19-09-2014, 02:48 PM
Palm Vein Technology
Palm Vein Technology.pptx (Size: 553.34 KB / Downloads: 86)
Introduction
Currently, passwords, Personal Identification Numbers or identification cards are used for personal identification.
In biometric authentication, an account holder’s body characteristics or behaviors are registered in a database and then compared with others who may try to access that account.
A key advantage of biometric authentication is that biometric data is based on physical characteristics that stay constant throughout one’s lifetime and are difficult (some more than others) to fake or change.
Biometric identification can provide extremely accurate, secured access to information; fingerprints, palm vein and iris scans produce absolutely unique data sets (when done properly).
Principle Involved
Unlike the skin, through which near-infrared light passes, deoxygenated hemoglobin in the blood flowing through the veins absorbs near-infrared rays, causing it to be visible as black regions to the scanner.
Arteries and capillaries, whose blood contains oxygenated hemoglobin, which does not absorb near-infrared light, are invisible to the sensor, hence we chosen “VEINS”.
An individual's palm vein image is converted by algorithms into data points, which is then compressed, encrypted, and stored by the software person when ever access it, the data is compared with stored one, thus verification is done.
How secure is technology?
On the basis of testing the technology on more than 70,000 individuals , Fujitsu declared that the new system had a false rejection rate of 0.01%
(i.e., only one out of 10,000 scans were incorrect denials for access).
And a false acceptance rate of less than 0.00008% (i.e., incorrect approval for access in one in over a million scans).
And if you’re registered your profile as a child, it'll still be recognized as you grow, as an individual's patterns of veins are established in utero (before birth).
Conclusion
If this technology is introduced in India we can solve many problems such as password protection in ATM, security in various fields.
If we implement this technology in government offices we can make the employees to work according to the government timings.
Surely this technology will bring a revolution in the field of science and technology in the near future.