SlideShare uma empresa Scribd logo
1 de 15
PALM VEIN TECHNOLOGY
YOUR HAND IS THE KEY
• Defined as recognizing and identifying
a person based on
physiological or behavioural characteristics.
• Any detail of the human body which differs from
one human to other can be used as unique biometric data.
BIOMETRICS
• Fingerprint authentication system.
• Facial recognition.
• Iris recognition.
• Voice recognition.
BIOMETRIC SYSTEMS
FINGER PRINT SYSTEM
The problems with finger print system …
 Can be easily copied.
 Wrong results if the finger is dirty or wounded.
 False positives if the software is not sufficiently sophisticated.
 Concerns over hygiene.
FACIAL BIOMETRICS
 Susceptible to environmental changes such as lighting.
 Depends on the expressions of face.
 Changes in appearance with the use of cosmetics, hair styling etc
 It's estimated there's a 5% drop in accuracy per year due to aging.
The problems with facial biometrics system …
IRIS SCANNING
The problems with Iris scanning system …
 Iris scanners can be easily fooled by a high quality image of an iris or
face in place of the real thing.
 Accuracy of scanners can be affected by changes in lighting.
 More expensive than other forms of biometrics.
 Very difficult to perform at a larger distance.
 ONE’S PALM is used as the “PASSWORD” for verification.
 Has a high level of authentication accuracy due to the
uniqueness and complexity of vein patterns of the palm.
PALM VEIN TECHNOLOGY
 The human palm vein pattern is extremely complex.
 Veins are located inside the human body, and therefore it is
protected against forgery and manipulation.
 The position of the palm vein vessels remain the same for
the whole life and its pattern is absolutely unique.
 Records vein patterns only in live individuals. Therefore, zero
possibility of manipulations involving deceased entities.
WHY PALM VEINS?
Palm has to be
positioned
3-8 cm over the
sensor
Sensor emits near
infrared
beam to the palm
Oxygen reduced blood
within the veins absorbs
the near infrared light
The sensors wide angular near
infrared camera takes a raw
image of the palm vein pattern
The sensors template library
SW changes the raw image
into template data
The generated template
can be stored in either a
database
PALM VEIN AUTHENTICATION
HOW IT WORKS?
HOW SECURE IS THE TECHNOLOGY?
On the basis of testing the technology by Fujitsu :
 The system had a False Rejection Rate (FAR) of 0.01%
(i.e., only one out of 10,000 scans were incorrect denials for access).
 A False Acceptance Rate of less than 0.00008%
(i.e., incorrect approval for access in one in over a million scans).
COMPARISON
ACCURACY
APPLICATIONS
 ATM’s and banks.
 Hospitals and libraries.
 Access control.
 Personal computers.
CONCLUSION
 A NEW FACE OF BIOMETRIC.
 More reliable and accurate.
 Ultra secure and less time consuming.
 Wide application range.
 Highly user friendly.
 Much better than the existing biometric systems.

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Palm vein Technology
Palm vein TechnologyPalm vein Technology
Palm vein Technology
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 

Destaque

Plam vein technology
Plam vein technologyPlam vein technology
Plam vein technologyDinesh Ediga
 
1.palm vein technology(final)
1.palm vein technology(final)1.palm vein technology(final)
1.palm vein technology(final)Ojal Katiyar
 
Palmvein Technology
Palmvein TechnologyPalmvein Technology
Palmvein TechnologySai Divya
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONHarisankar U K
 
Palmvein authentication
Palmvein authenticationPalmvein authentication
Palmvein authenticationSufiyan Arab
 
Palmprint recognition presentation
Palmprint recognition presentationPalmprint recognition presentation
Palmprint recognition presentationAlexandru Dorobantu
 
презентация Bio smart 4 2016
презентация Bio smart 4 2016презентация Bio smart 4 2016
презентация Bio smart 4 2016dremin_alex
 
Medical Identity Theft, Palm Vein Authentication: The Manager's Perspective
Medical Identity Theft, Palm Vein Authentication: The Manager's PerspectiveMedical Identity Theft, Palm Vein Authentication: The Manager's Perspective
Medical Identity Theft, Palm Vein Authentication: The Manager's PerspectiveCRUZ CERDA
 

Destaque (13)

PPT (2)
PPT (2)PPT (2)
PPT (2)
 
Plam vein technology
Plam vein technologyPlam vein technology
Plam vein technology
 
1.palm vein technology(final)
1.palm vein technology(final)1.palm vein technology(final)
1.palm vein technology(final)
 
Palmvein Technology
Palmvein TechnologyPalmvein Technology
Palmvein Technology
 
Finger vein technology
Finger vein technologyFinger vein technology
Finger vein technology
 
Palm vein new
Palm vein newPalm vein new
Palm vein new
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATION
 
Palmvein authentication
Palmvein authenticationPalmvein authentication
Palmvein authentication
 
Palm view technology
Palm view technologyPalm view technology
Palm view technology
 
Palmprint recognition presentation
Palmprint recognition presentationPalmprint recognition presentation
Palmprint recognition presentation
 
BioSmart
BioSmartBioSmart
BioSmart
 
презентация Bio smart 4 2016
презентация Bio smart 4 2016презентация Bio smart 4 2016
презентация Bio smart 4 2016
 
Medical Identity Theft, Palm Vein Authentication: The Manager's Perspective
Medical Identity Theft, Palm Vein Authentication: The Manager's PerspectiveMedical Identity Theft, Palm Vein Authentication: The Manager's Perspective
Medical Identity Theft, Palm Vein Authentication: The Manager's Perspective
 

Semelhante a Palm vein Technology

Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein TechnologyAnkan Das
 
Palm veim technology.pptx
Palm veim technology.pptxPalm veim technology.pptx
Palm veim technology.pptxShamamaIbtesam
 
Biometics technology
Biometics technologyBiometics technology
Biometics technologyPraween Lakra
 
palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologypptNaga Dinesh
 
Using Biometrics to address Voter Authentication
Using Biometrics to address Voter AuthenticationUsing Biometrics to address Voter Authentication
Using Biometrics to address Voter Authentication'Femi Akin-Laguda
 
Comparison of various Biometric methods
Comparison of various Biometric methodsComparison of various Biometric methods
Comparison of various Biometric methodsRupinder Saini
 
A State-of-the-art Review on Dielectric fluid in Electric Discharge Machining...
A State-of-the-art Review on Dielectric fluid in Electric Discharge Machining...A State-of-the-art Review on Dielectric fluid in Electric Discharge Machining...
A State-of-the-art Review on Dielectric fluid in Electric Discharge Machining...IRJET Journal
 
Non-Invasive ABCD Monitoring of Malignant Melanoma Using Image Processing in ...
Non-Invasive ABCD Monitoring of Malignant Melanoma Using Image Processing in ...Non-Invasive ABCD Monitoring of Malignant Melanoma Using Image Processing in ...
Non-Invasive ABCD Monitoring of Malignant Melanoma Using Image Processing in ...IRJET Journal
 
Protection of Patient Identity and Privacy Using Vascular Biometrics
Protection of Patient Identity and Privacy Using Vascular BiometricsProtection of Patient Identity and Privacy Using Vascular Biometrics
Protection of Patient Identity and Privacy Using Vascular BiometricsCSCJournals
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTAjay K
 

Semelhante a Palm vein Technology (20)

Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Palm veim technology.pptx
Palm veim technology.pptxPalm veim technology.pptx
Palm veim technology.pptx
 
Palm vein new
Palm vein newPalm vein new
Palm vein new
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologyppt
 
Biometrics Starts
Biometrics StartsBiometrics Starts
Biometrics Starts
 
palm vein technology
palm vein technologypalm vein technology
palm vein technology
 
Using Biometrics to address Voter Authentication
Using Biometrics to address Voter AuthenticationUsing Biometrics to address Voter Authentication
Using Biometrics to address Voter Authentication
 
Biometrics
BiometricsBiometrics
Biometrics
 
Comparison of various Biometric methods
Comparison of various Biometric methodsComparison of various Biometric methods
Comparison of various Biometric methods
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
A State-of-the-art Review on Dielectric fluid in Electric Discharge Machining...
A State-of-the-art Review on Dielectric fluid in Electric Discharge Machining...A State-of-the-art Review on Dielectric fluid in Electric Discharge Machining...
A State-of-the-art Review on Dielectric fluid in Electric Discharge Machining...
 
Non-Invasive ABCD Monitoring of Malignant Melanoma Using Image Processing in ...
Non-Invasive ABCD Monitoring of Malignant Melanoma Using Image Processing in ...Non-Invasive ABCD Monitoring of Malignant Melanoma Using Image Processing in ...
Non-Invasive ABCD Monitoring of Malignant Melanoma Using Image Processing in ...
 
Iris ppt
Iris pptIris ppt
Iris ppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Protection of Patient Identity and Privacy Using Vascular Biometrics
Protection of Patient Identity and Privacy Using Vascular BiometricsProtection of Patient Identity and Privacy Using Vascular Biometrics
Protection of Patient Identity and Privacy Using Vascular Biometrics
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPT
 
Biometrics
BiometricsBiometrics
Biometrics
 

Último

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Último (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Palm vein Technology

  • 1. PALM VEIN TECHNOLOGY YOUR HAND IS THE KEY
  • 2. • Defined as recognizing and identifying a person based on physiological or behavioural characteristics. • Any detail of the human body which differs from one human to other can be used as unique biometric data. BIOMETRICS
  • 3. • Fingerprint authentication system. • Facial recognition. • Iris recognition. • Voice recognition. BIOMETRIC SYSTEMS
  • 4. FINGER PRINT SYSTEM The problems with finger print system …  Can be easily copied.  Wrong results if the finger is dirty or wounded.  False positives if the software is not sufficiently sophisticated.  Concerns over hygiene.
  • 5. FACIAL BIOMETRICS  Susceptible to environmental changes such as lighting.  Depends on the expressions of face.  Changes in appearance with the use of cosmetics, hair styling etc  It's estimated there's a 5% drop in accuracy per year due to aging. The problems with facial biometrics system …
  • 6. IRIS SCANNING The problems with Iris scanning system …  Iris scanners can be easily fooled by a high quality image of an iris or face in place of the real thing.  Accuracy of scanners can be affected by changes in lighting.  More expensive than other forms of biometrics.  Very difficult to perform at a larger distance.
  • 7.  ONE’S PALM is used as the “PASSWORD” for verification.  Has a high level of authentication accuracy due to the uniqueness and complexity of vein patterns of the palm. PALM VEIN TECHNOLOGY
  • 8.  The human palm vein pattern is extremely complex.  Veins are located inside the human body, and therefore it is protected against forgery and manipulation.  The position of the palm vein vessels remain the same for the whole life and its pattern is absolutely unique.  Records vein patterns only in live individuals. Therefore, zero possibility of manipulations involving deceased entities. WHY PALM VEINS?
  • 9. Palm has to be positioned 3-8 cm over the sensor Sensor emits near infrared beam to the palm Oxygen reduced blood within the veins absorbs the near infrared light The sensors wide angular near infrared camera takes a raw image of the palm vein pattern The sensors template library SW changes the raw image into template data The generated template can be stored in either a database PALM VEIN AUTHENTICATION
  • 11. HOW SECURE IS THE TECHNOLOGY? On the basis of testing the technology by Fujitsu :  The system had a False Rejection Rate (FAR) of 0.01% (i.e., only one out of 10,000 scans were incorrect denials for access).  A False Acceptance Rate of less than 0.00008% (i.e., incorrect approval for access in one in over a million scans).
  • 14. APPLICATIONS  ATM’s and banks.  Hospitals and libraries.  Access control.  Personal computers.
  • 15. CONCLUSION  A NEW FACE OF BIOMETRIC.  More reliable and accurate.  Ultra secure and less time consuming.  Wide application range.  Highly user friendly.  Much better than the existing biometric systems.