SlideShare una empresa de Scribd logo
1 de 16
Currently, passwords, Personal Identification
 Numbers or identification cards are used for
 personal identification.

In biometric authentication, an account
 holder’s body characteristics or behaviors are
 registered in a database and then compared
 with others who may try to access that account.
 A key advantage of biometric authentication
is that biometric data is based on physical
characteristics that stay constant throughout
one’s lifetime and are difficult (some more than
others) to fake or change.
 Biometric identification can provide
extremely accurate, secured access to
information; fingerprints, palm vein and iris
scans produce absolutely unique data sets
(when done properly).
   fingerprints,
   faces,
   voice prints and
    palm veins.

Among these, because of its high accuracy, contact less
palm vein authentication technology is being
incorporated
In this technology ONE’S PALM       is used as the
 “PASSWORD” for verification.

 The veins present in the palm of the individual are
 scanned & verified thus providing the access.

Palm vein authentication has a high level of
 authentication accuracy due to the uniqueness and
 complexity of vein patterns of the palm.
 Unlike the skin, through which near-infrared light
  passes, deoxygenated hemoglobin in the blood
  flowing through the veins absorbs near-infrared
  rays, causing it to be visible as black regions to
  the scanner.

 Arteries and capillaries, whose blood contains
 oxygenated hemoglobin, which does not absorb
 near-infrared light, are invisible to the
 sensor, hence we chosen “VEINS”.
An individual's palm vein image is converted by
 algorithms into data points, which is then
 compressed, encrypted, and stored by the
 software person when ever access it, the data is
 compared with stored one, thus verification is
 done.

Fujitsu research is the one main company which
 has come up with first basis of “ PALM VEIN
 TECHNOLOGY”
 On the basis of testing the technology on more than 70,000
  individuals , Fujitsu declared that the new system had a false
  rejection rate of 0.01%.

 In addition the devices ability to perform            personal
  authentication was verified using the following:

 1. Data from people ranging from 6 to 85 years old including
  people in various occupations.

 2. Data about foreigners living in Japan in accordance with the
  world demographics released by the united nations.
 The completely contactless feature of this Device makes it
  suitable for use where high levels of hygiene are
  required.

 It also eliminates any hesitation people might have about
  coming into contact with something that other people have
  already touched.

 In addition to being contactless and thereby hygienic and
  user-friendly in that the user does not need to physically
  touch a surface and is free of such hygiene concerns.
 ATM AND BANKING
 PERSONAL COMPUTERS
 IN HOSPITALS AND LIBRARYS




         (ATM)               ( COMPUTER)
Technology                   +                     -
 Fingerprint     •Popular            •Less Accurate
                 •Cheapest

    Voice        •Non invasive       •Least Accurate

Iris & Retinal   •Very accurate      •Invasive
                                     •Expensive
                                     •Sensitive

 Palm Vein       •Non-invasive       •Unfamiliar
                 •Relatively Cheap
                 •Accurate
Palm vein technology
Palm vein technology
Palm vein technology

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Palm-Vein Technology
Palm-Vein TechnologyPalm-Vein Technology
Palm-Vein Technology
 
palm vein technology
palm vein technologypalm vein technology
palm vein technology
 
Palm vein Technology
Palm vein TechnologyPalm vein Technology
Palm vein Technology
 
Finger vein technology
Finger vein technologyFinger vein technology
Finger vein technology
 
Silent sound technology final report
Silent sound technology final reportSilent sound technology final report
Silent sound technology final report
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
 
face recognition
face recognitionface recognition
face recognition
 
Finger reader
Finger readerFinger reader
Finger reader
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
Abstract Silent Sound Technology
Abstract   Silent Sound TechnologyAbstract   Silent Sound Technology
Abstract Silent Sound Technology
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Finger Print Sensor
Finger Print SensorFinger Print Sensor
Finger Print Sensor
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system ppt
 
FACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTFACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPT
 

Similar a Palm vein technology

Similar a Palm vein technology (20)

palm vein technology
palm vein technologypalm vein technology
palm vein technology
 
PPT (2)
PPT (2)PPT (2)
PPT (2)
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
Plam vein technology
Plam vein technologyPlam vein technology
Plam vein technology
 
palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologyppt
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authentication
 
Alternatives to Paswords
Alternatives to PaswordsAlternatives to Paswords
Alternatives to Paswords
 
Biometrics
BiometricsBiometrics
Biometrics
 
Presentation Fingervein Authentication
Presentation Fingervein AuthenticationPresentation Fingervein Authentication
Presentation Fingervein Authentication
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio Metrics
Bio MetricsBio Metrics
Bio Metrics
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
 
Bio matrix
Bio matrixBio matrix
Bio matrix
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprint
 
Palmvein Technology
Palmvein TechnologyPalmvein Technology
Palmvein Technology
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Computer science ppt
Computer science pptComputer science ppt
Computer science ppt
 

Último

THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 

Último (20)

THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 

Palm vein technology

  • 1.
  • 2. Currently, passwords, Personal Identification Numbers or identification cards are used for personal identification. In biometric authentication, an account holder’s body characteristics or behaviors are registered in a database and then compared with others who may try to access that account.
  • 3.  A key advantage of biometric authentication is that biometric data is based on physical characteristics that stay constant throughout one’s lifetime and are difficult (some more than others) to fake or change.  Biometric identification can provide extremely accurate, secured access to information; fingerprints, palm vein and iris scans produce absolutely unique data sets (when done properly).
  • 4. fingerprints,  faces,  voice prints and  palm veins. Among these, because of its high accuracy, contact less palm vein authentication technology is being incorporated
  • 5. In this technology ONE’S PALM is used as the “PASSWORD” for verification.  The veins present in the palm of the individual are scanned & verified thus providing the access. Palm vein authentication has a high level of authentication accuracy due to the uniqueness and complexity of vein patterns of the palm.
  • 6.
  • 7.
  • 8.  Unlike the skin, through which near-infrared light passes, deoxygenated hemoglobin in the blood flowing through the veins absorbs near-infrared rays, causing it to be visible as black regions to the scanner.  Arteries and capillaries, whose blood contains oxygenated hemoglobin, which does not absorb near-infrared light, are invisible to the sensor, hence we chosen “VEINS”.
  • 9. An individual's palm vein image is converted by algorithms into data points, which is then compressed, encrypted, and stored by the software person when ever access it, the data is compared with stored one, thus verification is done. Fujitsu research is the one main company which has come up with first basis of “ PALM VEIN TECHNOLOGY”
  • 10.  On the basis of testing the technology on more than 70,000 individuals , Fujitsu declared that the new system had a false rejection rate of 0.01%.  In addition the devices ability to perform personal authentication was verified using the following:  1. Data from people ranging from 6 to 85 years old including people in various occupations.  2. Data about foreigners living in Japan in accordance with the world demographics released by the united nations.
  • 11.  The completely contactless feature of this Device makes it suitable for use where high levels of hygiene are required.  It also eliminates any hesitation people might have about coming into contact with something that other people have already touched.  In addition to being contactless and thereby hygienic and user-friendly in that the user does not need to physically touch a surface and is free of such hygiene concerns.
  • 12.  ATM AND BANKING  PERSONAL COMPUTERS  IN HOSPITALS AND LIBRARYS  (ATM) ( COMPUTER)
  • 13. Technology + - Fingerprint •Popular •Less Accurate •Cheapest Voice •Non invasive •Least Accurate Iris & Retinal •Very accurate •Invasive •Expensive •Sensitive Palm Vein •Non-invasive •Unfamiliar •Relatively Cheap •Accurate

Notas del editor

  1. Increasing necessity of e-mail, Internet resources etc, offers serious security concerns. Biometrics is replacing passwords.
  2. without resorting to documents that may be stolen, lost or altered. It is not easy to determine which method of biometric data gathering and reading does the "best" job of ensuring secure authentication. the question is which biometric solution is most appropriate for a given application. Often, the optimal solution utilizes a multi-layered approach, combining biometrics with passwords, PINs and smart cards.
  3. Palm Vein Technology - highly secure black network, reflecting which flashes a near infrared ray on the palm. Unlike the skin, through which near infrared light passes, deoxygenated hemoglobin in the blood flowing through the veins absorbs near infrared rays
  4. The near-infrared rays in the palm vein scanner have no effect on the body when scanning. Arteries and capillaries, whose blood contains oxygenated hemoglobin, each time a person logs in attempting to gain access by a palm scan to a particular bank account or secured entryway, etc., the newly captured image is likewise processed and compared to the registered one or to the bank of stored files for verification,
  5. First the individual places his PALM on the sensor, thus the sensor takes the “PALM VEIN IMAGE” and compares it with the pre-registered one with the help of INFRA RED RAYS.If there is a match then access is allowed, if not access is denied. This system is not at all dangerous. A near infrared ray is a component of sunlight, whose effect is much less than walking in sunlight.
  6. No two people in the wor ld share a palm vein pattern - even those of identical twins will differ.Even if you have registered your profile as a child, the image will still be valid as veins are established in utero (before birth).This technology system had a false rejection rate of 0.01% (i.e., only one out of 10,000 scans were incorrect denials for access)
  7. ANY ????????????????????????