SlideShare ist ein Scribd-Unternehmen logo
1 von 17
PALM VEIN TECHNOLOGY
What is biometrics??
Biometrics can be defined as
recognizing and identifying a
person based on
physiological or behavioral
characteristics
The behavioral
characteristics measure the
movement of a user, when
users walk, speak, type on a
keyboard or sign their name.
The physiological
characteristics would be the
physical human traits like
fingerprints, hand shape,
eyes and face, veins, etc
Disadvantages of other technologies
1 )Finger print
• Some people may feel offended about placing
their fingers on the same place where many
other people have continuously touched
• Wrong results if the finger is dirty.
2)Face recognition
• 2D recognition is affected by changes in
lighting, the person’s hair, the age ,and if the
person wear glasses.
Disadvantages of other technologies
1 )Finger print
• Some people may feel
offended about placing
their fingers on the same
place where many other
people have continuously
touched
• Wrong results if the finger is
dirty.
2)Face recognition
• 2D recognition is affected
by changes in lighting, the
person’s hair, the age ,and if
the person wear glasses.
• It also depends on orientation/angle of user’s
face with camera
3)IRIS scan
• Difficult to use because of positioning eye.
Requires more time for matching with database
stored
• Many commercial Iris scanners can be easily
fooled by a high quality image of an iris or face in
place of the real thing
INTRODUCTION
• Palm vein technology is the upcoming
technology in this world
• It is the worlds first contactless personal
identification system that uses the vein
pattern in human palm to confirm persons
identity
• It is one of the biometric authentication
technology, which identifies people by their
unique biological information
How does it work?
Simply hold your palm a few
centimeters over the scanner and with
a second it reads your unique vein
pattern .
when near-infrared light passes,
deoxygenated hemoglobin in the blood
flowing through the veins absorbs near-
infrared rays, causing it to be visible as
black regions to the scanner
• Then it compares it with the pre registered
one with the help of infra red rays
• Generated image is digitized,encrypted &
finally stored as a registered image template
in database
• If there is a match found then access is
allowed else access is denied
How secure is this technology?
• On the basis of testing the technology on more
than 70,000 individuals, Fujitsu declared that the
new system had a false rejection rate of 0.01%
• And a false acceptance rate of less than 0.00008%
(i.e., incorrect approval for access in one in over a
million scan
• And if you registered your profile as a child, itll
still be recognized as you grow, as an individuals
patterns of veins are established in utero
What happens if hands get damaged
• There may be a chance that the palm we had
registered may get damaged then we cannot use
this technology.
• During the time of registration we take the veins
of both the hands so that if one gets damaged we
can access through the second hand.
• When hand get damaged upto large extent we
can get veins because deeper into the hand veins
are obtained
Applications
• ATM & BANKING
• PERSONAL COMPUTERS
• HOSPITALS &LIBRARIES
ATM & BANKING
• The Bank of Tokyo launched its
“Super –IC Card”.
• This card combines the functions
of a bankcard, credit card,
electronic money and palm vein
authentication.
• This system is advantageous
because the customer’s
information is not stored at the
bank.
• To activate the palm vein
authentication function, the
customer brings the card and his
passbook and seal to the bank
counter where the customers
vein information is registered on
the card .
PERSONALCOMPUTERS
In personal computers palm vein technology can be
applied by inserting the vein sensor inside mouse or
on the keyboard. When power is supplied to system
the mouse/keyboard also gets power and the sensor
in the mouse/keyboard will be ready to sense palm
veins
IN HOSPITALS AND LIBRARYS
Palm Secure device can also be used in hospitals for
doctor and patient’s identification and where the high
level of security is required
ADVANTAGES
• This technology is,
— More Reliable, More Accurate
— Fast
— Small
— Relatively cheap to implemented and operate
• —No more problems of forgotten passwords
and id codes.
• —No two people in the world share a palm vein
pattern- even those of identical twins differ.
Conclusion
• Palm vein pattern authentication technology
developed by Fujitsu was being used in a wide range
• If this technology is introduced in our country we can
solve many problems such as password protection in
ATM , security in various fields and if we implement
this technology in government offices we can make
the employees to work according the government
timings. surely this technology will bring a revolution
in the field of science and technology in the near
future.

Weitere ähnliche Inhalte

Was ist angesagt?

palm vein technology
palm vein technologypalm vein technology
palm vein technology
RAJASHREE B
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
Manav Mittal
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
Pathik504
 

Was ist angesagt? (20)

palm vein technology
palm vein technologypalm vein technology
palm vein technology
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology
 
Palm-Vein Technology
Palm-Vein TechnologyPalm-Vein Technology
Palm-Vein Technology
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
Finger Print Sensor
Finger Print SensorFinger Print Sensor
Finger Print Sensor
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
Biometric ATM (1).pptx
Biometric ATM (1).pptxBiometric ATM (1).pptx
Biometric ATM (1).pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and Security
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptx
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
 

Andere mochten auch (10)

Pattern Recognition
Pattern RecognitionPattern Recognition
Pattern Recognition
 
Pattern recognition
Pattern recognitionPattern recognition
Pattern recognition
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1
 
Introduction to pattern recognization
Introduction to pattern recognizationIntroduction to pattern recognization
Introduction to pattern recognization
 
1.palm vein technology(final)
1.palm vein technology(final)1.palm vein technology(final)
1.palm vein technology(final)
 
Pattern Recognition and its Applications
Pattern Recognition and its ApplicationsPattern Recognition and its Applications
Pattern Recognition and its Applications
 
Artificial intelligence Pattern recognition system
Artificial intelligence Pattern recognition systemArtificial intelligence Pattern recognition system
Artificial intelligence Pattern recognition system
 
Pattern Recognition
Pattern RecognitionPattern Recognition
Pattern Recognition
 
Pattern recognition
Pattern recognitionPattern recognition
Pattern recognition
 
Introduction to pattern recognition
Introduction to pattern recognitionIntroduction to pattern recognition
Introduction to pattern recognition
 

Ähnlich wie Palm vein Technology

sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
CoreGaming3
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
mmubashirkhan
 

Ähnlich wie Palm vein Technology (20)

Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologyppt
 
PPT (2)
PPT (2)PPT (2)
PPT (2)
 
Palmvein Technology
Palmvein TechnologyPalmvein Technology
Palmvein Technology
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprint
 
Palm veim technology.pptx
Palm veim technology.pptxPalm veim technology.pptx
Palm veim technology.pptx
 
Palm view technology
Palm view technologyPalm view technology
Palm view technology
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
Palmsecure
PalmsecurePalmsecure
Palmsecure
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition Technology
 
Palm vein technology latest ppt
Palm vein technology latest pptPalm vein technology latest ppt
Palm vein technology latest ppt
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
 
palm vein technology (1).pptx
palm vein technology (1).pptxpalm vein technology (1).pptx
palm vein technology (1).pptx
 
Biometric by amin
Biometric by aminBiometric by amin
Biometric by amin
 
It's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfIt's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdf
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Palm vein Technology

  • 2. What is biometrics?? Biometrics can be defined as recognizing and identifying a person based on physiological or behavioral characteristics The behavioral characteristics measure the movement of a user, when users walk, speak, type on a keyboard or sign their name. The physiological characteristics would be the physical human traits like fingerprints, hand shape, eyes and face, veins, etc
  • 3. Disadvantages of other technologies 1 )Finger print • Some people may feel offended about placing their fingers on the same place where many other people have continuously touched • Wrong results if the finger is dirty. 2)Face recognition • 2D recognition is affected by changes in lighting, the person’s hair, the age ,and if the person wear glasses.
  • 4. Disadvantages of other technologies 1 )Finger print • Some people may feel offended about placing their fingers on the same place where many other people have continuously touched • Wrong results if the finger is dirty. 2)Face recognition • 2D recognition is affected by changes in lighting, the person’s hair, the age ,and if the person wear glasses.
  • 5. • It also depends on orientation/angle of user’s face with camera 3)IRIS scan • Difficult to use because of positioning eye. Requires more time for matching with database stored • Many commercial Iris scanners can be easily fooled by a high quality image of an iris or face in place of the real thing
  • 6. INTRODUCTION • Palm vein technology is the upcoming technology in this world • It is the worlds first contactless personal identification system that uses the vein pattern in human palm to confirm persons identity • It is one of the biometric authentication technology, which identifies people by their unique biological information
  • 7. How does it work? Simply hold your palm a few centimeters over the scanner and with a second it reads your unique vein pattern .
  • 8. when near-infrared light passes, deoxygenated hemoglobin in the blood flowing through the veins absorbs near- infrared rays, causing it to be visible as black regions to the scanner
  • 9. • Then it compares it with the pre registered one with the help of infra red rays • Generated image is digitized,encrypted & finally stored as a registered image template in database • If there is a match found then access is allowed else access is denied
  • 10. How secure is this technology? • On the basis of testing the technology on more than 70,000 individuals, Fujitsu declared that the new system had a false rejection rate of 0.01% • And a false acceptance rate of less than 0.00008% (i.e., incorrect approval for access in one in over a million scan • And if you registered your profile as a child, itll still be recognized as you grow, as an individuals patterns of veins are established in utero
  • 11. What happens if hands get damaged • There may be a chance that the palm we had registered may get damaged then we cannot use this technology. • During the time of registration we take the veins of both the hands so that if one gets damaged we can access through the second hand. • When hand get damaged upto large extent we can get veins because deeper into the hand veins are obtained
  • 12. Applications • ATM & BANKING • PERSONAL COMPUTERS • HOSPITALS &LIBRARIES
  • 13. ATM & BANKING • The Bank of Tokyo launched its “Super –IC Card”. • This card combines the functions of a bankcard, credit card, electronic money and palm vein authentication. • This system is advantageous because the customer’s information is not stored at the bank. • To activate the palm vein authentication function, the customer brings the card and his passbook and seal to the bank counter where the customers vein information is registered on the card .
  • 14. PERSONALCOMPUTERS In personal computers palm vein technology can be applied by inserting the vein sensor inside mouse or on the keyboard. When power is supplied to system the mouse/keyboard also gets power and the sensor in the mouse/keyboard will be ready to sense palm veins
  • 15. IN HOSPITALS AND LIBRARYS Palm Secure device can also be used in hospitals for doctor and patient’s identification and where the high level of security is required
  • 16. ADVANTAGES • This technology is, — More Reliable, More Accurate — Fast — Small — Relatively cheap to implemented and operate • —No more problems of forgotten passwords and id codes. • —No two people in the world share a palm vein pattern- even those of identical twins differ.
  • 17. Conclusion • Palm vein pattern authentication technology developed by Fujitsu was being used in a wide range • If this technology is introduced in our country we can solve many problems such as password protection in ATM , security in various fields and if we implement this technology in government offices we can make the employees to work according the government timings. surely this technology will bring a revolution in the field of science and technology in the near future.