SlideShare una empresa de Scribd logo
1 de 18
PALM VEIN TECHNOLOGY
SUBMITTED BY:
MANAV MITTAL
1
INTRODUCTION
• Palm vein technology is one of the upcoming
technology.
• It is the world’s first contactless personal
identification system that uses the vein patterns in
human palms to confirm a person’s identity.
• It is highly secure and accurate.
• The contact less feature gives it a hygienic advantage
over other biometric authentication technologies.
• It uses the vascular patterns of an individual’s palm as
personal identification data.
2
Our Current Security Measures
• Internal
– Building Access –
Magnetic Card
and Pin
– Computer Access
– User ID and
Password
• External
– Customer Access
– ATM card and
PIN
3
Technology + -
Fingerprint •Popular
•Cheapest
•Less Accurate
Voice •Non invasive •Least Accurate
Iris & Retinal •Very accurate •Invasive
•Expensive
•Sensitive
Palm Vein •Non-invasive
•Relatively Cheap
•Accurate
•Unfamiliar
source
source
source
Overview of Bio-Tech
4
HOW IT WORKS
•Takes snapshot of palm veins
•Converts into algorithm (ICP)
•Compares with database
source
5
PALM VEIN PAATTERN VERIFICATION SYSTEM
The thermal vein pattern verification system involves
the following stages:
• Image Acquisition
• Image enhancement
• Vein pattern segmentation
• Skeletonization
• Matching
6
User Interface
•Contactless
•Non-invasive
•2.18 seconds recognition
speed
source
7
• Available Software Development Kit
– Easy to integrate to current company
system
• Small
• Cheap to produce
• Easy to Install
• Wide range of operating condition
– Iris scanners are sensitive to light and
temp.
source
8
Data Flow
9
Accuracy
TECHNOLOGY
FALSE ACCEPTANCE
RATE
FALSE REJECTION
RATE
PalmSecure .00008% .01%
Fingerprint 1-2% 3%
Iris .0001% - .94% .99% - .2%
Voice 2% 10%
• Vein patterns
– Distinctive and unique to individuals, even left and right hands.
– Difficult to steal or forge
• False acceptance rate
– A rate at which someone other than the actual person is falsely recognized.
• False rejection rate
– A rate at which the actual person is not recognized accurately.
10
In comparison with others
technology
*note – Chart created using average of data provided by the Table
11
Security Evaluation
There are several common methods of attacking the system
• Spoofing attacks
• Replay and transmission attacks
Known methods of improving security of biometric system
a. Multimodal biometric system
b. Biometrics combined with password
c. Watermarking
12
Practical Applications
Portable Mouse
ATM Machine
• ‘Palm Secure’ is now widely
used in various fields.
– ATM
• 92% of all Japanese ATMs
• 18,000+ ATM machines for
Bank of Tokyo - Mitsubishi
– School ID, Entry Key to
private property, Log-in to
PCs or servers
– Potential is limitless
• PalmSecure mouse with a
build-in sensor in 2007
– easily installed to personal
computer.
13
• Hidden characteristics are used as biometric features.
• It is difficult to forge for intruders.
• It is not affected by dryness or roughness of skin or by
physical injury on surface of the hand.
• It has an FRR of 0.01% and FAR of less than 0.00008%.
This is based on experiments conducted on 70,000
individuals in Japan.
• This technology is non-intrusive.
ADVANTAGES
14
• There are numerous factors that can affect the
quality of the captured image such as body
temperature, humidity, heat radiation, nearness of
vein to surface, camera calibration and focus.
• It is still relatively expensive and not available for
mass production yet.
DISADVANTAGES
15
CONCLUSION
Palm vein pattern recognition is a convenient and
easy to use biometric technology with high security
and accuracy level.
The technology is gaining momentum but it is still
expensive and relatively untested because it has not
yet been marketed globally.
16
QUESTIONS???
17
End of the Presentation
Thank You.
18

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Palm vein Technology
Palm vein TechnologyPalm vein Technology
Palm vein Technology
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
palm vein technology
palm vein technologypalm vein technology
palm vein technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
 
BIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEMBIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEM
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
Biometric recognition using deep learning
Biometric recognition using deep learningBiometric recognition using deep learning
Biometric recognition using deep learning
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
An atm with an iris recognition
An atm with an iris recognitionAn atm with an iris recognition
An atm with an iris recognition
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
 
Moneypad- The future wallet
Moneypad- The future walletMoneypad- The future wallet
Moneypad- The future wallet
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
 

Destacado

24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmalAkmal Hussain
 
PALM VEIN TECHNOLOGY
PALM VEIN TECHNOLOGYPALM VEIN TECHNOLOGY
PALM VEIN TECHNOLOGYSagar Pudi
 
Plam vein technology
Plam vein technologyPlam vein technology
Plam vein technologyDinesh Ediga
 
Elliptic Curve Cryptography: Arithmetic behind
Elliptic Curve Cryptography: Arithmetic behindElliptic Curve Cryptography: Arithmetic behind
Elliptic Curve Cryptography: Arithmetic behindAyan Sengupta
 
ECC vs RSA: Battle of the Crypto-Ninjas
ECC vs RSA: Battle of the Crypto-NinjasECC vs RSA: Battle of the Crypto-Ninjas
ECC vs RSA: Battle of the Crypto-NinjasJames McGivern
 
Elliptic Curves and Elliptic Curve Cryptography
Elliptic Curves and Elliptic Curve CryptographyElliptic Curves and Elliptic Curve Cryptography
Elliptic Curves and Elliptic Curve CryptographyMd. Al-Amin Khandaker Nipu
 
Elliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge ProofElliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge ProofArunanand Ta
 
Matrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein ReaderMatrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein Readerlissapenas123
 
Night Vision Technology.Final
Night Vision Technology.FinalNight Vision Technology.Final
Night Vision Technology.Finalpratik665
 
NIGHT VISION TECHNOLOGY
NIGHT VISION TECHNOLOGYNIGHT VISION TECHNOLOGY
NIGHT VISION TECHNOLOGYMihika Shah
 
Night vision technology ppt
Night vision technology pptNight vision technology ppt
Night vision technology pptEkta Singh
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final pptAnkita Vanage
 
Seminar on night vision technology ppt
Seminar on night vision technology pptSeminar on night vision technology ppt
Seminar on night vision technology pptdeepakmarndi
 

Destacado (19)

PPT (2)
PPT (2)PPT (2)
PPT (2)
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal
 
PALM VEIN TECHNOLOGY
PALM VEIN TECHNOLOGYPALM VEIN TECHNOLOGY
PALM VEIN TECHNOLOGY
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
Plam vein technology
Plam vein technologyPlam vein technology
Plam vein technology
 
Elliptic Curve Cryptography: Arithmetic behind
Elliptic Curve Cryptography: Arithmetic behindElliptic Curve Cryptography: Arithmetic behind
Elliptic Curve Cryptography: Arithmetic behind
 
Elliptic curvecryptography Shane Almeida Saqib Awan Dan Palacio
Elliptic curvecryptography Shane Almeida Saqib Awan Dan PalacioElliptic curvecryptography Shane Almeida Saqib Awan Dan Palacio
Elliptic curvecryptography Shane Almeida Saqib Awan Dan Palacio
 
ECC vs RSA: Battle of the Crypto-Ninjas
ECC vs RSA: Battle of the Crypto-NinjasECC vs RSA: Battle of the Crypto-Ninjas
ECC vs RSA: Battle of the Crypto-Ninjas
 
Elliptic Curves and Elliptic Curve Cryptography
Elliptic Curves and Elliptic Curve CryptographyElliptic Curves and Elliptic Curve Cryptography
Elliptic Curves and Elliptic Curve Cryptography
 
Palmvein ppt
Palmvein pptPalmvein ppt
Palmvein ppt
 
Elliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge ProofElliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge Proof
 
Matrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein ReaderMatrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein Reader
 
Night Vision Technology.Final
Night Vision Technology.FinalNight Vision Technology.Final
Night Vision Technology.Final
 
Blue Brain
Blue Brain Blue Brain
Blue Brain
 
NIGHT VISION TECHNOLOGY
NIGHT VISION TECHNOLOGYNIGHT VISION TECHNOLOGY
NIGHT VISION TECHNOLOGY
 
Night vision technology ppt
Night vision technology pptNight vision technology ppt
Night vision technology ppt
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Seminar on night vision technology ppt
Seminar on night vision technology pptSeminar on night vision technology ppt
Seminar on night vision technology ppt
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Similar a Palm Vein Technology

49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptxssuserb46d43
 
Computer science ppt
Computer science pptComputer science ppt
Computer science pptbrijesh kumar
 
finger print based door lock.pptx
finger print based door lock.pptxfinger print based door lock.pptx
finger print based door lock.pptxPooja541216
 
Palmvein authentication
Palmvein authenticationPalmvein authentication
Palmvein authenticationSufiyan Arab
 
Palm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentationPalm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentationgagana5017
 
Bank locker system
Bank locker systemBank locker system
Bank locker systemRahul Wagh
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint TechnologyJoy Dutta
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprintSagar Verma
 
palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologypptNaga Dinesh
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Palak Pandoh
 
project ppt.pptx
project ppt.pptxproject ppt.pptx
project ppt.pptxBhavanaKs10
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensorsJeffrey Funk
 
Atm using finger print
Atm using finger printAtm using finger print
Atm using finger printManoranjan Roy
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bmbranjith
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...IJRTEMJOURNAL
 
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...inventionjournals
 

Similar a Palm Vein Technology (20)

49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx
 
Computer science ppt
Computer science pptComputer science ppt
Computer science ppt
 
finger print based door lock.pptx
finger print based door lock.pptxfinger print based door lock.pptx
finger print based door lock.pptx
 
Palmvein authentication
Palmvein authenticationPalmvein authentication
Palmvein authentication
 
Palm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentationPalm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentation
 
Bank locker system
Bank locker systemBank locker system
Bank locker system
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint Technology
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprint
 
palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologyppt
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)
 
project ppt.pptx
project ppt.pptxproject ppt.pptx
project ppt.pptx
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 
Atm using finger print
Atm using finger printAtm using finger print
Atm using finger print
 
Access controls
Access controlsAccess controls
Access controls
 
Bio metric security
Bio metric securityBio metric security
Bio metric security
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
Finger print ATM
Finger print ATMFinger print ATM
Finger print ATM
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
 
Biometrics
BiometricsBiometrics
Biometrics
 

Más de Manav Mittal

Intelligent road roller
Intelligent road rollerIntelligent road roller
Intelligent road rollerManav Mittal
 
Scada monitoring system
Scada monitoring systemScada monitoring system
Scada monitoring systemManav Mittal
 
Moving object detection
Moving object detectionMoving object detection
Moving object detectionManav Mittal
 
Electronic Walking Stick
Electronic Walking StickElectronic Walking Stick
Electronic Walking StickManav Mittal
 

Más de Manav Mittal (7)

Intelligent road roller
Intelligent road rollerIntelligent road roller
Intelligent road roller
 
Scada monitoring system
Scada monitoring systemScada monitoring system
Scada monitoring system
 
Green computing
Green computingGreen computing
Green computing
 
Moving object detection
Moving object detectionMoving object detection
Moving object detection
 
NTPC training
NTPC trainingNTPC training
NTPC training
 
Siemag training
Siemag trainingSiemag training
Siemag training
 
Electronic Walking Stick
Electronic Walking StickElectronic Walking Stick
Electronic Walking Stick
 

Último

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 

Último (20)

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 

Palm Vein Technology

  • 1. PALM VEIN TECHNOLOGY SUBMITTED BY: MANAV MITTAL 1
  • 2. INTRODUCTION • Palm vein technology is one of the upcoming technology. • It is the world’s first contactless personal identification system that uses the vein patterns in human palms to confirm a person’s identity. • It is highly secure and accurate. • The contact less feature gives it a hygienic advantage over other biometric authentication technologies. • It uses the vascular patterns of an individual’s palm as personal identification data. 2
  • 3. Our Current Security Measures • Internal – Building Access – Magnetic Card and Pin – Computer Access – User ID and Password • External – Customer Access – ATM card and PIN 3
  • 4. Technology + - Fingerprint •Popular •Cheapest •Less Accurate Voice •Non invasive •Least Accurate Iris & Retinal •Very accurate •Invasive •Expensive •Sensitive Palm Vein •Non-invasive •Relatively Cheap •Accurate •Unfamiliar source source source Overview of Bio-Tech 4
  • 5. HOW IT WORKS •Takes snapshot of palm veins •Converts into algorithm (ICP) •Compares with database source 5
  • 6. PALM VEIN PAATTERN VERIFICATION SYSTEM The thermal vein pattern verification system involves the following stages: • Image Acquisition • Image enhancement • Vein pattern segmentation • Skeletonization • Matching 6
  • 8. • Available Software Development Kit – Easy to integrate to current company system • Small • Cheap to produce • Easy to Install • Wide range of operating condition – Iris scanners are sensitive to light and temp. source 8
  • 10. Accuracy TECHNOLOGY FALSE ACCEPTANCE RATE FALSE REJECTION RATE PalmSecure .00008% .01% Fingerprint 1-2% 3% Iris .0001% - .94% .99% - .2% Voice 2% 10% • Vein patterns – Distinctive and unique to individuals, even left and right hands. – Difficult to steal or forge • False acceptance rate – A rate at which someone other than the actual person is falsely recognized. • False rejection rate – A rate at which the actual person is not recognized accurately. 10
  • 11. In comparison with others technology *note – Chart created using average of data provided by the Table 11
  • 12. Security Evaluation There are several common methods of attacking the system • Spoofing attacks • Replay and transmission attacks Known methods of improving security of biometric system a. Multimodal biometric system b. Biometrics combined with password c. Watermarking 12
  • 13. Practical Applications Portable Mouse ATM Machine • ‘Palm Secure’ is now widely used in various fields. – ATM • 92% of all Japanese ATMs • 18,000+ ATM machines for Bank of Tokyo - Mitsubishi – School ID, Entry Key to private property, Log-in to PCs or servers – Potential is limitless • PalmSecure mouse with a build-in sensor in 2007 – easily installed to personal computer. 13
  • 14. • Hidden characteristics are used as biometric features. • It is difficult to forge for intruders. • It is not affected by dryness or roughness of skin or by physical injury on surface of the hand. • It has an FRR of 0.01% and FAR of less than 0.00008%. This is based on experiments conducted on 70,000 individuals in Japan. • This technology is non-intrusive. ADVANTAGES 14
  • 15. • There are numerous factors that can affect the quality of the captured image such as body temperature, humidity, heat radiation, nearness of vein to surface, camera calibration and focus. • It is still relatively expensive and not available for mass production yet. DISADVANTAGES 15
  • 16. CONCLUSION Palm vein pattern recognition is a convenient and easy to use biometric technology with high security and accuracy level. The technology is gaining momentum but it is still expensive and relatively untested because it has not yet been marketed globally. 16
  • 18. End of the Presentation Thank You. 18

Notas del editor

  1. Henrik
  2. Richard
  3. Iris scanners are sensitive to light and temp.Richard
  4. Richard
  5. YooJin
  6. YooJin
  7. YooJin