Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: SEMINAR REPORT Palm Vein Technology
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
SEMINAR REPORT Palm Vein Technology

[attachment=42067]

ABSTRACT

With the increase in technology threat to personal data and national security had also
increased. The methods that were developed to secure important information from outside
intervention were not up to safe mark .There was a need to introduce a technology that
secures our data more efficiently from unlawful intervention .
Fujitsu has developed a palm vein pattern authentication technology that uses vascular
patterns as personal identification data .Vein recognition technology is secure because the
authentication data exists inside the body and is therefore very difficult to forge. It is
highly accurate. This technology can be used in various fields like banking, hospitals,
government offices, in passport issuing etc. Business growth will be achieved with these
solutions by reducing the size of the palm vein sensor and shortening the authentication
time.
Hand vein is a biometric modality that seems promising as it is acquired in Near Infrared
light (NIR), which implies that skin variations and dirtiness are less sensible than in
visible light. Moreover, the haemoglobin which flows in the veins is sensible to NIR
light, this way allowing a good quality of acquisition of the hand veins. It is possible to
use either the back of the hand or the hand palm. A recent study using back hand vein
data and tested with 5 sessions per person and 50 persons showed promising results. The
main problem of this database is the low resolution of the images (images at resolution
132x124 pixels).

WHAT IS BIOMETRICS?

Automated measurement of Physiological and/or behavioral characteristics to
determine or authenticate identity is known as Biometrics [5]. Three components of
above definition will determine what is and what is not a biometric and also its different
types and functionalities.
Let’s start with the First component of the definition: “Automated measurement”,
which means no human intervention or involvement is required. Biometrics are
automated in as much as the processes involved in sample acquisition, feature extraction,
record retrieval, and algorithm-based matching are computerized or machine-based. Also
the record retrieval and comparison against another measurement must take place in Real-
Time. So for an instance, DNA sampling is NOT a biometric measurement because today
it still requires human intervention and it’s NOT done in real time. The second
component of the definition: “Physiological and/or behavioral characteristics”,
determine the two main biometric categories: behavioral and physiological. The
behavioral characteristics measure the movement of a user, when users walk, speak, type
on a keyboard or sign their name. The physiological characteristics would be the physical
human traits like fingerprints, hand shape, eyes and face, veins, etc., and the last
component of the definition is “determine or authenticate identity”, which categorizes
the two types of biometric functionalities[5]. The first type is identification systems or the
systems that answer the question who am I? and determine the identity of a person. The
second type is verification systems or systems that answer the question, am I who I claim
to be? and authenticate a person.

BIOMETRIC FEATURES

 It becomes obsolete to beware passwords safely or to remember to all of them.
 Abuse of stolen id cards and passports will be reduced enormously.
 Abuse of stolen credit cards will be prevented.
 Taking over foreign identities will be impossible.
 Building access right to people without the right of admittance will be prevented.
 Access to devices/computers will be not possible for persons without the right of
admittance.
 Unnecessary costs will be drastically reduced.
 Level of common convenience and safety will grow.

THE BASIS OF PALM VEIN TECHNOLOGY

Every individual have unique pattern of Palm veins, so the palm vein pattern is used to
authenticate some individual’s identity. The process of authentication and registration is
discussed in next topics. An individual first rests his wrist, and on some devices, the
middle of his fingers, on the sensor's supports such that the palm is held centimetres
above the device's scanner, which flashes a near-infrared ray on the palm [6]. Unlike the
skin, through which near-infrared light passes, deoxygenated haemoglobin in the blood
flowing through the veins absorbs near-infrared rays, illuminating the haemoglobin,
causing it to be visible to the scanner.

HOW SECURE IS THE TECHNOLOGY ?

On the basis of testing the technology on more than 70,000 individuals , Fujitsu
declared that the new system had a FRR of 0.01% FAR of 0.00008% . Also, if your
profile is registered with your right hand, don't log in with your left - the patterns of an
individual's two hands differ. And if you registered your profile as a child , it'll still be
recognized as you grow, as an individual's patterns of veins are established in uterus
(before birth). No two people in the world share a palm vein pattern, even those of
identical twins differ. In addition the device ability to perform personal authentication
was verified using the following:
1. Data from people ranging from 6 to 85 years old including people in various
occupations in accordance with the demographics realized by the Statistics Canter
of the Statistics Bureau.
2. Data about foreigners living in Japan in accordance with the world demographics
released by the United Nations.
3. Data taken in various situations in daily life including after drinking alcohol,
taking bath, going outside and waking up.