SlideShare a Scribd company logo
1 of 16
PALM VEIN TECHNOLOGY
             Y O U R H AN D I S T H E K E Y
Biometric Systems
FINGER PRINT SYSTEM



The problems with finger print system …



• Finger prints can be easily copied.
• Wrong result if the finger is dirty.
• False positives. If the software is not sufficiently sophisticated
  concerns over hygiene.
• Not everyone would like to put their fingers on a sensor touched by
  others.
FACIAL BIOMETRICS



The problems with facial biometrics system …




• These are susceptible to environmental changes such as lighting.
• With age too, facial recognition deteriorates.
• Changes in appearance with the use of cosmetics, earrings, hair, etc,
   can give wrong readings too.
• It's estimated there's a 5% drop in accuracy per year due to aging.
IRIS SCANNING

The problems with facial biometrics system …




• Many commercial Iris scanners can be easily fooled by a high
   quality image of an iris or face in place of the real thing.
• The accuracy of scanners can be affected by changes in lighting.
• Iris scanners are significantly more expensive than some other forms
   of biometrics.
• Iris recognition is very difficult to perform at a distance larger than a few
   meters.
Palm vein authentication device uses blood vessel patterns as a personal
identifying factor.




Blood vessel patterns are unique to every individual. Even the vein patterns
on each hand are different.
PALM VEIN AUTHENTICATION




    Palm has to be              Sensor emits near             Oxygen reduced blood
    positioned                  infrared                      within the veins absorbs
    3-8 cm over the             beam to the palm              the near infrared light
    sensor




The generated template      The sensors template library   The sensors wide angular near
can be stored in either a   SW changes the raw image       infrared camera takes a raw
database                    into template data             image of the palm vein pattern
WHY VEINS ARE CHOSEN..


• When near-infrared light passes, deoxygenated hemoglobin
  in the blood flowing through the veins absorbs near-infrared rays,
  causing it to be visible as black regions to the scanner.


• Arteries and capillaries, whose blood contains oxygenated hemoglobin,
  which does not absorb near-infrared light, are invisible to the sensor,
  hence “VEINS” are chosen.
HOW SECURE IS THE TECHNOLOGY?
                          HOW SECURE IS THE TECHNOLOGY?



•   On the basis of testing the technology on more than 70,000 individuals,
    Fujitsu declared that the new system had a false rejection rate of 0.01%
    (i.e., only one out of 10,000 scans were incorrect denials for access).


•   And a false acceptance rate of less than 0.00008% (i.e., incorrect approval
    for access in one in over a million scans).


• And if you registered your profile as a child, it'll still be recognized as you
    grow, as an individual's patterns of veins are established in utero
    (before birth).
Overview of Biometrics


Technology                   +                           -
 Fingerprint     •Popular                  •Less Accurate
                 •Cheapest

    Voice        •Non invasive             •Least Accurate

Iris & Retinal   •Very accurate            •Invasive
                                           •Expensive
                                           •Sensitive

 Palm Vein       •Non-invasive             •Unfamiliar
                 •Relatively Cheap
                 •Accurate
ACCURACY



TECHNOLOGY    FALSE ACCEPTANCE RATE   FALSE REJECTION RATE




Palm Secure         .00008%                  .01%

Fingerprint          1-2%                     3%

    Iris         .0001% - .94%            .99% - .2%

   Voice              2%                     10%
COMPARISON
APPLICATIONS

More Related Content

What's hot

What's hot (19)

Palm vein Technology
Palm vein TechnologyPalm vein Technology
Palm vein Technology
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Biometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnologyBiometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnology
 
Palmvein Technology
Palmvein TechnologyPalmvein Technology
Palmvein Technology
 
PPT (2)
PPT (2)PPT (2)
PPT (2)
 
Palmvein ppt
Palmvein pptPalmvein ppt
Palmvein ppt
 
Palm vein-technology.doc
Palm vein-technology.docPalm vein-technology.doc
Palm vein-technology.doc
 
Palm view technology
Palm view technologyPalm view technology
Palm view technology
 
1.palm vein technology(final)
1.palm vein technology(final)1.palm vein technology(final)
1.palm vein technology(final)
 
PALM VEIN TECHNOLOGY
PALM VEIN TECHNOLOGYPALM VEIN TECHNOLOGY
PALM VEIN TECHNOLOGY
 
Palm vein technology latest ppt
Palm vein technology latest pptPalm vein technology latest ppt
Palm vein technology latest ppt
 
palm vein technology
palm vein technologypalm vein technology
palm vein technology
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology
 
Palmsecure
PalmsecurePalmsecure
Palmsecure
 
Palm vein Technology
Palm vein TechnologyPalm vein Technology
Palm vein Technology
 

Viewers also liked

презентация Bio smart 4 2016
презентация Bio smart 4 2016презентация Bio smart 4 2016
презентация Bio smart 4 2016dremin_alex
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein TechnologyAshwani Kumar
 
Medical Identity Theft, Palm Vein Authentication: The Manager's Perspective
Medical Identity Theft, Palm Vein Authentication: The Manager's PerspectiveMedical Identity Theft, Palm Vein Authentication: The Manager's Perspective
Medical Identity Theft, Palm Vein Authentication: The Manager's PerspectiveCRUZ CERDA
 
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...M2SYS Technology
 
Seminar report format b.tech
Seminar report format b.techSeminar report format b.tech
Seminar report format b.techRohit Kumar
 

Viewers also liked (6)

BioSmart
BioSmartBioSmart
BioSmart
 
презентация Bio smart 4 2016
презентация Bio smart 4 2016презентация Bio smart 4 2016
презентация Bio smart 4 2016
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Medical Identity Theft, Palm Vein Authentication: The Manager's Perspective
Medical Identity Theft, Palm Vein Authentication: The Manager's PerspectiveMedical Identity Theft, Palm Vein Authentication: The Manager's Perspective
Medical Identity Theft, Palm Vein Authentication: The Manager's Perspective
 
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
 
Seminar report format b.tech
Seminar report format b.techSeminar report format b.tech
Seminar report format b.tech
 

Similar to Plam vein technology

Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein TechnologyAnkan Das
 
Biometics technology
Biometics technologyBiometics technology
Biometics technologyPraween Lakra
 
palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologypptNaga Dinesh
 
Fingerprint Recognition
Fingerprint RecognitionFingerprint Recognition
Fingerprint RecognitionMirza Baig
 
Palm veim technology.pptx
Palm veim technology.pptxPalm veim technology.pptx
Palm veim technology.pptxShamamaIbtesam
 
SEMINAR FIRST.pptx
SEMINAR FIRST.pptxSEMINAR FIRST.pptx
SEMINAR FIRST.pptxAlenJames14
 
Fingerprint information hiding secur.ppt
Fingerprint information hiding secur.pptFingerprint information hiding secur.ppt
Fingerprint information hiding secur.pptnaghamallella
 
Matrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein ReaderMatrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein Readerlissapenas123
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognitionsunjaysahu
 
Top Biometric Identifiers: Risks & Rewards
Top Biometric Identifiers: Risks & RewardsTop Biometric Identifiers: Risks & Rewards
Top Biometric Identifiers: Risks & RewardsVeridium
 
Iris scanning
Iris scanningIris scanning
Iris scanningNikithaME
 
biometry-160212135415 (1).pdf
biometry-160212135415 (1).pdfbiometry-160212135415 (1).pdf
biometry-160212135415 (1).pdfssuser0f453c
 

Similar to Plam vein technology (20)

palm vein technology
palm vein technologypalm vein technology
palm vein technology
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologyppt
 
Fingerprint Recognition
Fingerprint RecognitionFingerprint Recognition
Fingerprint Recognition
 
Palm veim technology.pptx
Palm veim technology.pptxPalm veim technology.pptx
Palm veim technology.pptx
 
Palm vein new
Palm vein newPalm vein new
Palm vein new
 
SEMINAR FIRST.pptx
SEMINAR FIRST.pptxSEMINAR FIRST.pptx
SEMINAR FIRST.pptx
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Fingerprint information hiding secur.ppt
Fingerprint information hiding secur.pptFingerprint information hiding secur.ppt
Fingerprint information hiding secur.ppt
 
Matrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein ReaderMatrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein Reader
 
PALM VEIN TECHNOLOGY..ppt
PALM VEIN TECHNOLOGY..pptPALM VEIN TECHNOLOGY..ppt
PALM VEIN TECHNOLOGY..ppt
 
Biometric by amin
Biometric by aminBiometric by amin
Biometric by amin
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Top Biometric Identifiers: Risks & Rewards
Top Biometric Identifiers: Risks & RewardsTop Biometric Identifiers: Risks & Rewards
Top Biometric Identifiers: Risks & Rewards
 
Iris scan.ppt 1
Iris scan.ppt 1Iris scan.ppt 1
Iris scan.ppt 1
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Biometric
Biometric Biometric
Biometric
 
biometry-160212135415 (1).pdf
biometry-160212135415 (1).pdfbiometry-160212135415 (1).pdf
biometry-160212135415 (1).pdf
 

Recently uploaded

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 

Recently uploaded (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 

Plam vein technology

  • 1. PALM VEIN TECHNOLOGY Y O U R H AN D I S T H E K E Y
  • 3. FINGER PRINT SYSTEM The problems with finger print system … • Finger prints can be easily copied. • Wrong result if the finger is dirty. • False positives. If the software is not sufficiently sophisticated concerns over hygiene. • Not everyone would like to put their fingers on a sensor touched by others.
  • 4. FACIAL BIOMETRICS The problems with facial biometrics system … • These are susceptible to environmental changes such as lighting. • With age too, facial recognition deteriorates. • Changes in appearance with the use of cosmetics, earrings, hair, etc, can give wrong readings too. • It's estimated there's a 5% drop in accuracy per year due to aging.
  • 5. IRIS SCANNING The problems with facial biometrics system … • Many commercial Iris scanners can be easily fooled by a high quality image of an iris or face in place of the real thing. • The accuracy of scanners can be affected by changes in lighting. • Iris scanners are significantly more expensive than some other forms of biometrics. • Iris recognition is very difficult to perform at a distance larger than a few meters.
  • 6. Palm vein authentication device uses blood vessel patterns as a personal identifying factor. Blood vessel patterns are unique to every individual. Even the vein patterns on each hand are different.
  • 7. PALM VEIN AUTHENTICATION Palm has to be Sensor emits near Oxygen reduced blood positioned infrared within the veins absorbs 3-8 cm over the beam to the palm the near infrared light sensor The generated template The sensors template library The sensors wide angular near can be stored in either a SW changes the raw image infrared camera takes a raw database into template data image of the palm vein pattern
  • 8. WHY VEINS ARE CHOSEN.. • When near-infrared light passes, deoxygenated hemoglobin in the blood flowing through the veins absorbs near-infrared rays, causing it to be visible as black regions to the scanner. • Arteries and capillaries, whose blood contains oxygenated hemoglobin, which does not absorb near-infrared light, are invisible to the sensor, hence “VEINS” are chosen.
  • 9.
  • 10.
  • 11.
  • 12. HOW SECURE IS THE TECHNOLOGY? HOW SECURE IS THE TECHNOLOGY? • On the basis of testing the technology on more than 70,000 individuals, Fujitsu declared that the new system had a false rejection rate of 0.01% (i.e., only one out of 10,000 scans were incorrect denials for access). • And a false acceptance rate of less than 0.00008% (i.e., incorrect approval for access in one in over a million scans). • And if you registered your profile as a child, it'll still be recognized as you grow, as an individual's patterns of veins are established in utero (before birth).
  • 13. Overview of Biometrics Technology + - Fingerprint •Popular •Less Accurate •Cheapest Voice •Non invasive •Least Accurate Iris & Retinal •Very accurate •Invasive •Expensive •Sensitive Palm Vein •Non-invasive •Unfamiliar •Relatively Cheap •Accurate
  • 14. ACCURACY TECHNOLOGY FALSE ACCEPTANCE RATE FALSE REJECTION RATE Palm Secure .00008% .01% Fingerprint 1-2% 3% Iris .0001% - .94% .99% - .2% Voice 2% 10%