SlideShare a Scribd company logo
Name: Arab Sufiyan M.
Enrollment no:150511201703
Guided by : Shubhda Mem.
Seminar
On
PALM VEIN
TECHNOLOGY
Content
 Introduction
 Features
 How It Works ?
 Specification
 Application
 Advantages
 Disadvantages
 Conclusion
 Reference
Introduction
 Palm vein technology is one of the upcoming technology.
 It is the world’s first contactless person identification
system that uses the vein patterns in human palms to
confirm a person’s identity.
 It is highly secure and accurate.
 The contact less feature gives it a hygienic advantage over
other biometric authentication technologies.
 It uses the vascular patterns of an individual’s palm as
personal identification data.
Features
Contactless.
Easy to use.
Non traceable.
Advance authentication accuracy.
High security and applicability rate.
Palm image
How It Works ?
• Takes snapshot of palm veins
• Converts into algorithm (ICP :Iterative Closest Point)
• Compares with database
How It Works ?
Cont…
Specification
Specification
Application
 ATM
 LIBRARYS
 PERSONAL COMPUTER
In LIBRARYS
 Palm secure device can
also be used in Library
for readers
identification can where
the high level of
security is required.
ATM and Banking
 The bank of Tokyo launched it
“super-IC card”.
 System is advantageous because
the customer’s information is not
store at the bank.
 This card combine the function of
a bank card,
credit card, electronic money,
palm vein authentication.
Personal Computers
 In personal
computers palm
vein technology can
be applied by
inserting the vein
sensor inside
mouse or on
keyboard.
Advantage
 Accuracy and Reliability.
 Security.
 Contactless or Non Intrusive.
 Cost-E5ective.
 Usability.
Disadvantages
 There are numerous factors that can affect
the quality of the captured image such as
body temperature, humidity, heat radiation,
nearness of vein to surface, camera
calibration and focus.
 It is still relatively expensive and not
available for mass production yet.
Conclusion
 Palm vein pattern authentication technology developed by Fujitsu
was being used in a wide range in Japan .
 If this technology is introduced in our country we can solve many
problems such as password protection in ATM ,security in various
fields and if we implement this technology in government we can
make the employees to work according the government timings.
 Surely this technology will bring a revolution in the field of
science and technology in the near future.
Reference
 www.google.com
 www.wikipedia.com
 www.studymafia.org
Thanks

More Related Content

What's hot

Palmvein Technology
Palmvein TechnologyPalmvein Technology
Palmvein Technology
Sai Divya
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal
Akmal Hussain
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
Chitrachedu Dada Kalandar
 
Palmvein ppt
Palmvein pptPalmvein ppt
Palmvein ppt
vedabobbala
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
Dhara k
 
Palm vein-technology.doc
Palm vein-technology.docPalm vein-technology.doc
Palm vein-technology.doc
Gadwal Mounika Mudhiraj
 
palm vein technology
palm vein technologypalm vein technology
palm vein technology
RAJASHREE B
 
Hostel girls security ppt
Hostel girls security pptHostel girls security ppt
Hostel girls security ppt
anubobhate
 
PPT (2)
PPT (2)PPT (2)
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
Bhavin Solanki
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
Manav Mittal
 
1.palm vein technology(final)
1.palm vein technology(final)1.palm vein technology(final)
1.palm vein technology(final)
Ojal Katiyar
 
Palm vein Technology
Palm vein TechnologyPalm vein Technology
Palm vein Technology
Harisankar U K
 
Palm-Vein Technology
Palm-Vein TechnologyPalm-Vein Technology
Palm-Vein Technology
Papun Papun
 
A High Performance Fingerprint Matching System for Large Databases Based on GPU
A High Performance Fingerprint Matching System for Large Databases Based on GPUA High Performance Fingerprint Matching System for Large Databases Based on GPU
A High Performance Fingerprint Matching System for Large Databases Based on GPU
Alpesh Kurhade
 
Palm vein new
Palm vein newPalm vein new
Palm vein new
Rohit Kumar
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology
Anurag Chitti
 
Palm vein technology latest ppt
Palm vein technology latest pptPalm vein technology latest ppt
Palm vein technology latest ppt
vishesh2969
 
Biometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnologyBiometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnology
Sarvani Mallipeddi
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
Augustine Micahel
 

What's hot (20)

Palmvein Technology
Palmvein TechnologyPalmvein Technology
Palmvein Technology
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
Palmvein ppt
Palmvein pptPalmvein ppt
Palmvein ppt
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
 
Palm vein-technology.doc
Palm vein-technology.docPalm vein-technology.doc
Palm vein-technology.doc
 
palm vein technology
palm vein technologypalm vein technology
palm vein technology
 
Hostel girls security ppt
Hostel girls security pptHostel girls security ppt
Hostel girls security ppt
 
PPT (2)
PPT (2)PPT (2)
PPT (2)
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
1.palm vein technology(final)
1.palm vein technology(final)1.palm vein technology(final)
1.palm vein technology(final)
 
Palm vein Technology
Palm vein TechnologyPalm vein Technology
Palm vein Technology
 
Palm-Vein Technology
Palm-Vein TechnologyPalm-Vein Technology
Palm-Vein Technology
 
A High Performance Fingerprint Matching System for Large Databases Based on GPU
A High Performance Fingerprint Matching System for Large Databases Based on GPUA High Performance Fingerprint Matching System for Large Databases Based on GPU
A High Performance Fingerprint Matching System for Large Databases Based on GPU
 
Palm vein new
Palm vein newPalm vein new
Palm vein new
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology
 
Palm vein technology latest ppt
Palm vein technology latest pptPalm vein technology latest ppt
Palm vein technology latest ppt
 
Biometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnologyBiometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnology
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 

Similar to Palmvein authentication

Palm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentationPalm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentation
gagana5017
 
Computer science ppt
Computer science pptComputer science ppt
Computer science ppt
brijesh kumar
 
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
inventionjournals
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
branjith
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
SonuSawant
 
49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx
ssuserb46d43
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
IJRTEMJOURNAL
 
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET-  	  Secure Automated Teller Machine (ATM) by Image ProcessingIRJET-  	  Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET Journal
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median Filter
NIDHI SHARMA
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)
Palak Pandoh
 
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET Journal
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET Journal
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET Journal
 
IRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATM
IJTET Journal
 
Palm
PalmPalm
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine LearningIRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET Journal
 
Pay-Cloak:Biometric
Pay-Cloak:BiometricPay-Cloak:Biometric
Pay-Cloak:Biometric
ijtsrd
 
Security Protocols for USB Mass Storage Devices
Security Protocols for USB Mass Storage DevicesSecurity Protocols for USB Mass Storage Devices
Security Protocols for USB Mass Storage Devices
IRJET Journal
 
Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...
IJECEIAES
 
D0351022026
D0351022026D0351022026
D0351022026
inventionjournals
 

Similar to Palmvein authentication (20)

Palm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentationPalm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentation
 
Computer science ppt
Computer science pptComputer science ppt
Computer science ppt
 
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
 
49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET-  	  Secure Automated Teller Machine (ATM) by Image ProcessingIRJET-  	  Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median Filter
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)
 
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
 
IRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATM
 
Palm
PalmPalm
Palm
 
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine LearningIRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine Learning
 
Pay-Cloak:Biometric
Pay-Cloak:BiometricPay-Cloak:Biometric
Pay-Cloak:Biometric
 
Security Protocols for USB Mass Storage Devices
Security Protocols for USB Mass Storage DevicesSecurity Protocols for USB Mass Storage Devices
Security Protocols for USB Mass Storage Devices
 
Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...
 
D0351022026
D0351022026D0351022026
D0351022026
 

Recently uploaded

Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 

Recently uploaded (20)

Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 

Palmvein authentication

  • 1.
  • 2. Name: Arab Sufiyan M. Enrollment no:150511201703 Guided by : Shubhda Mem. Seminar On PALM VEIN TECHNOLOGY
  • 3. Content  Introduction  Features  How It Works ?  Specification  Application  Advantages  Disadvantages  Conclusion  Reference
  • 4. Introduction  Palm vein technology is one of the upcoming technology.  It is the world’s first contactless person identification system that uses the vein patterns in human palms to confirm a person’s identity.  It is highly secure and accurate.  The contact less feature gives it a hygienic advantage over other biometric authentication technologies.  It uses the vascular patterns of an individual’s palm as personal identification data.
  • 5. Features Contactless. Easy to use. Non traceable. Advance authentication accuracy. High security and applicability rate.
  • 7. How It Works ? • Takes snapshot of palm veins • Converts into algorithm (ICP :Iterative Closest Point) • Compares with database
  • 13. In LIBRARYS  Palm secure device can also be used in Library for readers identification can where the high level of security is required.
  • 14. ATM and Banking  The bank of Tokyo launched it “super-IC card”.  System is advantageous because the customer’s information is not store at the bank.  This card combine the function of a bank card, credit card, electronic money, palm vein authentication.
  • 15. Personal Computers  In personal computers palm vein technology can be applied by inserting the vein sensor inside mouse or on keyboard.
  • 16. Advantage  Accuracy and Reliability.  Security.  Contactless or Non Intrusive.  Cost-E5ective.  Usability.
  • 17. Disadvantages  There are numerous factors that can affect the quality of the captured image such as body temperature, humidity, heat radiation, nearness of vein to surface, camera calibration and focus.  It is still relatively expensive and not available for mass production yet.
  • 18. Conclusion  Palm vein pattern authentication technology developed by Fujitsu was being used in a wide range in Japan .  If this technology is introduced in our country we can solve many problems such as password protection in ATM ,security in various fields and if we implement this technology in government we can make the employees to work according the government timings.  Surely this technology will bring a revolution in the field of science and technology in the near future.

Editor's Notes

  1. <number>