SlideShare a Scribd company logo
1 of 16
PALM VEIN TECHNOLOGY
             Y O U R H AN D I S T H E K E Y
Biometric Systems
FINGER PRINT SYSTEM



The problems with finger print system …



• Finger prints can be easily copied.
• Wrong result if the finger is dirty.
• False positives. If the software is not sufficiently sophisticated
  concerns over hygiene.
• Not everyone would like to put their fingers on a sensor touched by
  others.
FACIAL BIOMETRICS



The problems with facial biometrics system …




• These are susceptible to environmental changes such as lighting.
• With age too, facial recognition deteriorates.
• Changes in appearance with the use of cosmetics, earrings, hair, etc,
   can give wrong readings too.
• It's estimated there's a 5% drop in accuracy per year due to aging.
IRIS SCANNING

The problems with facial biometrics system …




• Many commercial Iris scanners can be easily fooled by a high
   quality image of an iris or face in place of the real thing.
• The accuracy of scanners can be affected by changes in lighting.
• Iris scanners are significantly more expensive than some other forms
   of biometrics.
• Iris recognition is very difficult to perform at a distance larger than a few
   meters.
Palm vein authentication device uses blood vessel patterns as a personal
identifying factor.




Blood vessel patterns are unique to every individual. Even the vein patterns
on each hand are different.
PALM VEIN AUTHENTICATION




    Palm has to be              Sensor emits near             Oxygen reduced blood
    positioned                  infrared                      within the veins absorbs
    3-8 cm over the             beam to the palm              the near infrared light
    sensor




The generated template      The sensors template library   The sensors wide angular near
can be stored in either a   SW changes the raw image       infrared camera takes a raw
database                    into template data             image of the palm vein pattern
WHY VEINS ARE CHOSEN..


• When near-infrared light passes, deoxygenated hemoglobin
  in the blood flowing through the veins absorbs near-infrared rays,
  causing it to be visible as black regions to the scanner.


• Arteries and capillaries, whose blood contains oxygenated hemoglobin,
  which does not absorb near-infrared light, are invisible to the sensor,
  hence “VEINS” are chosen.
HOW SECURE IS THE TECHNOLOGY?
                          HOW SECURE IS THE TECHNOLOGY?



•   On the basis of testing the technology on more than 70,000 individuals,
    Fujitsu declared that the new system had a false rejection rate of 0.01%
    (i.e., only one out of 10,000 scans were incorrect denials for access).


•   And a false acceptance rate of less than 0.00008% (i.e., incorrect approval
    for access in one in over a million scans).


• And if you registered your profile as a child, it'll still be recognized as you
    grow, as an individual's patterns of veins are established in utero
    (before birth).
Overview of Biometrics


Technology                   +                           -
 Fingerprint     •Popular                  •Less Accurate
                 •Cheapest

    Voice        •Non invasive             •Least Accurate

Iris & Retinal   •Very accurate            •Invasive
                                           •Expensive
                                           •Sensitive

 Palm Vein       •Non-invasive             •Unfamiliar
                 •Relatively Cheap
                 •Accurate
ACCURACY



TECHNOLOGY    FALSE ACCEPTANCE RATE   FALSE REJECTION RATE




Palm Secure         .00008%                  .01%

Fingerprint          1-2%                     3%

    Iris         .0001% - .94%            .99% - .2%

   Voice              2%                     10%
COMPARISON
APPLICATIONS

More Related Content

What's hot

What's hot (19)

Palm vein Technology
Palm vein TechnologyPalm vein Technology
Palm vein Technology
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Biometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnologyBiometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnology
 
Palmvein Technology
Palmvein TechnologyPalmvein Technology
Palmvein Technology
 
PPT (2)
PPT (2)PPT (2)
PPT (2)
 
Palmvein ppt
Palmvein pptPalmvein ppt
Palmvein ppt
 
Palm vein-technology.doc
Palm vein-technology.docPalm vein-technology.doc
Palm vein-technology.doc
 
Palm view technology
Palm view technologyPalm view technology
Palm view technology
 
1.palm vein technology(final)
1.palm vein technology(final)1.palm vein technology(final)
1.palm vein technology(final)
 
PALM VEIN TECHNOLOGY
PALM VEIN TECHNOLOGYPALM VEIN TECHNOLOGY
PALM VEIN TECHNOLOGY
 
Palm vein technology latest ppt
Palm vein technology latest pptPalm vein technology latest ppt
Palm vein technology latest ppt
 
palm vein technology
palm vein technologypalm vein technology
palm vein technology
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology
 
Palmsecure
PalmsecurePalmsecure
Palmsecure
 
Palm vein Technology
Palm vein TechnologyPalm vein Technology
Palm vein Technology
 

Viewers also liked

презентация Bio smart 4 2016
презентация Bio smart 4 2016презентация Bio smart 4 2016
презентация Bio smart 4 2016dremin_alex
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein TechnologyAshwani Kumar
 
Medical Identity Theft, Palm Vein Authentication: The Manager's Perspective
Medical Identity Theft, Palm Vein Authentication: The Manager's PerspectiveMedical Identity Theft, Palm Vein Authentication: The Manager's Perspective
Medical Identity Theft, Palm Vein Authentication: The Manager's PerspectiveCRUZ CERDA
 
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...M2SYS Technology
 
Seminar report format b.tech
Seminar report format b.techSeminar report format b.tech
Seminar report format b.techRohit Kumar
 

Viewers also liked (6)

BioSmart
BioSmartBioSmart
BioSmart
 
презентация Bio smart 4 2016
презентация Bio smart 4 2016презентация Bio smart 4 2016
презентация Bio smart 4 2016
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Medical Identity Theft, Palm Vein Authentication: The Manager's Perspective
Medical Identity Theft, Palm Vein Authentication: The Manager's PerspectiveMedical Identity Theft, Palm Vein Authentication: The Manager's Perspective
Medical Identity Theft, Palm Vein Authentication: The Manager's Perspective
 
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
 
Seminar report format b.tech
Seminar report format b.techSeminar report format b.tech
Seminar report format b.tech
 

Similar to Plam vein technology

Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein TechnologyAnkan Das
 
Biometics technology
Biometics technologyBiometics technology
Biometics technologyPraween Lakra
 
palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologypptNaga Dinesh
 
Fingerprint Recognition
Fingerprint RecognitionFingerprint Recognition
Fingerprint RecognitionMirza Baig
 
Palm veim technology.pptx
Palm veim technology.pptxPalm veim technology.pptx
Palm veim technology.pptxShamamaIbtesam
 
SEMINAR FIRST.pptx
SEMINAR FIRST.pptxSEMINAR FIRST.pptx
SEMINAR FIRST.pptxAlenJames14
 
Fingerprint information hiding secur.ppt
Fingerprint information hiding secur.pptFingerprint information hiding secur.ppt
Fingerprint information hiding secur.pptnaghamallella
 
Matrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein ReaderMatrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein Readerlissapenas123
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognitionsunjaysahu
 
Top Biometric Identifiers: Risks & Rewards
Top Biometric Identifiers: Risks & RewardsTop Biometric Identifiers: Risks & Rewards
Top Biometric Identifiers: Risks & RewardsVeridium
 
Iris scanning
Iris scanningIris scanning
Iris scanningNikithaME
 
biometry-160212135415 (1).pdf
biometry-160212135415 (1).pdfbiometry-160212135415 (1).pdf
biometry-160212135415 (1).pdfssuser0f453c
 

Similar to Plam vein technology (20)

palm vein technology
palm vein technologypalm vein technology
palm vein technology
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologyppt
 
Fingerprint Recognition
Fingerprint RecognitionFingerprint Recognition
Fingerprint Recognition
 
Palm veim technology.pptx
Palm veim technology.pptxPalm veim technology.pptx
Palm veim technology.pptx
 
Palm vein new
Palm vein newPalm vein new
Palm vein new
 
SEMINAR FIRST.pptx
SEMINAR FIRST.pptxSEMINAR FIRST.pptx
SEMINAR FIRST.pptx
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Fingerprint information hiding secur.ppt
Fingerprint information hiding secur.pptFingerprint information hiding secur.ppt
Fingerprint information hiding secur.ppt
 
Matrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein ReaderMatrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein Reader
 
PALM VEIN TECHNOLOGY..ppt
PALM VEIN TECHNOLOGY..pptPALM VEIN TECHNOLOGY..ppt
PALM VEIN TECHNOLOGY..ppt
 
Biometric by amin
Biometric by aminBiometric by amin
Biometric by amin
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Top Biometric Identifiers: Risks & Rewards
Top Biometric Identifiers: Risks & RewardsTop Biometric Identifiers: Risks & Rewards
Top Biometric Identifiers: Risks & Rewards
 
Iris scan.ppt 1
Iris scan.ppt 1Iris scan.ppt 1
Iris scan.ppt 1
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Biometric
Biometric Biometric
Biometric
 
biometry-160212135415 (1).pdf
biometry-160212135415 (1).pdfbiometry-160212135415 (1).pdf
biometry-160212135415 (1).pdf
 

Recently uploaded

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Recently uploaded (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Plam vein technology

  • 1. PALM VEIN TECHNOLOGY Y O U R H AN D I S T H E K E Y
  • 3. FINGER PRINT SYSTEM The problems with finger print system … • Finger prints can be easily copied. • Wrong result if the finger is dirty. • False positives. If the software is not sufficiently sophisticated concerns over hygiene. • Not everyone would like to put their fingers on a sensor touched by others.
  • 4. FACIAL BIOMETRICS The problems with facial biometrics system … • These are susceptible to environmental changes such as lighting. • With age too, facial recognition deteriorates. • Changes in appearance with the use of cosmetics, earrings, hair, etc, can give wrong readings too. • It's estimated there's a 5% drop in accuracy per year due to aging.
  • 5. IRIS SCANNING The problems with facial biometrics system … • Many commercial Iris scanners can be easily fooled by a high quality image of an iris or face in place of the real thing. • The accuracy of scanners can be affected by changes in lighting. • Iris scanners are significantly more expensive than some other forms of biometrics. • Iris recognition is very difficult to perform at a distance larger than a few meters.
  • 6. Palm vein authentication device uses blood vessel patterns as a personal identifying factor. Blood vessel patterns are unique to every individual. Even the vein patterns on each hand are different.
  • 7. PALM VEIN AUTHENTICATION Palm has to be Sensor emits near Oxygen reduced blood positioned infrared within the veins absorbs 3-8 cm over the beam to the palm the near infrared light sensor The generated template The sensors template library The sensors wide angular near can be stored in either a SW changes the raw image infrared camera takes a raw database into template data image of the palm vein pattern
  • 8. WHY VEINS ARE CHOSEN.. • When near-infrared light passes, deoxygenated hemoglobin in the blood flowing through the veins absorbs near-infrared rays, causing it to be visible as black regions to the scanner. • Arteries and capillaries, whose blood contains oxygenated hemoglobin, which does not absorb near-infrared light, are invisible to the sensor, hence “VEINS” are chosen.
  • 9.
  • 10.
  • 11.
  • 12. HOW SECURE IS THE TECHNOLOGY? HOW SECURE IS THE TECHNOLOGY? • On the basis of testing the technology on more than 70,000 individuals, Fujitsu declared that the new system had a false rejection rate of 0.01% (i.e., only one out of 10,000 scans were incorrect denials for access). • And a false acceptance rate of less than 0.00008% (i.e., incorrect approval for access in one in over a million scans). • And if you registered your profile as a child, it'll still be recognized as you grow, as an individual's patterns of veins are established in utero (before birth).
  • 13. Overview of Biometrics Technology + - Fingerprint •Popular •Less Accurate •Cheapest Voice •Non invasive •Least Accurate Iris & Retinal •Very accurate •Invasive •Expensive •Sensitive Palm Vein •Non-invasive •Unfamiliar •Relatively Cheap •Accurate
  • 14. ACCURACY TECHNOLOGY FALSE ACCEPTANCE RATE FALSE REJECTION RATE Palm Secure .00008% .01% Fingerprint 1-2% 3% Iris .0001% - .94% .99% - .2% Voice 2% 10%