Vein Recognition Method

15

TAGS:

description

 

Transcript of Vein Recognition Method

Page 1: Vein Recognition Method
Page 2: Vein Recognition Method

s

Page 3: Vein Recognition Method

Vein Recognition Technology Vein

recognition is a type of biometrics that can be used to identify individuals based on the vein patterns in the human finger.

Page 4: Vein Recognition Method

Vein ID System A type of biometrics

identification system that uses veins in a person's body to establish identity

use infrared light to scan the user's hand

to make an identification match

Page 5: Vein Recognition Method

Prominence of biometric

technologies fingerprinting, facial

recognition, hand geometry, and iris recognition may leave little demand

unique features and advantages for other modalities

The up-and-coming biometric technologies include vein, DNA, ear, and body odor recognition

Page 6: Vein Recognition Method

How does it work? By identifying the

subcutaneous Hand is placed on

a scanner Red blood cells

absorb the infrared rays

After the vein template is extracted

Compared with previously stored patterns

Page 7: Vein Recognition Method
Page 8: Vein Recognition Method

“Uses”

Page 9: Vein Recognition Method

Variations of Vein Recognition Technology

It include finger vein, wrist vein, palm, and backhand vein recognition

The technology was commercialized in 2004.

The prominent companies are Fujitsu Limited Hitachi, Ltd., Techsphere Company Ltd.

Page 10: Vein Recognition Method

Fujitsu’s product called PalmSecure scans the veins present under the palms,

Hitachi’s product scans veins present in the finger.

Page 11: Vein Recognition Method

Techsphere’s product called VP-II scans, scan veins located on the wrists

“Some products scan veins located on the wrists as well.”

Page 12: Vein Recognition Method

“Advantages”

Page 13: Vein Recognition Method

“Challenges”

invasive

Large Size

Expensive

lack of interest from governments

Page 14: Vein Recognition Method

Logical Access Applications Guard against

illegitimate access or leakage of information

Centralize information scattered in different locations

To enable more effective information management.

Page 15: Vein Recognition Method

“Thanks”