palm vein technology
#3

PRESENTED BY:
M.ANUSHA

[attachment=9609]
Abstract:
Forget about signatures and photo IDs, forget about PIN numbers, forget about fingerprint, voiceprint, iris scan, or facial recognition security technologies to counter forged or stolen user IDs. Palm vein ID authentication, which uses an infrared sensor to capture the user's vein pattern unique to every individual's palm for an exquisitely sensitive biometric authentication technique. The palm vein scanner has no deleterious effect on the body, nor does it require that the device be touched, unlike current fingerprint scanners, other limitations of various other technologies are related to measuring external features. On the contrary, palm vein recognition seems not to be affected by aging; neither cuts, scars, tattoos, nor skin color affect the scan’s outcome; and, given that veins are internal, they can hardly be tampered with.
As we increasingly rely on computers and other machines in our daily lives, ensuring the security of personal information and assets becomes more of a challenge. To help deal with this growing problem, Fujitsu has developed a unique biometric security technology hand and no one else's.. In all these applications, the key to securing your assets and data will be in the palm of your hand. The new technology has many potential applications such as an ultra secure system for ATMs and banking transactions, server log in system, an authorization system for front doors, schools, hospital wards, storage areas, and high security areas in airports, and even facilitating library lending, doing away with the age-old library card system.
1. Introduction:
How secure are your assets?

Can your personal identification number be easily guessed? As we increasingly rely on computers and other machines in our daily lives, ensuring the security of personal information and assets becomes more of a challenge. If your bank card or personal data falls into the wrong hands, others can profit at your expense.Fujitsu's palm vein authentication technology consists of a small palm vein scanner that's easy and natural to use, fast and highly accurate. Simply hold your palm a few centimeters over the scanner and within a second it reads your unique vein pattern. A vein picture is taken and your pattern is registered. Now no one else can log in under your profile. ATM transactions are just one of the many applications of this new technology. Fujitsu's technology capitalizes on the special features of the veins in the palm.
Vein patterns are unique even among identical twins. Indeed each hand has a unique pattern. Try logging in with your left hand after registering with your right, and you'll be denied access. The scanner makes use of a special characteristic of the reduced hemoglobin coursing through the palm veins — it absorbs near-infrared light. This makes it possible to take a snapshot of what's beneath the outer skin, something very hard to read or steal.
2. The Basis of Palm Vein Technology:
Palm vein authentication uses the vascular patterns of an individual’s palm as personal identification data.
An individual first rests his wrist, and on some devices, the middle of his fingers, on the sensor's supports such that the palm is held centimeters above the device's scanner, which flashes a near-infrared ray on the palm. Unlike the skin, through which near-infrared light passes, deoxygenated hemoglobin in the blood flowing through the veins absorbs near-infrared rays, illuminating the hemoglobin, causing it to be visible to the scanner. Arteries and capillaries, whose blood contains oxygenated hemoglobin, which does not absorb near-infrared light, are invisible to the sensor. The still image captured by the camera, which photographs in the near-infrared range, appears as a black network, reflecting the palm's vein pattern against the lighter background of
the palm. An individual's palm vein image is converted by algorithms into data points, which is then compressed, encrypted, and stored by the software and registered along with the other details in his profile as a reference for future comparison. Then, each time a person logs in attempting to gain access by a palm scan to a particular bank account or secured entryway, etc., the newly captured image is likewise processed and compared to the registered one or to the bank of stored files for verification all in a period of seconds. Numbers and positions of veins and their crossing points are all compared and, depending on verification, the person is either granted or denied access.
3. How it works:
Carolina HealthCare System is the first known healthcare provider in the US to use the technology, which pairs a palm scanning device made by Fujitsu with a durable cradle and software system that the hospital designed itself. Incoming patients are asked to place their middle finger between two prongs at the top of the cradle to make sure their palm is properly positioned. The scanner uses near-infrared light to map the vein patterns in a patientýs palm. The digital image is converted into a number that correlates with the patient's medical records. Vein patterns in a palm are considered more unique than a fingerprint. Since a number, not an image, is stored with the palm scanner, there is no chance an identity could be stolen and illegally reproduced.
4. Features of palm vein technology:
Vein patterns are unique to individuals and contain detailed characteristics for formulation of algorithm template. Based on research to date by Fujitsu, Advanced authenticationalgorithm produces high level of accuracy.
• Leading-edge authentication system verifies an individual’s identity by recognizing the pattern of blood veins in the palm.
• Vein patterns are unique to individuals and contain detailed characteristics for formulation of algorithm template.Contactless authentication is hygienic and non-invasive, thus promoting high-level of user acceptance. Advanced authentication algorithm produces high level of accuracy and application versatility.
Extremely difficult to forge, thereby enabling a high level of security
5. How Secure is the Technology?
On the basis of testing the technology on more than 70,000 individuals, Fujitsu declared that the new system had a false rejection rate of 0.01% (i.e., only one out of 10,000 scans were incorrect denials for access), and a false acceptance rate of less than 0.00008% (i.e., incorrect approval for access in one in over a million scans). Also, if your profile is registered with your right hand, don't log in with your left - the patterns of an individual's two hands differ. And if you registered your profile as a child, it'll still be recognized as you grow, as an individual's patterns of veins are established in utero (before birth). No two people in the world share a palm vein pattern - even those of identical twins differ.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: palm vein biometrics, site seminarprojects com palm vein technology, palm vein technology pdf free download, palm vein technology seminar pdf, palm vein technology full documentation over 25 pages, palm vein authentication code, palm vein biometric authentication device,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
palm vein technology - by electronics seminars - 28-12-2009, 03:41 PM
RE: palm vein technology - by seminar class - 22-02-2011, 09:52 AM
RE: palm vein technology - by seminar class - 05-03-2011, 03:07 PM
RE: palm vein technology - by seminar class - 16-03-2011, 12:19 PM
RE: palm vein technology - by smart paper boy - 29-08-2011, 04:49 PM

Possibly Related Threads...
Thread Author Replies Views Last Post
  FPGA-Based Embedded System Implementation of Finger Vein Biometrics seminar project explorer 3 4,877 20-06-2016, 05:09 PM
Last Post: computer science crazy
  5G technology dhanya1987 8 12,969 11-04-2016, 11:21 AM
Last Post: dhanabhagya
  FinFET Technology computer science crazy 13 11,706 10-03-2015, 04:38 PM
Last Post: seminar report asees
  Cellonics Technology computer science crazy 3 3,590 05-09-2014, 09:45 PM
Last Post: seminar report asees
  Latest Invention: Acoustic Ear-scanning Technology to Help Avoid Theft project report helper 10 8,793 20-08-2014, 09:02 PM
Last Post: preethikrishna
  RFID Technology computer science crazy 4 4,679 09-08-2014, 07:10 PM
Last Post: Guest
  Seminar Report On Optical Computing Technology mechanical wiki 3 6,170 27-07-2013, 12:41 PM
Last Post: computer topic
Question Sixth Sense Technology nitins60 43 76,623 22-06-2013, 10:46 AM
Last Post: Guest
  Blue Eyes Technology sprity 21 31,508 30-01-2013, 12:54 PM
Last Post: seminar details
  3G MOBILE COMMUNICATION TECHNOLOGY full report seminar presentation 22 31,536 29-01-2013, 11:06 AM
Last Post: seminar details

Forum Jump: