SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Downloaden Sie, um offline zu lesen
Page | 1
PALM VEIN TECHNOLOGY
-- (TOUCHING THE PERFECTION)
Submitted by
R.DEEPTHIR.DEEPTHIR.DEEPTHIR.DEEPTHI V.JEEVITHAV.JEEVITHAV.JEEVITHAV.JEEVITHA
06691A041506691A041506691A041506691A0415 06691A0406691A0406691A0406691A0426262626
ddddeepthi.raychoti@gmail.comeepthi.raychoti@gmail.comeepthi.raychoti@gmail.comeepthi.raychoti@gmail.com vaddireddy.jeevitha@gmail.comvaddireddy.jeevitha@gmail.comvaddireddy.jeevitha@gmail.comvaddireddy.jeevitha@gmail.com
IVIVIVIV----ECEECEECEECE
MADANAPALLE INSTITUTE OF TECHNOLOGY & SCIENCE
Page | 2
CONTENTS
1. ABSTRACT 1
2. INTRODUCTION 2
3. PALM VIEW TECHNOLOGY REVIEWS 2
i) Basis of Palm Vein Technology
ii) Palm Vein Registration
iii) Working of Palm Vein Systems
iv) How Secure is the Technology?
v) What happens if Registered Palm is damaged?
vi) Contact less palm vein authentication device
4. ADVANTAGES 6
5. APPLICATIONS 6
i) ATM
ii) Personal Computers
iii) Hospitals and Libraries
iv) Authentication
6. CONCLUSION 8
7. REFERENCES 8
ABSTRACT:
Page | 3
With the increase in technology threat to personal data and national security had
also increased .The methods that were developed to secure important information from
outside intervention were not up to safe mark .There was a need to introduce a technology
that secures our data more efficiently from unlawful intervention .
Fujitsu has developed a palm vein pattern authentication technology that uses
vescular patterns as personal identification data .Vein recognition technology is secure
because the authentication data exists inside the body and is therefore very difficult to
forge. It is highly accurate. This technology can be used in various fields like banking,
hospitals, government offices, in passport issuing etc. Business growth will be achieved
with these solutions by reducing the size of the palm vein sensor and shortening the
authentication time. This paper is about the palm vein technology, its applications, how
this technology is applied in real time applications and the advantages of using this
technology.
2. Introduction:
Page | 4
In the ubiquitous network society, where individuals can easily
access their information any time and anywhere, people are also faced with the risk that
others can easily access the same information anytime and anywhere. Because of this
risk, personal identification technology is used which includes Passwords, personal
identification numbers and identification cards. However, cards can be stolen and
passwords and numbers can be guessed or forgotten. To solve these problems, Fujitsu
developed four methods: fingerprints, faces, voice prints and palm veins. Among these,
because of its high accuracy, contact less palm vein authentication technology is being
incorporated into various financial solution products for use in public places. This paper
palm vein authentication technologies and some examples of its application to financial
solutions.
3. Palm Vein Technology Reviews:
3.1 The Basis of Palm Vein Technology
An individual first rests his wrist, and on some
devices, the middle of his fingers, on the sensor's supports
such that the palm is held centimeters above the device's
scanner, which flashes a near-infrared ray on the palm.
Unlike the skin, through which near-infrared light passes, fig:3.1 veins in palm
deoxygenated hemoglobin in the blood flowing through the veins absorbs near-infrared
rays, illuminating the hemoglobin, causing it to be visible to the scanner. Arteries and
capillaries, whose blood contains oxygenated hemoglobin, which does not absorb near-
infrared light, are invisible to the sensor. The still image captured by the camera, which
photographs in the near-infrared range, appears as a black network, reflecting the palm's
vein pattern against the lighter background of the palm.
An individual's palm vein image is converted by algorithms into data points,
which is then compressed, encrypted, and stored by the software and registered along
with the other details in his profile as a reference for future comparison. Then, each time a
person logs in attempting to gain access by a palm scan to a particular bank account or
secured entryway, etc., the newly captured image is likewise processed and compared to
Page | 5
the registered one or to the bank of stored files for verification, all in a period of seconds.
Numbers and positions of veins and their crossing points are all compared and, depending
on verification, the person is either granted or denied access.
3.2 REGISTERING THROUGH PALM VEIN TECHNOLOGY:
Step 1:
Palm vein authentication technology consists of a small
Palm vein scanner that's easy and natural to use, fast and
Highly accurate. Simply hold your palm a few centimeters
Over the scanner and within a second it reads your unique
vein pattern. A vein picture is taken and palm pattern is Fig3.2 Scanner Display
registered.
Step 2:
Scanned palm
Original
palm Registered
Pattern.
Fig 3.2: Process of Registration
The registered palm pattern is stored into the database along with the personal details
of the client.
3.3 Working of palm vein security systems
1. One should place his/her palm near to scanner.
Fig3.3: Palm on Sensor
Page | 6
2. The scanner makes use of a special characteristic of the reduced hemoglobin coursing
through the palm veins — it absorbs near-infrared light. This makes it possible to take
a snapshot of what's beneath the outer skin, something very hard to read or steal.
Fig 3.3.1: Infra red on Palm
3. The integrated optical system in the palm vein sensor uses this phenomenon to generate
an image of the palm vein pattern and the generated image is digitized, encrypted and
finally stored as a registered template in the database.
Fig 3.3.2: Short region on palm
3.4 How Secure is the Technology?
On the basis of testing the technology on more than 70,000 individuals ,
Fujitsu declared that the new system had a false rejection rate of 0.01% (i.e., only one
out of 10,000 scans were incorrect denials for access), and a false acceptance rate of less
than 0.00008% (i.e., incorrect approval for access in one in over a million scans).
Page | 7
Also, if your profile is registered with your right hand, don't log in with your left - the
patterns of an individual's two hands differ. And if you registered your profile as a child
, it'll still be recognized as you grow, as an individual's patterns of veins are
established in utero (before birth). No two people in the world share a palm vein
pattern - even those of identical twins differ. In addition the devices ability to perform
personal authentication was verified using the following:
1. Data from people ranging from 6 to 85 years old including people in various
occupations in accordance with the demographics realized by the Statistics Center of the
Statistics Bureau.
2. Data about foreigners living in Japan in accordance with the world demographics
released by the United Nations.
3. Data taken in various situations in daily life including after drinking alcohol, taking a
bath, going outside and waking up.
3.5. What happens if the registered palm gets damaged?
There may be a chance that the palm we had registered may get
damaged then we cannot use this technology, so during the time of registration we take
the veins of both the hands so that if one gets damaged we can access through the second
hand. When hand get damaged up to large extent we can get veins because deeper into the
hand veins are obtained.
Fig 3.5: Registering two palms
When we apply this method we can maintain complete privacy .
Page | 8
3.6. Contact less palm vein authentication device
(HYGIENE CONCERN):
The completely contactless feature of this
Device makes it suitable for use where high levels of
hygiene are required .It also eliminates any hesitation people
might have about coming into contact with something that
other people have already touched. Fig:3.6 Contact less
Sensor
In addition to being contactless and thereby hygienic and user-friendly in
that the user does not need to physically touch a surface and is free of such hygiene
concerns, palm vein authentication is highly secure in that the veins are internal to the
body and carry a wealth of information, thereby being extremely difficult to forge.
4. ADVANTAGES:
In addition to the palm, vein authentication can be done using the
vascular pattern on the back of a hand or a finger. However, the palm vein pattern is the
most complex and covers the widest area, because the palm has no hair, it is easier to
photograph its vascular pattern. The palm also has no significant variations in skin
color compared with fingers or back of the hand, where the color can darken in certain
areas.
5. APPLICATIONS:
This palm vein authentication technology is used in various areas for
more security. The following are some of the important areas where it is used:
5.1. ATM:
In July 2004, to ensure customer security, Suruga bank launched its“Bio
Security Deposit” the world’s first financial service to use Palm Secure . This service
features high security for customers using vein authentication , does not require a
bank card or pass book and prevents withdrawals from branches other than the
registered branch and ATMs thereby minimizing the risk of fraudulent withdrawals.
To open a Bio-Security Deposit account, customers go to a bank and have their palm
veins photographed at the counter in order to guarantee secure data management, the
Page | 9
palm vein data is stored only on the vein data base server at the branch office where the
account is opened..
In October 2004, The Bank of Tokyo launched its “Super –IC Card”. This card
combines the functions of a bankcard, credit card, electronic money and palm vein
authentication. This Super –IC Card contains the customer’s palm
Vein data and vein authentication algorithms and performs vein
authentication by itself . This system is advantageous because
the customers information is not stored at the bank. When a
Customer applies for a Super –IC Card, the bank sends the card
to the customers home . To activate the palm vein authentication function, the
customer brings the card and his passbook and seal to the bank Fig:5.1 ATM Sensor
counter where the customers vein information is registered on
the card . After registration the customer can make transactions at that branch counter
and ATM using palm vein authentication and a matching PIN number
5.2. PERSONAL COMPUTERS:
In personal computers palm vein technology
can applied by inserting the vein sensor inside mouse.
when power is supplied to system the mouse also gets
power and the sensor in the mouse will be ready to sense
palm veins. When one place his/her palm the sensor sense
the veins and if they are matched with the registered ones Fig:5.2 PC Sensor
the system allows the person to use it.
One can use this technology even to lock folders , that should be
maintained as private information.
5.3. IN HOSPITALS AND LIBRARYS:
A public library in Japan is set to
become the first in the world to use palm-vein biometrics
as a substitute for conventional library cards. Fig:5.3 Using Sensor
Page | 10
The University of Tokyo hospital has taken delivery of a
contactless palm vein authentication system to secure physical access to its
Department of Planning, Information and Management.
5.4 Authentication:
In front of our homes we can apply
this Palm vein techonolgy so that by registering the veins
of our family members and relatives we can maintain high
range security which is not possible through other
technologies . Japanese recently used this technologies
before front doors and getting high range security.
Fig:5.4 Near Front Doors
6. Conclusion:
Palm vein pattern authentication technology developed by Fujitsu
was being used in a wide range in japan . If this technology is introduced in our country
we can solve many problems such as password protection in ATM ,
security in various fields and if we implement this technology in government offices
we can make the employees to work according the government timings.surely this
technology will bring a revolution in the field of science and technology in the near
future.
7. REFERENCES:
1. WWW.ZENGINKYO.OR.JP/EN/NEWS/INDEX
2. www.btm.co.jp/english/index.html
3. WWW.networkworld.COM

Weitere ähnliche Inhalte

Was ist angesagt?

Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein TechnologyManav Mittal
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmalAkmal Hussain
 
Palm vein technology.pptx
Palm vein technology.pptxPalm vein technology.pptx
Palm vein technology.pptxschetan202
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology Anurag Chitti
 
Palmvein Technology
Palmvein TechnologyPalmvein Technology
Palmvein TechnologySai Divya
 
PALM VEIN TECHNOLOGY
PALM VEIN TECHNOLOGYPALM VEIN TECHNOLOGY
PALM VEIN TECHNOLOGYSagar Pudi
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology pptDhara k
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technologysathyakawthar
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology bhoovi1239
 
palm vein technology
palm vein technologypalm vein technology
palm vein technologyRAJASHREE B
 
1.palm vein technology(final)
1.palm vein technology(final)1.palm vein technology(final)
1.palm vein technology(final)Ojal Katiyar
 
Palm vein technology latest ppt
Palm vein technology latest pptPalm vein technology latest ppt
Palm vein technology latest pptvishesh2969
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein TechnologyAshwani Kumar
 

Was ist angesagt? (20)

Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal
 
Palm vein technology.pptx
Palm vein technology.pptxPalm vein technology.pptx
Palm vein technology.pptx
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology
 
Palmvein Technology
Palmvein TechnologyPalmvein Technology
Palmvein Technology
 
PALM VEIN TECHNOLOGY
PALM VEIN TECHNOLOGYPALM VEIN TECHNOLOGY
PALM VEIN TECHNOLOGY
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
 
Palm vein new
Palm vein newPalm vein new
Palm vein new
 
Palm vein Technology
Palm vein TechnologyPalm vein Technology
Palm vein Technology
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
Palm vein-technology.doc
Palm vein-technology.docPalm vein-technology.doc
Palm vein-technology.doc
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology
 
palm vein technology
palm vein technologypalm vein technology
palm vein technology
 
1.palm vein technology(final)
1.palm vein technology(final)1.palm vein technology(final)
1.palm vein technology(final)
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
Palmsecure
PalmsecurePalmsecure
Palmsecure
 
Palm vein technology latest ppt
Palm vein technology latest pptPalm vein technology latest ppt
Palm vein technology latest ppt
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 

Ähnlich wie Palm view technology

palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologypptNaga Dinesh
 
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUEPALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUEJournal For Research
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintSonuSawant
 
hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authenticationKumar Goud
 
IRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIJTET Journal
 
Presentation Fingervein Authentication
Presentation Fingervein AuthenticationPresentation Fingervein Authentication
Presentation Fingervein AuthenticationANEESH SASIDHARAN
 
Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...IJECEIAES
 
IRJET- Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
IRJET-  	  Sixth Sense Hand-Mouse Interface using Gestures & Randomized KeyIRJET-  	  Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
IRJET- Sixth Sense Hand-Mouse Interface using Gestures & Randomized KeyIRJET Journal
 
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET-  	  Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET-  	  Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET Journal
 
Credit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsCredit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsIOSR Journals
 
Enhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric SystemEnhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric Systemijtsrd
 
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...IRJET Journal
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)JIEMS Akkalkuwa
 
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiMDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiDharmendrasingh417
 

Ähnlich wie Palm view technology (20)

palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologyppt
 
kiran's slide info
kiran's slide infokiran's slide info
kiran's slide info
 
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUEPALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
 
palm vein technology
palm vein technologypalm vein technology
palm vein technology
 
hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authentication
 
IRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATM
 
Presentation Fingervein Authentication
Presentation Fingervein AuthenticationPresentation Fingervein Authentication
Presentation Fingervein Authentication
 
Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...
 
IRJET- Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
IRJET-  	  Sixth Sense Hand-Mouse Interface using Gestures & Randomized KeyIRJET-  	  Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
IRJET- Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
 
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET-  	  Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET-  	  Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
 
Credit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsCredit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using Biometrics
 
H029044050
H029044050H029044050
H029044050
 
Enhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric SystemEnhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric System
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
 
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiMDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
 
D0351022026
D0351022026D0351022026
D0351022026
 

Mehr von Chitrachedu Dada Kalandar

Mehr von Chitrachedu Dada Kalandar (13)

microcontroller based automation of drip irrigation system
microcontroller based automation of drip irrigation systemmicrocontroller based automation of drip irrigation system
microcontroller based automation of drip irrigation system
 
Tusanami
TusanamiTusanami
Tusanami
 
Tsunami warning system
Tsunami warning systemTsunami warning system
Tsunami warning system
 
P 6168--microcontroller based-lpg_gas_detector_using_gsm_module
P 6168--microcontroller based-lpg_gas_detector_using_gsm_moduleP 6168--microcontroller based-lpg_gas_detector_using_gsm_module
P 6168--microcontroller based-lpg_gas_detector_using_gsm_module
 
Microcontroller based automation of drip irrigation system
Microcontroller based automation of drip irrigation systemMicrocontroller based automation of drip irrigation system
Microcontroller based automation of drip irrigation system
 
Wireless
WirelessWireless
Wireless
 
Wireless transmission of electricity – development and possibility
Wireless transmission of electricity – development and possibilityWireless transmission of electricity – development and possibility
Wireless transmission of electricity – development and possibility
 
Solar botanic
Solar botanicSolar botanic
Solar botanic
 
Solar botanic (1)
Solar botanic (1)Solar botanic (1)
Solar botanic (1)
 
Advanced automatic railway system to avoid different train accidents
Advanced automatic railway system to avoid different train  accidentsAdvanced automatic railway system to avoid different train  accidents
Advanced automatic railway system to avoid different train accidents
 
5g tech
5g tech5g tech
5g tech
 
5 g mobile technology
5 g mobile technology5 g mobile technology
5 g mobile technology
 
an advance approach to divert trafiic at busy signals using rfid technolgy
an advance approach to divert trafiic at busy signals using rfid technolgyan advance approach to divert trafiic at busy signals using rfid technolgy
an advance approach to divert trafiic at busy signals using rfid technolgy
 

Kürzlich hochgeladen

The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 

Kürzlich hochgeladen (20)

Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 

Palm view technology

  • 1. Page | 1 PALM VEIN TECHNOLOGY -- (TOUCHING THE PERFECTION) Submitted by R.DEEPTHIR.DEEPTHIR.DEEPTHIR.DEEPTHI V.JEEVITHAV.JEEVITHAV.JEEVITHAV.JEEVITHA 06691A041506691A041506691A041506691A0415 06691A0406691A0406691A0406691A0426262626 ddddeepthi.raychoti@gmail.comeepthi.raychoti@gmail.comeepthi.raychoti@gmail.comeepthi.raychoti@gmail.com vaddireddy.jeevitha@gmail.comvaddireddy.jeevitha@gmail.comvaddireddy.jeevitha@gmail.comvaddireddy.jeevitha@gmail.com IVIVIVIV----ECEECEECEECE MADANAPALLE INSTITUTE OF TECHNOLOGY & SCIENCE
  • 2. Page | 2 CONTENTS 1. ABSTRACT 1 2. INTRODUCTION 2 3. PALM VIEW TECHNOLOGY REVIEWS 2 i) Basis of Palm Vein Technology ii) Palm Vein Registration iii) Working of Palm Vein Systems iv) How Secure is the Technology? v) What happens if Registered Palm is damaged? vi) Contact less palm vein authentication device 4. ADVANTAGES 6 5. APPLICATIONS 6 i) ATM ii) Personal Computers iii) Hospitals and Libraries iv) Authentication 6. CONCLUSION 8 7. REFERENCES 8 ABSTRACT:
  • 3. Page | 3 With the increase in technology threat to personal data and national security had also increased .The methods that were developed to secure important information from outside intervention were not up to safe mark .There was a need to introduce a technology that secures our data more efficiently from unlawful intervention . Fujitsu has developed a palm vein pattern authentication technology that uses vescular patterns as personal identification data .Vein recognition technology is secure because the authentication data exists inside the body and is therefore very difficult to forge. It is highly accurate. This technology can be used in various fields like banking, hospitals, government offices, in passport issuing etc. Business growth will be achieved with these solutions by reducing the size of the palm vein sensor and shortening the authentication time. This paper is about the palm vein technology, its applications, how this technology is applied in real time applications and the advantages of using this technology. 2. Introduction:
  • 4. Page | 4 In the ubiquitous network society, where individuals can easily access their information any time and anywhere, people are also faced with the risk that others can easily access the same information anytime and anywhere. Because of this risk, personal identification technology is used which includes Passwords, personal identification numbers and identification cards. However, cards can be stolen and passwords and numbers can be guessed or forgotten. To solve these problems, Fujitsu developed four methods: fingerprints, faces, voice prints and palm veins. Among these, because of its high accuracy, contact less palm vein authentication technology is being incorporated into various financial solution products for use in public places. This paper palm vein authentication technologies and some examples of its application to financial solutions. 3. Palm Vein Technology Reviews: 3.1 The Basis of Palm Vein Technology An individual first rests his wrist, and on some devices, the middle of his fingers, on the sensor's supports such that the palm is held centimeters above the device's scanner, which flashes a near-infrared ray on the palm. Unlike the skin, through which near-infrared light passes, fig:3.1 veins in palm deoxygenated hemoglobin in the blood flowing through the veins absorbs near-infrared rays, illuminating the hemoglobin, causing it to be visible to the scanner. Arteries and capillaries, whose blood contains oxygenated hemoglobin, which does not absorb near- infrared light, are invisible to the sensor. The still image captured by the camera, which photographs in the near-infrared range, appears as a black network, reflecting the palm's vein pattern against the lighter background of the palm. An individual's palm vein image is converted by algorithms into data points, which is then compressed, encrypted, and stored by the software and registered along with the other details in his profile as a reference for future comparison. Then, each time a person logs in attempting to gain access by a palm scan to a particular bank account or secured entryway, etc., the newly captured image is likewise processed and compared to
  • 5. Page | 5 the registered one or to the bank of stored files for verification, all in a period of seconds. Numbers and positions of veins and their crossing points are all compared and, depending on verification, the person is either granted or denied access. 3.2 REGISTERING THROUGH PALM VEIN TECHNOLOGY: Step 1: Palm vein authentication technology consists of a small Palm vein scanner that's easy and natural to use, fast and Highly accurate. Simply hold your palm a few centimeters Over the scanner and within a second it reads your unique vein pattern. A vein picture is taken and palm pattern is Fig3.2 Scanner Display registered. Step 2: Scanned palm Original palm Registered Pattern. Fig 3.2: Process of Registration The registered palm pattern is stored into the database along with the personal details of the client. 3.3 Working of palm vein security systems 1. One should place his/her palm near to scanner. Fig3.3: Palm on Sensor
  • 6. Page | 6 2. The scanner makes use of a special characteristic of the reduced hemoglobin coursing through the palm veins — it absorbs near-infrared light. This makes it possible to take a snapshot of what's beneath the outer skin, something very hard to read or steal. Fig 3.3.1: Infra red on Palm 3. The integrated optical system in the palm vein sensor uses this phenomenon to generate an image of the palm vein pattern and the generated image is digitized, encrypted and finally stored as a registered template in the database. Fig 3.3.2: Short region on palm 3.4 How Secure is the Technology? On the basis of testing the technology on more than 70,000 individuals , Fujitsu declared that the new system had a false rejection rate of 0.01% (i.e., only one out of 10,000 scans were incorrect denials for access), and a false acceptance rate of less than 0.00008% (i.e., incorrect approval for access in one in over a million scans).
  • 7. Page | 7 Also, if your profile is registered with your right hand, don't log in with your left - the patterns of an individual's two hands differ. And if you registered your profile as a child , it'll still be recognized as you grow, as an individual's patterns of veins are established in utero (before birth). No two people in the world share a palm vein pattern - even those of identical twins differ. In addition the devices ability to perform personal authentication was verified using the following: 1. Data from people ranging from 6 to 85 years old including people in various occupations in accordance with the demographics realized by the Statistics Center of the Statistics Bureau. 2. Data about foreigners living in Japan in accordance with the world demographics released by the United Nations. 3. Data taken in various situations in daily life including after drinking alcohol, taking a bath, going outside and waking up. 3.5. What happens if the registered palm gets damaged? There may be a chance that the palm we had registered may get damaged then we cannot use this technology, so during the time of registration we take the veins of both the hands so that if one gets damaged we can access through the second hand. When hand get damaged up to large extent we can get veins because deeper into the hand veins are obtained. Fig 3.5: Registering two palms When we apply this method we can maintain complete privacy .
  • 8. Page | 8 3.6. Contact less palm vein authentication device (HYGIENE CONCERN): The completely contactless feature of this Device makes it suitable for use where high levels of hygiene are required .It also eliminates any hesitation people might have about coming into contact with something that other people have already touched. Fig:3.6 Contact less Sensor In addition to being contactless and thereby hygienic and user-friendly in that the user does not need to physically touch a surface and is free of such hygiene concerns, palm vein authentication is highly secure in that the veins are internal to the body and carry a wealth of information, thereby being extremely difficult to forge. 4. ADVANTAGES: In addition to the palm, vein authentication can be done using the vascular pattern on the back of a hand or a finger. However, the palm vein pattern is the most complex and covers the widest area, because the palm has no hair, it is easier to photograph its vascular pattern. The palm also has no significant variations in skin color compared with fingers or back of the hand, where the color can darken in certain areas. 5. APPLICATIONS: This palm vein authentication technology is used in various areas for more security. The following are some of the important areas where it is used: 5.1. ATM: In July 2004, to ensure customer security, Suruga bank launched its“Bio Security Deposit” the world’s first financial service to use Palm Secure . This service features high security for customers using vein authentication , does not require a bank card or pass book and prevents withdrawals from branches other than the registered branch and ATMs thereby minimizing the risk of fraudulent withdrawals. To open a Bio-Security Deposit account, customers go to a bank and have their palm veins photographed at the counter in order to guarantee secure data management, the
  • 9. Page | 9 palm vein data is stored only on the vein data base server at the branch office where the account is opened.. In October 2004, The Bank of Tokyo launched its “Super –IC Card”. This card combines the functions of a bankcard, credit card, electronic money and palm vein authentication. This Super –IC Card contains the customer’s palm Vein data and vein authentication algorithms and performs vein authentication by itself . This system is advantageous because the customers information is not stored at the bank. When a Customer applies for a Super –IC Card, the bank sends the card to the customers home . To activate the palm vein authentication function, the customer brings the card and his passbook and seal to the bank Fig:5.1 ATM Sensor counter where the customers vein information is registered on the card . After registration the customer can make transactions at that branch counter and ATM using palm vein authentication and a matching PIN number 5.2. PERSONAL COMPUTERS: In personal computers palm vein technology can applied by inserting the vein sensor inside mouse. when power is supplied to system the mouse also gets power and the sensor in the mouse will be ready to sense palm veins. When one place his/her palm the sensor sense the veins and if they are matched with the registered ones Fig:5.2 PC Sensor the system allows the person to use it. One can use this technology even to lock folders , that should be maintained as private information. 5.3. IN HOSPITALS AND LIBRARYS: A public library in Japan is set to become the first in the world to use palm-vein biometrics as a substitute for conventional library cards. Fig:5.3 Using Sensor
  • 10. Page | 10 The University of Tokyo hospital has taken delivery of a contactless palm vein authentication system to secure physical access to its Department of Planning, Information and Management. 5.4 Authentication: In front of our homes we can apply this Palm vein techonolgy so that by registering the veins of our family members and relatives we can maintain high range security which is not possible through other technologies . Japanese recently used this technologies before front doors and getting high range security. Fig:5.4 Near Front Doors 6. Conclusion: Palm vein pattern authentication technology developed by Fujitsu was being used in a wide range in japan . If this technology is introduced in our country we can solve many problems such as password protection in ATM , security in various fields and if we implement this technology in government offices we can make the employees to work according the government timings.surely this technology will bring a revolution in the field of science and technology in the near future. 7. REFERENCES: 1. WWW.ZENGINKYO.OR.JP/EN/NEWS/INDEX 2. www.btm.co.jp/english/index.html 3. WWW.networkworld.COM