Palm Vein Technology: Chapter-1
Palm Vein Technology: Chapter-1
Palm Vein Technology: Chapter-1
1.1. Motivation
The palm vein authentication technology offers a high level of accuracy. Compared with a finger or the back of a hand, a palm has a broader and more complicated vascular pattern and thus contains a wealth of differentiating features for personal identification. The importance of biometrics in the current field of Security has been depicted in this work. Biometric systems are superior because they provide a nontransferable means of identifying people not just cards or badges. The key point about an identification method that is nontransferable" means it cannot be given or lent to another individual so nobody can get around the system -they personally have to go through the control point.A key advantage of biometric authentication is that biometric data is based on physical characteristics that stay constant throughout ones lifetime and are difficult to fake or change. Biometric identification can provide extremely accurate, secured access to information of Palm Vein which produce absolutely unique data. Because the palm vein patterns are internal to the body, this is a difficult method to forge. Also, the system is contactless and hygienic for use in public areas. It is more powerful than other biometric authentication such as face, iris, and retinal. As veins are internal in the body and have a wealth of differentiating features, attempts to forge an identity are extremely difficult, thereby enabling a high level of security.
Page 1
Using the data of 140,000 palms from 70,000 individuals, it has been proved that the system has a false acceptance rate of less than 0.00008% and a false rejection rate of 0.01%, provided the hand is held over the device three times during registration, with one retry for comparison during authentication. In addition, the devices ability to perform personal authentication was verified using the following: 1) Data from people ranging from 5 to 85 years old, including people in various occupations in accordance with the demographics released by the Statistics Center of the Statistics Bureau; 2) Data about foreigners living in Japan in accordance with the world demographics released by the United Nations; 3) Data taken in various situations in daily life, including after drinking alcohol, taking a bath, going outside, and waking up.
Page 2
1.3. Introduction
In the network society, where individuals can easily access their information anytime and anywhere, people are also faced with the risk that others can easily access the same information anytime and anywhere. Because of this risk, personal identification technology, which can distinguish between registered legitimate users and imposters, is now generating interest.
The ability to verify identity has become increasingly important in many areas of modern life, such as electronic government, medical administration systems, access control systems for secure areas, passenger ticketing, and home office and home study environments. Technologies for personal identification include code numbers, passwords, and smart cards, but these all carry the risk of loss, theft, forgery, or unauthorized use. It is expected that biometric authentication technology, which authenticates physiological data, will be deployed to supplement - or as an alternative to - these other systems. Currently, passwords, Personal Identification Numbers (4-digit PIN numbers) or identification cards are used for personal identification. To solve the problems associated with them, biometric authentication technology, which identifies people by their unique biological information, is attracting attention. In biometric authentication, an account holders body characteristics or behaviors (habits) are registered in a database and then compared with others who may try to access that account to see if the attempt is legitimate.
Methods such as fingerprints, faces, voiceprints, and palm veins, among these, because of its high accuracy, contact less palm vein authentication technology is being incorporated into various financial solution products for use in public places.
Palm Secure detects the structure of the pattern of veins on the palm of the human hand with the utmost precision.
Page 3
An individual first rests his wrist, and on some devices, the middle of his fingers, on the sensor's supports such that the palm is held centimeters above the device's scanner, which flashes a near-infrared ray on the palm. Unlike the skin, through which near-infrared light passes, deoxygenated hemoglobin in the blood flowing through the veins absorbs near-infrared rays, illuminating the hemoglobin, causing it to be visible to the scanner. Arteries and capillaries, whose blood contains oxygenated Fig. 1.3.1 Palm Vein Technology highly secure hemoglobin, which does not absorb near-infrared light, are invisible to the sensor. The still image captured by the camera, which photographs in the near-infrared range, appears as a black network, reflecting the palm's vein pattern against the lighter background of the palm. An individual's palm vein image is converted by algorithms into data points, which is then compressed, encrypted, and stored by the software and registered along with the other details in his profile as a reference for future comparison. Then, each time a person logs in attempting to gain access by a palm scan to a particular bank account or secured entryway, etc., the newly captured image is likewise processed and compared to the registered one or to the bank of stored files for verification, all in a period of seconds. Numbers and positions of veins and their crossing points are all compared and, depending on verification, the person is either granted or denied access.
Page 4
2.1. Design
Fig. 2.1
Palm vein authentication works by comparing the pattern of veins in the palm (which appear as blue lines) of a person being authenticated with a pattern stored in a database. Vascular patterns are unique to each individual, according to research even identical twins have different patterns. And since the vascular patterns exist inside the body, they cannot be stolen by means of photography, voice recording or fingerprints, thereby making this method of biometric authentication more secure than others. The palm secure works by capturing a persons vein pattern image while radiating it with near-infrared rays. The Palm Secure detects the structure of the pattern of veins on the palm of the human hand with the utmost precision. The sensor emits a near-infrared beam towards the palm of the hand and the blood flowing through these back to the heart with reduced oxygen absorbs this radiation, causing the veins to appear as a black pattern. This pattern is recorded by the sensor and is stored in encrypted form in a database, on a token or on a smart card.
Page 5
Page 6
Fig. 2. 2. 2
Page 7
In addition to the palm, vein authentication can be done using the vascular pattern on the back of the hand or a finger. However, the palm vein pattern is the most complex and covers the widest area. Because the palm has no hair, it is easier to photograph its vascular pattern. The palm also has no significant variations in skin color compared with fingers or the back of the hand, where the color can darken in certain areas. One of the main issues in image fusion is image alignment or registration. Once the images are registered, they can be fused.
In image registration, the central part of the palm is captured without any touching causing the palm to be registered. The captured or registered color image (palm print) is set as the source or reference image and the near-infrared image (palm vein) is set as the target image which is aligned to the source image.
Fig.2.2.4. Image registration. First column: palm print images (source); second column: palm vein images (target); third column: registered palm print images.
Dept of Computer Science, GIT, Belgaum Page 8
Fig.2.2.5. Fusion of palm print and palm vein images: (a) registered palm print image; (b) original palm vein image; (c) and (f) low-frequency palm print and palm vein images, respectively; (d) and (e) horizontal and vertical details of the palm print image; (g) and (h) horizontal and vertical details of the palm vein image; (i), (j) and (k) modulus maxima at three levels; (l), (m) and (n) modulus maxima at three levels; (o), (p) and (q) fused modulus maxima at three levels; and (r) reconstructed fused image.
Page 9
Fig.2.2.5.1 Image fusion. First column: registered palm print images; second column: palm vein images; third column: fused images. Dept of Computer Science, GIT, Belgaum Page 10
Enter the palm vein ID authentication; capture the user's vein pattern unique to every individual's palm for an exquisitely sensitive biometric authentication technique. This technology has few other advantages over other biometric technologies as the palm vein scanner has no deleterious effect on the body, nor does it require that the device be touched. Aging or the camera angle could affect facial recognition systems; fingerprints can be forged but on the contrary, palm vein recognition seems not to be affected by aging; neither cuts, scars nor skin color affect the scans outcome; and, given that veins are internal, they can hardly be tampered.
Infrared vein image of the palm Fig. 3.1.
Page 11
Palm Secure: This service features high security for customers using vein authentication, does not require a bankcard or passbook, and prevents withdrawals from branches other than the registered branch and ATMs, thereby minimizing the risk of fraudulent withdrawals.
Super-IC Card: This card combines the functions of a bankcard, credit card, electronic money and palm vein authentication
Page 12
Page 13
Page 14
Because of the importance of personal identification, we can expect to see the Development of new products for various applications, such as:
Management in healthcare Access control to medication dispensing Identification of doctors and nurses when accessing protected health records Patient identification management Operator authentication Settlement by credit card Obtaining various certificates using the Basic Resident Register Card Owner authentication Retrieval of checked luggage Driver authentication Attendance authentication Checking attendance in schools Clocking in and out of the workplace.
Page 15
This paper explains palm vein authentication. It is based on the authentication system that utilizes the latest Biometric Security Technology. Answering a worldwide need from governments to the private sector, this contactless device offers an easy-to-use, hygienic solution for verifying identity. This technology is highly secure because it uses information contained within the body and is also highly accurate because the pattern of veins in the palm is complex and unique to each individual. Moreover, its contactless feature gives it a hygienic advantage over other biometric authentication technologies. This paper also describes some examples of financial solutions and product applications for the general market that have been developed based on this technology
Page 16
[1] A. K. Jain and J. Feng, Latent palm print matching, IEEE Trans. Pattern Anal. Mach. Intell., vol. 31, no. 6, pp. 10321047, Jun. 2009.
[2] Anal. Mach. Intell., vol. 31, no. 6, pp. 10321047, Jun. 2009. V. P. Zharov, S. Ferguson, J. F. Eidt, P. C. Howard, L. M. Fink, and M. Waner, Infrared imaging of subcutaneous veins, Lasers Surgery Medicine, vol. 34, no. 1, pp. 5661, Jan. 2004
[3] Wang, L., Graham, L.: Near- and Far- Infrared Imaging for Vein Pattern Biometrics. In:IEEE ICAVSS, IEEE Computer Society Press, Los Alamitos (2006)
Page 17