WELCOME.

Slides:



Advertisements
Similar presentations
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Advertisements

BIOMETRIC VOTING SYSTEM
Biometrics By: Ashley Rodriguez. Biometrics An automated method of recognizing a person based on physical or behavioral traits. Consist of two main classes.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
By: Monika Achury and Shuchita Singh
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Introduction to Fingerprint Biometrics By Tamar Bar.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
FIT3105 Biometric based authentication and identity management
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
PALM VEIN TECHNOLOGY.
Retinal Scan Sami Lyden. Presentation ● Biometrics – Method – Advantages – Disadvantages ● Retinal recognition – Scanners – Methods ● Comparison ● Developement?
Biometrics and Authentication Shivani Kirubanandan.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Biometrics: Ear Recognition
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
Authentication Approaches over Internet Jia Li
Information Technology Department NNK Investment & Banking Team 3-F Bao Nguyen | Henrik Nilsen | Yoonjin Kim 1.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
B IOMETRIC STANDARDS A N OVERVIEW OF BIOMETRICS AND IDENTITY MANAGEMENT Supervisor : Ahmed Abu Mosameh Prepared by samaher el nbahen UNIVERSITY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Information about Biometrics and its security By Ridham Bhatt.
BIOMETRICS.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
WELCOME TO PALM VEIN TECHNOLOGY M.Sravanthi K.Raga Ranjitha
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
By: Kirti Chawla. Definition Biometrics utilize ”something you are” to authenticate identification. This might include fingerprints, retina pattern, iris,
PRESENTATION ON BIOMETRICS
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
BIOMETRICS.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
Overview of Bio-Tech Technology+- Fingerprint Popular Cheapest Less Accurate Voice Non invasive Least Accurate Iris & Retinal Very accurate Invasive Expensive.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
Authentication.
FACE RECOGNITION TECHNOLOGY
Biometric Security Fujitsu Palm Vein Technology
Jenna Lutton February 26th, 2007
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Biometric Security Palm Vein Technology
Seminar Presentation on Biometrics
Biometric technology.
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Presented by: k.ramya krishna
BY: Michael Etse and Maverick Fermill
Presentation transcript:

WELCOME

PALM V EIN TECHNOLOGY

CONTENTS INDRODUCTION Biometrics Palm Vein Technology Accuracy REASONS FOR CONSIDERING THE PALM AREA FOR IDENTIFICATION : Accuracy Practical applications Advantages Disadvantages Conclusion References

INTRODUCTION Palm vein technology is one of the upcoming technology. It is the world’s first contactless personal identification system that uses the vein patterns in human palms to confirm a person’s identity. It is highly secure and accurate. The contact less feature gives it a hygienic advantage over other biometric authentication technologies. It uses the vascular patterns of an individual’s palm as personal identification data. biometric authentication technology, which identifies people by their unique biological information

Biometrics Automated measurement of Physiological and/or behavioral characteristics to determine or authenticate identity is known as Biometrics Increasing necessity of e-mail, Internet resources etc, offers serious security concerns. Biometrics can be defined as recognizing and identifying a person based on physiological or behavioral characteristics The behavioral characteristics measure the movement of a user, when users walk, speak, type on a keyboard or sign their name. The physiological characteristics would be the physical human traits like fingerprints, hand shape, eyes and face, veins, etc

Abuse of stolen id cards and passports will be reduced enormously. BIOMETRIC FEATURES It becomes obsolete to beware passwords safely or to remember to all of them. Abuse of stolen id cards and passports will be reduced enormously. Abuse of stolen credit cards will be prevented. Taking over foreign identities will be impossible. Building access right to people without the right of admittance will be prevented. Access to devices/computers will be not possible for persons without the right of admittance. Unnecessary costs will be drastically reduced. Level of common convenience and safety will grow.

DIFFERENT BIOMETRIC TECHNOLOGIES Physical Biometrics • Iris • Retina • Vein Pattern • Hand Geometry • Face • Fingerprint • Ear shape Behavioral Biometrics • Keystroke dynamics • Signature dynamics • Walking Gait • Voice

Biometric Systems

Biometrics Process new biometric sample is requested. Database No Quality Sufficient? Signal Processing, Feature Extraction, Representation Biometric Data Collection Transmission Yes Generate Template Database Template Match Decision Confidence? Yes No

VOICE PRINT Voice Recognition: is the Identification using the acoustic features of speech that have been found to differ between individuals. ADVANTAGES Easy to use and requires no special training or equipment. Relatively inexpensive compared to other biometrics. Consumers prefer to use voiceprints over other biometric technology for identification according to a Chase bank’s research study. DISADVANTAGES When processing a person’s voice over multiple channels such a microphone and then over a telephone reduces the recognition rate. Physical conditions of the voice, such as those due to sickness, affect the voice verification process. Environment noise reduces the overall accuracy and effectiveness of the recognition. The storage requirement for voiceprint database can be very large. A person’s voice changes over time.

Voice Identification System Construct voice reference template Database

FINGER PRINT Fingerprint Recognition is the identification by using patterns of friction ridges and valleys on an individual's fingertips which are unique to that individual. ADVANTAGES Since fingerprints are the composition of protruding sweat glands, everyone has unique fingerprints. They do not change naturally. Its reliability and stability is higher compared to the iris, voice, and face recognition method. Fingerprint recognition equipment is relatively low-priced compared to other biometric system DISADVANTAGES Vulnerable to noise and distortion brought on by dirt and twists. Some people may feel offended about placing their fingers on the same place where many other people have continuously touched. Some people have damaged or eliminated fingerprints. Since users have to touch the sensing device, so it gets damaged on scratches on it

Fingerprint Recognition steps: Database

FACE RECOGNITION Face recognition uses the visible physical structure of the face and analyses the spatial geometry of distinguishing features in it to identify an individual. ADVANTAGES Non intrusive, privacy cannot be invaded easily. Cheap technology. DISADVANTAGES 2D recognition is affected by changes in lighting, the person’s hair, the age, and if the person wear glasses. It also depends on orientation/angle of user’s face with camera. Requires camera equipment for user identification; thus, it is not likely to become popular until most PCs include good resolution cameras as standard equipment. Even the expressions on the face also affect the recognition process. For example:in Canada passport size photo with neutral face expression are accepted.

Face recognition process: Extraction of face features Input face image Extraction of face image Positive Database negative

Verification time is generally less than 5 seconds. IRIS SCAN The iris is the colored ring of textured tissue that surrounds the pupil of the eye. ADVANTAGES Very high accuracy. Verification time is generally less than 5 seconds. The eye from a dead person would deteriorate too fast to be useful, so no extra precautions have to been taken with retinal scans to be sure the user is a living human being. DISADVANTAGES Intrusive. A lot of memory for the data to be stored. Very expensive. Difficult to use because of positioning eye. Requires more time for matching with database stored

Iris Identification Steps: Input of face image Recognition of iris pattern Detection of eye regions Put iris in focus accept Database reject

Signature Identification: Signature identification: is the analyses of the way a user signs his or her name. The process used by a biometric system to verify a signature is called dynamic signature verification (DSV). the angle at which the pen is held the number of times the pen is lifted, the time it takes to write the entire signature, the pressure exerted by the person while signing, the variations in the speed with which different parts of the signature are written. ADVANTAGES Unique for every individual and user himself can decide the identity. Lesser false acceptance rate. Relatively cheap technology. No expert training required

High false rejection rate. DISADVANTAGES Signature of a person may change after a long time, like if an user gone through an accident and he cannot use his hand and then he signs after a long time, his sign and pressure points may change. High false rejection rate. Pressure points may change because of weather or some disease. System can be fooled by imitating   Profile Database

Palm Vein Technology In this technology ONE’S PALM is used as the “PASSWORD” for verification The veins present in the palm of the individual are scanned & verified thus providing the access Palm vein authentication is one of the vascular pattern authentication technologies. Vascular pattern authentication includes vein pattern authentication using the vein patterns of the palm, back of the hand or fingers as personal identification data The palm vein authentication uses the vascular patterns of the palm as personal identification data

First the individual places his PALM on the sensor, thus the sensor takes the “PALM VEIN IMAGE” and compares it with the pre-registered one with the help of INFRA RED RAYS. If there is a match then access is allowed, if not access is denied. This system is not at all dangerous. A near infrared ray is a component of sunlight, whose effect is much less than walking in sunlight.

REASONS FOR CONSIDERING THE PALM AREA FOR IDENTIFICATION : A palm has wide area and more complicated vascular pattern and contains some differentiating features for personal identification when compared with the patterns present in the back of the hand and the ventral side or dorsal side of the fingers. The palm normally has no hair and thus eliminates an obstacle to capturing the vein pattern and it is less susceptible to a change in skin color. For this purpose the contactless palm vein authentication device was launched by Fujitsu in Japan. This is also known as palm secure.

REASONS FOR CONSIDERING THE PALM AREA FOR IDENTIFICATION …. In palm vein authentication we use sensing and matching technology. when near-infrared light passes, deoxygenated hemoglobin in the blood flowing through the veins absorbs near-infrared rays, causing it to be visible as black regions to the scanner. Arteries and capillaries, whose blood contains oxygenated hemoglobin, which does not absorb near-infrared light, are invisible to the sensor, hence “VEINS” are chosen

SENSING TECHNOLOGY : The sensing technology used for vein patterns is based on near-infrared ray spectroscopy (NIRS) and imaging Deoxygenated hemoglobin in vein vessels absorbs light having a wavelength of about 760 nm within near-infrared area (Fig. 1). When capturing a body using near-infrared rays only the blood vessel pattern containing the deoxidized hemoglobin is visible as a series of dark lines (Fig.2). The vein authentication device translates the black lines of the infrared ray image as the blood vessel pattern of the palm (Fig. 3), and then matches it with the previously registered blood vessel pattern of the individual.

Fig2:infrared ray image Fig1: visible ray image Fig2:infrared ray image Fig 3 :Extracted vein pattern Blood vessel patterns are unique to every individual. Even the vein patterns on each hand are different.

IMAGING METHODS: Transmission method: There are two imaging methods used for veins 1.Reflection 2.Transmission. Reflection Method: The reflection method illuminates the target part from the front In this method, an illumination device and a capturing device can be combined because the direction of illumination and capturing is the same. Transmission method: The transmission method illuminates the target part from the back, the side or the surface around the target. but in this method, those devices must be used separately because the direction of illumination and capturing differs

Matching: The palm vein pattern is extracted from infrared-ray images as dark lines. This Matching involves 1. Capture 2. Extraction of palm vein pattern features 3. Storing of palm vein pattern features 1. Capture: Decide whether or not the user will hold his/her palm over the palm vein authentication sensor. If the palm is held, capture the infrared-ray image 2. Extraction of palm vein pattern features: Extract the palm vein pattern from the captured infrared-ray image by image processing. Convert the palm vein pattern to palm vein feature data following the algorithm to determine the correspondence between the two palm vein patterns. 3. Storing of palm vein pattern features: Store the palm vein feature data to storage, smart card or hard disk, depending on the application.

How It Works Working of Palm Vein Systems We Rest our palm on Vein Scanner Palm Vein Scanner – near Infra Red Rays Infra red rays will pass through veins Veins carry Deoxygenated Hemoglobin Deoxygenated blood absorbs Infra Red Rays Arteries and capillaries reflects infra red rays Vein patterns are captured for Authentication If Authorized, the requested Application gets Activated Extract the vein patterns from the infrared image and convert into vein pattern data. Now Compares it with database

WORKING

Step 1: Palm vein authentication technology consists of a small Palm vein scanner that's easy and natural to use, fast and Highly accurate . Simply hold your palm a few centimeters Over the scanner and within a second it reads your unique vein pattern. A vein picture is taken and palm pattern is registered.

Step 2: The registered palm pattern is stored into the database along with the personal details of the client

1. One should place his/her palm near to scanner.

2. The scanner makes use of a special characteristic of the reduced hemoglobin coursing through the palm veins — it absorbs near-infrared light. This makes it possible to take a snapshot of what's beneath the outer skin, something very hard to read or steal.

3. The integrated optical system in the palm vein sensor uses this phenomenon to generate an image of the palm vein pattern and the generated image is digitized, encrypted and finally stored as a registered template in the database.

Data Flow Richard

Palm vein authentication Sensor emits near infrared beam to the palm Palm has to be positioned 3-8 cm over the sensor Oxygen reduced blood within the veins absorbs the near infrared light The generated template can be stored in either a database The sensors template library SW changes the raw image into template data The sensors wide angular near infrared camera takes a raw image of the palm vein pattern

PALM VEIN PAATTERN VERIFICATION SYSTEM The thermal vein pattern verification system involves the following stages: Image Acquisition Image enhancement Vein pattern segmentation Skeletonization Matching

User Interface Contactless Non-invasive 2.18 seconds recognition speed Richard source

How Secure is the Technology? How Secure is the Technology? On the basis of testing the technology on more than 70,000 individuals, Fujitsu declared that the new system had a false rejection rate of 0.01%(i.e., only one out of 10,000 scans were incorrect denials for access). And a false acceptance rate of less than 0.00008% (i.e., incorrect approval for access in one in over a millio scans). And if you registered your profile as a child, it'll still be recognized as you grow, as an individual's patterns of veins are established in utero No two people in the world share a palm vein pattern - even those of identical twins will differ.

Overview of Biometrics Technology + - Fingerprint Popular Cheapest Less Accurate Voice Non invasive Least Accurate Iris & Retinal Very accurate Invasive Expensive Sensitive Palm Vein Non-invasive Relatively Cheap Accurate Unfamiliar

accuracy Vein patterns Technology False Acceptance rate False Rejection Rate Palm Secure .00008% .01% Fingerprint 1-2% 3% Iris .0001% - .94% .99% - .2% Voice 2% 10% Vein patterns Distinctive and unique to individuals, even left and right hands. Difficult to steal or forge False acceptance rate A rate at which someone other than the actual person is falsely recognized. False rejection rate A rate at which the actual person is not recognized accurately.

In comparison with others technology *note – Chart created using average of data provided by the Table YooJin

Need Of It No more problems of forgotten passwords and id codes - biometrics is the technology taking care of it. Apart from other techniques like IRIS scan in which Cataract replacement, Finger scan during Injuries etc can be an disadvantage, this technique has no problems.

Contactless, hygienic and non-invasive . ADVANTAGES: Contactless, hygienic and non-invasive . It is difficult to forge for intruders because blood vessels are hidden within the body. This technology is non- intrusive; It does not involve any physical contact between the user and the system . Vein patterns are unique to each individual; even identical twins have different vein patterns . Palm vein technology has an FRR of 0.01% and FAR of less than 0.00008%.this is based on the experiments conducted on 70,000 individuals in Japan. It is Highly accurate

DISADVANTAGES: There are numerous factors that can effect the quality of the captured image. They are body temperature, ambient temperature, humidity, unevenly distribution of heat, heat radiation, nearness of vein to surface, camera calibration and focus. Palm vein recognition is invasive because it creates fear among the users that it can be a painful process It is relatively expensive and not available for mass production yet. It is not applicable to people who lost their palms.

Palm vein authentication is utilized in various Fields such as APPLICATIONS: Palm vein authentication is utilized in various Fields such as Security systems - Door lock and integrated building security systems Log-in control – login into pc’s or servers, network data access, etc. Healthcare - ID verification for medical equipment, electronic record management, etc. Financial services - ATM,Banks, vault access, etc.

applications

Practical Application ATM: Palm vein pattern is captured by using the palm vein sensor on the ATM. The palm vein pattern is converted to palm vein features and transferred to the user’s smart card a The matching between the palm vein features stored on the smart card and those transferred from the sensor is executed on the smart card. The result is the output from the card. ATM MACHINES WITH PALM VEIN SENSOR UNIT

Login authentication: Palm vein authentication can be integrated into laptop PCs by USB . It is used to control access to electronically stored information. Because login authentication using palm vein authentication can also be used for authentication using conventional IDs and passwords

Door security system: The palm vein authentication access control unit can be used to control entry and exit into and out of rooms and buildings. This unit consists of operation and control sections. The operation section has a key pad, indicators , contactless smart card reader and palm vein sensor The control section has a processing unit for the authentication and stores palm vein features of enrollees This unit executes verification when a user input his or her ID

Palm vein pattern authentication technology developed by Fujitsu was being used in a wide range in japan . If this technology is introduced in our country we can solve many problems such as password protection in ATM security in various fields and if we implement this technology in government offices we can make the employees to work according the government timings surely this technology will bring a revolution in the field of science and technology in the near future.

THANK YOU