8/3/2019 Final Technical ion Naren23
1/23
8/3/2019 Final Technical ion Naren23
2/23
4.6Contact Less Palm Vein Authentication Device.17
1. .APPLICATIONS.18
5.1A T M .. 18
5.2Personal Computers..19
5.3Libraries.19
5.4Authentication..20
1. BENEFITS...21
6.1 Accuracy....21
6.2Statistics.22
1. CONCLUSIONS...23
2. REFERENCES..23
2
8/3/2019 Final Technical ion Naren23
3/23
8/3/2019 Final Technical ion Naren23
4/23
appear as blue lines) of a person being authenticated with a pattern stored in a database.
Vascular patterns are unique to each Individual according to Fujitsu research even
identical twins have different patterns. And since the vascular patterns exist inside the
body, they cannot be stolen by means of photography, voice recording or fingerprints,
thereby making this method of biometric authentication more secure than others
2. History
2.1 Biometrics Evolution:
The term "biometrics" is derived from the Greek words bio resembles life and metric is to
measure. Biometrics is becoming an interesting topic now in regards to computer and
network security, however the ideas of biometrics have been around for many years.
Possibly the first known example of biometrics in practice was a form of finger printing
being used in CHINA in the 14th century, as reported by explorer joao de barros. He
wrote that the CHINESE merchants were stamping children's palm prints and footprints
on paper with ink to distinguish the young children from one another. This is one of the
earliest known cases of biometrics in use and is still being used today.
In the 1890s, an anthropologist named ALPHONSE
BERTILLION sought to fix the problem of identifying convicted criminals and turned
biometrics into a distinct field of study. He developed 'BERTILLONAGE', a method of
bodily measurement which got named after him. The problem with identifying repeated
offenders was that the criminals often gave different aliases each time they were arrested.
BERTILLION realized that even if names changed, even if a person cut his hair or put on
weight, certain elements of the body remained fixed, such as the size of the skull or the
length of their fingers. His system was used by police authorities throughout the world,
until it quickly faded when it was discovered that some people shared the same
measurements and based on the measurements alone, two people could get treated as one.
After this, the police used finger printing, which was developed by Richard
Edward henry of Scotland yard, instead. Essentially reverting to the same methods used
by the Chinese for years. However the idea of biometrics as a field of study with Useful
identification applications, was there and interest in it has grown. Today we have the
4
8/3/2019 Final Technical ion Naren23
5/23
technology to realize the aims, and to refine the accuracy of biometric identification, and
therefore the possibility of making it a viable field.
Biometrics has been around since 29,000 BC when cavemen would sign their
drawings with handprints. In 500 BC Babylonian business transactions were signed in
clay tablets with fingerprints. The earliest cataloging of fingerprints dates back to 1881
when Juan Vucetich started a collection of fingerprints of criminals in Argentina.
Talk about winning hands down over your competitors. That's what a new
biometric technology is doing. It scans the veins in the palm to create an almost foolproof
profile of the user. This technology is ideal not just for high security areas, but also where
conventional ID systems have failed. With increasing awareness of security and identity
theft, organizations would like to map individuals uniquely. Though various forms of
biometric systems are being used - fingerprints, iris and retina scans, voice prints, facial
features, hand geometry and signatures - the palm vein steals a march over others as it's
found to be the most fraud-resistant. That's simply because the identity, in this case the
complex maze of veins, is inside the palm.
2.2IRIS Recognition
2.2.1 What Is IRIS?
It is very much important to have glimpse of IRIS of our eye. IRIS is a thin,
circular structure in the eye. IRIS is responsible for controlling the diameter andsize of eye ball (pupil) and amount of light reaching to the eyeball. A color of eye
is responsible due to IRIS.
2.2.2 How IRIS Works In Eye
When light impact on the eye, muscles attached to the iris expand or contract the
aperture at the Centre of the iris. This is known as pupil.
IRIS recognition is one of the biometric identification and authentication that employs
pattern recognition technology with the help of high resolution images of IRIS of a eye of
a particular person. IRIS recognition is absolutely different than Retina Scan Technology.
IRIS recognition employs camera with infrared illumination which reduces reflection
from convex cornea and imparts detail rich images with complex structure of IRIS. Then
5
8/3/2019 Final Technical ion Naren23
6/23
these images converted to digital templates and provide mathematical representation of
the IRIS.
This technology provides unambiguous and perfect identification of an individual. Person
with a glasses or contact lenses can also be identified by IRIS recognition. Because of its
speed of comparison, IRIS recognition is the unique biometric recognition technology
perfectly suited for one to many identification
2.2.3 Advantages
IRIS of an eye has been described as the ideal part of the human body for
biometric identification: IRIS is an integral organ of the eye and is well protected against
any damage. While fingerprint gets changed over a period of time because of certain type
of manual labor. As compared to face, the shape of IRIS is flat and its geometric
configuration is quite regular. This makes IRIS shape far more predictable than face. In
general the rage of IRIS scanner is from some centimeters to few meters. There is no need
for the person to touch IRIS scanner to be identified and authenticated. There will be no
effects on the eyes while scanning on them this is guaranteed by the experts .
2.3Face Recognition
Face Recognition technology have lead to perfection since many
years. Now Face recognition technology is the best of all technology available where
the large no of database is required to identify with easy, user friendly process.The
Face technology has been made to safely recognize persons, independent of variances
6
8/3/2019 Final Technical ion Naren23
7/23
that appear to human faces. Face Recognition technology handles pose, mimic, aging
variance as well as variances coming from a new hair style, glasses or temporary
lighting changes.
Figure 2.3.1 shows the various fields involved in recognizing the face.
2.4Finger Recognition
Fingerprint recognition is also known as image acquisition. In this part of the
process, a user places his or her finger on a scanner. Numerous images of the
fingerprint are then captured. It should be noted that during this stage, the goal is to
capture images of the center of the fingerprint, which contains many of the unique
features. All of the captured images are then converted into black and white images.The fingerprint is composed of various ridges and valleys which form the basis
for the loops, arches, and swirls that one can easily see on his/her fingertip. The ridges
and valleys contain different kinds of breaks and discontinuities. These are called
minutiae, and it is from these minutiae that the unique features are located and
determined.
7
8/3/2019 Final Technical ion Naren23
8/23
There are two types of minutiae:
Ridge endings (the location where the ridge actually ends)
Bifurcations (the location where a single ridge becomes two ridges)
2.4.1 Template Creation
Template Creation Based upon the unique features found in the minutiae. Thelocation, position, as well as the type and quality of the minutiae are factors taken intoconsideration in the template creation stage. Each type of fingerprint recognitiontechnology has its own set of algorithms for template creation and matching. Templatematching the system will either attempt to verify or identify a individual, by comparingthe enrolled template against the verification template.
Any application that requires such authentication can be interfaced withBiometrics system using standard APIs known as BioAPI or BAPI. These APIs are open-
systems standard written in C and it consists a set of function calls to perform basicactions common to all biometric technologies, such as
enroll user
authentication
discover identity
identity
We all know that no two fingerprints in the world possess exact same characteristics; we
are using the fingerprints to identify the employee in your company to mark the
attendance and time. During the registration process, various employee data, i.e., name,
address, [employee #] etc. Is entered into the database of the persons record. The person
then places a finger on the scanner and a template of the finger is recorded tying the
fingerprint to the record. By placing the user's finger on the sensor, in less than one
second, the fingerprint reader/terminal verifies the person's identity. As no two fingerprint
feature the exact same characteristics, fingerprint reader assures your company fraud and
error free data collection and integration as well as payroll accuracy.
From that point on, to "punch in" or "punch out", the individual simply places his
or her finger on the scanner for recognition. The owner/employer/etc. Can then filter thedata to generate customized reports of a single employee, several employees, over any
time period, etc.
2.4.2 Auxiliary Images
8
8/3/2019 Final Technical ion Naren23
9/23
Auxiliary images Sometimes, when working with AFIS or some more professional
biometrics applications, it is useful to have auxiliary images to work with.AFIS can
supply five types of auxiliary images. These are:
a 500 DPI version of the extracted image;
a binary image;
a quality map;
a ridge directions map;
a ridges image
A 500 DPI version of the extracted image is useful because, regardless of the input image
resolution, the minutiae extraction is always made on a 500 DPI image. International
standards determined 500 DPI as the default resolution for fingerprint systems. As such,
this resolution is used in fingerprint readers, fingerprint matchers and fingerprint
compression algorithms
Fig 2.4.2.1
The quality map shows the background (black) and four levels of quality, showing where
the ridges are more consistent and where the image have noise or lack of ridges
information
Fig 2.4.2.2 quality map
The binary image shows the processed image after removal of the gray tones information.
Good images provide a clear image of fingerprint ridges, in a binary image
9
http://www.mantratec.com/img_biometrics/Biometrics%20sdkapi%20Criminal%20Forensic%20AFIS%20SDK_clip_image001.jpghttp://www.mantratec.com/img_biometrics/Biometrics%20sdkapi%20Criminal%20Forensic%20AFIS%20SDK_clip_image001.jpg8/3/2019 Final Technical ion Naren23
10/23
8/3/2019 Final Technical ion Naren23
11/23
Persons palm vein image is captured by special kind of sensor. During reflection,
illumination of palm takes place with the help of infrared rays and captures the light given
off after diffusion through the palm. The deoxidized hemoglobin in the palm vein vessels
absorbs the infrared rays and causing the palm veins to appear as a black pattern. This
vein pattern is then verified against preregistered pattern to authenticate the human. This
recognition method provides high level of security.
3.2 Vascular Pattern Authentication
Hemoglobin in the blood is oxygenated in the lungs and carries oxygen to the tissues
of the body through the arteries. After it releases its oxygen to the tissues, the deoxidized
hemoglobin returns to the heart through the veins. These two types of hemoglobin have
different rates of absorbency. Deoxidized hemoglobin absorbs light at a wavelength of
about 760 nm in the near-infrared region. When the palm is illuminated with near infrared
light, unlike the image seen by the human eye, the deoxidized hemoglobin in the palm
veins absorbs this light, thereby reducing the reflection rate and causing the veins to
appear as a black pattern. In vein authentication based on this principle, the region used
for authentication is photographed with near-infrared light, and the vein pattern is
extracted by image processing and registered. The vein pattern of the person being
authenticated is then verified against the preregistered pattern. In addition to the palm,
vein authentication can be done using the vascular pattern on the back of the hand or a
finger. However, the palm vein pattern is the most complex and covers the widest area.
Because the palm has no hair, it is easier to photograph its vascular pattern. The palm also
has no significant variations in skin color compared with fingers or the back of the hand,
where the color can darken in certain areas
11
8/3/2019 Final Technical ion Naren23
12/23
Figure 3.2 illustrating the palm pattern recognition.
3.2.1 High Authentication Accuracy
Using the data of 140,000 palms from 70,000 individuals, Fujitsu has confirmed that the
system has a false acceptance rate of less than 0.00008% and a false rejection rate of
0.01%, provided the hand is held over the device three times during registration, with one
retry for comparison during authentication. In addition, the devices ability to perform
personal authentication was verified using the following:
1) data from people ranging from 5 to 85 years old, including people in various
occupations in accordance with the demographics released by the Statistics Center of the
Statistics Bureau
2) data about foreigners living in Japan in accordance with the world demographics
released by the United Nations
3) data taken in various situations in daily life, including after drinking alcohol, taking a
bath, going outside, and waking up
4 Palm Vein Technology Reviews
4.1 Basic Of Palm Vein Technology
An individual first rests his wrist, and on some devices, the middle of his fingers, on the
sensor's supports such that the palm is held centimeters above the device's scanner, which
12
http://2.bp.blogspot.com/_xyESBX_nWPQ/S9LVNeY88tI/AAAAAAAAAPE/rknt5LSmwpc/s1600/q1.jpg8/3/2019 Final Technical ion Naren23
13/23
flashes a near-infrared ray on the palm. Unlike the skin, through which near-infrared light
passes, deoxygenated hemoglobin in the blood flowing through the veins absorbs near-
infrared rays, illuminating the hemoglobin, causing it to be visible to the scanner. Arteries
and capillaries, whose blood contains oxygenated hemoglobin, which does not absorb
near-infrared light, are invisible to the sensor. The still image captured by the camera,
which photographs in the near-infrared range, appears as a black network, reflecting the
palm's vein pattern against the lighter background of the palm.
Fig 4.1 Veins of Palm
In individual's palm vein image is converted by algorithms into data points, which is then
compressed, encrypted, and stored by the software and registered along with the other
details in his profile as a reference for future comparison. Then,each timea person logs in
attempting to gain access by a palm scan to a particular bank account or secured entryway,
etc., the newly captured image is likewise processed and compared to the registered one orto the bank of stored files for verification, all in a period of seconds. Numbers and
positions of veins and their crossing points are all compared and, depending on
verification, the person is either granted or denied access
4.2Registering Through Palm Vein Technology
Registration of palm is done in the following steps as shown
Step 1: Palm vein authentication technology consists of a small Palm vein scanner
that's easy and natural to use, fast and Highly accurate . Simply hold your palm a few
centimeters Over the scanner and within a second it reads your unique vein pattern .A
vein picture is taken and palm pattern is registered .
13
http://64.202.120.86/upload/image/articles/2006/fujitsu-palm-vein-biometric-technology/palmvein1.jpg8/3/2019 Final Technical ion Naren23
14/23
Fig 4.2 Scanner Display
Step 2: The registered palm pattern is stored into the database along with the personal
details of the client.
4.3Working of palm vein security systems
1.One should place his/her palm near to scanner
Fig 4.3.1 palm on sensor
14
8/3/2019 Final Technical ion Naren23
15/23
2.The scanner makes use of a special characteristic of the reduced hemoglobin coursing
through the palm veins it absorbs near-infrared light. This makes it possible to take a
snapshot of what's beneath the outer skin, something very hard to read or steal
Fig 4.3.2 infrared on palm
3. The integrated optical system in the palm vein sensor uses this phenomenon to generate
an image of the palm vein pattern and the generated image is digitized, encrypted and
finally stored as a registered template in the database.
Fig 4.3.3 short region on palm
4.4 How secure is the technology
On basis of testing the technology on more than 70,000 individuals,
researches declared that the new system had a false rejection rate of 0.01% (i.e., only one
out of 10,000 scans were incorrect denials for access),and a false acceptance rate of less
15
8/3/2019 Final Technical ion Naren23
16/23
than 0.00008% (i.e.,incorrect approval for access in one in over a million scans). Also, if
your profile is registered with your right hand, don't log in with your left - the patterns of
an individual's two hands differ. And if you registered your profile as a child ,it'll still be
recognized as you grow, as an individual's patterns of veins are established in utero
(before birth). No two people in the world share a palm vein pattern even those of
identical twins differ .In addition the devices ability to perform personal authentication
was verified using the following:
1. Data from people ranging from 6 to 85 years old including people in various
occupations in accordance with the demographics realized by the Statistics Center of the
Statistics Bureau.
2. Data about foreigners living in Japan in accordance with the world demographics
released by the united nations.
3. Data taken in various situations in daily life including after drinking alcohol, taking a
bath, going outside and waking up
4.5 What happens if the registered palm gets damaged
There may be a chance that the palm we had registered may get damaged then we cannot
use this technology, so during the time of registration we take the veins of both the handsso that if one gets damaged we can access through the second hand. When hand get
damaged up to large extent we can get veins because deeper into the hand veins are
obtained.
Fig 4.6 Registering two palms
When we apply this method we can maintain complete
privacy .
16
8/3/2019 Final Technical ion Naren23
17/23
4.6 Contact less palm vein authentication device (HYGIENE
CONCERN):
The completely contactless feature of this Device makes it suitable for use
where high levels of hygiene are required .It also eliminates any hesitation people might
have about coming into contact with something that other people have already touched
Fig 4.7 contact less sensor
In addition to being contactless and thereby hygienic and user-friendly in
that the user does not need to physically touch a surface and is free of such hygiene
concerns, palm vein authentication is highly secure in that the veins are internal to the
body and carry a wealth of information, thereby being extremely difficult to forge.
5.Applications
This palm vein authentication technology is used in various areas for more security. The
following are some of the important areas where it is used
5.1 A.T.M
In July 2004, to ensure customer security, Suruga bank launched itsBio Security
Deposit the worlds first financial service to use Palm Secure . This service features
high security for customers using vein authentication , does not require a bank card orpass book and prevents withdrawals from branches other than the registered branch and
ATMs thereby minimizing the risk of fraudulent withdrawals. To open a Bio-Security
Deposit account, customers go to a bank and have their palm veins photographed at the
counter in order to guarantee secure data management, the palm vein data is stored only
on the vein data base server at the branch office where the account is opened..
17
8/3/2019 Final Technical ion Naren23
18/23
Fig 5.1 ATM sensor
In October 2004, The Bank of Tokyo launched its Super IC Card. This card
combines the functions of a bankcard, credit card, electronic money and palm vein
authentication. This Super IC Card contains the customers palm Vein data and vein
authentication algorithms and performs vein authentication by itself .This system is
advantageous because the customers information is not stored at the bank. When a
customer applies for a Super IC Card, the bank sends the card to the customers home. To
activate the palm vein authentication function, the customer brings the card and his
passbook and seal to the bank counter where the customers vein information is registered
on the card .After registration the customer can make transactions at that branch counter
and ATM using palm vein authentication and a matching PIN number
5.2 Personal Computers
In personal computers palm vein technology can applied by inserting the
vein sensor inside mouse. When power is supplied to system the mouse also gets power
and the sensor in the mouse will be ready to sense palm veins. When one place his/her
palm the sensor sense the veins and if they are matched with the registered ones the
system allows the person to use it.
18
http://64.202.120.86/upload/image/articles/2006/fujitsu-palm-vein-biometric-technology/palmvein3.jpg8/3/2019 Final Technical ion Naren23
19/23
fig 5.2 pc sensor
One can use this technology even to lock folders, that should be maintained as
private information.
5.3 Libraries & Hospitals
A public library in Japan is set to become the first in the world to
use palm-vein biometrics as a substitute for conventional library cards.
Fig 5.3 using sensor
The University of Tokyo hospital has taken delivery of a contactless palm vein
authentication system to secure physical access to its Department of Planning,
Information and Management.
5.4 Authentication
In front of our homes we can apply this Palm vein technology sothat by registering the veins of our family members and relatives we can maintain high
range security which is not possible through other technologies .Japanese recently used
this technologies before front doors and getting high range security.
19
8/3/2019 Final Technical ion Naren23
20/23
Fig 5.5Near Front Doors
Generally the authentication work flow will be done in step by step process which involves placing the
hand on the sensor, capturing the data, converting into encrypted data, storing the database. So when an
user place his hand it verifies the data base and check whether the available palm copy exist or not , thiscan be explained by pictorial representation as shown in the figure
Fig 5.5.1 authentication work flow process
6.Benefits :
Currently, it's possible for someone to overhear or see sensitive personal information, or
use someone else's Social Security number or health insurance card to receive services. It
can also be time-consuming to check in at a hospital, filling out paperwork and waiting for
staff to enter the information into a computer before a patient receives care. With the new
palm scanning system, once a patient's information is collected on the first visit, it is
permanently in the system. On subsequent visits, the patient need only provide a birth date
and have their palm rescanned to establish a positive identification. In an emergency, a
positive identification can be made even if the patient is unconscious.
20
8/3/2019 Final Technical ion Naren23
21/23
6.1 Accuracy
One of its benfits is due to the accuracy over other technologies
Fig 6.1
6.2 Statistics
In compare to other technologies the statistics can be made as follows
Fig 6.2
21
8/3/2019 Final Technical ion Naren23
22/23
Data flow: the flow of data between sensors for an ATM as an example can be showed as
7.Conclusion:
Palm vein pattern authentication technology developed by Fujitsu one of the scientist
which was being used in a wide range in japan .Compare to other technology this
technology is widely used in other countries .If this technology is introduced in our
country we can solve many problems such as password protection in ATM ,security in
various fields and if we implement this technology in government offices we can make the
employees to work according the government timings. Surely this technology will bring a
revolution in the field of science and technology in the near future.
7. REFERENCES:
[1.]WWW.ZENGINKYO.OR.JP/EN/NEWS/INDEX
[2.]www.btm.co.jp/english/index.html
[3.]WWW.networkworld.COM
22
http://www.zenginkyo.or.jp/EN/NEWS/INDEXhttp://www.zenginkyo.or.jp/EN/NEWS/INDEXhttp://www.btm.co.jp/english/index.htmlhttp://www.btm.co.jp/english/index.htmlhttp://www.networkworld.com/http://www.networkworld.com/http://www.btm.co.jp/english/index.htmlhttp://www.networkworld.com/http://www.zenginkyo.or.jp/EN/NEWS/INDEX8/3/2019 Final Technical ion Naren23
23/23
[4] http://en.wikipedia.org/wiki/Biometrics#History_of_Biometrics
23
Top Related