SlideShare una empresa de Scribd logo
1 de 18
PALM VEIN TECHNOLOGY
SUBMITTED BY:
MANAV MITTAL
1
INTRODUCTION
• Palm vein technology is one of the upcoming
technology.
• It is the world’s first contactless personal
identification system that uses the vein patterns in
human palms to confirm a person’s identity.
• It is highly secure and accurate.
• The contact less feature gives it a hygienic advantage
over other biometric authentication technologies.
• It uses the vascular patterns of an individual’s palm as
personal identification data.
2
Our Current Security Measures
• Internal
– Building Access –
Magnetic Card
and Pin
– Computer Access
– User ID and
Password
• External
– Customer Access
– ATM card and
PIN
3
Technology + -
Fingerprint •Popular
•Cheapest
•Less Accurate
Voice •Non invasive •Least Accurate
Iris & Retinal •Very accurate •Invasive
•Expensive
•Sensitive
Palm Vein •Non-invasive
•Relatively Cheap
•Accurate
•Unfamiliar
source
source
source
Overview of Bio-Tech
4
HOW IT WORKS
•Takes snapshot of palm veins
•Converts into algorithm (ICP)
•Compares with database
source
5
PALM VEIN PAATTERN VERIFICATION SYSTEM
The thermal vein pattern verification system involves
the following stages:
• Image Acquisition
• Image enhancement
• Vein pattern segmentation
• Skeletonization
• Matching
6
User Interface
•Contactless
•Non-invasive
•2.18 seconds recognition
speed
source
7
• Available Software Development Kit
– Easy to integrate to current company
system
• Small
• Cheap to produce
• Easy to Install
• Wide range of operating condition
– Iris scanners are sensitive to light and
temp.
source
8
Data Flow
9
Accuracy
TECHNOLOGY
FALSE ACCEPTANCE
RATE
FALSE REJECTION
RATE
PalmSecure .00008% .01%
Fingerprint 1-2% 3%
Iris .0001% - .94% .99% - .2%
Voice 2% 10%
• Vein patterns
– Distinctive and unique to individuals, even left and right hands.
– Difficult to steal or forge
• False acceptance rate
– A rate at which someone other than the actual person is falsely recognized.
• False rejection rate
– A rate at which the actual person is not recognized accurately.
10
In comparison with others
technology
*note – Chart created using average of data provided by the Table
11
Security Evaluation
There are several common methods of attacking the system
• Spoofing attacks
• Replay and transmission attacks
Known methods of improving security of biometric system
a. Multimodal biometric system
b. Biometrics combined with password
c. Watermarking
12
Practical Applications
Portable Mouse
ATM Machine
• ‘Palm Secure’ is now widely
used in various fields.
– ATM
• 92% of all Japanese ATMs
• 18,000+ ATM machines for
Bank of Tokyo - Mitsubishi
– School ID, Entry Key to
private property, Log-in to
PCs or servers
– Potential is limitless
• PalmSecure mouse with a
build-in sensor in 2007
– easily installed to personal
computer.
13
• Hidden characteristics are used as biometric features.
• It is difficult to forge for intruders.
• It is not affected by dryness or roughness of skin or by
physical injury on surface of the hand.
• It has an FRR of 0.01% and FAR of less than 0.00008%.
This is based on experiments conducted on 70,000
individuals in Japan.
• This technology is non-intrusive.
ADVANTAGES
14
• There are numerous factors that can affect the
quality of the captured image such as body
temperature, humidity, heat radiation, nearness of
vein to surface, camera calibration and focus.
• It is still relatively expensive and not available for
mass production yet.
DISADVANTAGES
15
CONCLUSION
Palm vein pattern recognition is a convenient and
easy to use biometric technology with high security
and accuracy level.
The technology is gaining momentum but it is still
expensive and relatively untested because it has not
yet been marketed globally.
16
QUESTIONS???
17
End of the Presentation
Thank You.
18

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Palm vein Technology
Palm vein TechnologyPalm vein Technology
Palm vein Technology
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
palm vein technology
palm vein technologypalm vein technology
palm vein technology
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
Palm-Vein Technology
Palm-Vein TechnologyPalm-Vein Technology
Palm-Vein Technology
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Finger print ATM
Finger print ATMFinger print ATM
Finger print ATM
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
 
Bio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdkBio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdk
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
 
Project synopsis on face recognition in e attendance
Project synopsis on face recognition in e attendanceProject synopsis on face recognition in e attendance
Project synopsis on face recognition in e attendance
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Biometrics
BiometricsBiometrics
Biometrics
 

Destacado

24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmalAkmal Hussain
 
PALM VEIN TECHNOLOGY
PALM VEIN TECHNOLOGYPALM VEIN TECHNOLOGY
PALM VEIN TECHNOLOGYSagar Pudi
 
Plam vein technology
Plam vein technologyPlam vein technology
Plam vein technologyDinesh Ediga
 
Elliptic Curve Cryptography: Arithmetic behind
Elliptic Curve Cryptography: Arithmetic behindElliptic Curve Cryptography: Arithmetic behind
Elliptic Curve Cryptography: Arithmetic behindAyan Sengupta
 
ECC vs RSA: Battle of the Crypto-Ninjas
ECC vs RSA: Battle of the Crypto-NinjasECC vs RSA: Battle of the Crypto-Ninjas
ECC vs RSA: Battle of the Crypto-NinjasJames McGivern
 
Elliptic Curves and Elliptic Curve Cryptography
Elliptic Curves and Elliptic Curve CryptographyElliptic Curves and Elliptic Curve Cryptography
Elliptic Curves and Elliptic Curve CryptographyMd. Al-Amin Khandaker Nipu
 
Elliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge ProofElliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge ProofArunanand Ta
 
Matrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein ReaderMatrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein Readerlissapenas123
 
Night Vision Technology.Final
Night Vision Technology.FinalNight Vision Technology.Final
Night Vision Technology.Finalpratik665
 
NIGHT VISION TECHNOLOGY
NIGHT VISION TECHNOLOGYNIGHT VISION TECHNOLOGY
NIGHT VISION TECHNOLOGYMihika Shah
 
Night vision technology ppt
Night vision technology pptNight vision technology ppt
Night vision technology pptEkta Singh
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final pptAnkita Vanage
 
Seminar on night vision technology ppt
Seminar on night vision technology pptSeminar on night vision technology ppt
Seminar on night vision technology pptdeepakmarndi
 

Destacado (18)

PPT (2)
PPT (2)PPT (2)
PPT (2)
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal
 
PALM VEIN TECHNOLOGY
PALM VEIN TECHNOLOGYPALM VEIN TECHNOLOGY
PALM VEIN TECHNOLOGY
 
Plam vein technology
Plam vein technologyPlam vein technology
Plam vein technology
 
Elliptic Curve Cryptography: Arithmetic behind
Elliptic Curve Cryptography: Arithmetic behindElliptic Curve Cryptography: Arithmetic behind
Elliptic Curve Cryptography: Arithmetic behind
 
Elliptic curvecryptography Shane Almeida Saqib Awan Dan Palacio
Elliptic curvecryptography Shane Almeida Saqib Awan Dan PalacioElliptic curvecryptography Shane Almeida Saqib Awan Dan Palacio
Elliptic curvecryptography Shane Almeida Saqib Awan Dan Palacio
 
ECC vs RSA: Battle of the Crypto-Ninjas
ECC vs RSA: Battle of the Crypto-NinjasECC vs RSA: Battle of the Crypto-Ninjas
ECC vs RSA: Battle of the Crypto-Ninjas
 
Elliptic Curves and Elliptic Curve Cryptography
Elliptic Curves and Elliptic Curve CryptographyElliptic Curves and Elliptic Curve Cryptography
Elliptic Curves and Elliptic Curve Cryptography
 
Palmvein ppt
Palmvein pptPalmvein ppt
Palmvein ppt
 
Elliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge ProofElliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge Proof
 
Matrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein ReaderMatrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein Reader
 
Night Vision Technology.Final
Night Vision Technology.FinalNight Vision Technology.Final
Night Vision Technology.Final
 
Blue Brain
Blue Brain Blue Brain
Blue Brain
 
NIGHT VISION TECHNOLOGY
NIGHT VISION TECHNOLOGYNIGHT VISION TECHNOLOGY
NIGHT VISION TECHNOLOGY
 
Night vision technology ppt
Night vision technology pptNight vision technology ppt
Night vision technology ppt
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Seminar on night vision technology ppt
Seminar on night vision technology pptSeminar on night vision technology ppt
Seminar on night vision technology ppt
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Similar a Palm Vein Technology

49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptxssuserb46d43
 
Computer science ppt
Computer science pptComputer science ppt
Computer science pptbrijesh kumar
 
finger print based door lock.pptx
finger print based door lock.pptxfinger print based door lock.pptx
finger print based door lock.pptxPooja541216
 
Palmvein authentication
Palmvein authenticationPalmvein authentication
Palmvein authenticationSufiyan Arab
 
Palm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentationPalm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentationgagana5017
 
Bank locker system
Bank locker systemBank locker system
Bank locker systemRahul Wagh
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint TechnologyJoy Dutta
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprintSagar Verma
 
palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologypptNaga Dinesh
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Palak Pandoh
 
project ppt.pptx
project ppt.pptxproject ppt.pptx
project ppt.pptxBhavanaKs10
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensorsJeffrey Funk
 
Atm using finger print
Atm using finger printAtm using finger print
Atm using finger printManoranjan Roy
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bmbranjith
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...IJRTEMJOURNAL
 
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...inventionjournals
 
palm vein technology (1).pptx
palm vein technology (1).pptxpalm vein technology (1).pptx
palm vein technology (1).pptxPallavi Goli
 

Similar a Palm Vein Technology (20)

49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx
 
Computer science ppt
Computer science pptComputer science ppt
Computer science ppt
 
finger print based door lock.pptx
finger print based door lock.pptxfinger print based door lock.pptx
finger print based door lock.pptx
 
Palmvein authentication
Palmvein authenticationPalmvein authentication
Palmvein authentication
 
Palm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentationPalm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentation
 
Bank locker system
Bank locker systemBank locker system
Bank locker system
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint Technology
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprint
 
palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologyppt
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)
 
project ppt.pptx
project ppt.pptxproject ppt.pptx
project ppt.pptx
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 
Atm using finger print
Atm using finger printAtm using finger print
Atm using finger print
 
Access controls
Access controlsAccess controls
Access controls
 
Bio metric security
Bio metric securityBio metric security
Bio metric security
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
 
Biometrics
BiometricsBiometrics
Biometrics
 
palm vein technology (1).pptx
palm vein technology (1).pptxpalm vein technology (1).pptx
palm vein technology (1).pptx
 

Más de Manav Mittal

Intelligent road roller
Intelligent road rollerIntelligent road roller
Intelligent road rollerManav Mittal
 
Scada monitoring system
Scada monitoring systemScada monitoring system
Scada monitoring systemManav Mittal
 
Moving object detection
Moving object detectionMoving object detection
Moving object detectionManav Mittal
 
Electronic Walking Stick
Electronic Walking StickElectronic Walking Stick
Electronic Walking StickManav Mittal
 

Más de Manav Mittal (7)

Intelligent road roller
Intelligent road rollerIntelligent road roller
Intelligent road roller
 
Scada monitoring system
Scada monitoring systemScada monitoring system
Scada monitoring system
 
Green computing
Green computingGreen computing
Green computing
 
Moving object detection
Moving object detectionMoving object detection
Moving object detection
 
NTPC training
NTPC trainingNTPC training
NTPC training
 
Siemag training
Siemag trainingSiemag training
Siemag training
 
Electronic Walking Stick
Electronic Walking StickElectronic Walking Stick
Electronic Walking Stick
 

Último

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 

Último (20)

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 

Palm Vein Technology

  • 1. PALM VEIN TECHNOLOGY SUBMITTED BY: MANAV MITTAL 1
  • 2. INTRODUCTION • Palm vein technology is one of the upcoming technology. • It is the world’s first contactless personal identification system that uses the vein patterns in human palms to confirm a person’s identity. • It is highly secure and accurate. • The contact less feature gives it a hygienic advantage over other biometric authentication technologies. • It uses the vascular patterns of an individual’s palm as personal identification data. 2
  • 3. Our Current Security Measures • Internal – Building Access – Magnetic Card and Pin – Computer Access – User ID and Password • External – Customer Access – ATM card and PIN 3
  • 4. Technology + - Fingerprint •Popular •Cheapest •Less Accurate Voice •Non invasive •Least Accurate Iris & Retinal •Very accurate •Invasive •Expensive •Sensitive Palm Vein •Non-invasive •Relatively Cheap •Accurate •Unfamiliar source source source Overview of Bio-Tech 4
  • 5. HOW IT WORKS •Takes snapshot of palm veins •Converts into algorithm (ICP) •Compares with database source 5
  • 6. PALM VEIN PAATTERN VERIFICATION SYSTEM The thermal vein pattern verification system involves the following stages: • Image Acquisition • Image enhancement • Vein pattern segmentation • Skeletonization • Matching 6
  • 8. • Available Software Development Kit – Easy to integrate to current company system • Small • Cheap to produce • Easy to Install • Wide range of operating condition – Iris scanners are sensitive to light and temp. source 8
  • 10. Accuracy TECHNOLOGY FALSE ACCEPTANCE RATE FALSE REJECTION RATE PalmSecure .00008% .01% Fingerprint 1-2% 3% Iris .0001% - .94% .99% - .2% Voice 2% 10% • Vein patterns – Distinctive and unique to individuals, even left and right hands. – Difficult to steal or forge • False acceptance rate – A rate at which someone other than the actual person is falsely recognized. • False rejection rate – A rate at which the actual person is not recognized accurately. 10
  • 11. In comparison with others technology *note – Chart created using average of data provided by the Table 11
  • 12. Security Evaluation There are several common methods of attacking the system • Spoofing attacks • Replay and transmission attacks Known methods of improving security of biometric system a. Multimodal biometric system b. Biometrics combined with password c. Watermarking 12
  • 13. Practical Applications Portable Mouse ATM Machine • ‘Palm Secure’ is now widely used in various fields. – ATM • 92% of all Japanese ATMs • 18,000+ ATM machines for Bank of Tokyo - Mitsubishi – School ID, Entry Key to private property, Log-in to PCs or servers – Potential is limitless • PalmSecure mouse with a build-in sensor in 2007 – easily installed to personal computer. 13
  • 14. • Hidden characteristics are used as biometric features. • It is difficult to forge for intruders. • It is not affected by dryness or roughness of skin or by physical injury on surface of the hand. • It has an FRR of 0.01% and FAR of less than 0.00008%. This is based on experiments conducted on 70,000 individuals in Japan. • This technology is non-intrusive. ADVANTAGES 14
  • 15. • There are numerous factors that can affect the quality of the captured image such as body temperature, humidity, heat radiation, nearness of vein to surface, camera calibration and focus. • It is still relatively expensive and not available for mass production yet. DISADVANTAGES 15
  • 16. CONCLUSION Palm vein pattern recognition is a convenient and easy to use biometric technology with high security and accuracy level. The technology is gaining momentum but it is still expensive and relatively untested because it has not yet been marketed globally. 16
  • 18. End of the Presentation Thank You. 18

Notas del editor

  1. Henrik
  2. Richard
  3. Iris scanners are sensitive to light and temp.Richard
  4. Richard
  5. YooJin
  6. YooJin
  7. YooJin