Sie sind auf Seite 1von 24

Palm Vein Technology

1. INTRODUCTION
In the ubiquitous network society, where individuals can easily access their information anytime and anywhere, people are also faced with the risk that others can easily access the same information anytime and anywhere. Because of this risk, personal identification technology, which can distinguish between registered legitimate users and imposters, is now generating interest. Currently, passwords, Personal Identification Numbers (4-digit PIN numbers) or identification cards are used for personal identification. However, cards can be stolen, and passwords and numbers can be guessed or forgotten. To solve these problems, biometric authentication technology, which identifies people by their unique biological information, is attracting attention. In biometric authentication, an account holders body characteristics or behaviors (habits) are registered in a database and then compared with others who may try to access that account to see if the attempt is legitimate. Fujitsu has researched and developed biometric authentication technology focusing on four methods: fingerprints, faces, voiceprints, and palm veins. Among these, because of its high accuracy, contact less palm vein authentication technology is being incorporated into various financial solution products for use in public places. The Palm Secure sensor developed by Fujitsu is a biometric authentication solution offering optimum levels of security. Palm Secure detects the structure of the pattern of veins on the palm of the human hand with the utmost precision. The ability to verify identity has become increasingly important in many areas of modern life, such as electronic government, medical administration systems, access control systems for secure areas, passenger ticketing, and home office and home study environments. Technologies for personal identification include code numbers, passwords, and smart cards, but these all carry the risk of loss, theft, forgery, or unauthorized use. It is expected that biometric authentication technology, which authenticates physiological data, will be deployed to supplement - or as an alternative to - these other systems.

Palm Vein Technology

The Fujitsu Group has developed biometric authentication technologies based on fingerprints, voice, facial features, and vein patterns in the palm, and has also combined two or more of these capabilities in multi-biometric authentication systems. Although biometric authentication is already being used to some extent by companies and government authorities, for it to gain wider acceptance, it needs to be considered less intrusive, and concerns about hygiene need to be addressed.

For that reason, there is a market need for voice or facial recognition systems and other biometric authentication technology that can read physiological data without requiring physical contact with sensor equipment, and the development of such systems that are both practical and offer greater precision.

Palm Vein Technology

2. Biometric technologies:
2.1 Face Recognition:
Every face has several distinguishable landmarks, valleys and nodal points. Every human face has approximately 80 nodal points. Some features measured by software are: Distance between the eyes, width of the nose, shape of the cheek-bones, the length of jaw-line. These nodal points are measured creating a numerical code called a face print, representing face in the database. Disadvantage: 2D recognition is affected by changes in lighting, the persons hair, the age and if the person wear glasses. It also depends on the angle of users face with camera

Fig1:Nodal points and face print

2.2 Voice Recognition


Voice recognition is the technology by which sounds, words or phrases spoken by humans are converted into electrical signals and these signals are transformed into coding patterns to which meaning has been assigned.

Palm Vein Technology

Disadvantages: Environment noise reduces the overall accuracy A persons voice changes over time. When processing persons voice over multiple channels like microphone and then over a telephone reduces the recognition rate.

Fig2 :Voice Print

2.3

Iris Recognition:

Iris recognition is an automated method of biometric identification that uses mathematical patternrecognition techniques on video images of the iris of an individual's eyes, whose complex random patterns are unique and can be seen from some distance. Disadvantages:

Intrusive Lot of memory for the data to be stored Difficult to use because of positioning eye. Requires more time for matching with database stored Very expensive

Palm Vein Technology

Fig 3: Iris recognition

2.4

Fingerprint Recognition:

Fingerprint recognition or fingerprint authentication refers to the automated method of verifying a match between two human fingerprints. Fingerprints are one of many forms of biometrics used to identify individuals and verify their identity. This article touches on two major classes of algorithms (minutia and pattern) and four sensor designs (optical, ultrasonic, passive capacitance, and active capacitance).

Disadvantages: For some people it is very intrusive, because is still related to criminal identification. It can make mistakes with the dryness or dirty of the fingers skin, as well as with the age (is not appropriate with children, because the size of their fingerprint changes quickly). Large memory space requirement.

Palm Vein Technology

Fig4: Finger prints.

So we can go for Palm Vein Technology. Facial, Finger, Iris Recognition defects can be eliminated through this technique Vein Patterns are established in Utero (before birth) so it is very reliable. Twins even dont have same Vein Patterns

Palm Vein Technology

3. Palm Vein Technology


Palm vein authentication works by comparing the pattern of veins in the palm (which appear as blue lines) of a person being authenticated with a pattern stored in a database. Vascular patterns are unique to each individual, according to Fujitsu research even identical twins have different patterns. And since the vascular patterns exist inside the body, they cannot be stolen by means of photography, voice recording or fingerprints, thereby making this method of biometric authentication more secure than others.

3.1 Principles of vascular pattern authentication:


Hemoglobin in the blood is oxygenated in the lungs and carries oxygen to the tissues of the body through the arteries. After it releases its oxygen to the tissues, the deoxidized hemoglobin returns to the heart through the veins. These two types of hemoglobin have different rates of absorbency. Deoxidized hemoglobin absorbs light at a wavelength of about 760 nm in the near-infrared region. When the palm is illuminated with near infrared light, unlike the image seen by the human eye, the deoxidized hemoglobin in the palm veins absorbs this light, thereby reducing the reflection rate and causing the veins to appear as a black pattern. In vein authentication based on this principle, the region used for authentication is photographed with near-infrared light, and the vein pattern is extracted by image processing and registered. The vein pattern of the person being

Figure 5: Extracting a palm vein pattern.

Authenticated is then verified against the preregistered pattern.

Palm Vein Technology

3.2 The Basis of Palm Vein Technology:


An individual first rests his wrist, and on some devices, the middle of his fingers, on the sensor's supports such that the palm is held centimeters above the device's scanner, which flashes a nearinfrared ray on the palm.

Figure 6: veins in palm

Unlike the skin, through which near-infrared light passes, deoxygenated hemoglobin in the blood flowing through the veins absorbs near-infrared rays, illuminating the hemoglobin, causing it to be visible to the scanner. Arteries and capillaries, whose blood contains oxygenated hemoglobin, which does not absorb near-infrared light, are invisible to the sensor. The still image captured by the camera, which photographs in the near-infrared range, appears as a black network, reflecting the palm's vein pattern against the lighter background of the palm. An individual's palm vein image is converted by algorithms into data points, which is then compressed, encrypted, and stored by the software and registered along with the other details in his profile as a reference for future comparison. Then, each time a person logs in attempting to gain access by a palm scan to a particular bank account or secured entryway, etc., the newly captured image is likewise processed and compared to the registered one or to the bank of stored files for verification, all in a period of seconds. Numbers and positions of veins and their crossing points are all compared and, depending on verification, the person is either granted or denied access.

Palm Vein Technology

3.3 Registering through palm vein technology:

Step 1:

Figure 7: Scanner Display

Palm vein authentication technology consists of a small Palm vein scanner that's easy and natural to use, fast and highly accurate. Simply hold your palm a few centimeters over the scanner and within a second it reads your unique vein pattern. A vein picture is taken and palm pattern is registered.

Figure 8: Registering the palm

Step 2: The registered palm pattern is stored into the database along with the personal details of the client.

Palm Vein Technology

3.4 Working of palm vein security systems: 1. One should place his/her palm near to scanner.

Figure 9: Palm on Sensor

Figure 10: Infra red on Palm

2. The scanner makes use of a special characteristic of the reduced hemoglobin coursing through the palm veins it absorbs near-infrared light. This makes it possible to take a snapshot of what's beneath the outer skin, something very hard to read or steal.

Figure 11: Snapshot of Palm Veins

3. The integrated optical system in the palm vein sensor uses this phenomenon to generate an image of the palm vein pattern and the generated image is digitized, encrypted and finally stored as a registered template in the database.

Palm Vein Technology

Figure 12: Palm Vein Authentication: How it works.

An individual inserts a smart card into the sensor device and holds her hand over the reader. The vein pattern is instantly captured using a completely safe near-infrared light. The reader converts the image into an encrypted biometric template and compares it against the template on the smart card (1 to 1 matching) or those in the database (1 to N matching). Using a built-in speaker, the device instructs the user to place his hand over the device and informs the user when the scan is complete. In the example below, the template is stored in a smart card. This enhances security since the template never leaves the card. Alternatively, the reference templates can be stored in a database on a server (1 to N matching). The first step in all palm vein authentication applications is the enrollment process, which scans the user's palm and records the unique pattern as an encrypted biometric template in the database or on the smart card itself. In banking applications, for example, once a new customer has been issued a smart card, he/she is asked to visit the bank in order to enroll her vein data.

Palm Vein Technology

Figure 13: Schematic of the hand vein pattern imaging module.

Whereas Mohamed Shahin, Ahmed Badawi, and Mohamed Kamel proposed, biometric authentication using hand vein patterns, they designed a system a near IR cold source to provide back-of-hand illumination. The IR cold source is a solid-state array of 24 LEDs (light emitting diodes). The diodes are mounted in a square shape, 6 LEDs in each side, on a designed and assembled PCB (printed circuit board) and made housing and an attachment for fixing the LEDs around the CCD lens. Our experiments showed that the cold source provides better contrast than the ordinary tungsten filament bulbs. A commercially available, low cost, monochrome CCD fitted with an IR filter is used to image the back of hand. As shown in figure it gives the stages through which the image processed. Figure 4 shows the vein processing stages.

Figure 14: Block diagram of hand veins processing stage.

Palm Vein Technology

4. SECURITY
On the basis of testing the technology on more than 70,000 individuals, Fujitsu declared that the new system had a false rejection rate of 0.01% i.e. only one out of 10,000 scans were incorrect denials for access, and a false acceptance of less than 0.00008% i.e. incorrect approval for access in one in over million scans. Also, if your profile is registered with your right hand, don't log in with your left the patterns of an individuals two hands differ. And if you registered your profile as a child, itll still be recognized as you grow, as an individuals patterns of veins are established in utero i.e. before birth. A palm vein pattern even those of identical twins differ. In addition the devices ability to perform personal authentication was verified using the following: 1. Data from people ranging from 6 to 85 years old including people in various occupations in accordance with the demographics realized by the Statistics Center of the Statistics Bureau. 2. Data about foreigners living in Japan in accordance with the world demographics released by the United Nations. 3. Data taken in various situations in daily life including gafter drinking alcohol, taking a bath, going outside and waking up.

4.1 What happens if the registered palm gets damaged?


There may be a chance that the palm we had registered may get damaged then we cannot use this technology, so during the time of registration we take the veins of both the hands so that if one gets damaged we can access through the second hand. When hand get damaged up to large extent we can get veins because deeper into the hand veins are obtained.

Figure 15: Registering two palms

When we apply this method we can maintain complete privacy.

Palm Vein Technology

4.2 Contact less palm vein authentication device

Figure 16: Contact less sensor

(HYGIENE CONCERN): The completely contactless feature of this device makes it suitable for use where high levels of hygiene are required. It also eliminate any hesitation people might have about coming into contact with something that other people have already touched.

In addition to being contactless and thereby hygienic and user-friendly in that the user does not need to physically touch a surface and is free of such hygiene concerns, palm vein authentication is highly secure in that the veins are internal to the body and carry a wealth of information, thereby being extremely difficult to forge.

Palm Vein Technology

5. Advantages of using the palm:


In addition to the palm, vein authentication can be done using the vascular pattern on the back of the hand or a finger. However, the palm vein pattern is the most complex and covers the widest area. Because the palm has no hair, it is easier to photograph its vascular pattern. The palm also has no significant variations in skin color compared with fingers or the back of the hand, where the color can darken in certain areas.

5.1 Advantages of reflection photography:


There are two methods of photographing veins: reflection and transmission. Fujitsu employs the reflection method. The reflection method illuminates the palm and photographs the light that is reflected back from the palm, while the transmission method photographs light that passes straight through the hand. Both types capture the near-infrared light given off by the region used for identification after diffusion through the hand. An important difference between the reflection method and transmission method is how they respond to changes in the hands light transmittance. When the body cools due to a lowered ambient temperature, the blood vessels (in particular the capillaries) contract, decreasing the flow of blood through the body. This increases the hands light transmittance, so light passes through it more easily. If the transmittance is too high, the hand can become saturated with light and light can easily pass through the hand. In the transmission method, this results in a lighter, lesscontrasted image in which it is difficult to see the vessels. However, a high light transmittance does not significantly affect the level or contrast of the reflected light. Therefore, with the reflection method, the vessels can easily be seen even when the hand/body is cool. The system configurations of the two methods are also different. The reflection method illuminates the palm and takes photographs reflected back from the palm, so the illumination and photography components can be positioned in the same place. Conversely, because the transmission method photographs light that passes through the hand, the illumination and photography components must be placed in different locations. This makes it difficult for the

Palm Vein Technology

System to be embedded into smaller devices such as notebook PCs or cellular phones. Fujitsu has conducted an in-depth study of the necessary optical components to reduce the size of the sensor, making it more suitable for embedded applications. Completely contactless design minimizes hygiene concerns and psychological resistance: Fujitsu is a pioneer in designing a completely contactless palm vein authentication device. With this device, authentication simply involves holding a hand over the vein sensor. The completely contactless feature of this device makes it suitable for use where high levels of hygiene are required, such as in public places or medical facilities. It also eliminates any hesitation people might have about coming into contact with something that other people have already touched.

5.2 High authentication accuracy:


Using the data of 140,000 palms from 70,000 individuals, Fujitsu has confirmed that the system has a false acceptance rate of less than 0.00008% and a false rejection rate of 0.01%, provided the hand is held over the device three times during registration, with one retry for comparison during authentication. In addition, the devices ability to perform personal authentication was verified using the following: 1) data from people ranging from 5 to 85 years old, including people in various occupations in accordance with the demographics released by the Statistics Center of the Statistics Bureau; 2) data about foreigners living in Japan in accordance with the world demographics released by the United Nations; 3) data taken in various situations in daily life, including after drinking alcohol, taking a bath, going outside, and waking up.

Palm Vein Technology

6. Applications
6.1. ATM
In July 2004, to ensure customer security, Suruga bank launched its bio security Deposit the worlds first financial service to use Palm Secure. This features High security for customers using vein authentication, does not require a bank card or pass book and prevents withdrawals from branches other than the registered branch and ATMs thereby minimizing the risk of fraudulent withdrawals. To open Bio-Security deposit account, customers go to a bank and have their palm veins photographed at the counter in order to guarantee secure data management, the palm vein data is stored only on the vein data base server at the branch office where the account is opened.

Figure 17: ATM Sensor

In October 2004, the bank of Tokyo launched Super-IC card. This card combines the functions of a bankcard, credit card, electronic money and palm vein authentication. This Super-IC card contains the customers palm vein data and vein authentication algorithms and performs vein authentication by itself. This system is advantageous because the customers information is not stored at the bank. When a customer applies for a Super-IC Card, the bank sends the card to the customers home. To activate the palm vein authentication customer begins the card and his passbook and seal to the bank counter where the customers vein information is registered on the card. After registering the customer can make transactions at that branch counter and ATM using palm vein authentication and a matching PIN number

Palm Vein Technology

6.2. Personal computers


In personal computers palm vein technology can apply by inserting the vein sensor inside mouse. When power is supplied to system the mouse also gets power and the sensor in the mouse will be ready to sense palm veins.

Figure 18: PC Sensor

When one place his/her palm the sensor sense the veins and if they are matched with the registered ones the system allows the person to use it. One can use this technology even to lock folders that should be maintained as private information.

6.3. In hospitals and libraries


A public library in Japan is set to become the first in the world to use palm-vein biometrics as a substitute for conventional library cards.

The University of Tokyo hospital has taken delivery of a contactless palm vein authentication system to secure physical access to its Department of Planning, Information and Management.

Figure 19: Sensor in Hospital

Palm Vein Technology

6.4 Authentication:
In front of our homes we can apply this Palm vein technology so that by registering the veins of our family members and relatives we can maintain high range security which is not possible through other technologies. Japanese recently used this technology before front doors and getting high range security.

Figure 20: Using Sensor

6.5 Login unit using Palm Secure


The palm vein authentication login unit controls access to electronically stored

Information .As with the units for financial solutions, there are two types: a server type and an IC card type. Because the Palm Secure login unit can also be used for authentication using conventional IDs and passwords, existing operating systems and applications can continue to be used. It is also possible to build the unit into an existing application to enhance operability.

Figure 21: Palm Secure login unit.

Palm Vein Technology

In the early stage of introduction, the units were limited to businesses handling personal information that came under the Act for the Protection of Personal Information enforced in April 2005. However, use of the units is now expanding to leading-edge businesses that handle confidential information.

6.6 Other product applications


Because of the importance of personal identification, we can expect to see the Development of new products for various applications, such as: Management in healthcare Access control to medication dispensing Identification of doctors and nurses when accessing protected health records Patient identification management Operator authentication Settlement by credit card Obtaining various certificates using the Basic Resident Register Card Owner authentication Retrieval of checked luggage Driver authentication Attendance authentication Checking attendance in schools Clocking in and out of the workplace.

Palm Vein Technology

7. PALM VEIN SOLUTIONS


Palm Vein Authentication Solution

Using Fujitsu PalmSecure for SSO, BHiC will provide secured, contactless, hygienic and noninvasive authentication. The solution uses standard USB connectivity with management console for administrators. Enterprise level event logging capability is also possible.

Palm Vein Access Control Solution

Using Fujitsu PalmEntry and BioGuard Solutions, BHiC is offering an award-winning biometric authentication technology for secure access. This solution provides a robust authentication systems in delivering a fast and convenient identification. We offer secure physical and logical access control to customers in healthcare, financial services, government, retail, education and other industries.

Palm Vein Technology

Palm Vein Time Attendance Solution

With the latest vascular technology from Fujitsu, IDLink Palm Access with Time Attendance Solution is one of the most advanced biometric system. Using IDCube Admin Suite which provides profile management, transaction managemet, remote management and reports management. Supports 2 palms per user including alarm palm and can connect to third party controller or access card systems via Wiegand protocol.

Palm Vein Technology

8 Conclusion :

Palm vein pattern authentication technology developed by Fujitsu was being used in a wide range in Japan . If this technology is introduced in our country we can solve many problems such as password protection in ATM ,security in various fields and if we implement this technology in government offices we can make the employees to work according the government timings. Surely this technology will bring a revolution in the field of science and technology in the near future.

Palm Vein Technology

9. REFERENCES
[1] Palm Vein Authentication Technology white paper, Bioguard, Innovative Biometric Solutions, March, 2007. [2] Yuhang Ding, Dayan Zhuang and Kejun Wang, A Study of Hand Vein Recognition Method, The IEEE International Conference on Mechatronics & Automation Niagara Falls, Canada, July 2005. [3] Shi Zhao, Yiding Wang and Yunhong Wang, Extracting Hand Vein Patterns from Low-Quality Images: A New Biometric Technique Using Low-Cost Devices, Fourth International Conference on Image and Graphics, 2007. [4] Masaki Watanabe, Toshio Endoh,Morito Shiohara, and Shigeru Sasaki, Palm vein authentication technology and its applications, The Biometric Consortium Conference, September 19-21, 2005,USA, pp. 1-2.

Das könnte Ihnen auch gefallen