biometric securityfujitsupalmveintechnology

24
Presented by: K.N.Lakshmi divya 1

Upload: sarvani-mallipeddi

Post on 22-Dec-2014

216 views

Category:

Documents


4 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Biometric securityfujitsupalmveintechnology

Presented by:K.N.Lakshmi divya

1

Page 2: Biometric securityfujitsupalmveintechnology

WHAT IS PALM VEIN AUTHENTICATION?

Palm vein authentication is one of the vascular pattern authentication technologies.

Vascular pattern authentication includes vein pattern authentication using the vein patterns of the palm,back of the hand or fingers as personal identification data

The palm vein authentication uses the vascular patternsof the palm as personal identification data

Page 3: Biometric securityfujitsupalmveintechnology

REASONS FOR CONSIDERING THE PALM AREA FOR IDENTIFICATION :

A palm has wide area and more complicated vascular pattern and contains some differentiating features for personal identification when compared with the patterns present in the back of the hand and the ventral side or dorsal side of the fingers.

The palm normally has no hair and thus eliminates an obstacle to capturing the vein pattern and it is less susceptible to a change in skin color.

For this purpose the contactless palm vein authentication device was launched by Fujitsu in japan.This is also known as palmsecure.

In palm vein authentication we use sensing and matching technology.

Page 4: Biometric securityfujitsupalmveintechnology

SENSING TECHNOLOGY : The sensing technology used for vein patterns is

based on near-infrared ray spectroscopy (NIRS) and imaging

Deoxygenated hemoglobin in vein vessels absorbs light having a wavelength of about 760 nm within near-infrared area (Fig. 1).

When capturing a body using near-infrared rays only the blood vessel pattern containing the deoxidized hemoglobin is visible as a series of dark lines (Fig.2).

The vein authentication device translates the black lines of the infrared ray image as the blood vessel pattern of the palm (Fig. 3), and then matches it with the previously registered blood vessel pattern of the individual.

Page 5: Biometric securityfujitsupalmveintechnology

Fig1: visible ray image

Fig2:infrared ray image

Fig 3 :Extracted vein pattern

Page 6: Biometric securityfujitsupalmveintechnology

IMAGING METHODS:

There are two imaging methods used for veins 1.Reflection 2.Transmission.

Reflection Method: The reflection method illuminates the target part from the

front. In this method, an illumination device and a capturing device can be combined because the direction of illumination and capturing is the same.

Transmission method: The transmission method illuminates the target part from the

back, the side or the surface around the target. but in this method, those devices must be used separately because the direction of illumination and capturing differs

Page 7: Biometric securityfujitsupalmveintechnology

Therefore the configuration of the sensor used in the Reflection and Transmission method also differs.

Capture by this sensor is executed in a contactless manner.Users need not touch the sensor; they only have to hold their palm above it.

:

Page 8: Biometric securityfujitsupalmveintechnology

Matching:

The palm vein pattern is extracted from infrared-ray images as dark lines.

This Matching involves1. Capture 2. Extraction of palm vein pattern

features3. Storing of palm vein pattern features

Page 9: Biometric securityfujitsupalmveintechnology

1. Capture: Decide whether or not the user will hold

his/her palm over the palm vein authentication sensor. If the palm is held, capture the infrared-ray image

2. Extraction of palm vein pattern features: Extract the palm vein pattern from the

captured infrared-ray image by image processing. Convert the palm vein pattern to palm vein feature data following the algorithm to determine the correspondence between the two palm vein patterns.

3. Storing of palm vein pattern features: Store the palm vein feature data to

storage, smart card or hard disk, depending on the application.

Page 10: Biometric securityfujitsupalmveintechnology

•Takes snapshot of palm veins•Generation of infrared ray image.•Extract the vein patterns from the infrared image and convert into vein pattern data.•Now Compares it with database 10

Page 11: Biometric securityfujitsupalmveintechnology

Technology + -

Fingerprint •Popular•Cheapest

•Less Accurate

Voice •Non invasive •Least Accurate

Iris & Retinal •Very accurate •Invasive•Expensive•Sensitive

Palm Vein •Non-invasive•Relatively Cheap•Accurate

•Unfamiliar

11source

sourcesource

Page 12: Biometric securityfujitsupalmveintechnology

Vein patterns Distinctive and unique to individuals, even left and

right hands. Difficult to steal or forge

False acceptance rate A rate at which someone other than the actual

person is falsely recognized. False rejection rate

A rate at which the actual person is not recognized accurately.

12

Page 13: Biometric securityfujitsupalmveintechnology

*note – Chart created using average of data provided by the Table

13

Page 14: Biometric securityfujitsupalmveintechnology

• Contactless

• Non-invasive

• 2.18 seconds recognition speed

14

source

Page 15: Biometric securityfujitsupalmveintechnology

ADVANTAGES:

Contactless, hygienic and non-invasive . It is difficult to forge for intruders because

blood vessels are hidden within the body. This technology is non-intrusive;It does not

involve any physical contact between the user and the system .

Vein patterns are unique to each individual; even identical twins have different vein patterns .

Palm vein technology has an FRR of 0.01% and FAR of less than 0.00008%.this is based on the experiments conducted on 70,000 individuals in japan. It is Highly accurate

Page 16: Biometric securityfujitsupalmveintechnology

DISADVANTAGES:

There are numerous factors that can effect the quality of the captured image.They are body temperature,

ambient temperature,humidity,unevenly distribution of heat,heat radiation,nearness of vein to surface,camera calibration and focus.

palm vein recognition is invasive because it creates fear among the users that it can be a painful process

It is relatively expensive and not available for mass production yet.

It is not applicable to people who lost their palms.

Page 17: Biometric securityfujitsupalmveintechnology

APPLICATIONS:

Palm vein authentication is utilized in various Fields such as

Security systems - Door lock and integrated building security systems

Log-in control – login into pc’s or servers, network data access, etc.

Healthcare - ID verification for medical equipment, electronic record management, etc.

Financial services - ATM,Banks, vault access, etc.

Page 18: Biometric securityfujitsupalmveintechnology

ATM MACHINES WITH PALM VEIN SENSOR UNIT

ATM: palm vein pattern is

captured by using the palm vein sensor on the ATM. The palm vein pattern is converted to palm vein features and transferred to the user’s smart card a

The matching between the palm vein features stored on the smart card and those transferred from the sensor is executed on the smart card.

The result is the output from the card.

18

Page 19: Biometric securityfujitsupalmveintechnology

Login authentication:

Palm vein authentication can be integrated into laptop PCs by USB .

It is used to control access to electronically stored information.

Because login authentication using palm vein authentication can also be used for authentication using conventional IDs and passwords

Page 20: Biometric securityfujitsupalmveintechnology

Door security system:

The palm vein authentication access control unit can be used to control entry and exit into and out of rooms and buildings.

This unit consists of operation and control sections. The operation section has a key pad,indicators , contactless smart card reader and palm vein sensor

The control section has a processing unit for the authentication and stores palm vein features of enrollees

This unit executes verification when a user input his or her ID

Page 21: Biometric securityfujitsupalmveintechnology

In comparison with other leading bio-tech, PalmSecure is More Reliable, More Accurate Fast Small Relatively cheap to implemented and

operate It can be use for

PC log-in Building entrance ATM machine, etc…

Protect sensitive financial information Reduce loss due to identity theft

21

Page 22: Biometric securityfujitsupalmveintechnology

Protect Our Clients. Protect Ourselves.

22

Page 23: Biometric securityfujitsupalmveintechnology
Page 24: Biometric securityfujitsupalmveintechnology

24