Seminar On Palm Vein

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 31

Contents: 1. Introduction 2. Biometric system 3 .

PALM VEIN TECHNOLOGY REVIEWS - THE BASIS OF PALM VEIN TECHNOLOGY - REGISTERING THROUGH PALM VEIN TECHNOLOGY - WORKING OF PALM VEIN TECHNOLOGY - PERFORMANCE METRICS OF BIOMETRIC SYSTEM -HOW SECURE IS THE TECHNOLOGY ? -FEATURES OF PALM VEIN TECHNOLOGY -WHAT HAPPENS IF THE REGISTERED PALM GETS DAMAGED? 4. ADVANTAGES & DISADVANTAGES OF P.V.T 5. APPLICATIONS AND BUSINESS

6. FUTURE ASPECTS 7.conclusion 8.Reference

1. INTRODUCTION
Palm vein technology is one of the upcoming technology. Its developed by fujitsu. It is the worlds first contactless personal identification system that uses the vein patterns in human palms to confirm a persons identity. It is highly secure and accurate. The contact less feature gives it a hygienic advantage over other biometric authentication technologies. It uses the vascular patterns of an individuals palm as personal identification data. ie,It is the technology which uses the palm veins of a human body for recognizing the person being authenticated.

1.1 BIOMETRIC SYSTEM


Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic. features measured are; face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice. Biometric systems are superior because they provide a nontransferable means of identifying people not just cards or badges. . The fundamentals of biometrics are that they are things about a person: - measurable - things that can be counted, numbered or otherwise quantified - physiological characteristics - like height, eye color, fingerprint, DNA etc. -behavioral characteristics - such as the way a person moves, walks, types .

A key advantage of biometric authentication is that biometric data is based on physical characteristics that stay constant throughout ones lifetime and are difficult (some more than others) to fake or change. Biometric identification can provide extremely accurate, secured access to information; fingerprints, palm vein and iris scans produce absolutely unique data sets (when done properly). Automated biometric identification can be done rapidly and uniformly, without resorting to documents that may be stolen, lost or altered. It is not easy to determine which method of biometric data gathering and reading does the "best" job of ensuring secure authentication. Each of the different methods has inherent advantages and disadvantages. Some are less invasive than others; some can be done without the knowledge of the subject; others are very difficult to fake.

THERE
BELOW:

ARE DIFFERENT KINDS OF

BIOMETRIC

SYSTEMS.THEY ARE GIVEN

PALMVEIN:

1.2 USAGE OF BIOMETRIC TECHNOLOGYMINIMIZES RISKS

_ The person, who has my office id card, can _ The person, who has my house key, can _ The person, who knows my password, can _ The person, who knows the pin number of my credit card, can _ The person, who is able to forge my signature, can _ The person, who steals my passport, can

1.3 BIOMETRICS- SECURITY & CONVENIENCE:

Fig-1.3 Threats in various security systems [1]

PALM VEIN TECHNOLOGY REVIEWS


Palm vein technology is one of the upcoming technology .It uses the vascular patterns of an individuals palm as personal identification data.(ie,It is

the technology which uses the palm veins of a human body for recognizing the person being authenticated).

Palm vein authentication has a high level of authentication accuracy due to the uniqueness and complexity of vein patterns of the palm. Because the palm vein patterns are internal to the body, this is a difficult method to forge. Also, the system is contactless and hygienic for use in public areas. It is more powerful than other biometric authentication such as face, iris, and retinal. Palm vein authentication uses an infrared beam to penetrate the users hand as it is held over the sensor; the veins within the palm of the user are returned as black lines.

THE BASIS OF PALM VEIN TECHNOLOGY

An individual first rests his wrist, and on some devices, the middle of his fingers, on the sensor's . The palm is held centimeters above the device's scanner, which flashes a nearinfrared ray on the palm. Unlike the skin, through which near-infrared light passes, deoxygenated hemoglobin in the blood flowing through the veins absorbs near-infrared rays, illuminating the hemoglobin, causing it to be visible to the scanner. Arteries and capillaries, whose blood contains oxygenated hemoglobin, which does not absorb near-infrared light, are invisible to the sensor. The still image captured by the camera, which photographs in the near-infrared range, appears as a black network, reflecting the palm's vein pattern against the lighter background of the palm. An individual's palm vein image is converted by algorithms into data points, which is then compressed, encrypted, and stored by the software and registered along with the other details in his profile as a reference for future comparison. Then, each time a person logs in attempting to gain access by a palm scan to a particular bank account or secured entryway, etc., the newly captured image is likewise processed and compared to the registered one or to the bank of stored files for verification, all in a period of seconds. Numbers and positions of veins and their crossing points are all compared and, depending on verification, the person is either granted or denied access.

REGISTERING THROUGH PALM VEIN TECHNOLOGY

Step 1: Palm vein authentication technology consists of a small Palm vein scanner second it that's easy and natural to use, fast and Highly accurate . reads your unique vein pattern. A vein picture is taken and palm Simply hold your palm a few centimeters over the scanner and within a pattern is registered.

Fig2.2.1: A view from scanning device

Step 2: The registered palm pattern is stored into the database along with the personal details of the client. Scanned palm

Original palm Re Fig :2.2.2 Process of Registration Registered pattern

PALM VEIN AUTHENTICATION SCHEMA


8

Fig 2(a)

Palm vein authentication uses the vascular patterns of an individuals palm as personal identification data .Compared with finger or the back of a hand, a palm has a broader and more complicated vascular pattern and thus contains a wealth of differentiating features for personal identification.
9

The palm is an ideal part of the body for this technology; It normally does not have hair which can be obstacle for photographing the blood vessel pattern, and it is less susceptible to change in skin color, unlike a finger or the back of hand. The deoxidized hemoglobin in the vein vessels absorbs light having a wave length of about 760 nm within the near infrared area . When the infrared ray image captured, as far as the image seen in figure 2(a), only the blood vessel pattern containing the deoxidized hemoglobin is visible as a series of dark lines. Based on this the vein authenticating device translates the black lines of the infrared ray image as the blood vessel pattern of the palm and then storing the template on the smart card or database. The lighting of the infrared ray is controlled depending on the illumination around the sensor, and the sensor is able to capture the palm vein image regardless of the position and movement of palm. The software solution then matches the translated vein pattern with the stored pattern, while measuring the position and orientation of the palm by on-cardprocess method or by palm vein technology.

WORKING OF PALM VEIN TECHNOLOGY

10

Once the palm vein pattern is registered in the system, user can authenticate him/herself in the system. Using a built-in speaker, the device instructs the user to place his hand over the complete. The working of Palm Vein Technology is described in following steps [2]. STEP 1: Hold your palm over the palm vein image sensor and camera which will take the snapshot of palm. device and informs the user when the scan is

Fig-2.3.1 Palm vein image sensor and palm image captured. [3]

STEP 2: Now palm image is processed and digitalized with the help of algorithm implemented in the system

Fig-2.3.2 Magnified view of palm vein pattern. [4]

STEP 3:
11

This digitalized image is matched with the previously stored database and authenticates user identity. In banking applications, for example, once a new customer has been issued a smart card, he/she is asked to visit the bank in order to enroll her vein data. After that they can make a risk reduced transactions. When an individual inserts a smart card into the sensor device and holds her hand over the reader.(card or IC CARD) . The vein pattern is instantly captured using a completely safe near-infrared light. The reader converts the image into an encrypted biometric template and compares it against the template on the smart card (1 to 1 matching) or those in the database (1 to N matching), if it found the correct match..it will grant permission for the user to access it or otherwise it will block from unauthorised access.

PERFORMANCE METRICS OF BIOMETRIC SYSTEM


1. FALSE ACCEPTANCE RATE (FAR) The probability that the system incorrectly matches the input pattern to a non-matching template in the database. It measures the percent of invalid inputs which are incorrectly accepted [5].

2. FALSE REJECTION RATE (FRR) The probability that the system fails to detect a match between the input pattern and a matching template in the database. It measures the percent of valid inputs which are incorrectly rejected [5].

12

Table-1: Comparison with other technologies based on FRR and FAR Technology FAR FRR Palm vein Finger print Iris / Retina Voice 0.00008 % 1-2 % 0.0001-0.94 % 2% 0.01 % 3% 0.99-0.2 % 10 %

Fig: Graph created from the data in table-1. [2]

3. EQUAL ERROR RATE ORCROSSOVER ERROR RATE (EER OR CER) The rate at which both accept and reject errors are equal. The value of the EER can be easily obtained from the ROC curve .The EER is a quick way to compare the accuracy of devices with different ROC curves.In general, the device with the lowest EER is most accurate. Obtained from the ROC plot by taking the point where FAR and FRR have thesame value. The lower the EER, the more accurate the system is considered to be.

4. RELATIVE OPERATING CHARACTERISTICS OR RECEIVER

13

OPERATING CHARACTERISTICS (ROC) The ROC plot is a visual characterization of the trade-off between the FAR and the FRR. In general, the matching algorithm performs a decision based on a threshold which determines how close to a template the input needs to be for it to be considered a match. If the threshold is reduced, there will be less false nonmatches but more false accepts. Correspondingly, a higher threshold will reduce the FAR but increase the FRR. A common variation is the Detection error trade-off (DET), which is obtained using normal deviate scales on both axes. This more linear graph illuminates the differences for higher performances (rarer errors).

Fig-2.4.(1) Receiver operating characteristics (graph between FRR and FAR). [5]

Fig-2.4(.2 )Graph showing EER identification by plotting FAR and FRR on same graph.

14

5. FAILURE TO ENROL RATE (FTE OR FER) The rate at which attempts to create a template from an input is unsuccessful . This is most commonly caused by low quality inputs. 6. FAILURE TO CAPTURE RATE (FTC) Within automatic systems, the probability that the system fails to detect a biometric input when presented correctly . 7. TEMPLATE CAPACITY The maximum number of sets of data which can be stored in the system.

HOW SECURE IS THE TECHNOLOGY ?


On the basis of testing the technology on more than 70,000 individuals , Fujitsu declared that the new system had a FRR of 0.01% FAR of 0.00008% . Also, if your profile is registered with your right hand, don't log in with your left - the patterns of an individual's two hands differ. And if you registered your profile as a child , it'll still be recognized as you grow, as an individual's patterns of veins are established in uterus (before birth).

15

No two people in the world share a twins differ.

palm vein pattern, even those of identical

In addition the device ability to perform personal authentication was verified using the following: 1. Data from people ranging from 6 to 85 years old including people in various occupations in accordance with the demographics realized by the Statistics Canter of the Statistics Bureau. 2. Data about foreigners living in Japan in accordance with the world demographics released by the United Nations. 3. Data taken in various situations in daily life including after drinking alcohol, taking bath, going outside and waking up.

FEATURES OF PALM VEIN TECHNOLOGY


1. The human palm vein pattern is extremely complex and it shows a huge number of vessels. 2. The biometric information is located inside the human body, and therefore it is protected against forgery and manipulation. 3. The position of the palm vein vessels remain the same for the whole life and its pattern is absolutely unique. 4. The enrolment of the palm vein pattern can be done without any physical contact to the sensor. 5. Skin colour, skin dirtying, surface wounds, skin humidity, skin temperature, aging do not have major influence to enrol and to authenticate the palm vein patterncorrectly. 6. Palm Secure is based on a near infrared method, and it has no negative influence to the health. 7. Since it is contact less and uses infrared beam, it is more hygienic.

16

WHAT HAPPENS IF THE REGISTERED PALM GETS DAMAGED?


There may be a chance that the palm we had registered may get damaged then we cannot use this technology, so during the time of registration we take the veins of both the hands so that if one gets damaged we can access through the second hand. When hand get damaged up to large extent we can get veins because deeper into the hand veins are obtained.

Fig-2.8 registering vein pattern of both palms simulteniously. [6]

ADVANTAGES & DISADVANTAGES OF P.V.T


Palm vein technology has comparatively much more positives than negatives. Some of them are discussed earlier in the report and now we will discuss all in detail.

3.1. ADVANTAGES
1. Palm vein authentication can be done using the vascular pattern on the back of a hand or a finger. However, the palm vein pattern is the most complex and covers the widest area, because the palm has no hair, it is easier to photograph its vascular pattern. The palm also has no significant variations in skin colour compared with fingers or back of the hand, where the colour can darken in certain areas. Also we can use fusion of two technologies, palm vein and palm print, which will be more complex and more reliable but costly.
2.

Because iterative closest point (ICP) method is used in this technology so there will be no false rejections or false acceptance cases because of

17

orientation problem. So FRR and FAR are very low in comparison to other biometric technologies. So it is more secure and reliable. 3. The contactless feature of this device makes it suitable for use where high levels of hygiene are required. It also eliminates any hesitation people might have about coming into contact with something that other people have already touched. 4. The vascular pattern of our palm doesnt change with our growth or age , Even palm vein pattern is generated before birth. So once you registered the palm vein pattern, you need not to re-register again anytime in whole life except any critical case of accident. Even in case of accident if palm is not injured critically, palm vein pattern can be extracted because vein are located deeper inside the hand. Also at the time of registration you have to register the vein pattern of both the palms, so if one gets injured other one can be used. 5. Palm vein pattern of any individual cannot be theft. Also since it is contactless, privacy cannot be invaded.

Single Sign-On

3.2 DISADVANTAGES

The only weaknesses of palm vein biometric system are the different factor that affects the quality of captured image. Such factors include body temperature, ambient temperature and humidity, unevenly distribution of heat, heat radiation, and nearness of the vein to surface and camera calibration and focus. Most of these factors are natural cause which is difficult to overcome.

18

4. APPLICATIONS AND BUSINESS


This palm vein authentication technology is used in various areas for more security. The following are some of the important areas where it is used:

4.1 ATM AND BANKING In July 2004, to ensure customer security, Suruga bank launched its Bio Security Deposit the worlds first financial service to use Palm Secure . In Oct 2004, The Bank of Tokyo launched its Super IC Card. This card combines the functions of a bankcard, credit card, electronic money and palm vein authentication. This Super IC Card contains the customers palm Vein data and vein Authentication algorithms and reforms vein Authentication by itself. PVT is used in 92% of all Japanese ATMs including 18,000+ ATM machines for Bank ofTokyo Mitsubishi.

19

4.2 PERSONAL COMPUTERS


In personal computers palm vein technology can be applied by inserting the vein sensor inside mouse or on the keyboard. When power is supplied to system the mouse/keyboard also gets power and the sensor in the mouse/keyboard will be ready to sense palm veins. When one place his/her palm the sensor sense the veins and if they are matched with the registered ones the system allows the person to use it. One can use this technology even to lock folders, that should be maintained as private information. This technology will be very helpful in protecting data saved in computers and highly reducing the hacking of password. It can also be used in multiuser computers where more than one people can usethe computer. The users previously having account or login account in particular computer can access the computer. Also this can be possible over a network like top secure sites of defence or other corporate sites or accounts where some of the officials can access the network.

4.3 IN HOSPITALS AND LIBRARYS

20

PalmSecure device can also be used in hospitals for doctor and patients identification and where the high level of security is required. In libraries also Palmsecure device may be used in place of ID cards. Some public libraries are started using this technology. Forexample, a public library in Japan is set to become the first in the world to use palm-vein biometrics as a substitute for conventional library cards. The University of Tokyo hospital has taken delivery of a contactless palm vein authentication system to secure physical access to its Department of Planning, Information and Management.

4.4GENERAL AUTHENTICATION
In front of our homes we can apply this Palm vein technology so that by registering the veins of our family members and relatives we can not possible through other maintain high range security which is and getting high range security. Nowadays credit and debit cards lose are very general cases and customers faces huge lose sometimes. So replacing credit card with palm vein will solve the all problems.

technologies . Japanese recently used this technology before front doors

4.5 USE OF PVT IN OFFICES AND SCHOOLS


Palm vein sensing devices can be used in offices, schools colleges, universities for attendance purpose. It also improves the security and prevents any sensitive case.

4.6 OTHER PRODUCT APPLICATIONS

21

1. Management in healthcare 2. Access control to medication dispensing 3. Identification of doctors and nurses when accessing protected health records 4. Patient identification management 5. Operator authentication 6. 7. Settlement by credit card Obtaining various certificates using the Basic Resident Register Card 8. Owner authentication 9. Retrieval of checked luggage 10. Driver authentication 11. Attendance authentication 12. Checking attendance in schools 13. Clocking in and out of the workplace.

4.7 BUSINESS IMPACT


Although, palm vein technology is quite new but it is creating an impact on market and replacing the conventional biometric technologies. It can be seen from the fact that 92% ATMs in JAPAN using this technology including TOKYO NATIONAL BANK. Also some of public libraries in JAPAN are using palm vein authentication in place of IDcards.Even PVT is used at front door of home.

5. FUTURE ASPECTS
Japan and Korea are the leading manufacturers of Palm Secure devices. They supply the product mainly in Asia and America. the size of the device needed in various applications is different. Hence research works are going on to reduce the size of device. Resolution of image captured depends on ambient light intensity and temperature.

22

these two factors strongly affects the resolution of captured image and hence the accuracy of the device, so still some improvements are required in the technology and some progress is going on. Error rates are high while using single biometric, so the fusion of two or more biometric are also used. Mostly palm vein and palm print technologies are used for fusion. This fused technology is also called multimodal biometric. The error rates decreases to a large extent. In this technology, separate templates of palm print and palm vein pattern are taken using sensors and camera and matched with database.

6. CONCLUSION
. Palm vein technology is the new face of the biometric. It provides the maximum security as compared to other biometric technologies . it uses information contained within the body and is also highly accurate because the pattern of veins in the palm is complex and unique to each individual. It also gives least FRR, FAR, EER among them. Also verification time is less as compared to other technologies. Since in this technology ICP method is used which is free from orientation and rotational problems of the image.

23

Also there is no disadvantage. As discussed earlier, by using multimodal of fusion of other technology with PVT will make it more secure. Moreover, its contactless feature gives it a hygienic advantage over other biometric authentication technologies. financial solutions and product applications for the general market that have been developed based on this technology. Many of customers have favorably evaluated this technology and have experienced no psychological resistance to using it. This has encouraged manufacturers and developers to start development of new products for various applications Manufacturers and developers are working on reducing the size of the device in order to expand the range of application of the device. Fujitsu is continuing the work on reducing the size and improving the technology so that it can be more secure and have lesser FAR, FRR and EER.

7. REFERENCES
1. Palm SecureTM by Thomas Bengs, product manager EMEA. 2. Biometric security - Fujitsu Palm Vein Technology by Bao Nguyen, Henrik Nilsen, Yoonjin Kim (Information Technology Department NNK Investment &Banking). 3. White Paper Palm Vein Authentication. 2006 Fujitsu Computer Products forAmerica, Inc, 4. Analysis of Palm Vein Biometric System by Kenneth Wong, Thomson Lai,Bosco Lee, Frankie Shum.
24

5. BIOMETRICS by Alvaro E. Escobar. 6. Vascular Pattern Analysis towards Pervasive Palm Vein Authentication by Debnath Bhattacharyya (Heritage Institute of Technology, Kolkata, India ), Poulami Das (Heritage Institute of Technology, Kolkata, India), Tai-hoon Kim(Hannam University, Daejeon, Korea), Samir Kumar Bandyopadhyay (Universityof Calcutta, Kolkata, India). 7. A New Palm Vein Matching Method Based on ICP Algorithm Haifen ChenGuangming Lu Rui Wang Bio-Computing Research Centre, HIT Shenzhen Graduate School, Harbin Institute of Technology Shenzhen, China 8. Emerging Biometric Technologies from www.indiasafe.com/image/pdf-mar10/64.pdf 9. Report on Vascular Pattern Recognition by NTSC (National Science and Technology Council).

25

26

27

28

29

30

31

You might also like