SlideShare una empresa de Scribd logo
1 de 23
PALM VEIN TECHNOLOGY
    NAME: SATYAJIT DASH
    ROLL NO:




1
Introduction         Accuracy
                          CONTENTS
    Our current security measures      Practical applications
       Overview of Bio-Tech            Advantages
            How it works               Disadvantages
              Data flow                Conclusion
                                       References




2
INTRODUCTION

    • Palm vein technology is one of the upcoming
      technology.
    • It is the world’s first contactless personal
      identification system that uses the vein patterns in
      human palms to confirm a person’s identity.
    • It is highly secure and accurate.
    • The contact less feature gives it a hygienic advantage
      over other biometric authentication technologies.
    • It uses the vascular patterns of an individual’s palm as
      personal identification data.

3
Our Current Security Measures
     Internal               External
       Building Access –      Customer Access –
        Magnetic Card and      ATM card and PIN
        Pin
       Computer Access –
        User ID and
        Password




4
Overview of Bio-Tech
    Technology                   +                 -
    Fingerprint      •Popular            •Less Accurate
                     •Cheapest
        Voice        •Non invasive       •Least Accurate
    Iris & Retinal   •Very accurate      •Invasive
                                         •Expensive
                                         •Sensitive
     Palm Vein       •Non-invasive       •Unfamiliar
                     •Relatively Cheap
                     •Accurate




5
Palm Vein Technology Usability &
    Accuracy Graph




6
How It Works ?




    •Takes snapshot of palm veins
    •Converts into algorithm (ICP)
    •Compares with database




7
How It Works




8
Continue…




9
PALM VEIN PAATTERN VERIFICATION SYSTEM




     The thermal vein pattern verification system involves the
     following stages:
     • Image Acquisition
     • Image enhancement
     • Vein pattern segmentation
     • Skeletonization
10
     • Matching
User Interface




     •Contactless
     •Non-invasive
     •2.18 seconds recognition
     speed




11
 Available Software Development Kit
      Easy to integrate to current company system
  Small
  Cheap to produce
  Easy to Install
  Wide range of operating condition
      Iris scanners are sensitive to light and temp.




12
                              source
Data Flow




13
Accuracy
                                           FALSE ACCEPTANCE     FALSE REJECTION
                         TECHNOLOGY
                                                  RATE                RATE


                          PalmSecure           .00008%               .01%

                          Fingerprint            1-2%                 3%

                              Iris          .0001% - .94%         .99% - .2%

                             Voice                2%                 10%


      Vein patterns
         Distinctive and unique to individuals, even left and right hands.
         Difficult to steal or forge
      False acceptance rate
         A rate at which someone other than the actual person is falsely recognized.
      False rejection rate
         A rate at which the actual person is not recognized accurately.
14
In comparison with others
          technology
     *note – Chart created using average of data provided by the Table




15
Security Evaluation
     There are several common methods of attacking the system

     • Spoofing attacks
     • Replay and transmission attacks



     Known methods of improving security of biometric system
     a. Multimodal biometric system
     b. Biometrics combined with password
     c. Watermarking




16
Points of attacks in a biometric system




17
Practical Applications
 ‘Palm Secure’ is now widely
     used in various fields.
      ATM
         92% of all Japanese ATMs
         18,000+ ATM machines for Bank
           of Tokyo - Mitsubishi
      School ID, Entry Key to private      ATM Machine
       property, Log-in to PCs or servers
      Potential is limitless
 PalmSecure mouse with a build-
     in sensor in 2007
      easily installed to personal
       computer.



18                                          Portable Mouse
ADVANTAGES

• Hidden characteristics are used as biometric features.
• It is difficult to forge for intruders.
• It is not affected by dryness or roughness of skin or by
  physical injury on surface of the hand.
• It has an FRR of 0.01% and FAR of less than 0.00008%.
  This is based on experiments conducted on 70,000
  individuals in Japan.
• This technology is non-intrusive.



 19
DISADVANTAGES
     • There are numerous factors that can affect the quality of
       the captured image such as body
       temperature, humidity, heat radiation, nearness of vein to
       surface, camera calibration and focus.
     • It is still relatively expensive and not available for mass
       production yet.




20
CONCLUSION
Palm vein pattern recognition is a convenient and easy to
use biometric technology with high security and accuracy
level.
The technology is gaining momentum but it is still
expensive and relatively untested because it has not yet
been marketed globally.




 21
QUESTIONS???




22
End of the Presentation

         Thank You.



23

Más contenido relacionado

La actualidad más candente

palm vein technology
palm vein technologypalm vein technology
palm vein technologyRAJASHREE B
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmalAkmal Hussain
 
palm vein technology and its applications
palm vein technology and its applicationspalm vein technology and its applications
palm vein technology and its applicationsAkhil Kumar
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology bhoovi1239
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To BiometricsAbdul Rehman
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprintAnIsh Kumar
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein TechnologyAshwani Kumar
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein TechnologyAshwani Kumar
 
How fingerprint technology work
How fingerprint technology workHow fingerprint technology work
How fingerprint technology workAlisha Korpal
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPTPavan Kumar MT
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationAsim Kumar Pathak
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scannerAusaf khan
 
Money pad the future wallet
Money pad the future walletMoney pad the future wallet
Money pad the future walletLeelakh Sachdeva
 

La actualidad más candente (20)

palm vein technology
palm vein technologypalm vein technology
palm vein technology
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal
 
palm vein technology and its applications
palm vein technology and its applicationspalm vein technology and its applications
palm vein technology and its applications
 
Finger vein technology
Finger vein technologyFinger vein technology
Finger vein technology
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
PALM VEIN TECHNOLOGY..ppt
PALM VEIN TECHNOLOGY..pptPALM VEIN TECHNOLOGY..ppt
PALM VEIN TECHNOLOGY..ppt
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
 
Fingerprint Biometrics
Fingerprint BiometricsFingerprint Biometrics
Fingerprint Biometrics
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
How fingerprint technology work
How fingerprint technology workHow fingerprint technology work
How fingerprint technology work
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scanner
 
Money pad the future wallet
Money pad the future walletMoney pad the future wallet
Money pad the future wallet
 

Destacado (20)

Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
Braingate technology
Braingate technologyBraingate technology
Braingate technology
 
Daknet ppt
Daknet pptDaknet ppt
Daknet ppt
 
RAIN TECHNOLOGY
RAIN TECHNOLOGYRAIN TECHNOLOGY
RAIN TECHNOLOGY
 
Biometric Voting System
Biometric Voting SystemBiometric Voting System
Biometric Voting System
 
Wibree
Wibree Wibree
Wibree
 
Brain gate technology
Brain gate technologyBrain gate technology
Brain gate technology
 
Brain gate
Brain gateBrain gate
Brain gate
 
Eye Movement based Human Computer Interaction Technique
Eye Movement based Human Computer Interaction TechniqueEye Movement based Human Computer Interaction Technique
Eye Movement based Human Computer Interaction Technique
 
NIGHT VISION TECHNOLOGY
NIGHT VISION TECHNOLOGYNIGHT VISION TECHNOLOGY
NIGHT VISION TECHNOLOGY
 
Sky x technology
Sky x technologySky x technology
Sky x technology
 
Cordect
CordectCordect
Cordect
 
DakNet PPT
DakNet PPTDakNet PPT
DakNet PPT
 
Biometric Voting System
Biometric Voting SystemBiometric Voting System
Biometric Voting System
 
BRAIN GATE
BRAIN GATEBRAIN GATE
BRAIN GATE
 
Brain gate
Brain gateBrain gate
Brain gate
 
Rover Technology
Rover TechnologyRover Technology
Rover Technology
 
human computer interface
human computer interfacehuman computer interface
human computer interface
 
Rain technology
Rain technologyRain technology
Rain technology
 
Night vision technology ppt
Night vision technology pptNight vision technology ppt
Night vision technology ppt
 

Similar a Palm-Vein Technology

49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptxssuserb46d43
 
Matrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein ReaderMatrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein Readerlissapenas123
 
Nguyen nielsenkim palmvein
Nguyen nielsenkim palmveinNguyen nielsenkim palmvein
Nguyen nielsenkim palmveinNikhila07
 
Atm using finger print
Atm using finger printAtm using finger print
Atm using finger printManoranjan Roy
 
Palmvein Technology
Palmvein TechnologyPalmvein Technology
Palmvein TechnologySai Divya
 
palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologypptNaga Dinesh
 
Palmvein authentication
Palmvein authenticationPalmvein authentication
Palmvein authenticationSufiyan Arab
 
Biometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnologyBiometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnologySarvani Mallipeddi
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bmbranjith
 
Computer science ppt
Computer science pptComputer science ppt
Computer science pptbrijesh kumar
 
Palm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentationPalm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentationgagana5017
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint TechnologyJoy Dutta
 
Palm veim technology.pptx
Palm veim technology.pptxPalm veim technology.pptx
Palm veim technology.pptxShamamaIbtesam
 

Similar a Palm-Vein Technology (20)

49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx
 
Palm vein new
Palm vein newPalm vein new
Palm vein new
 
Palm vein new
Palm vein newPalm vein new
Palm vein new
 
Matrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein ReaderMatrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein Reader
 
Nguyen nielsenkim palmvein
Nguyen nielsenkim palmveinNguyen nielsenkim palmvein
Nguyen nielsenkim palmvein
 
Atm using finger print
Atm using finger printAtm using finger print
Atm using finger print
 
Palmvein Technology
Palmvein TechnologyPalmvein Technology
Palmvein Technology
 
palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologyppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Palmvein authentication
Palmvein authenticationPalmvein authentication
Palmvein authentication
 
Palmsecure
PalmsecurePalmsecure
Palmsecure
 
Biometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnologyBiometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnology
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
Computer science ppt
Computer science pptComputer science ppt
Computer science ppt
 
Biometrics 2.pptx
Biometrics 2.pptxBiometrics 2.pptx
Biometrics 2.pptx
 
Palm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentationPalm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentation
 
Bio metric security
Bio metric securityBio metric security
Bio metric security
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint Technology
 
Palmvein ppt
Palmvein pptPalmvein ppt
Palmvein ppt
 
Palm veim technology.pptx
Palm veim technology.pptxPalm veim technology.pptx
Palm veim technology.pptx
 

Último

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 

Último (20)

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 

Palm-Vein Technology

  • 1. PALM VEIN TECHNOLOGY NAME: SATYAJIT DASH ROLL NO: 1
  • 2. Introduction  Accuracy CONTENTS Our current security measures  Practical applications Overview of Bio-Tech  Advantages How it works  Disadvantages Data flow  Conclusion  References 2
  • 3. INTRODUCTION • Palm vein technology is one of the upcoming technology. • It is the world’s first contactless personal identification system that uses the vein patterns in human palms to confirm a person’s identity. • It is highly secure and accurate. • The contact less feature gives it a hygienic advantage over other biometric authentication technologies. • It uses the vascular patterns of an individual’s palm as personal identification data. 3
  • 4. Our Current Security Measures  Internal  External  Building Access –  Customer Access – Magnetic Card and ATM card and PIN Pin  Computer Access – User ID and Password 4
  • 5. Overview of Bio-Tech Technology + - Fingerprint •Popular •Less Accurate •Cheapest Voice •Non invasive •Least Accurate Iris & Retinal •Very accurate •Invasive •Expensive •Sensitive Palm Vein •Non-invasive •Unfamiliar •Relatively Cheap •Accurate 5
  • 6. Palm Vein Technology Usability & Accuracy Graph 6
  • 7. How It Works ? •Takes snapshot of palm veins •Converts into algorithm (ICP) •Compares with database 7
  • 10. PALM VEIN PAATTERN VERIFICATION SYSTEM The thermal vein pattern verification system involves the following stages: • Image Acquisition • Image enhancement • Vein pattern segmentation • Skeletonization 10 • Matching
  • 11. User Interface •Contactless •Non-invasive •2.18 seconds recognition speed 11
  • 12.  Available Software Development Kit  Easy to integrate to current company system  Small  Cheap to produce  Easy to Install  Wide range of operating condition  Iris scanners are sensitive to light and temp. 12 source
  • 14. Accuracy FALSE ACCEPTANCE FALSE REJECTION TECHNOLOGY RATE RATE PalmSecure .00008% .01% Fingerprint 1-2% 3% Iris .0001% - .94% .99% - .2% Voice 2% 10%  Vein patterns  Distinctive and unique to individuals, even left and right hands.  Difficult to steal or forge  False acceptance rate  A rate at which someone other than the actual person is falsely recognized.  False rejection rate  A rate at which the actual person is not recognized accurately. 14
  • 15. In comparison with others technology *note – Chart created using average of data provided by the Table 15
  • 16. Security Evaluation There are several common methods of attacking the system • Spoofing attacks • Replay and transmission attacks Known methods of improving security of biometric system a. Multimodal biometric system b. Biometrics combined with password c. Watermarking 16
  • 17. Points of attacks in a biometric system 17
  • 18. Practical Applications  ‘Palm Secure’ is now widely used in various fields.  ATM  92% of all Japanese ATMs  18,000+ ATM machines for Bank of Tokyo - Mitsubishi  School ID, Entry Key to private ATM Machine property, Log-in to PCs or servers  Potential is limitless  PalmSecure mouse with a build- in sensor in 2007  easily installed to personal computer. 18 Portable Mouse
  • 19. ADVANTAGES • Hidden characteristics are used as biometric features. • It is difficult to forge for intruders. • It is not affected by dryness or roughness of skin or by physical injury on surface of the hand. • It has an FRR of 0.01% and FAR of less than 0.00008%. This is based on experiments conducted on 70,000 individuals in Japan. • This technology is non-intrusive. 19
  • 20. DISADVANTAGES • There are numerous factors that can affect the quality of the captured image such as body temperature, humidity, heat radiation, nearness of vein to surface, camera calibration and focus. • It is still relatively expensive and not available for mass production yet. 20
  • 21. CONCLUSION Palm vein pattern recognition is a convenient and easy to use biometric technology with high security and accuracy level. The technology is gaining momentum but it is still expensive and relatively untested because it has not yet been marketed globally. 21
  • 23. End of the Presentation Thank You. 23

Notas del editor

  1. Henrik
  2. Richard
  3. Iris scanners are sensitive to light and temp.Richard
  4. Richard
  5. YooJin
  6. YooJin
  7. YooJin