SlideShare una empresa de Scribd logo
1 de 17
PALM VEIN TECHNOLOGY
What is biometrics??
Biometrics can be defined as
recognizing and identifying a
person based on
physiological or behavioral
characteristics
The behavioral
characteristics measure the
movement of a user, when
users walk, speak, type on a
keyboard or sign their name.
The physiological
characteristics would be the
physical human traits like
fingerprints, hand shape,
eyes and face, veins, etc
Disadvantages of other technologies
1 )Finger print
• Some people may feel offended about placing
their fingers on the same place where many
other people have continuously touched
• Wrong results if the finger is dirty.
2)Face recognition
• 2D recognition is affected by changes in
lighting, the person’s hair, the age ,and if the
person wear glasses.
Disadvantages of other technologies
1 )Finger print
• Some people may feel
offended about placing
their fingers on the same
place where many other
people have continuously
touched
• Wrong results if the finger is
dirty.
2)Face recognition
• 2D recognition is affected
by changes in lighting, the
person’s hair, the age ,and if
the person wear glasses.
• It also depends on orientation/angle of user’s
face with camera
3)IRIS scan
• Difficult to use because of positioning eye.
Requires more time for matching with database
stored
• Many commercial Iris scanners can be easily
fooled by a high quality image of an iris or face in
place of the real thing
INTRODUCTION
• Palm vein technology is the upcoming
technology in this world
• It is the worlds first contactless personal
identification system that uses the vein
pattern in human palm to confirm persons
identity
• It is one of the biometric authentication
technology, which identifies people by their
unique biological information
How does it work?
Simply hold your palm a few
centimeters over the scanner and with
a second it reads your unique vein
pattern .
when near-infrared light passes,
deoxygenated hemoglobin in the blood
flowing through the veins absorbs near-
infrared rays, causing it to be visible as
black regions to the scanner
• Then it compares it with the pre registered
one with the help of infra red rays
• Generated image is digitized,encrypted &
finally stored as a registered image template
in database
• If there is a match found then access is
allowed else access is denied
How secure is this technology?
• On the basis of testing the technology on more
than 70,000 individuals, Fujitsu declared that the
new system had a false rejection rate of 0.01%
• And a false acceptance rate of less than 0.00008%
(i.e., incorrect approval for access in one in over a
million scan
• And if you registered your profile as a child, itll
still be recognized as you grow, as an individuals
patterns of veins are established in utero
What happens if hands get damaged
• There may be a chance that the palm we had
registered may get damaged then we cannot use
this technology.
• During the time of registration we take the veins
of both the hands so that if one gets damaged we
can access through the second hand.
• When hand get damaged upto large extent we
can get veins because deeper into the hand veins
are obtained
Applications
• ATM & BANKING
• PERSONAL COMPUTERS
• HOSPITALS &LIBRARIES
ATM & BANKING
• The Bank of Tokyo launched its
“Super –IC Card”.
• This card combines the functions
of a bankcard, credit card,
electronic money and palm vein
authentication.
• This system is advantageous
because the customer’s
information is not stored at the
bank.
• To activate the palm vein
authentication function, the
customer brings the card and his
passbook and seal to the bank
counter where the customers
vein information is registered on
the card .
PERSONALCOMPUTERS
In personal computers palm vein technology can be
applied by inserting the vein sensor inside mouse or
on the keyboard. When power is supplied to system
the mouse/keyboard also gets power and the sensor
in the mouse/keyboard will be ready to sense palm
veins
IN HOSPITALS AND LIBRARYS
Palm Secure device can also be used in hospitals for
doctor and patient’s identification and where the high
level of security is required
ADVANTAGES
• This technology is,
— More Reliable, More Accurate
— Fast
— Small
— Relatively cheap to implemented and operate
• —No more problems of forgotten passwords
and id codes.
• —No two people in the world share a palm vein
pattern- even those of identical twins differ.
Conclusion
• Palm vein pattern authentication technology
developed by Fujitsu was being used in a wide range
• If this technology is introduced in our country we can
solve many problems such as password protection in
ATM , security in various fields and if we implement
this technology in government offices we can make
the employees to work according the government
timings. surely this technology will bring a revolution
in the field of science and technology in the near
future.

Más contenido relacionado

La actualidad más candente

Presentation Fingervein Authentication
Presentation Fingervein AuthenticationPresentation Fingervein Authentication
Presentation Fingervein AuthenticationANEESH SASIDHARAN
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentationrs2003
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final pptAnkita Vanage
 
palm vein technology and its applications
palm vein technology and its applicationspalm vein technology and its applications
palm vein technology and its applicationsAkhil Kumar
 
Palm-Vein Technology
Palm-Vein TechnologyPalm-Vein Technology
Palm-Vein TechnologyPapun Papun
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentationVivek Kumar
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and SecurityShreyans Jain
 
Vein Recognition Method
Vein Recognition MethodVein Recognition Method
Vein Recognition MethodHafsa Tahir
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPTsravya raju
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology pptDhara k
 

La actualidad más candente (20)

Palm vein Technology
Palm vein TechnologyPalm vein Technology
Palm vein Technology
 
Presentation Fingervein Authentication
Presentation Fingervein AuthenticationPresentation Fingervein Authentication
Presentation Fingervein Authentication
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
palm vein technology and its applications
palm vein technology and its applicationspalm vein technology and its applications
palm vein technology and its applications
 
Palm-Vein Technology
Palm-Vein TechnologyPalm-Vein Technology
Palm-Vein Technology
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentation
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and Security
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
Vein Recognition Method
Vein Recognition MethodVein Recognition Method
Vein Recognition Method
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
 
ECG BIOMETRICS
ECG BIOMETRICSECG BIOMETRICS
ECG BIOMETRICS
 

Destacado

Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1leenak770
 
Introduction to pattern recognization
Introduction to pattern recognizationIntroduction to pattern recognization
Introduction to pattern recognizationAjharul Abedeen
 
1.palm vein technology(final)
1.palm vein technology(final)1.palm vein technology(final)
1.palm vein technology(final)Ojal Katiyar
 
Pattern Recognition and its Applications
Pattern Recognition and its ApplicationsPattern Recognition and its Applications
Pattern Recognition and its ApplicationsSajida Mohammad
 
Artificial intelligence Pattern recognition system
Artificial intelligence Pattern recognition systemArtificial intelligence Pattern recognition system
Artificial intelligence Pattern recognition systemREHMAT ULLAH
 

Destacado (10)

Pattern Recognition
Pattern RecognitionPattern Recognition
Pattern Recognition
 
Pattern recognition
Pattern recognitionPattern recognition
Pattern recognition
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1
 
Introduction to pattern recognization
Introduction to pattern recognizationIntroduction to pattern recognization
Introduction to pattern recognization
 
1.palm vein technology(final)
1.palm vein technology(final)1.palm vein technology(final)
1.palm vein technology(final)
 
Pattern Recognition and its Applications
Pattern Recognition and its ApplicationsPattern Recognition and its Applications
Pattern Recognition and its Applications
 
Artificial intelligence Pattern recognition system
Artificial intelligence Pattern recognition systemArtificial intelligence Pattern recognition system
Artificial intelligence Pattern recognition system
 
Pattern Recognition
Pattern RecognitionPattern Recognition
Pattern Recognition
 
Pattern recognition
Pattern recognitionPattern recognition
Pattern recognition
 
Introduction to pattern recognition
Introduction to pattern recognitionIntroduction to pattern recognition
Introduction to pattern recognition
 

Similar a PALM VEIN BIOMETRIC TECHNOLOGY

palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologypptNaga Dinesh
 
Palmvein Technology
Palmvein TechnologyPalmvein Technology
Palmvein TechnologySai Divya
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmalAkmal Hussain
 
Biometics technology
Biometics technologyBiometics technology
Biometics technologyPraween Lakra
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprintSagar Verma
 
Palm veim technology.pptx
Palm veim technology.pptxPalm veim technology.pptx
Palm veim technology.pptxShamamaIbtesam
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptascg121433
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxCoreGaming3
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition TechnologyRutikBhoyar
 
Palm vein technology latest ppt
Palm vein technology latest pptPalm vein technology latest ppt
Palm vein technology latest pptvishesh2969
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security techmmubashirkhan
 
palm vein technology (1).pptx
palm vein technology (1).pptxpalm vein technology (1).pptx
palm vein technology (1).pptxPallavi Goli
 
It's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfIt's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfpreethi3173
 

Similar a PALM VEIN BIOMETRIC TECHNOLOGY (20)

Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologyppt
 
PPT (2)
PPT (2)PPT (2)
PPT (2)
 
Palmvein Technology
Palmvein TechnologyPalmvein Technology
Palmvein Technology
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprint
 
Palm veim technology.pptx
Palm veim technology.pptxPalm veim technology.pptx
Palm veim technology.pptx
 
Palm view technology
Palm view technologyPalm view technology
Palm view technology
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
Palmsecure
PalmsecurePalmsecure
Palmsecure
 
Biometrics
BiometricsBiometrics
Biometrics
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition Technology
 
Palm vein technology latest ppt
Palm vein technology latest pptPalm vein technology latest ppt
Palm vein technology latest ppt
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
 
palm vein technology (1).pptx
palm vein technology (1).pptxpalm vein technology (1).pptx
palm vein technology (1).pptx
 
Biometric by amin
Biometric by aminBiometric by amin
Biometric by amin
 
It's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfIt's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdf
 

Último

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 

PALM VEIN BIOMETRIC TECHNOLOGY

  • 2. What is biometrics?? Biometrics can be defined as recognizing and identifying a person based on physiological or behavioral characteristics The behavioral characteristics measure the movement of a user, when users walk, speak, type on a keyboard or sign their name. The physiological characteristics would be the physical human traits like fingerprints, hand shape, eyes and face, veins, etc
  • 3. Disadvantages of other technologies 1 )Finger print • Some people may feel offended about placing their fingers on the same place where many other people have continuously touched • Wrong results if the finger is dirty. 2)Face recognition • 2D recognition is affected by changes in lighting, the person’s hair, the age ,and if the person wear glasses.
  • 4. Disadvantages of other technologies 1 )Finger print • Some people may feel offended about placing their fingers on the same place where many other people have continuously touched • Wrong results if the finger is dirty. 2)Face recognition • 2D recognition is affected by changes in lighting, the person’s hair, the age ,and if the person wear glasses.
  • 5. • It also depends on orientation/angle of user’s face with camera 3)IRIS scan • Difficult to use because of positioning eye. Requires more time for matching with database stored • Many commercial Iris scanners can be easily fooled by a high quality image of an iris or face in place of the real thing
  • 6. INTRODUCTION • Palm vein technology is the upcoming technology in this world • It is the worlds first contactless personal identification system that uses the vein pattern in human palm to confirm persons identity • It is one of the biometric authentication technology, which identifies people by their unique biological information
  • 7. How does it work? Simply hold your palm a few centimeters over the scanner and with a second it reads your unique vein pattern .
  • 8. when near-infrared light passes, deoxygenated hemoglobin in the blood flowing through the veins absorbs near- infrared rays, causing it to be visible as black regions to the scanner
  • 9. • Then it compares it with the pre registered one with the help of infra red rays • Generated image is digitized,encrypted & finally stored as a registered image template in database • If there is a match found then access is allowed else access is denied
  • 10. How secure is this technology? • On the basis of testing the technology on more than 70,000 individuals, Fujitsu declared that the new system had a false rejection rate of 0.01% • And a false acceptance rate of less than 0.00008% (i.e., incorrect approval for access in one in over a million scan • And if you registered your profile as a child, itll still be recognized as you grow, as an individuals patterns of veins are established in utero
  • 11. What happens if hands get damaged • There may be a chance that the palm we had registered may get damaged then we cannot use this technology. • During the time of registration we take the veins of both the hands so that if one gets damaged we can access through the second hand. • When hand get damaged upto large extent we can get veins because deeper into the hand veins are obtained
  • 12. Applications • ATM & BANKING • PERSONAL COMPUTERS • HOSPITALS &LIBRARIES
  • 13. ATM & BANKING • The Bank of Tokyo launched its “Super –IC Card”. • This card combines the functions of a bankcard, credit card, electronic money and palm vein authentication. • This system is advantageous because the customer’s information is not stored at the bank. • To activate the palm vein authentication function, the customer brings the card and his passbook and seal to the bank counter where the customers vein information is registered on the card .
  • 14. PERSONALCOMPUTERS In personal computers palm vein technology can be applied by inserting the vein sensor inside mouse or on the keyboard. When power is supplied to system the mouse/keyboard also gets power and the sensor in the mouse/keyboard will be ready to sense palm veins
  • 15. IN HOSPITALS AND LIBRARYS Palm Secure device can also be used in hospitals for doctor and patient’s identification and where the high level of security is required
  • 16. ADVANTAGES • This technology is, — More Reliable, More Accurate — Fast — Small — Relatively cheap to implemented and operate • —No more problems of forgotten passwords and id codes. • —No two people in the world share a palm vein pattern- even those of identical twins differ.
  • 17. Conclusion • Palm vein pattern authentication technology developed by Fujitsu was being used in a wide range • If this technology is introduced in our country we can solve many problems such as password protection in ATM , security in various fields and if we implement this technology in government offices we can make the employees to work according the government timings. surely this technology will bring a revolution in the field of science and technology in the near future.