sushmitha ppt

Embed Size (px)

Citation preview

  • 7/29/2019 sushmitha ppt

    1/13

    G.Sushmitha

    SSJ EC

    ECE

  • 7/29/2019 sushmitha ppt

    2/13

    Fujitsu developed four methods: fingerprintsfaces, voice prints and palm veins.

    Among these, contact less palm vein authentication

    technology is because of its accuracy.The need for contact less palm vein technology ismore because The ID cards can be stolen andpasswords and numbers can be guessed or forgotten.

  • 7/29/2019 sushmitha ppt

    3/13

    An individual first rests his wrist,middle of his fingers, on thesensor's supports such that thepalm is held centimeters above the device's

    scannerWhich flashes a near-infrared ray on the palm.

    Unlike the skin, through which near-infraredlight passes, deoxygenated hemoglobin in the

    blood flowing through the veins absorbs near-infrared rays, illuminating the hemoglobin,causing it to be visible to the scanner

  • 7/29/2019 sushmitha ppt

    4/13

    An individual's palm vein image is converted byalgorithms into data points, which is then

    compressed, encrypted, and stored by thesoftware and registered along with the otherdetails in his profile as a reference for futurecomparison

    The newly captured image is likewise processedand compared to the registered one or to thebank of stored files for verification, all in a periodof seconds. Numbers and positions of veins and

    their crossing points are all compared and,depending on verification, the person is eithergranted or denied access.

  • 7/29/2019 sushmitha ppt

    5/13

    PVA technology consists of a smallPalm vein scanner that's easy andnatural to use, fast and Highly accurate .Simply hold your palm a few centimeters

    Over the scanner and within a second itreads your unique vein pattern.A vein pictureis taken and palm pattern is registered

  • 7/29/2019 sushmitha ppt

    6/13

    1.Palm on sensor 2.Infra red on palm

    3.Short Region on palm

  • 7/29/2019 sushmitha ppt

    7/13

    Fujitsu has tested the technology on more than70,000 individuals , and declared that the newsystem had a false rejection rate of less than0.00008% (i.e., incorrect approval for access inone in over a million scans).

    If you registered your profile as a child , it'll stillbe recognized as you grow, as an individual'spatterns of veins are established in utero (beforebirth).

    If your profile is registered with your right hand,don't log in with your left - the patterns of anindividual's two hands differ.

  • 7/29/2019 sushmitha ppt

    8/13

    There may be a chance that the palm we hadregistered may get damaged then we cannotuse this technology,so during the time ofregistration we take the veins of both the

    hands so that if one gets damaged we canaccess through the second hand.

    Fig. Registering two palms

  • 7/29/2019 sushmitha ppt

    9/13

    It achieves high levels of Hygienes It also eliminates any hesitation people

    might have about coming into contact with

    something that other people have alreadytouched.

    Fig. Contact less sensor

  • 7/29/2019 sushmitha ppt

    10/13

    ATM:

    In July 2004, to ensure customersecurity, Suruga bank launched itsBioSecurity Deposit the worlds first financialservice to use Palm Secure .

    PERSONAL COMPUTERS:In personal computers palm vein

    technology can applied by inserting the veinsensor inside mouse.

  • 7/29/2019 sushmitha ppt

    11/13

    DOORLOCKS:

    In front of our homes we can apply this Palm veintechonolgy so that by registering the veins of our family

    members and relatives we can maintain high range

    security which is not possible through other

    technologies . Japanese recently used this technologiesbefore front doors and getting high range security.

    NEAR FRONT DOORS

  • 7/29/2019 sushmitha ppt

    12/13

    Palm vein pattern authentication technologydeveloped by Fujitsu was being used in a widerange in japan . If this technology is introducedin our country we can solve many problems such

    as password protection in ATM ,security invarious fields and if we implement thistechnology in government offices

    we can make the employees to work according

    the government timings. surely this technologywill bring a revolution in the field of science andtechnology in the near future.

  • 7/29/2019 sushmitha ppt

    13/13