SlideShare une entreprise Scribd logo
1  sur  15
PALM VEIN TECHNOLOGY
YOUR HAND IS THE KEY
• Defined as recognizing and identifying
a person based on
physiological or behavioural characteristics.
• Any detail of the human body which differs from
one human to other can be used as unique biometric data.
BIOMETRICS
• Fingerprint authentication system.
• Facial recognition.
• Iris recognition.
• Voice recognition.
BIOMETRIC SYSTEMS
FINGER PRINT SYSTEM
The problems with finger print system …
 Can be easily copied.
 Wrong results if the finger is dirty or wounded.
 False positives if the software is not sufficiently sophisticated.
 Concerns over hygiene.
FACIAL BIOMETRICS
 Susceptible to environmental changes such as lighting.
 Depends on the expressions of face.
 Changes in appearance with the use of cosmetics, hair styling etc
 It's estimated there's a 5% drop in accuracy per year due to aging.
The problems with facial biometrics system …
IRIS SCANNING
The problems with Iris scanning system …
 Iris scanners can be easily fooled by a high quality image of an iris or
face in place of the real thing.
 Accuracy of scanners can be affected by changes in lighting.
 More expensive than other forms of biometrics.
 Very difficult to perform at a larger distance.
 ONE’S PALM is used as the “PASSWORD” for verification.
 Has a high level of authentication accuracy due to the
uniqueness and complexity of vein patterns of the palm.
PALM VEIN TECHNOLOGY
 The human palm vein pattern is extremely complex.
 Veins are located inside the human body, and therefore it is
protected against forgery and manipulation.
 The position of the palm vein vessels remain the same for
the whole life and its pattern is absolutely unique.
 Records vein patterns only in live individuals. Therefore, zero
possibility of manipulations involving deceased entities.
WHY PALM VEINS?
Palm has to be
positioned
3-8 cm over the
sensor
Sensor emits near
infrared
beam to the palm
Oxygen reduced blood
within the veins absorbs
the near infrared light
The sensors wide angular near
infrared camera takes a raw
image of the palm vein pattern
The sensors template library
SW changes the raw image
into template data
The generated template
can be stored in either a
database
PALM VEIN AUTHENTICATION
HOW IT WORKS?
HOW SECURE IS THE TECHNOLOGY?
On the basis of testing the technology by Fujitsu :
 The system had a False Rejection Rate (FAR) of 0.01%
(i.e., only one out of 10,000 scans were incorrect denials for access).
 A False Acceptance Rate of less than 0.00008%
(i.e., incorrect approval for access in one in over a million scans).
COMPARISON
ACCURACY
APPLICATIONS
 ATM’s and banks.
 Hospitals and libraries.
 Access control.
 Personal computers.
CONCLUSION
 A NEW FACE OF BIOMETRIC.
 More reliable and accurate.
 Ultra secure and less time consuming.
 Wide application range.
 Highly user friendly.
 Much better than the existing biometric systems.

Contenu connexe

Tendances

palm vein technology and its applications
palm vein technology and its applicationspalm vein technology and its applications
palm vein technology and its applications
Akhil Kumar
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
Manav Mittal
 
palm vein technology
palm vein technologypalm vein technology
palm vein technology
RAJASHREE B
 
iDEN Technology
iDEN Technology iDEN Technology
iDEN Technology
Naveen Ivao
 

Tendances (20)

Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
palm vein technology and its applications
palm vein technology and its applicationspalm vein technology and its applications
palm vein technology and its applications
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
palm vein technology
palm vein technologypalm vein technology
palm vein technology
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology
 
PALM VEIN TECHNOLOGY..ppt
PALM VEIN TECHNOLOGY..pptPALM VEIN TECHNOLOGY..ppt
PALM VEIN TECHNOLOGY..ppt
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal
 
Palm vein new
Palm vein newPalm vein new
Palm vein new
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
Finger vein technology
Finger vein technologyFinger vein technology
Finger vein technology
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Iris recognition
Iris recognition Iris recognition
Iris recognition
 
iDEN Technology
iDEN Technology iDEN Technology
iDEN Technology
 
ATM with an EYE
ATM with an EYEATM with an EYE
ATM with an EYE
 
DRIVER DROWSINESS ALERT SYSTEM
DRIVER DROWSINESS ALERT SYSTEMDRIVER DROWSINESS ALERT SYSTEM
DRIVER DROWSINESS ALERT SYSTEM
 

En vedette

En vedette (11)

PPT (2)
PPT (2)PPT (2)
PPT (2)
 
Plam vein technology
Plam vein technologyPlam vein technology
Plam vein technology
 
1.palm vein technology(final)
1.palm vein technology(final)1.palm vein technology(final)
1.palm vein technology(final)
 
Palmvein Technology
Palmvein TechnologyPalmvein Technology
Palmvein Technology
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATION
 
Palmvein authentication
Palmvein authenticationPalmvein authentication
Palmvein authentication
 
Palm view technology
Palm view technologyPalm view technology
Palm view technology
 
Palmprint recognition presentation
Palmprint recognition presentationPalmprint recognition presentation
Palmprint recognition presentation
 
BioSmart
BioSmartBioSmart
BioSmart
 
презентация Bio smart 4 2016
презентация Bio smart 4 2016презентация Bio smart 4 2016
презентация Bio smart 4 2016
 
Medical Identity Theft, Palm Vein Authentication: The Manager's Perspective
Medical Identity Theft, Palm Vein Authentication: The Manager's PerspectiveMedical Identity Theft, Palm Vein Authentication: The Manager's Perspective
Medical Identity Theft, Palm Vein Authentication: The Manager's Perspective
 

Similaire à Palm vein Technology

IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPT
Ajay K
 

Similaire à Palm vein Technology (20)

Palm veim technology.pptx
Palm veim technology.pptxPalm veim technology.pptx
Palm veim technology.pptx
 
Palm vein new
Palm vein newPalm vein new
Palm vein new
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologyppt
 
Biometrics Starts
Biometrics StartsBiometrics Starts
Biometrics Starts
 
palm vein technology
palm vein technologypalm vein technology
palm vein technology
 
Using Biometrics to address Voter Authentication
Using Biometrics to address Voter AuthenticationUsing Biometrics to address Voter Authentication
Using Biometrics to address Voter Authentication
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Comparison of various Biometric methods
Comparison of various Biometric methodsComparison of various Biometric methods
Comparison of various Biometric methods
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
A State-of-the-art Review on Dielectric fluid in Electric Discharge Machining...
A State-of-the-art Review on Dielectric fluid in Electric Discharge Machining...A State-of-the-art Review on Dielectric fluid in Electric Discharge Machining...
A State-of-the-art Review on Dielectric fluid in Electric Discharge Machining...
 
Non-Invasive ABCD Monitoring of Malignant Melanoma Using Image Processing in ...
Non-Invasive ABCD Monitoring of Malignant Melanoma Using Image Processing in ...Non-Invasive ABCD Monitoring of Malignant Melanoma Using Image Processing in ...
Non-Invasive ABCD Monitoring of Malignant Melanoma Using Image Processing in ...
 
Iris ppt
Iris pptIris ppt
Iris ppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Protection of Patient Identity and Privacy Using Vascular Biometrics
Protection of Patient Identity and Privacy Using Vascular BiometricsProtection of Patient Identity and Privacy Using Vascular Biometrics
Protection of Patient Identity and Privacy Using Vascular Biometrics
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPT
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 

Palm vein Technology

  • 1. PALM VEIN TECHNOLOGY YOUR HAND IS THE KEY
  • 2. • Defined as recognizing and identifying a person based on physiological or behavioural characteristics. • Any detail of the human body which differs from one human to other can be used as unique biometric data. BIOMETRICS
  • 3. • Fingerprint authentication system. • Facial recognition. • Iris recognition. • Voice recognition. BIOMETRIC SYSTEMS
  • 4. FINGER PRINT SYSTEM The problems with finger print system …  Can be easily copied.  Wrong results if the finger is dirty or wounded.  False positives if the software is not sufficiently sophisticated.  Concerns over hygiene.
  • 5. FACIAL BIOMETRICS  Susceptible to environmental changes such as lighting.  Depends on the expressions of face.  Changes in appearance with the use of cosmetics, hair styling etc  It's estimated there's a 5% drop in accuracy per year due to aging. The problems with facial biometrics system …
  • 6. IRIS SCANNING The problems with Iris scanning system …  Iris scanners can be easily fooled by a high quality image of an iris or face in place of the real thing.  Accuracy of scanners can be affected by changes in lighting.  More expensive than other forms of biometrics.  Very difficult to perform at a larger distance.
  • 7.  ONE’S PALM is used as the “PASSWORD” for verification.  Has a high level of authentication accuracy due to the uniqueness and complexity of vein patterns of the palm. PALM VEIN TECHNOLOGY
  • 8.  The human palm vein pattern is extremely complex.  Veins are located inside the human body, and therefore it is protected against forgery and manipulation.  The position of the palm vein vessels remain the same for the whole life and its pattern is absolutely unique.  Records vein patterns only in live individuals. Therefore, zero possibility of manipulations involving deceased entities. WHY PALM VEINS?
  • 9. Palm has to be positioned 3-8 cm over the sensor Sensor emits near infrared beam to the palm Oxygen reduced blood within the veins absorbs the near infrared light The sensors wide angular near infrared camera takes a raw image of the palm vein pattern The sensors template library SW changes the raw image into template data The generated template can be stored in either a database PALM VEIN AUTHENTICATION
  • 11. HOW SECURE IS THE TECHNOLOGY? On the basis of testing the technology by Fujitsu :  The system had a False Rejection Rate (FAR) of 0.01% (i.e., only one out of 10,000 scans were incorrect denials for access).  A False Acceptance Rate of less than 0.00008% (i.e., incorrect approval for access in one in over a million scans).
  • 14. APPLICATIONS  ATM’s and banks.  Hospitals and libraries.  Access control.  Personal computers.
  • 15. CONCLUSION  A NEW FACE OF BIOMETRIC.  More reliable and accurate.  Ultra secure and less time consuming.  Wide application range.  Highly user friendly.  Much better than the existing biometric systems.