SlideShare a Scribd company logo
1 of 16
PALM VEIN TECHNOLOGY
             Y O U R H AN D I S T H E K E Y
Biometric Systems
FINGER PRINT SYSTEM



The problems with finger print system …



• Finger prints can be easily copied.
• Wrong result if the finger is dirty.
• False positives. If the software is not sufficiently sophisticated
  concerns over hygiene.
• Not everyone would like to put their fingers on a sensor touched by
  others.
FACIAL BIOMETRICS



The problems with facial biometrics system …




• These are susceptible to environmental changes such as lighting.
• With age too, facial recognition deteriorates.
• Changes in appearance with the use of cosmetics, earrings, hair, etc,
   can give wrong readings too.
• It's estimated there's a 5% drop in accuracy per year due to aging.
IRIS SCANNING

The problems with facial biometrics system …




• Many commercial Iris scanners can be easily fooled by a high
   quality image of an iris or face in place of the real thing.
• The accuracy of scanners can be affected by changes in lighting.
• Iris scanners are significantly more expensive than some other forms
   of biometrics.
• Iris recognition is very difficult to perform at a distance larger than a few
   meters.
Palm vein authentication device uses blood vessel patterns as a personal
identifying factor.




Blood vessel patterns are unique to every individual. Even the vein patterns
on each hand are different.
PALM VEIN AUTHENTICATION




    Palm has to be              Sensor emits near             Oxygen reduced blood
    positioned                  infrared                      within the veins absorbs
    3-8 cm over the             beam to the palm              the near infrared light
    sensor




The generated template      The sensors template library   The sensors wide angular near
can be stored in either a   SW changes the raw image       infrared camera takes a raw
database                    into template data             image of the palm vein pattern
WHY VEINS ARE CHOSEN..


• When near-infrared light passes, deoxygenated hemoglobin
  in the blood flowing through the veins absorbs near-infrared rays,
  causing it to be visible as black regions to the scanner.


• Arteries and capillaries, whose blood contains oxygenated hemoglobin,
  which does not absorb near-infrared light, are invisible to the sensor,
  hence “VEINS” are chosen.
HOW SECURE IS THE TECHNOLOGY?
                          HOW SECURE IS THE TECHNOLOGY?



•   On the basis of testing the technology on more than 70,000 individuals,
    Fujitsu declared that the new system had a false rejection rate of 0.01%
    (i.e., only one out of 10,000 scans were incorrect denials for access).


•   And a false acceptance rate of less than 0.00008% (i.e., incorrect approval
    for access in one in over a million scans).


• And if you registered your profile as a child, it'll still be recognized as you
    grow, as an individual's patterns of veins are established in utero
    (before birth).
Overview of Biometrics


Technology                   +                           -
 Fingerprint     •Popular                  •Less Accurate
                 •Cheapest

    Voice        •Non invasive             •Least Accurate

Iris & Retinal   •Very accurate            •Invasive
                                           •Expensive
                                           •Sensitive

 Palm Vein       •Non-invasive             •Unfamiliar
                 •Relatively Cheap
                 •Accurate
ACCURACY



TECHNOLOGY    FALSE ACCEPTANCE RATE   FALSE REJECTION RATE




Palm Secure         .00008%                  .01%

Fingerprint          1-2%                     3%

    Iris         .0001% - .94%            .99% - .2%

   Voice              2%                     10%
COMPARISON
APPLICATIONS

More Related Content

What's hot

What's hot (19)

Palm vein Technology
Palm vein TechnologyPalm vein Technology
Palm vein Technology
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Biometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnologyBiometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnology
 
Palmvein Technology
Palmvein TechnologyPalmvein Technology
Palmvein Technology
 
PPT (2)
PPT (2)PPT (2)
PPT (2)
 
Palmvein ppt
Palmvein pptPalmvein ppt
Palmvein ppt
 
Palm vein-technology.doc
Palm vein-technology.docPalm vein-technology.doc
Palm vein-technology.doc
 
Palm view technology
Palm view technologyPalm view technology
Palm view technology
 
1.palm vein technology(final)
1.palm vein technology(final)1.palm vein technology(final)
1.palm vein technology(final)
 
PALM VEIN TECHNOLOGY
PALM VEIN TECHNOLOGYPALM VEIN TECHNOLOGY
PALM VEIN TECHNOLOGY
 
Palm vein technology latest ppt
Palm vein technology latest pptPalm vein technology latest ppt
Palm vein technology latest ppt
 
palm vein technology
palm vein technologypalm vein technology
palm vein technology
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology
 
Palmsecure
PalmsecurePalmsecure
Palmsecure
 
Palm vein Technology
Palm vein TechnologyPalm vein Technology
Palm vein Technology
 

Viewers also liked

презентация Bio smart 4 2016
презентация Bio smart 4 2016презентация Bio smart 4 2016
презентация Bio smart 4 2016dremin_alex
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein TechnologyAshwani Kumar
 
Medical Identity Theft, Palm Vein Authentication: The Manager's Perspective
Medical Identity Theft, Palm Vein Authentication: The Manager's PerspectiveMedical Identity Theft, Palm Vein Authentication: The Manager's Perspective
Medical Identity Theft, Palm Vein Authentication: The Manager's PerspectiveCRUZ CERDA
 
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...M2SYS Technology
 
Seminar report format b.tech
Seminar report format b.techSeminar report format b.tech
Seminar report format b.techRohit Kumar
 

Viewers also liked (6)

BioSmart
BioSmartBioSmart
BioSmart
 
презентация Bio smart 4 2016
презентация Bio smart 4 2016презентация Bio smart 4 2016
презентация Bio smart 4 2016
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Medical Identity Theft, Palm Vein Authentication: The Manager's Perspective
Medical Identity Theft, Palm Vein Authentication: The Manager's PerspectiveMedical Identity Theft, Palm Vein Authentication: The Manager's Perspective
Medical Identity Theft, Palm Vein Authentication: The Manager's Perspective
 
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
 
Seminar report format b.tech
Seminar report format b.techSeminar report format b.tech
Seminar report format b.tech
 

Similar to Plam vein technology

Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein TechnologyAnkan Das
 
Biometics technology
Biometics technologyBiometics technology
Biometics technologyPraween Lakra
 
palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologypptNaga Dinesh
 
Fingerprint Recognition
Fingerprint RecognitionFingerprint Recognition
Fingerprint RecognitionMirza Baig
 
Palm veim technology.pptx
Palm veim technology.pptxPalm veim technology.pptx
Palm veim technology.pptxShamamaIbtesam
 
SEMINAR FIRST.pptx
SEMINAR FIRST.pptxSEMINAR FIRST.pptx
SEMINAR FIRST.pptxAlenJames14
 
Fingerprint information hiding secur.ppt
Fingerprint information hiding secur.pptFingerprint information hiding secur.ppt
Fingerprint information hiding secur.pptnaghamallella
 
Matrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein ReaderMatrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein Readerlissapenas123
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognitionsunjaysahu
 
Top Biometric Identifiers: Risks & Rewards
Top Biometric Identifiers: Risks & RewardsTop Biometric Identifiers: Risks & Rewards
Top Biometric Identifiers: Risks & RewardsVeridium
 
Iris scanning
Iris scanningIris scanning
Iris scanningNikithaME
 
biometry-160212135415 (1).pdf
biometry-160212135415 (1).pdfbiometry-160212135415 (1).pdf
biometry-160212135415 (1).pdfssuser0f453c
 

Similar to Plam vein technology (20)

palm vein technology
palm vein technologypalm vein technology
palm vein technology
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologyppt
 
Fingerprint Recognition
Fingerprint RecognitionFingerprint Recognition
Fingerprint Recognition
 
Palm veim technology.pptx
Palm veim technology.pptxPalm veim technology.pptx
Palm veim technology.pptx
 
Palm vein new
Palm vein newPalm vein new
Palm vein new
 
SEMINAR FIRST.pptx
SEMINAR FIRST.pptxSEMINAR FIRST.pptx
SEMINAR FIRST.pptx
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Fingerprint information hiding secur.ppt
Fingerprint information hiding secur.pptFingerprint information hiding secur.ppt
Fingerprint information hiding secur.ppt
 
Matrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein ReaderMatrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein Reader
 
PALM VEIN TECHNOLOGY..ppt
PALM VEIN TECHNOLOGY..pptPALM VEIN TECHNOLOGY..ppt
PALM VEIN TECHNOLOGY..ppt
 
Biometric by amin
Biometric by aminBiometric by amin
Biometric by amin
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Top Biometric Identifiers: Risks & Rewards
Top Biometric Identifiers: Risks & RewardsTop Biometric Identifiers: Risks & Rewards
Top Biometric Identifiers: Risks & Rewards
 
Iris scan.ppt 1
Iris scan.ppt 1Iris scan.ppt 1
Iris scan.ppt 1
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Biometric
Biometric Biometric
Biometric
 
biometry-160212135415 (1).pdf
biometry-160212135415 (1).pdfbiometry-160212135415 (1).pdf
biometry-160212135415 (1).pdf
 

Recently uploaded

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 

Recently uploaded (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 

Plam vein technology

  • 1. PALM VEIN TECHNOLOGY Y O U R H AN D I S T H E K E Y
  • 3. FINGER PRINT SYSTEM The problems with finger print system … • Finger prints can be easily copied. • Wrong result if the finger is dirty. • False positives. If the software is not sufficiently sophisticated concerns over hygiene. • Not everyone would like to put their fingers on a sensor touched by others.
  • 4. FACIAL BIOMETRICS The problems with facial biometrics system … • These are susceptible to environmental changes such as lighting. • With age too, facial recognition deteriorates. • Changes in appearance with the use of cosmetics, earrings, hair, etc, can give wrong readings too. • It's estimated there's a 5% drop in accuracy per year due to aging.
  • 5. IRIS SCANNING The problems with facial biometrics system … • Many commercial Iris scanners can be easily fooled by a high quality image of an iris or face in place of the real thing. • The accuracy of scanners can be affected by changes in lighting. • Iris scanners are significantly more expensive than some other forms of biometrics. • Iris recognition is very difficult to perform at a distance larger than a few meters.
  • 6. Palm vein authentication device uses blood vessel patterns as a personal identifying factor. Blood vessel patterns are unique to every individual. Even the vein patterns on each hand are different.
  • 7. PALM VEIN AUTHENTICATION Palm has to be Sensor emits near Oxygen reduced blood positioned infrared within the veins absorbs 3-8 cm over the beam to the palm the near infrared light sensor The generated template The sensors template library The sensors wide angular near can be stored in either a SW changes the raw image infrared camera takes a raw database into template data image of the palm vein pattern
  • 8. WHY VEINS ARE CHOSEN.. • When near-infrared light passes, deoxygenated hemoglobin in the blood flowing through the veins absorbs near-infrared rays, causing it to be visible as black regions to the scanner. • Arteries and capillaries, whose blood contains oxygenated hemoglobin, which does not absorb near-infrared light, are invisible to the sensor, hence “VEINS” are chosen.
  • 9.
  • 10.
  • 11.
  • 12. HOW SECURE IS THE TECHNOLOGY? HOW SECURE IS THE TECHNOLOGY? • On the basis of testing the technology on more than 70,000 individuals, Fujitsu declared that the new system had a false rejection rate of 0.01% (i.e., only one out of 10,000 scans were incorrect denials for access). • And a false acceptance rate of less than 0.00008% (i.e., incorrect approval for access in one in over a million scans). • And if you registered your profile as a child, it'll still be recognized as you grow, as an individual's patterns of veins are established in utero (before birth).
  • 13. Overview of Biometrics Technology + - Fingerprint •Popular •Less Accurate •Cheapest Voice •Non invasive •Least Accurate Iris & Retinal •Very accurate •Invasive •Expensive •Sensitive Palm Vein •Non-invasive •Unfamiliar •Relatively Cheap •Accurate
  • 14. ACCURACY TECHNOLOGY FALSE ACCEPTANCE RATE FALSE REJECTION RATE Palm Secure .00008% .01% Fingerprint 1-2% 3% Iris .0001% - .94% .99% - .2% Voice 2% 10%