SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Downloaden Sie, um offline zu lesen
PALM VEIN TECHNOLOGY
YOUR HAND IS THE KEY
• Defined as recognizing and identifying
a person based on
physiological or behavioural characteristics.
• Any detail of the human body which differs from
one human to other can be used as unique biometric data.
BIOMETRICS
• Fingerprint authentication system.
• Facial recognition.
• Iris recognition.
• Voice recognition.
BIOMETRIC SYSTEMS
FINGER PRINT SYSTEM
The problems with finger print system …
 Can be easily copied.
 Wrong results if the finger is dirty or wounded.
 False positives if the software is not sufficiently sophisticated.
 Concerns over hygiene.
FACIAL BIOMETRICS
 Susceptible to environmental changes such as lighting.
 Depends on the expressions of face.
 Changes in appearance with the use of cosmetics, hair styling etc
 It's estimated there's a 5% drop in accuracy per year due to aging.
The problems with facial biometrics system …
IRIS SCANNING
The problems with Iris scanning system …
 Iris scanners can be easily fooled by a high quality image of an iris or
face in place of the real thing.
 Accuracy of scanners can be affected by changes in lighting.
 More expensive than other forms of biometrics.
 Very difficult to perform at a larger distance.
 ONE’S PALM is used as the “PASSWORD” for verification.
 Has a high level of authentication accuracy due to the
uniqueness and complexity of vein patterns of the palm.
PALM VEIN TECHNOLOGY
 The human palm vein pattern is extremely complex.
 Veins are located inside the human body, and therefore it is
protected against forgery and manipulation.
 The position of the palm vein vessels remain the same for
the whole life and its pattern is absolutely unique.
 Records vein patterns only in live individuals. Therefore, zero
possibility of manipulations involving deceased entities.
WHY PALM VEINS?
Palm has to be
positioned
3-8 cm over the
sensor
Sensor emits near
infrared
beam to the palm
Oxygen reduced blood
within the veins absorbs
the near infrared light
The sensors wide angular near
infrared camera takes a raw
image of the palm vein pattern
The sensors template library
SW changes the raw image
into template data
The generated template
can be stored in either a
database
PALM VEIN AUTHENTICATION
HOW IT WORKS?
HOW SECURE IS THE TECHNOLOGY?
On the basis of testing the technology by Fujitsu :
 The system had a False Rejection Rate (FAR) of 0.01%
(i.e., only one out of 10,000 scans were incorrect denials for access).
 A False Acceptance Rate of less than 0.00008%
(i.e., incorrect approval for access in one in over a million scans).
COMPARISON
ACCURACY
APPLICATIONS
 ATM’s and banks.
 Hospitals and libraries.
 Access control.
 Personal computers.
CONCLUSION
 A NEW FACE OF BIOMETRIC.
 More reliable and accurate.
 Ultra secure and less time consuming.
 Wide application range.
 Highly user friendly.
 Much better than the existing biometric systems.

Weitere ähnliche Inhalte

Was ist angesagt?

Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology pptDhara k
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein TechnologyManav Mittal
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technologysathyakawthar
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein TechnologyAshwani Kumar
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmalAkmal Hussain
 
palm vein technology and its applications
palm vein technology and its applicationspalm vein technology and its applications
palm vein technology and its applicationsAkhil Kumar
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technologyVishwasJangra
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and SecurityShreyans Jain
 
Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...Nadeer Abu Jraerr
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsUsman Sheikh
 

Was ist angesagt? (20)

Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Palm vein Technology
Palm vein TechnologyPalm vein Technology
Palm vein Technology
 
PALM VEIN TECHNOLOGY..ppt
PALM VEIN TECHNOLOGY..pptPALM VEIN TECHNOLOGY..ppt
PALM VEIN TECHNOLOGY..ppt
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
Finger vein technology
Finger vein technologyFinger vein technology
Finger vein technology
 
Fingerprint Biometrics
Fingerprint BiometricsFingerprint Biometrics
Fingerprint Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal
 
palm vein technology and its applications
palm vein technology and its applicationspalm vein technology and its applications
palm vein technology and its applications
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and Security
 
Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 

Andere mochten auch

Plam vein technology
Plam vein technologyPlam vein technology
Plam vein technologyDinesh Ediga
 
1.palm vein technology(final)
1.palm vein technology(final)1.palm vein technology(final)
1.palm vein technology(final)Ojal Katiyar
 
Palmvein Technology
Palmvein TechnologyPalmvein Technology
Palmvein TechnologySai Divya
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONHarisankar U K
 
Palmvein authentication
Palmvein authenticationPalmvein authentication
Palmvein authenticationSufiyan Arab
 
Palmprint recognition presentation
Palmprint recognition presentationPalmprint recognition presentation
Palmprint recognition presentationAlexandru Dorobantu
 
презентация Bio smart 4 2016
презентация Bio smart 4 2016презентация Bio smart 4 2016
презентация Bio smart 4 2016dremin_alex
 
Medical Identity Theft, Palm Vein Authentication: The Manager's Perspective
Medical Identity Theft, Palm Vein Authentication: The Manager's PerspectiveMedical Identity Theft, Palm Vein Authentication: The Manager's Perspective
Medical Identity Theft, Palm Vein Authentication: The Manager's PerspectiveCRUZ CERDA
 

Andere mochten auch (12)

PPT (2)
PPT (2)PPT (2)
PPT (2)
 
Plam vein technology
Plam vein technologyPlam vein technology
Plam vein technology
 
1.palm vein technology(final)
1.palm vein technology(final)1.palm vein technology(final)
1.palm vein technology(final)
 
Palmvein Technology
Palmvein TechnologyPalmvein Technology
Palmvein Technology
 
Palm vein new
Palm vein newPalm vein new
Palm vein new
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATION
 
Palmvein authentication
Palmvein authenticationPalmvein authentication
Palmvein authentication
 
Palm view technology
Palm view technologyPalm view technology
Palm view technology
 
Palmprint recognition presentation
Palmprint recognition presentationPalmprint recognition presentation
Palmprint recognition presentation
 
BioSmart
BioSmartBioSmart
BioSmart
 
презентация Bio smart 4 2016
презентация Bio smart 4 2016презентация Bio smart 4 2016
презентация Bio smart 4 2016
 
Medical Identity Theft, Palm Vein Authentication: The Manager's Perspective
Medical Identity Theft, Palm Vein Authentication: The Manager's PerspectiveMedical Identity Theft, Palm Vein Authentication: The Manager's Perspective
Medical Identity Theft, Palm Vein Authentication: The Manager's Perspective
 

Ähnlich wie Palm vein Technology

Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein TechnologyAnkan Das
 
Palm veim technology.pptx
Palm veim technology.pptxPalm veim technology.pptx
Palm veim technology.pptxShamamaIbtesam
 
Biometics technology
Biometics technologyBiometics technology
Biometics technologyPraween Lakra
 
palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologypptNaga Dinesh
 
Using Biometrics to address Voter Authentication
Using Biometrics to address Voter AuthenticationUsing Biometrics to address Voter Authentication
Using Biometrics to address Voter Authentication'Femi Akin-Laguda
 
Comparison of various Biometric methods
Comparison of various Biometric methodsComparison of various Biometric methods
Comparison of various Biometric methodsRupinder Saini
 
A State-of-the-art Review on Dielectric fluid in Electric Discharge Machining...
A State-of-the-art Review on Dielectric fluid in Electric Discharge Machining...A State-of-the-art Review on Dielectric fluid in Electric Discharge Machining...
A State-of-the-art Review on Dielectric fluid in Electric Discharge Machining...IRJET Journal
 
Non-Invasive ABCD Monitoring of Malignant Melanoma Using Image Processing in ...
Non-Invasive ABCD Monitoring of Malignant Melanoma Using Image Processing in ...Non-Invasive ABCD Monitoring of Malignant Melanoma Using Image Processing in ...
Non-Invasive ABCD Monitoring of Malignant Melanoma Using Image Processing in ...IRJET Journal
 
Protection of Patient Identity and Privacy Using Vascular Biometrics
Protection of Patient Identity and Privacy Using Vascular BiometricsProtection of Patient Identity and Privacy Using Vascular Biometrics
Protection of Patient Identity and Privacy Using Vascular BiometricsCSCJournals
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTAjay K
 

Ähnlich wie Palm vein Technology (20)

Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Palm veim technology.pptx
Palm veim technology.pptxPalm veim technology.pptx
Palm veim technology.pptx
 
Palm vein new
Palm vein newPalm vein new
Palm vein new
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologyppt
 
Biometrics Starts
Biometrics StartsBiometrics Starts
Biometrics Starts
 
palm vein technology
palm vein technologypalm vein technology
palm vein technology
 
Using Biometrics to address Voter Authentication
Using Biometrics to address Voter AuthenticationUsing Biometrics to address Voter Authentication
Using Biometrics to address Voter Authentication
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Comparison of various Biometric methods
Comparison of various Biometric methodsComparison of various Biometric methods
Comparison of various Biometric methods
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
A State-of-the-art Review on Dielectric fluid in Electric Discharge Machining...
A State-of-the-art Review on Dielectric fluid in Electric Discharge Machining...A State-of-the-art Review on Dielectric fluid in Electric Discharge Machining...
A State-of-the-art Review on Dielectric fluid in Electric Discharge Machining...
 
Non-Invasive ABCD Monitoring of Malignant Melanoma Using Image Processing in ...
Non-Invasive ABCD Monitoring of Malignant Melanoma Using Image Processing in ...Non-Invasive ABCD Monitoring of Malignant Melanoma Using Image Processing in ...
Non-Invasive ABCD Monitoring of Malignant Melanoma Using Image Processing in ...
 
Iris ppt
Iris pptIris ppt
Iris ppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Protection of Patient Identity and Privacy Using Vascular Biometrics
Protection of Patient Identity and Privacy Using Vascular BiometricsProtection of Patient Identity and Privacy Using Vascular Biometrics
Protection of Patient Identity and Privacy Using Vascular Biometrics
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPT
 

Kürzlich hochgeladen

Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
Things you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceThings you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceMartin Humpolec
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum ComputingGDSC PJATK
 
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxYounusS2
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 

Kürzlich hochgeladen (20)

Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
Things you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceThings you didn't know you can use in your Salesforce
Things you didn't know you can use in your Salesforce
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum Computing
 
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptx
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 

Palm vein Technology

  • 1. PALM VEIN TECHNOLOGY YOUR HAND IS THE KEY
  • 2. • Defined as recognizing and identifying a person based on physiological or behavioural characteristics. • Any detail of the human body which differs from one human to other can be used as unique biometric data. BIOMETRICS
  • 3. • Fingerprint authentication system. • Facial recognition. • Iris recognition. • Voice recognition. BIOMETRIC SYSTEMS
  • 4. FINGER PRINT SYSTEM The problems with finger print system …  Can be easily copied.  Wrong results if the finger is dirty or wounded.  False positives if the software is not sufficiently sophisticated.  Concerns over hygiene.
  • 5. FACIAL BIOMETRICS  Susceptible to environmental changes such as lighting.  Depends on the expressions of face.  Changes in appearance with the use of cosmetics, hair styling etc  It's estimated there's a 5% drop in accuracy per year due to aging. The problems with facial biometrics system …
  • 6. IRIS SCANNING The problems with Iris scanning system …  Iris scanners can be easily fooled by a high quality image of an iris or face in place of the real thing.  Accuracy of scanners can be affected by changes in lighting.  More expensive than other forms of biometrics.  Very difficult to perform at a larger distance.
  • 7.  ONE’S PALM is used as the “PASSWORD” for verification.  Has a high level of authentication accuracy due to the uniqueness and complexity of vein patterns of the palm. PALM VEIN TECHNOLOGY
  • 8.  The human palm vein pattern is extremely complex.  Veins are located inside the human body, and therefore it is protected against forgery and manipulation.  The position of the palm vein vessels remain the same for the whole life and its pattern is absolutely unique.  Records vein patterns only in live individuals. Therefore, zero possibility of manipulations involving deceased entities. WHY PALM VEINS?
  • 9. Palm has to be positioned 3-8 cm over the sensor Sensor emits near infrared beam to the palm Oxygen reduced blood within the veins absorbs the near infrared light The sensors wide angular near infrared camera takes a raw image of the palm vein pattern The sensors template library SW changes the raw image into template data The generated template can be stored in either a database PALM VEIN AUTHENTICATION
  • 11. HOW SECURE IS THE TECHNOLOGY? On the basis of testing the technology by Fujitsu :  The system had a False Rejection Rate (FAR) of 0.01% (i.e., only one out of 10,000 scans were incorrect denials for access).  A False Acceptance Rate of less than 0.00008% (i.e., incorrect approval for access in one in over a million scans).
  • 14. APPLICATIONS  ATM’s and banks.  Hospitals and libraries.  Access control.  Personal computers.
  • 15. CONCLUSION  A NEW FACE OF BIOMETRIC.  More reliable and accurate.  Ultra secure and less time consuming.  Wide application range.  Highly user friendly.  Much better than the existing biometric systems.