Biometric Security Palm Vein Technology

Slides:



Advertisements
Similar presentations
BIOMETRIC VOTING SYSTEM
Advertisements

Confidential – Do Not Distribute Iris Biometrics For Accurate Patient Identification Michael Trader President M2SYS Technology
Input & Output Devices ASHIMA KALRA.
e-Solutions for Access Control, CCTV, Attendance Monitoring, Personal Identification, Building Management and Fire Detection SECURITY & SAFETY IS ONE.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
By Aidan Summerville.  The process inn which a person’s unique physical and other traits are detected and recorded by an electronic device or system.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
PALM VEIN TECHNOLOGY.
AUTOMATIC DATA CAPTURE  a term to describe technologies which aim to immediately identify data with 100 percent accuracy.
Iris Recognition By Mohammed, Ashfaq Ahmed. Introduction Iris Recognition is a Biometric Technology which deals with identification based on the human.
Marjie Rodrigues
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
BornholmsTrafikken April 2004 Peter Havskov Christensen, M.Sc.
WELCOME.
systemhound © Raxco Software Belgium systemhound PC inventory software.
Information Technology Department NNK Investment & Banking Team 3-F Bao Nguyen | Henrik Nilsen | Yoonjin Kim 1.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
Input Devices Manual and Automatic By Laura and Gracie.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Biometrics Stephen Schmidt Brian Miller Devin Reid.
WELCOME TO PALM VEIN TECHNOLOGY M.Sravanthi K.Raga Ranjitha
Hand Scanning for Entering the Building  Hand scanning will keep intruders out and improve the security between the bank and their clients.  This reliable.
Biometrics Authentication Technology
Biometrics.
Cashless Society E-Learning 1 (31 st Jan – 1 st Feb 2008)
By: Kirti Chawla. Definition Biometrics utilize ”something you are” to authenticate identification. This might include fingerprints, retina pattern, iris,
PRESENTATION ON BIOMETRICS
Biometric Technologies
Describe direct data entry and associated devices, e. g
WELCOME.
IDENTITY THEFT By Deshano Dottery. FASTEST GROWING PROBLEM IN AMERICA Approximatley 15 million victims per year Approximatley 15 million victims per year.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Topic 8 – Security Methods 1)TechMed scenario covers Security methods and devices, including biometrics In the scenario: Implied.
BIOMETRICS.
Biome-NO-trics Securing your business through biometrics so there are no tricks. Hailey Nealen, Rebekah O’Bryan, and Mirada McCormick.
Social Bar Every person is interested in three things at his bar: Every person is interested in three things at his bar: Music Music Alcohol Alcohol Social.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
The Big Picture Things to think about What different ways are there to collect information automatically? What are the advantages and disadvantages of.
Overview of Bio-Tech Technology+- Fingerprint Popular Cheapest Less Accurate Voice Non invasive Least Accurate Iris & Retinal Very accurate Invasive Expensive.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
Automatic Data Capture  Process where many techniques are used to automatically collect data without need for manual entry. Manual entry has following.
BIOMETRIC VOTING SYSTEM ( A novel way to vote ). INTRODUCTION :  It has always been an arduous task for the election commission to conduct free and fair.
Biometrics Security in Banking Systems Image processing in ATM
Presented By: Mark Jordan
A device tat transfers data from the outside world into a computer
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
PARKING AUTOMATION SYSTEM
Authentication.
Biometrics.
Biometric Security Fujitsu Palm Vein Technology
Jenna Lutton February 26th, 2007
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Hailey Nealen, Rebekah O’Bryan, and Mirada McCormick
by- A.Swetha (13FF1A0401) G.Pradeep (14FF5A0407) B.Gopi (14FF5A0402)
OCR GCSE ICT Data capture methods.
BSC Biometric Security System
Biometrics.
Margaret Brown 3rd period October 14, 2007
BSC Biometric Security System
Biometric technology.
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Presented by: k.ramya krishna
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
K.C.C.A. : Key Crime Ceasing Association
BY: Michael Etse and Maverick Fermill
Presentation transcript:

Biometric Security Palm Vein Technology V. Harsha vardhan [06N31A0417]

What is Palm vein Technology Palm vein technology is a biometric security system in which Blood vessels in our palm are scanned and imprint is stored inthe database. Every time we want to pass through the security, the system compares Imprint in the database with our vein pattern.

BIO-TECH SECURITY MEASURES Palm vein detection Relatively cheap accurate Retinal scan High cost Finger print Popular Less accurate

HOW DOES IT WORK Takes snapshot of palm veins Converts into algorithm Detection of hand vein pattern Generating near infra red image Encryption of image to store in database Takes snapshot of palm veins Converts into algorithm Compares with Database

Block Diagram Database Biometric sensor (Security machine) Encryption Device Processor Output Result [YES/NO] Processor compares the imprint in the database and Actual scan.

Accuracy Retinal scan 99% Palm vein 93% Finger Print 60% When Large group of people are Considered., i.e., may be a few thousands Of imprints in a single database

Features Available Software Development Kit Kit is Small Easy to integrate to current company system Kit is Small Cheap to produce Easy to Install Wide range of operating condition Retinal scanners are sensitive to light and temp

Applications Private PUBLIC USAGE Building Access – Magnetic Card and Pin SYSTEM OR a MACHINE ACCESS PUBLIC USAGE ATM Access Home security

Why should it be preferred ? Customer impact Leading type of ID Theft – Credit cards can be duplicated. IN 2007-2008, 8.1 Million credit card victims around The world.(Mostly in america) Every year at around $45.3 Billion loss occurs due To credit card theft and Duplication.

In comparison with other leading bio-tech, Palm Secure is More Reliable, More Accurate Fast Small Relatively cheap to implemented and operate It can be use for PC log-in Building entrance ATM machine, etc… Reduce loss due to identity theft

Queries??

1. FUJITSU INTERNATIONAL ONLINE INFORMATION FROM GOOGLE. 2.WWW.FUGITSU.COM