Palm Vein Authentication Technology-01-05-2013

Views:
 
     
 

Presentation Description

EVoteTechnology, Palm Vein Authentication Profile Creation for Registered Voters, shall eliminate voter fraud, combat identity theft,and and provide Electronic Point of Sale (EPOS) authentication of purchaseers.-01-05-2014

Comments

Presentation Transcript

PALM VEIN TECHNOLOGY AND IT’S APPLICATIONS:

PALM VEIN TECHNOLOGY AND IT’S APPLICATIONS BY G.PADMA (08Q61A0524).

Biometrics :

Increasing necessity of e-mail, Internet resources etc, offers serious security concerns. Biometrics is replacing passwords. Biometrics can be defined as recognizing and identifying a person based on physiological or behavioral characteristics Biometrics

Palm Vein Technology:

In this technology ONE’S PALM is used as the “PASSWORD” for verification. The veins present in the palm of the individual are scanned & verified thus providing the access. Palm vein authentication has a high level of authentication accuracy due to the uniqueness and complexity of vein patterns of the palm. Palm Vein Technology

Principle Involved:

Unlike the skin, through which near-infrared light passes, deoxygenated hemoglobin in the blood flowing through the veins absorbs near-infrared rays, causing it to be visible as black regions to the scanner. Arteries and capillaries, whose blood contains oxygenated hemoglobin, which does not absorb near-infrared light, are invisible to the sensor, hence we chosen “VEINS”. Principle Involved

PowerPoint Presentation:

An individual's palm vein image is converted by algorithms into data points, which is then compressed, encrypted, and stored by the software person when ever access it, the data is compared with stored one, thus verification is done. Fujitsu research is the one main company which has come up with first basis of “ PALM VEIN TECHNOLOGY”

WORKING :

WORKING

PowerPoint Presentation:

First the individual places his PALM on the sensor, thus the sensor takes the “PALM VEIN IMAGE” and compares it with the pre-registered one with the help of INFRA RED RAYS. If there is a match then access is allowed, if not access is denied. This system is not at all dangerous. A near infrared ray is a component of sunlight, whose effect is much less than walking in sunlight.

Reflection Photography:

There are two types of vein photography-reflection and transmission. Reflection is more useful technique at low ambient temperatures as blood flow decreases at cool temperatures. At cool temperatures transmission method provides low contrast images. Reflection Photography

Contactless Palm Vein Authentication:

The lighting of the infrared ray is controlled depending on the illumination around the sensor. The sensor is able to capture the palm image regardless of the position and movement of the palm. The software matches the translated vein pattern with the registered pattern, while measuring the position and orientation of the palm by a pattern matching method. Contactless Palm Vein Authentication

PowerPoint Presentation:

Implementation of a contactless identification system enables applications in public places or medical facilities. The contactless feature of this device makes it suitable for use where high levels of hygiene are required. Eliminates any hesitation people might have about coming into contact with something that other people have already touched.

How Is It Secure? :

This technology system had a false rejection rate of 0.01% (i.e., only one out of 10,000 scans were incorrect denials for access) False acceptance rate of less than 0.00008% i.e., incorrect approval for access in one in over a million scans. How Is It Secure?

PowerPoint Presentation:

No two people in the world share a palm vein pattern - even those of identical twins will differ. Even if you have registered your profile as a child, the image will still be valid as veins are established in utero (before birth).

Product Development For General Market:

Two products are in great demand in the general market. One is for a physical access control unit, other is a logical access control unit. Physical access control unit can be used to control entry and exit for rooms and buildings. Logical access control unit can be used to protect input and output of electronic data. Product Development For General Market

Need Of It :

No more problems of forgotten passwords and id codes - biometrics is the technology taking care of it. Apart from other techniques like IRIS scan in which Cataract replacement, Finger scan during Injuries etc can be an disadvantage, this technique has no problems. Need Of It

Advantages:

Very Economical Highest factor of Security One time registry and usage throughout life More advantageous than other Biometric techniques Advantages

Applications :

Management in healthcare Operator authentication Owner authentication Attendance authentication Applications

Conclusion:

Biometric technology has been around for decades but has mainly been for highly secretive environments with extreme security measures. The above article gives a snapshot of the dynamics in the emerging biometric market, and stands apart from other techniques available and also a bit more advantageous. Conclusion

PowerPoint Presentation:

THANK YOU

authorStream Live Help