Abstract :
With the increase in technology threat
to personal data and national security had also increased .The methods that
were developed to secure important information from outside intervention were
not up to safe mark .There was a need to introduce a technology that secures
our data more efficiently from unlawful intervention .
Fujitsu has developed a palm vein
pattern authentication technology that uses vescular patterns as personal
identification data .Vein recognition technology
is secure because the authentication
data exists inside the body and is therefore very difficult to forge. It is
highly accurate. This technology can be used in various fields like banking,
hospitals, government offices, in passport issuing etc. Business growth will be
achieved with these solutions by reducing the size of the palm vein sensor and
shortening the authentication time. This paper is about the palm vein
technology, its applications, how this technology is applied in real time
applications and the advantages of using this technology.
An individual first rests his wrist,
and on some devices, the middle of his fingers,
on the sensor's supports such that the
palm is held centimeters above the device's scanner, which flashes a
near-infrared ray on the palm. Unlike the skin, through which near- infrared
light passes deoxygenated hemoglobin in the blood flowing through the veins
absorbs near-infrared rays, illuminating the hemoglobin, causing it to be
visible to the scanner. Arteries and capillaries, whose blood contains
oxygenated hemoglobin, which does not absorb near-infrared light, are invisible
to the sensor. The still image captured by the camera, which phot ographs in the near-infrared range,
appears as a black network, reflecting the palm's vein pattern against the
lighter background of the palm.
An individual's palm vein image is
converted by algorithms into data points, which is then compressed, encrypted,
and stored by the software and registered along with the other details in his
profile as a reference for future comparison. Then, each time a person logs in
attempting to gain access by a palm scan to a particular bank account or
secured entryway, etc., the newly captured image is likewise processed and
compared to the registered one or to the bank of stored files for verification,
all in a period of seconds. Numbers and positions of veins and their crossing
points are all compared and, depending on verification, the person is either
granted or denied access.
Download :
Palm Vein Technology PPT