SlideShare ist ein Scribd-Unternehmen logo
1 von 18
PALM VEIN TECHNOLOGY
SUBMITTED BY:
MANAV MITTAL
1
INTRODUCTION
• Palm vein technology is one of the upcoming
technology.
• It is the world’s first contactless personal
identification system that uses the vein patterns in
human palms to confirm a person’s identity.
• It is highly secure and accurate.
• The contact less feature gives it a hygienic advantage
over other biometric authentication technologies.
• It uses the vascular patterns of an individual’s palm as
personal identification data.
2
Our Current Security Measures
• Internal
– Building Access –
Magnetic Card
and Pin
– Computer Access
– User ID and
Password
• External
– Customer Access
– ATM card and
PIN
3
Technology + -
Fingerprint •Popular
•Cheapest
•Less Accurate
Voice •Non invasive •Least Accurate
Iris & Retinal •Very accurate •Invasive
•Expensive
•Sensitive
Palm Vein •Non-invasive
•Relatively Cheap
•Accurate
•Unfamiliar
source
source
source
Overview of Bio-Tech
4
HOW IT WORKS
•Takes snapshot of palm veins
•Converts into algorithm (ICP)
•Compares with database
source
5
PALM VEIN PAATTERN VERIFICATION SYSTEM
The thermal vein pattern verification system involves
the following stages:
• Image Acquisition
• Image enhancement
• Vein pattern segmentation
• Skeletonization
• Matching
6
User Interface
•Contactless
•Non-invasive
•2.18 seconds recognition
speed
source
7
• Available Software Development Kit
– Easy to integrate to current company
system
• Small
• Cheap to produce
• Easy to Install
• Wide range of operating condition
– Iris scanners are sensitive to light and
temp.
source
8
Data Flow
9
Accuracy
TECHNOLOGY
FALSE ACCEPTANCE
RATE
FALSE REJECTION
RATE
PalmSecure .00008% .01%
Fingerprint 1-2% 3%
Iris .0001% - .94% .99% - .2%
Voice 2% 10%
• Vein patterns
– Distinctive and unique to individuals, even left and right hands.
– Difficult to steal or forge
• False acceptance rate
– A rate at which someone other than the actual person is falsely recognized.
• False rejection rate
– A rate at which the actual person is not recognized accurately.
10
In comparison with others
technology
*note – Chart created using average of data provided by the Table
11
Security Evaluation
There are several common methods of attacking the system
• Spoofing attacks
• Replay and transmission attacks
Known methods of improving security of biometric system
a. Multimodal biometric system
b. Biometrics combined with password
c. Watermarking
12
Practical Applications
Portable Mouse
ATM Machine
• ‘Palm Secure’ is now widely
used in various fields.
– ATM
• 92% of all Japanese ATMs
• 18,000+ ATM machines for
Bank of Tokyo - Mitsubishi
– School ID, Entry Key to
private property, Log-in to
PCs or servers
– Potential is limitless
• PalmSecure mouse with a
build-in sensor in 2007
– easily installed to personal
computer.
13
• Hidden characteristics are used as biometric features.
• It is difficult to forge for intruders.
• It is not affected by dryness or roughness of skin or by
physical injury on surface of the hand.
• It has an FRR of 0.01% and FAR of less than 0.00008%.
This is based on experiments conducted on 70,000
individuals in Japan.
• This technology is non-intrusive.
ADVANTAGES
14
• There are numerous factors that can affect the
quality of the captured image such as body
temperature, humidity, heat radiation, nearness of
vein to surface, camera calibration and focus.
• It is still relatively expensive and not available for
mass production yet.
DISADVANTAGES
15
CONCLUSION
Palm vein pattern recognition is a convenient and
easy to use biometric technology with high security
and accuracy level.
The technology is gaining momentum but it is still
expensive and relatively untested because it has not
yet been marketed globally.
16
QUESTIONS???
17
End of the Presentation
Thank You.
18

Weitere ähnliche Inhalte

Was ist angesagt?

Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology bhoovi1239
 
palm vein technology
palm vein technologypalm vein technology
palm vein technologyRAJASHREE B
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein TechnologyAshwani Kumar
 
palm vein technology and its applications
palm vein technology and its applicationspalm vein technology and its applications
palm vein technology and its applicationsAkhil Kumar
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprintAnIsh Kumar
 
ATM System by image processing
ATM System by image processingATM System by image processing
ATM System by image processingshahab islam
 
Design and development of dorsal hand vein recognition biometric system usin...
Design and development of dorsal hand vein recognition  biometric system usin...Design and development of dorsal hand vein recognition  biometric system usin...
Design and development of dorsal hand vein recognition biometric system usin...Raghavendra DC
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshareprachi
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmalAkmal Hussain
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionDevyani Vaidya
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technologyVishwasJangra
 

Was ist angesagt? (20)

Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology
 
Palm vein new
Palm vein newPalm vein new
Palm vein new
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
palm vein technology
palm vein technologypalm vein technology
palm vein technology
 
Finger vein technology
Finger vein technologyFinger vein technology
Finger vein technology
 
PALM VEIN TECHNOLOGY..ppt
PALM VEIN TECHNOLOGY..pptPALM VEIN TECHNOLOGY..ppt
PALM VEIN TECHNOLOGY..ppt
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
palm vein technology and its applications
palm vein technology and its applicationspalm vein technology and its applications
palm vein technology and its applications
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
 
Keystroke dynamics
Keystroke dynamicsKeystroke dynamics
Keystroke dynamics
 
ATM System by image processing
ATM System by image processingATM System by image processing
ATM System by image processing
 
Design and development of dorsal hand vein recognition biometric system usin...
Design and development of dorsal hand vein recognition  biometric system usin...Design and development of dorsal hand vein recognition  biometric system usin...
Design and development of dorsal hand vein recognition biometric system usin...
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
Fingerprint Biometrics
Fingerprint BiometricsFingerprint Biometrics
Fingerprint Biometrics
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
 

Andere mochten auch

PALM VEIN TECHNOLOGY
PALM VEIN TECHNOLOGYPALM VEIN TECHNOLOGY
PALM VEIN TECHNOLOGYSagar Pudi
 
Plam vein technology
Plam vein technologyPlam vein technology
Plam vein technologyDinesh Ediga
 
Elliptic Curve Cryptography: Arithmetic behind
Elliptic Curve Cryptography: Arithmetic behindElliptic Curve Cryptography: Arithmetic behind
Elliptic Curve Cryptography: Arithmetic behindAyan Sengupta
 
ECC vs RSA: Battle of the Crypto-Ninjas
ECC vs RSA: Battle of the Crypto-NinjasECC vs RSA: Battle of the Crypto-Ninjas
ECC vs RSA: Battle of the Crypto-NinjasJames McGivern
 
Elliptic Curves and Elliptic Curve Cryptography
Elliptic Curves and Elliptic Curve CryptographyElliptic Curves and Elliptic Curve Cryptography
Elliptic Curves and Elliptic Curve CryptographyMd. Al-Amin Khandaker Nipu
 
Elliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge ProofElliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge ProofArunanand Ta
 
Matrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein ReaderMatrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein Readerlissapenas123
 
Night Vision Technology.Final
Night Vision Technology.FinalNight Vision Technology.Final
Night Vision Technology.Finalpratik665
 
NIGHT VISION TECHNOLOGY
NIGHT VISION TECHNOLOGYNIGHT VISION TECHNOLOGY
NIGHT VISION TECHNOLOGYMihika Shah
 
Night vision technology ppt
Night vision technology pptNight vision technology ppt
Night vision technology pptEkta Singh
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final pptAnkita Vanage
 
Seminar on night vision technology ppt
Seminar on night vision technology pptSeminar on night vision technology ppt
Seminar on night vision technology pptdeepakmarndi
 

Andere mochten auch (17)

PPT (2)
PPT (2)PPT (2)
PPT (2)
 
PALM VEIN TECHNOLOGY
PALM VEIN TECHNOLOGYPALM VEIN TECHNOLOGY
PALM VEIN TECHNOLOGY
 
Plam vein technology
Plam vein technologyPlam vein technology
Plam vein technology
 
Elliptic Curve Cryptography: Arithmetic behind
Elliptic Curve Cryptography: Arithmetic behindElliptic Curve Cryptography: Arithmetic behind
Elliptic Curve Cryptography: Arithmetic behind
 
Elliptic curvecryptography Shane Almeida Saqib Awan Dan Palacio
Elliptic curvecryptography Shane Almeida Saqib Awan Dan PalacioElliptic curvecryptography Shane Almeida Saqib Awan Dan Palacio
Elliptic curvecryptography Shane Almeida Saqib Awan Dan Palacio
 
ECC vs RSA: Battle of the Crypto-Ninjas
ECC vs RSA: Battle of the Crypto-NinjasECC vs RSA: Battle of the Crypto-Ninjas
ECC vs RSA: Battle of the Crypto-Ninjas
 
Elliptic Curves and Elliptic Curve Cryptography
Elliptic Curves and Elliptic Curve CryptographyElliptic Curves and Elliptic Curve Cryptography
Elliptic Curves and Elliptic Curve Cryptography
 
Palmvein ppt
Palmvein pptPalmvein ppt
Palmvein ppt
 
Elliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge ProofElliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge Proof
 
Matrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein ReaderMatrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein Reader
 
Night Vision Technology.Final
Night Vision Technology.FinalNight Vision Technology.Final
Night Vision Technology.Final
 
Blue Brain
Blue Brain Blue Brain
Blue Brain
 
NIGHT VISION TECHNOLOGY
NIGHT VISION TECHNOLOGYNIGHT VISION TECHNOLOGY
NIGHT VISION TECHNOLOGY
 
Night vision technology ppt
Night vision technology pptNight vision technology ppt
Night vision technology ppt
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Seminar on night vision technology ppt
Seminar on night vision technology pptSeminar on night vision technology ppt
Seminar on night vision technology ppt
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Ähnlich wie Palm Vein Technology

49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptxssuserb46d43
 
Computer science ppt
Computer science pptComputer science ppt
Computer science pptbrijesh kumar
 
finger print based door lock.pptx
finger print based door lock.pptxfinger print based door lock.pptx
finger print based door lock.pptxPooja541216
 
Palmvein authentication
Palmvein authenticationPalmvein authentication
Palmvein authenticationSufiyan Arab
 
Palm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentationPalm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentationgagana5017
 
Bank locker system
Bank locker systemBank locker system
Bank locker systemRahul Wagh
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint TechnologyJoy Dutta
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprintSagar Verma
 
palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologypptNaga Dinesh
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Palak Pandoh
 
project ppt.pptx
project ppt.pptxproject ppt.pptx
project ppt.pptxBhavanaKs10
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensorsJeffrey Funk
 
Atm using finger print
Atm using finger printAtm using finger print
Atm using finger printManoranjan Roy
 
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffffSeminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffffkantharajubn600
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bmbranjith
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...IJRTEMJOURNAL
 
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...inventionjournals
 

Ähnlich wie Palm Vein Technology (20)

49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx
 
Computer science ppt
Computer science pptComputer science ppt
Computer science ppt
 
finger print based door lock.pptx
finger print based door lock.pptxfinger print based door lock.pptx
finger print based door lock.pptx
 
Palmvein authentication
Palmvein authenticationPalmvein authentication
Palmvein authentication
 
Palm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentationPalm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentation
 
Bank locker system
Bank locker systemBank locker system
Bank locker system
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint Technology
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprint
 
palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologyppt
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)
 
project ppt.pptx
project ppt.pptxproject ppt.pptx
project ppt.pptx
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 
Atm using finger print
Atm using finger printAtm using finger print
Atm using finger print
 
Access controls
Access controlsAccess controls
Access controls
 
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffffSeminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
 
Bio metric security
Bio metric securityBio metric security
Bio metric security
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
Finger print ATM
Finger print ATMFinger print ATM
Finger print ATM
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
 

Mehr von Manav Mittal

Intelligent road roller
Intelligent road rollerIntelligent road roller
Intelligent road rollerManav Mittal
 
Scada monitoring system
Scada monitoring systemScada monitoring system
Scada monitoring systemManav Mittal
 
Moving object detection
Moving object detectionMoving object detection
Moving object detectionManav Mittal
 
Electronic Walking Stick
Electronic Walking StickElectronic Walking Stick
Electronic Walking StickManav Mittal
 

Mehr von Manav Mittal (7)

Intelligent road roller
Intelligent road rollerIntelligent road roller
Intelligent road roller
 
Scada monitoring system
Scada monitoring systemScada monitoring system
Scada monitoring system
 
Green computing
Green computingGreen computing
Green computing
 
Moving object detection
Moving object detectionMoving object detection
Moving object detection
 
NTPC training
NTPC trainingNTPC training
NTPC training
 
Siemag training
Siemag trainingSiemag training
Siemag training
 
Electronic Walking Stick
Electronic Walking StickElectronic Walking Stick
Electronic Walking Stick
 

Kürzlich hochgeladen

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Palm Vein Technology

  • 1. PALM VEIN TECHNOLOGY SUBMITTED BY: MANAV MITTAL 1
  • 2. INTRODUCTION • Palm vein technology is one of the upcoming technology. • It is the world’s first contactless personal identification system that uses the vein patterns in human palms to confirm a person’s identity. • It is highly secure and accurate. • The contact less feature gives it a hygienic advantage over other biometric authentication technologies. • It uses the vascular patterns of an individual’s palm as personal identification data. 2
  • 3. Our Current Security Measures • Internal – Building Access – Magnetic Card and Pin – Computer Access – User ID and Password • External – Customer Access – ATM card and PIN 3
  • 4. Technology + - Fingerprint •Popular •Cheapest •Less Accurate Voice •Non invasive •Least Accurate Iris & Retinal •Very accurate •Invasive •Expensive •Sensitive Palm Vein •Non-invasive •Relatively Cheap •Accurate •Unfamiliar source source source Overview of Bio-Tech 4
  • 5. HOW IT WORKS •Takes snapshot of palm veins •Converts into algorithm (ICP) •Compares with database source 5
  • 6. PALM VEIN PAATTERN VERIFICATION SYSTEM The thermal vein pattern verification system involves the following stages: • Image Acquisition • Image enhancement • Vein pattern segmentation • Skeletonization • Matching 6
  • 8. • Available Software Development Kit – Easy to integrate to current company system • Small • Cheap to produce • Easy to Install • Wide range of operating condition – Iris scanners are sensitive to light and temp. source 8
  • 10. Accuracy TECHNOLOGY FALSE ACCEPTANCE RATE FALSE REJECTION RATE PalmSecure .00008% .01% Fingerprint 1-2% 3% Iris .0001% - .94% .99% - .2% Voice 2% 10% • Vein patterns – Distinctive and unique to individuals, even left and right hands. – Difficult to steal or forge • False acceptance rate – A rate at which someone other than the actual person is falsely recognized. • False rejection rate – A rate at which the actual person is not recognized accurately. 10
  • 11. In comparison with others technology *note – Chart created using average of data provided by the Table 11
  • 12. Security Evaluation There are several common methods of attacking the system • Spoofing attacks • Replay and transmission attacks Known methods of improving security of biometric system a. Multimodal biometric system b. Biometrics combined with password c. Watermarking 12
  • 13. Practical Applications Portable Mouse ATM Machine • ‘Palm Secure’ is now widely used in various fields. – ATM • 92% of all Japanese ATMs • 18,000+ ATM machines for Bank of Tokyo - Mitsubishi – School ID, Entry Key to private property, Log-in to PCs or servers – Potential is limitless • PalmSecure mouse with a build-in sensor in 2007 – easily installed to personal computer. 13
  • 14. • Hidden characteristics are used as biometric features. • It is difficult to forge for intruders. • It is not affected by dryness or roughness of skin or by physical injury on surface of the hand. • It has an FRR of 0.01% and FAR of less than 0.00008%. This is based on experiments conducted on 70,000 individuals in Japan. • This technology is non-intrusive. ADVANTAGES 14
  • 15. • There are numerous factors that can affect the quality of the captured image such as body temperature, humidity, heat radiation, nearness of vein to surface, camera calibration and focus. • It is still relatively expensive and not available for mass production yet. DISADVANTAGES 15
  • 16. CONCLUSION Palm vein pattern recognition is a convenient and easy to use biometric technology with high security and accuracy level. The technology is gaining momentum but it is still expensive and relatively untested because it has not yet been marketed globally. 16
  • 18. End of the Presentation Thank You. 18

Hinweis der Redaktion

  1. Henrik
  2. Richard
  3. Iris scanners are sensitive to light and temp.Richard
  4. Richard
  5. YooJin
  6. YooJin
  7. YooJin