1 / 13

WELCOME TO

PAPER PRESENTATION ON . WELCOME TO. PALM VEIN TECHNOLOGY -- (TOUCHING THE PERFECTION). PRESENTED BY. M.Sravanthi K.Raga Ranjitha. 08RC1A0531. 08RC1A0526. II/IV CSE. II/IV CSE.

prue
Download Presentation

WELCOME TO

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. PAPER PRESENTATION ON WELCOME TO PALM VEIN TECHNOLOGY -- (TOUCHING THE PERFECTION) PRESENTED BY M.Sravanthi K.Raga Ranjitha 08RC1A0531 08RC1A0526 II/IV CSE II/IV CSE Laqshya Institute of Technology SciencesTanikella(v),Konijerla(m),KHAMMAM

  2. CONTENTS 1.Introduction 2.The basis of palm vein technology 3.Registering through palm vein technology 4.Working of palm vein security systems 5.How secure is the technology ? 6.What happens if the registered palm gets damaged? 7.Contact less palm vein authentication device 8.Applications 9.Conclusion

  3. Introduction • In the ubiquitous network society, where individuals can easily access their information. • personal identification technology is used which includes • Passwords, personal identification numbers and identification cards. • However, cards can be stolen and passwords and numbers can be guessed or forgotten. • To solve these problems, Fujitsu developed four methods fingerprints, faces, voice prints and palm veins.

  4. The Basis of Palm Vein Technology

  5. REGISTERING THROUGH PALM VEIN TECHNOLOGY Scanner Display Scanned palm Original palm Regitered pattern Process of registration

  6. Working of palm vein security systems Infra red on Palm Palm on Sensor Short region on palm

  7. How Secure is the Technology ? • On the basis of testing the technology on more than 70,000 individuals , Fujitsu declared that the new system had a false rejection rate of 0.01% , and a false acceptance rate of less than 0.00008% . • If your profile is registered with your right hand, don't log in with your left - the patterns of an individual's two hands differ. • And if you registered your profile as a child , it'll still be recognized as you grow.

  8. What happens if the registered palm gets damaged? • we take the veins of both the hands • When hand get damaged up to large extent we can get veins because deeper into the hand veins are obtained. Registering two palms

  9. Contact less palm vein authentication device • The completely contactless feature of this • Device makes it suitable for use where high levels of hygiene are required. • No need to physical touch Contact less sensor

  10. APPLICATIONS PERSONAL COMPUTERS ATM HOSPITALS AND LIBRARYS AUTHENTICATION

  11. Conclusion : • we can solve many problems such as password protection in ATM . • Security in various fields and if we implement this technology in government offices. • Surely this technology will bring a revolution in the field of science and technology in the near future.

  12. QUERIES........???

  13. THANK YOU

More Related