently, passwords, identification cards are used for personal identification. •However, cards can be stolen, and passwords and numbers can be guessed or forgotten.
  • 5. OVERVIEW OF BIOMETRICS Technology + - Fingerprint •Popular •Cheapest •Less Accurate Voice •Non invasive •Least Accurate Iris & Retinal •Very accurate •Invasive •Expensive •Sensitive Palm Vein •Non-invasive •Relatively Cheap •Accurate •Unfamiliar
  • 6.
  • 7. WHAT IS PALM VEIN TECHNOLOGY??? • Palm vein technologies are one of the technologies which is highly secure. • Palm vein authentication works by comparing the pattern of veins in the palm of a person being authenticated with a pattern stored in a database.
  • 8. • In this technology ONE’S PALM is used as the “PASSWORD” for verification • The venis present in the palm of the individual are scanned and verified thus providing the access
  • 9. Working of palm vein recognization system  Simply hold your palm a few centimeters over the scanner.  Sensor scans vein patterns.  Vein pattern along with personal details are stored in database.
  • 10.
  • 11. What happens if the registered palm gets damaged? • There may be a chance that the palm we had registered may get damaged then we cannot use this technology. • So during the time of registration we take the veins of both the hands so that if one gets damaged we can access through the second hand. • When we apply this method we can maintain complete privacy .
  • 12. APPLICATIONS • ATM’s • BANKS • PERSONAL COMPUTERS • HOSPITALS • LIBRARY • AUTHENTICATION
  • 13. ADVANTAGES •Vein patterns are not easily manipulated, observed, damaged or changed. •Palm veins are most complex & present inside the superficial skin. So impossible to copy the palm veins. •It is highly secure and accurate. •This technology is also fast and easy to install.
  • 14. DISADVANTAGES •There are numerous factors that can affect the quality of the captured image. •For example body temperature, heat radiation, humidity, nearness of vein to surface, camera,calibration, humidity and focus. •It is relatively expensive.
  • 15. • Palm vein pattern recognition is a convenient and easy to use biometric technology with high security and accuracy level. • Surely this technology will bring a revolution in the field of science and technology in the near future. CONCLUSION