PALM V EIN TECHNOLOGY - PowerPoint PPT Presentation

About This Presentation
Title:

PALM V EIN TECHNOLOGY

Description:

Voice Identification System Database Construct voice reference template FINGER PRINT Fingerprint Recognition is the identification by ... Verification time is ... – PowerPoint PPT presentation

Number of Views:1129
Avg rating:3.0/5.0
Slides: 55
Provided by: Bin96
Category:

less

Transcript and Presenter's Notes

Title: PALM V EIN TECHNOLOGY


1
WELCOME
2
  • PALM V EIN TECHNOLOGY

3
CONTENTS
  • INDRODUCTION
  • Biometrics
  • Palm Vein Technology
  • REASONS FOR CONSIDERING THE PALM AREA FOR
    IDENTIFICATION
  • Accuracy
  • Practical applications
  • Advantages
  • Disadvantages
  • Conclusion
  • References

4
INTRODUCTION
  • Palm vein technology is one of the upcoming
    technology.
  • It is the worlds first contactless personal
    identification system that uses the vein patterns
    in human palms to confirm a persons identity.
  • It is highly secure and accurate.
  • The contact less feature gives it a hygienic
    advantage over other biometric authentication
    technologies.
  • It uses the vascular patterns of an individuals
    palm as personal identification data.
  • biometric authentication technology, which
    identifies people by their unique biological
    information

5
Biometrics
  • Automated measurement of Physiological and/or
    behavioral characteristics to determine or
    authenticate identity is known as Biometrics
  • Increasing necessity of e-mail, Internet
    resources etc, offers serious security concerns.
  • Biometrics can be defined as recognizing and
    identifying a person based on physiological or
    behavioral characteristics
  • The behavioral characteristics measure the
    movement of a user, when users walk, speak, type
    on a keyboard or sign their name.
  • The physiological characteristics would be the
    physical human traits like fingerprints, hand
    shape, eyes and face, veins, etc

6
BIOMETRIC FEATURES
  • It becomes obsolete to beware passwords safely or
    to remember to all of them.
  • Abuse of stolen id cards and passports will be
    reduced enormously.
  • Abuse of stolen credit cards will be prevented.
  • Taking over foreign identities will be
    impossible.
  • Building access right to people without the right
    of admittance will be prevented.
  • Access to devices/computers will be not possible
    for persons without the right of admittance.
  • Unnecessary costs will be drastically reduced.
  • Level of common convenience and safety will
    grow.

7
DIFFERENT BIOMETRIC TECHNOLOGIES
  • Physical Biometrics
  • Iris
  • Retina
  • Vein Pattern
  • Hand Geometry
  • Face
  • Fingerprint
  • Ear shape
  • Behavioral Biometrics
  • Keystroke dynamics
  • Signature dynamics
  • Walking Gait
  • Voice

8
Biometric Systems
9
Biometrics Process
new biometric sample is requested.
No
Quality Sufficient?
Signal Processing, Feature Extraction,
Representation
Biometric Data Collection
Transmission
Yes
Generate Template
Database
Template Match
Decision Confidence?
Yes
No
10
  • VOICE PRINT
  • Voice Recognition is the Identification using
    the acoustic features of speech that have been
    found to differ between individuals.
  • ADVANTAGES
  • Easy to use and requires no special training or
    equipment.
  • Relatively inexpensive compared to other
    biometrics.
  • Consumers prefer to use voiceprints over other
    biometric technology for identification according
    to a Chase banks research study.
  • DISADVANTAGES
  • When processing a persons voice over multiple
    channels such a microphone and then over a
    telephone reduces the recognition rate.
  • Physical conditions of the voice, such as those
    due to sickness, affect the voice verification
    process.
  • Environment noise reduces the overall accuracy
    and effectiveness of the recognition.
  • The storage requirement for voiceprint database
    can be very large.
  • A persons voice changes over time.

11
Voice Identification System
Construct voice reference template
Database
12
  • FINGER PRINT
  • Fingerprint Recognition is the identification by
    using patterns of friction ridges and valleys on
    an individual's fingertips which are unique to
    that individual.
  • ADVANTAGES
  • Since fingerprints are the composition of
    protruding sweat glands, everyone has unique
    fingerprints. They do not change naturally.
  • Its reliability and stability is higher compared
    to the iris, voice, and face recognition method.
  • Fingerprint recognition equipment is relatively
    low-priced compared to other biometric system
  • DISADVANTAGES
  • Vulnerable to noise and distortion brought on by
    dirt and twists.
  • Some people may feel offended about placing their
    fingers on the same place where many other people
    have continuously touched.
  • Some people have damaged or eliminated
    fingerprints.
  • Since users have to touch the sensing device, so
    it gets damaged on scratches on it

13
Fingerprint Recognition steps
Database
14
FACE RECOGNITION
  • Face recognition uses the visible physical
    structure of the face and analyses the spatial
    geometry of distinguishing features in it to
    identify an individual.
  • ADVANTAGES
  • Non intrusive, privacy cannot be invaded easily.
  • Cheap technology.
  • DISADVANTAGES
  • 2D recognition is affected by changes in
    lighting, the persons hair, the age, and if
  • the person wear glasses.
  • It also depends on orientation/angle of users
    face with camera.
  • Requires camera equipment for user
    identification thus, it is not likely to become
  • popular until most PCs include good resolution
    cameras as standard equipment.
  • Even the expressions on the face also affect the
    recognition process. For examplein Canada
    passport size photo with neutral face expression
    are accepted.

15
Face recognition process
Extraction of face features
Input face image
Extraction of face image
Positive
Database
negative
16
  • IRIS SCAN
  • The iris is the colored ring of textured tissue
    that surrounds the pupil of the eye.
  • ADVANTAGES
  • Very high accuracy.
  • Verification time is generally less than 5
    seconds.
  • The eye from a dead person would deteriorate too
    fast to be useful, so no extra precautions have
    to been taken with retinal scans to be sure the
    user is a living human being.
  • DISADVANTAGES
  • Intrusive.
  • A lot of memory for the data to be stored.
  • Very expensive.
  • Difficult to use because of positioning eye.
  • Requires more time for matching with database
    stored

17
Iris Identification Steps
Input of face image
Recognition of iris pattern
Detection of eye regions
Put iris in focus
accept
Database
reject
18
Signature Identification
  • Signature identification is the analyses of the
    way a user signs his or her name.
  • The process used by a biometric system to verify
    a signature is called dynamic signature
    verification (DSV).
  • the angle at which the pen is held
  • the number of times the pen is lifted,
  • the time it takes to write the entire signature,
  • the pressure exerted by the person while signing,
  • the variations in the speed with which different
    parts of the signature are written.
  • ADVANTAGES
  • Unique for every individual and user himself
    can decide the identity.
  • Lesser false acceptance rate.
  • Relatively cheap technology.
  • No expert training required

19
  • DISADVANTAGES
  • Signature of a person may change after a long
    time, like if an user gone through an accident
    and he cannot use his hand and then he signs
    after a long time, his sign and pressure points
    may change.
  • High false rejection rate.
  • Pressure points may change because of weather or
    some disease.
  • System can be fooled by imitating
  •  

Profile
Database
20
Palm Vein Technology
  • In this technology ONES PALM is used as the
    PASSWORD for verification
  • The veins present in the palm of the individual
    are scanned verified thus providing the access
  • Palm vein authentication is one of the vascular
    pattern authentication technologies.
  • Vascular pattern authentication includes vein
    pattern authentication using the vein patterns of
    the palm, back of the hand or fingers as personal
    identification data
  • The palm vein authentication uses the vascular
    patterns of the palm as personal identification
    data

21
  • First the individual places his PALM on the
    sensor, thus the sensor takes the PALM VEIN
    IMAGE and compares it with the pre-registered
    one with the help of INFRA RED RAYS.
  • If there is a match then access is allowed, if
    not access is denied.
  • This system is not at all dangerous. A near
    infrared ray is a component of sunlight, whose
    effect is much less than walking in sunlight.

22
REASONS FOR CONSIDERING THE PALM AREA FOR
IDENTIFICATION
  • A palm has wide area and more complicated
    vascular pattern and contains some
    differentiating features for personal
    identification when compared with the patterns
    present in the back of the hand and the ventral
    side or dorsal side of the fingers.
  • The palm normally has no hair and thus eliminates
    an obstacle to capturing the vein pattern and it
    is less susceptible to a change in skin color.
  • For this purpose the contactless palm vein
    authentication device was launched by Fujitsu in
    Japan. This is also known as palm secure.

23
REASONS FOR CONSIDERING THE PALM AREA FOR
IDENTIFICATION .
  • In palm vein authentication we use sensing and
    matching technology.
  • when near-infrared light passes, deoxygenated
    hemoglobin in the blood flowing through the
    veins absorbs near-infrared rays, causing it to
    be visible as black regions to the scanner.
  • Arteries and capillaries, whose blood contains
    oxygenated hemoglobin,
  • which does not absorb near-infrared light, are
    invisible to the sensor, hence VEINS are
    chosen

24
SENSING TECHNOLOGY
  • The sensing technology used for vein patterns is
    based on near-infrared ray spectroscopy (NIRS)
    and imaging
  • Deoxygenated hemoglobin in vein vessels absorbs
    light having a wavelength of about 760 nm within
    near-infrared area (Fig. 1).
  • When capturing a body using near-infrared rays
    only the blood vessel pattern containing the
    deoxidized hemoglobin is visible as a series of
    dark lines (Fig.2).
  • The vein authentication device translates the
    black lines of the infrared ray image as the
    blood vessel pattern of the palm (Fig. 3), and
    then matches it with the previously registered
    blood vessel pattern of the individual.

25
Fig2infrared ray image
Fig 3 Extracted vein pattern
Fig1 visible ray image
Blood vessel patterns are unique to every
individual. Even the vein patterns on each hand
are different.
26
IMAGING METHODS
  • There are two imaging methods used for veins
  • 1.Reflection
  • 2.Transmission.
  • Reflection Method
  • The reflection method illuminates the target
    part from the front In this method, an
    illumination device and a capturing device can be
    combined because the direction of illumination
    and capturing is the same.
  • Transmission method
  • The transmission method illuminates the
    target part from the back, the side or the
    surface around the target. but in this method,
    those devices must be used separately because the
    direction of illumination and capturing differs

27
Matching
The palm vein pattern is extracted from
infrared-ray images as dark lines. This Matching
involves 1. Capture 2. Extraction of palm
vein pattern features 3. Storing of palm vein
pattern features
  • 1. Capture
  • Decide whether or not the user will hold
    his/her palm over the palm vein authentication
    sensor. If the palm is held, capture the
    infrared-ray image
  • 2. Extraction of palm vein pattern features
  • Extract the palm vein pattern from the
    captured infrared-ray image by image processing.
    Convert the palm vein pattern to palm vein
    feature data following the algorithm to determine
    the correspondence between the two palm vein
    patterns.
  • 3. Storing of palm vein pattern features
  • Store the palm vein feature data to storage,
    smart card or hard disk, depending on the
    application.

28
How It Works
  • Working of Palm Vein Systems
  • We Rest our palm on Vein Scanner
  • Palm Vein Scanner near Infra Red Rays
  • Infra red rays will pass through veins
  • Veins carry Deoxygenated Hemoglobin
  • Deoxygenated blood absorbs Infra Red Rays
  • Arteries and capillaries reflects infra red rays
  • Vein patterns are captured for Authentication
  • If Authorized, the requested Application gets
    Activated
  • Extract the vein patterns from the infrared image
    and convert into vein pattern data.
  • Now Compares it with database

29
WORKING

30
Step 1 Palm vein authentication technology
consists of a small Palm vein scanner that's
easy and natural to use, fast and Highly accurate
. Simply hold your palm a few centimeters Over
the scanner and within a second it reads your
unique vein pattern. A vein picture is taken and
palm pattern is registered.
31
Step 2 The registered palm pattern is stored
into the database along with the personal details
of the client
32
1. One should place his/her palm near to
scanner.
33
  • 2. The scanner makes use of a special
    characteristic of the reduced hemoglobin coursing
    through the palm veins it absorbs near-infrared
    light. This makes it possible to take a snapshot
    of what's beneath the outer skin, something very
    hard to read or steal.

34
  • 3. The integrated optical system in the palm vein
    sensor uses this phenomenon to generate an image
    of the palm vein pattern and the generated image
    is digitized, encrypted and finally stored as a
    registered template in the database.

35
Data Flow
36
Palm vein authentication
Sensor emits near infrared beam to the palm
Palm has to be positioned 3-8 cm over the sensor
Oxygen reduced blood within the veins absorbs the
near infrared light
The sensors wide angular near infrared camera
takes a raw image of the palm vein pattern
The sensors template library SW changes the raw
image into template data
The generated template can be stored in either a
database
37
PALM VEIN PAATTERN VERIFICATION SYSTEM
  • The thermal vein pattern verification system
    involves the following stages
  • Image Acquisition
  • Image enhancement
  • Vein pattern segmentation
  • Skeletonization
  • Matching

38
User Interface
  • Contactless
  • Non-invasive
  • 2.18 seconds recognition speed

source
39
(No Transcript)
40
How Secure is the Technology?How Secure is
the Technology?
  • On the basis of testing the technology on more
    than 70,000 individuals, Fujitsu declared that
    the new system had a false rejection rate of
    0.01(i.e., only one out of 10,000 scans were
    incorrect denials for access).
  • And a false acceptance rate of less than 0.00008
    (i.e., incorrect approval for access in one in
    over a millio scans).
  • And if you registered your profile as a child,
    it'll still be recognized as you grow, as an
    individual's patterns of veins are established in
    utero
  • No two people in the world share a palm vein
    pattern - even those of identical twins will
    differ.

41
Overview of Biometrics
Technology -
Fingerprint Popular Cheapest Less Accurate
Voice Non invasive Least Accurate
Iris Retinal Very accurate Invasive Expensive Sensitive
Palm Vein Non-invasive Relatively Cheap Accurate Unfamiliar
42
accuracy
Technology False Acceptance rate False Rejection Rate
Palm Secure .00008 .01
Fingerprint 1-2 3
Iris .0001 - .94 .99 - .2
Voice 2 10
  • Vein patterns
  • Distinctive and unique to individuals, even left
    and right hands.
  • Difficult to steal or forge
  • False acceptance rate
  • A rate at which someone other than the actual
    person is falsely recognized.
  • False rejection rate
  • A rate at which the actual person is not
    recognized accurately.

43
In comparison with others technology
  • note Chart created using average of data
    provided by the Table

44
Need Of It
  • No more problems of forgotten passwords and id
    codes - biometrics is the technology taking care
    of it.
  • Apart from other techniques like IRIS scan in
    which Cataract replacement, Finger scan during
    Injuries etc can be an disadvantage, this
    technique has no problems.

45
ADVANTAGES
  • Contactless, hygienic and non-invasive .
  • It is difficult to forge for intruders because
    blood vessels are hidden within the body.
  • This technology is non- intrusive It does not
    involve any physical contact between the user and
    the system .
  • Vein patterns are unique to each individual even
    identical twins have different vein patterns .
  • Palm vein technology has an FRR of 0.01 and FAR
    of less than 0.00008.this is based on the
    experiments conducted on 70,000 individuals in
    Japan. It is Highly accurate

46
DISADVANTAGES
  • There are numerous factors that can effect the
    quality of the captured image. They are body
    temperature, ambient temperature, humidity,
    unevenly distribution of heat, heat radiation,
    nearness of vein to surface, camera calibration
    and focus.
  • Palm vein recognition is invasive because it
    creates fear among the users that it can be a
    painful process
  • It is relatively expensive and not available for
    mass production yet.
  • It is not applicable to people who lost their
    palms.

47
APPLICATIONS
  • Palm vein authentication is utilized in
    various Fields such as
  • Security systems - Door lock and integrated
    building security systems
  • Log-in control login into pcs or servers,
    network data access, etc.
  • Healthcare - ID verification for medical
    equipment, electronic record management, etc.
  • Financial services - ATM,Banks, vault access,
    etc.

48
applications
49
Practical Application
  • ATM
  • Palm vein pattern is captured by using the palm
    vein sensor on the ATM. The palm vein pattern is
    converted to palm vein features and transferred
    to the users smart card a
  • The matching between the palm vein features
    stored on the smart card and those transferred
    from the sensor is executed on the smart card.
  • The result is the output from the card.
  • ATM MACHINES WITH
  • PALM VEIN SENSOR UNIT

50
Login authentication
  • Palm vein authentication can be integrated into
    laptop PCs by USB .
  • It is used to control access to
    electronically stored information.
  • Because login authentication using palm vein
    authentication can also be used for
    authentication using conventional IDs and
    passwords

51
Door security system
  • The palm vein authentication access control unit
    can be used to control entry and exit into and
    out of rooms and buildings.
  • This unit consists of operation and control
    sections. The operation section has a key pad,
    indicators , contactless smart card reader and
    palm vein sensor
  • The control section has a processing unit for the
    authentication and stores palm vein features of
    enrollees
  • This unit executes verification when a user input
    his or her ID

52
  • Palm vein pattern authentication technology
    developed by Fujitsu was being used in a wide
    range in japan .
  • If this technology is introduced in our country
    we can solve many problems such as password
    protection in ATM
  • security in various fields and if we implement
    this technology in government offices we can make
    the employees to work according the government
    timings
  • surely this technology will bring a revolution
    in the field of science and technology in the
    near future.

53
(No Transcript)
54
THANK YOU
Write a Comment
User Comments (0)
About PowerShow.com