SlideShare uma empresa Scribd logo
1 de 23
PALM VEIN TECHNOLOGY
    NAME: SATYAJIT DASH
    ROLL NO:




1
Introduction         Accuracy
                          CONTENTS
    Our current security measures      Practical applications
       Overview of Bio-Tech            Advantages
            How it works               Disadvantages
              Data flow                Conclusion
                                       References




2
INTRODUCTION

    • Palm vein technology is one of the upcoming
      technology.
    • It is the world’s first contactless personal
      identification system that uses the vein patterns in
      human palms to confirm a person’s identity.
    • It is highly secure and accurate.
    • The contact less feature gives it a hygienic advantage
      over other biometric authentication technologies.
    • It uses the vascular patterns of an individual’s palm as
      personal identification data.

3
Our Current Security Measures
     Internal               External
       Building Access –      Customer Access –
        Magnetic Card and      ATM card and PIN
        Pin
       Computer Access –
        User ID and
        Password




4
Overview of Bio-Tech
    Technology                   +                 -
    Fingerprint      •Popular            •Less Accurate
                     •Cheapest
        Voice        •Non invasive       •Least Accurate
    Iris & Retinal   •Very accurate      •Invasive
                                         •Expensive
                                         •Sensitive
     Palm Vein       •Non-invasive       •Unfamiliar
                     •Relatively Cheap
                     •Accurate




5
Palm Vein Technology Usability &
    Accuracy Graph




6
How It Works ?




    •Takes snapshot of palm veins
    •Converts into algorithm (ICP)
    •Compares with database




7
How It Works




8
Continue…




9
PALM VEIN PAATTERN VERIFICATION SYSTEM




     The thermal vein pattern verification system involves the
     following stages:
     • Image Acquisition
     • Image enhancement
     • Vein pattern segmentation
     • Skeletonization
10
     • Matching
User Interface




     •Contactless
     •Non-invasive
     •2.18 seconds recognition
     speed




11
 Available Software Development Kit
      Easy to integrate to current company system
  Small
  Cheap to produce
  Easy to Install
  Wide range of operating condition
      Iris scanners are sensitive to light and temp.




12
                              source
Data Flow




13
Accuracy
                                           FALSE ACCEPTANCE     FALSE REJECTION
                         TECHNOLOGY
                                                  RATE                RATE


                          PalmSecure           .00008%               .01%

                          Fingerprint            1-2%                 3%

                              Iris          .0001% - .94%         .99% - .2%

                             Voice                2%                 10%


      Vein patterns
         Distinctive and unique to individuals, even left and right hands.
         Difficult to steal or forge
      False acceptance rate
         A rate at which someone other than the actual person is falsely recognized.
      False rejection rate
         A rate at which the actual person is not recognized accurately.
14
In comparison with others
          technology
     *note – Chart created using average of data provided by the Table




15
Security Evaluation
     There are several common methods of attacking the system

     • Spoofing attacks
     • Replay and transmission attacks



     Known methods of improving security of biometric system
     a. Multimodal biometric system
     b. Biometrics combined with password
     c. Watermarking




16
Points of attacks in a biometric system




17
Practical Applications
 ‘Palm Secure’ is now widely
     used in various fields.
      ATM
         92% of all Japanese ATMs
         18,000+ ATM machines for Bank
           of Tokyo - Mitsubishi
      School ID, Entry Key to private      ATM Machine
       property, Log-in to PCs or servers
      Potential is limitless
 PalmSecure mouse with a build-
     in sensor in 2007
      easily installed to personal
       computer.



18                                          Portable Mouse
ADVANTAGES

• Hidden characteristics are used as biometric features.
• It is difficult to forge for intruders.
• It is not affected by dryness or roughness of skin or by
  physical injury on surface of the hand.
• It has an FRR of 0.01% and FAR of less than 0.00008%.
  This is based on experiments conducted on 70,000
  individuals in Japan.
• This technology is non-intrusive.



 19
DISADVANTAGES
     • There are numerous factors that can affect the quality of
       the captured image such as body
       temperature, humidity, heat radiation, nearness of vein to
       surface, camera calibration and focus.
     • It is still relatively expensive and not available for mass
       production yet.




20
CONCLUSION
Palm vein pattern recognition is a convenient and easy to
use biometric technology with high security and accuracy
level.
The technology is gaining momentum but it is still
expensive and relatively untested because it has not yet
been marketed globally.




 21
QUESTIONS???




22
End of the Presentation

         Thank You.



23

Mais conteúdo relacionado

Mais procurados

palm vein technology
palm vein technologypalm vein technology
palm vein technologyRAJASHREE B
 
palm vein technology and its applications
palm vein technology and its applicationspalm vein technology and its applications
palm vein technology and its applicationsAkhil Kumar
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology Anurag Chitti
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology bhoovi1239
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein TechnologyAshwani Kumar
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmalAkmal Hussain
 
implementation of finger vein authentication technique
implementation of finger vein authentication techniqueimplementation of finger vein authentication technique
implementation of finger vein authentication techniqueViraj Rajopadhye
 
iDEN Technology
iDEN Technology iDEN Technology
iDEN Technology Naveen Ivao
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein TechnologyAnkan Das
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYJASHU JASWANTH
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologySYED HOZAIFA ALI
 
Brain chips seminar ppt
Brain chips seminar ppt Brain chips seminar ppt
Brain chips seminar ppt shivam chaddha
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition systemNilu Desai
 

Mais procurados (20)

Palm vein Technology
Palm vein TechnologyPalm vein Technology
Palm vein Technology
 
palm vein technology
palm vein technologypalm vein technology
palm vein technology
 
palm vein technology and its applications
palm vein technology and its applicationspalm vein technology and its applications
palm vein technology and its applications
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology
 
Finger vein technology
Finger vein technologyFinger vein technology
Finger vein technology
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
implementation of finger vein authentication technique
implementation of finger vein authentication techniqueimplementation of finger vein authentication technique
implementation of finger vein authentication technique
 
iDEN Technology
iDEN Technology iDEN Technology
iDEN Technology
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Palm vein new
Palm vein newPalm vein new
Palm vein new
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Brain chips seminar ppt
Brain chips seminar ppt Brain chips seminar ppt
Brain chips seminar ppt
 
PALM VEIN TECHNOLOGY..ppt
PALM VEIN TECHNOLOGY..pptPALM VEIN TECHNOLOGY..ppt
PALM VEIN TECHNOLOGY..ppt
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition system
 

Destaque

Destaque (20)

Braingate technology
Braingate technologyBraingate technology
Braingate technology
 
Daknet ppt
Daknet pptDaknet ppt
Daknet ppt
 
RAIN TECHNOLOGY
RAIN TECHNOLOGYRAIN TECHNOLOGY
RAIN TECHNOLOGY
 
Biometric Voting System
Biometric Voting SystemBiometric Voting System
Biometric Voting System
 
Wibree
Wibree Wibree
Wibree
 
Brain gate technology
Brain gate technologyBrain gate technology
Brain gate technology
 
Brain gate
Brain gateBrain gate
Brain gate
 
Eye Movement based Human Computer Interaction Technique
Eye Movement based Human Computer Interaction TechniqueEye Movement based Human Computer Interaction Technique
Eye Movement based Human Computer Interaction Technique
 
NIGHT VISION TECHNOLOGY
NIGHT VISION TECHNOLOGYNIGHT VISION TECHNOLOGY
NIGHT VISION TECHNOLOGY
 
Sky x technology
Sky x technologySky x technology
Sky x technology
 
Cordect
CordectCordect
Cordect
 
DakNet PPT
DakNet PPTDakNet PPT
DakNet PPT
 
Biometric Voting System
Biometric Voting SystemBiometric Voting System
Biometric Voting System
 
BRAIN GATE
BRAIN GATEBRAIN GATE
BRAIN GATE
 
Brain gate
Brain gateBrain gate
Brain gate
 
Rover Technology
Rover TechnologyRover Technology
Rover Technology
 
human computer interface
human computer interfacehuman computer interface
human computer interface
 
Rain technology
Rain technologyRain technology
Rain technology
 
Night vision technology ppt
Night vision technology pptNight vision technology ppt
Night vision technology ppt
 
Seminar Presentation Hadoop
Seminar Presentation HadoopSeminar Presentation Hadoop
Seminar Presentation Hadoop
 

Semelhante a Palm-Vein Technology

49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptxssuserb46d43
 
Matrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein ReaderMatrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein Readerlissapenas123
 
Nguyen nielsenkim palmvein
Nguyen nielsenkim palmveinNguyen nielsenkim palmvein
Nguyen nielsenkim palmveinNikhila07
 
Atm using finger print
Atm using finger printAtm using finger print
Atm using finger printManoranjan Roy
 
Palmvein Technology
Palmvein TechnologyPalmvein Technology
Palmvein TechnologySai Divya
 
palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologypptNaga Dinesh
 
Palmvein authentication
Palmvein authenticationPalmvein authentication
Palmvein authenticationSufiyan Arab
 
Biometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnologyBiometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnologySarvani Mallipeddi
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bmbranjith
 
Computer science ppt
Computer science pptComputer science ppt
Computer science pptbrijesh kumar
 
Palm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentationPalm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentationgagana5017
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint TechnologyJoy Dutta
 
Palm veim technology.pptx
Palm veim technology.pptxPalm veim technology.pptx
Palm veim technology.pptxShamamaIbtesam
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Palak Pandoh
 

Semelhante a Palm-Vein Technology (20)

49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx
 
Palm vein new
Palm vein newPalm vein new
Palm vein new
 
Matrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein ReaderMatrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein Reader
 
Nguyen nielsenkim palmvein
Nguyen nielsenkim palmveinNguyen nielsenkim palmvein
Nguyen nielsenkim palmvein
 
Atm using finger print
Atm using finger printAtm using finger print
Atm using finger print
 
Palmvein Technology
Palmvein TechnologyPalmvein Technology
Palmvein Technology
 
palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologyppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Palmvein authentication
Palmvein authenticationPalmvein authentication
Palmvein authentication
 
Palmsecure
PalmsecurePalmsecure
Palmsecure
 
Biometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnologyBiometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnology
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
Computer science ppt
Computer science pptComputer science ppt
Computer science ppt
 
Biometrics 2.pptx
Biometrics 2.pptxBiometrics 2.pptx
Biometrics 2.pptx
 
Palm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentationPalm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentation
 
Bio metric security
Bio metric securityBio metric security
Bio metric security
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint Technology
 
Palmvein ppt
Palmvein pptPalmvein ppt
Palmvein ppt
 
Palm veim technology.pptx
Palm veim technology.pptxPalm veim technology.pptx
Palm veim technology.pptx
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Último (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Palm-Vein Technology

  • 1. PALM VEIN TECHNOLOGY NAME: SATYAJIT DASH ROLL NO: 1
  • 2. Introduction  Accuracy CONTENTS Our current security measures  Practical applications Overview of Bio-Tech  Advantages How it works  Disadvantages Data flow  Conclusion  References 2
  • 3. INTRODUCTION • Palm vein technology is one of the upcoming technology. • It is the world’s first contactless personal identification system that uses the vein patterns in human palms to confirm a person’s identity. • It is highly secure and accurate. • The contact less feature gives it a hygienic advantage over other biometric authentication technologies. • It uses the vascular patterns of an individual’s palm as personal identification data. 3
  • 4. Our Current Security Measures  Internal  External  Building Access –  Customer Access – Magnetic Card and ATM card and PIN Pin  Computer Access – User ID and Password 4
  • 5. Overview of Bio-Tech Technology + - Fingerprint •Popular •Less Accurate •Cheapest Voice •Non invasive •Least Accurate Iris & Retinal •Very accurate •Invasive •Expensive •Sensitive Palm Vein •Non-invasive •Unfamiliar •Relatively Cheap •Accurate 5
  • 6. Palm Vein Technology Usability & Accuracy Graph 6
  • 7. How It Works ? •Takes snapshot of palm veins •Converts into algorithm (ICP) •Compares with database 7
  • 10. PALM VEIN PAATTERN VERIFICATION SYSTEM The thermal vein pattern verification system involves the following stages: • Image Acquisition • Image enhancement • Vein pattern segmentation • Skeletonization 10 • Matching
  • 11. User Interface •Contactless •Non-invasive •2.18 seconds recognition speed 11
  • 12.  Available Software Development Kit  Easy to integrate to current company system  Small  Cheap to produce  Easy to Install  Wide range of operating condition  Iris scanners are sensitive to light and temp. 12 source
  • 14. Accuracy FALSE ACCEPTANCE FALSE REJECTION TECHNOLOGY RATE RATE PalmSecure .00008% .01% Fingerprint 1-2% 3% Iris .0001% - .94% .99% - .2% Voice 2% 10%  Vein patterns  Distinctive and unique to individuals, even left and right hands.  Difficult to steal or forge  False acceptance rate  A rate at which someone other than the actual person is falsely recognized.  False rejection rate  A rate at which the actual person is not recognized accurately. 14
  • 15. In comparison with others technology *note – Chart created using average of data provided by the Table 15
  • 16. Security Evaluation There are several common methods of attacking the system • Spoofing attacks • Replay and transmission attacks Known methods of improving security of biometric system a. Multimodal biometric system b. Biometrics combined with password c. Watermarking 16
  • 17. Points of attacks in a biometric system 17
  • 18. Practical Applications  ‘Palm Secure’ is now widely used in various fields.  ATM  92% of all Japanese ATMs  18,000+ ATM machines for Bank of Tokyo - Mitsubishi  School ID, Entry Key to private ATM Machine property, Log-in to PCs or servers  Potential is limitless  PalmSecure mouse with a build- in sensor in 2007  easily installed to personal computer. 18 Portable Mouse
  • 19. ADVANTAGES • Hidden characteristics are used as biometric features. • It is difficult to forge for intruders. • It is not affected by dryness or roughness of skin or by physical injury on surface of the hand. • It has an FRR of 0.01% and FAR of less than 0.00008%. This is based on experiments conducted on 70,000 individuals in Japan. • This technology is non-intrusive. 19
  • 20. DISADVANTAGES • There are numerous factors that can affect the quality of the captured image such as body temperature, humidity, heat radiation, nearness of vein to surface, camera calibration and focus. • It is still relatively expensive and not available for mass production yet. 20
  • 21. CONCLUSION Palm vein pattern recognition is a convenient and easy to use biometric technology with high security and accuracy level. The technology is gaining momentum but it is still expensive and relatively untested because it has not yet been marketed globally. 21
  • 23. End of the Presentation Thank You. 23

Notas do Editor

  1. Henrik
  2. Richard
  3. Iris scanners are sensitive to light and temp.Richard
  4. Richard
  5. YooJin
  6. YooJin
  7. YooJin