Vous êtes sur la page 1sur 7

PALM VEIN RECOGNITION TECHNOLOGY

ABSTRACT
Automated measurement of Physiological and/or
With the increase in technology threat to behavioral characteristics to determine orauthentiat
personal data and national security had also e identity is known as Biometrics.
increased. The methods that were developed to
secure important information from outside Palm vein authentication device uses blood vessel
intervention were not up to safe mark. There was patterns as a personal identifying factor. The vein
a need to introduce a technology that secures our information is hard to duplicate since veins are
data more efficiently from unlawful intervention. internal to the human body. The palm vein
The palm vein pattern authentication technology authentication offers a high level of accuracy. Palm
that uses vescular patterns as personal vein authentication uses the vascular patterns of an
identification data.Vein recognition technology is individual’s palm as personal identification data.
secure because the authentication data exists Compared with a finger or the back of a hand , a
inside the body and is therefore very difficult to palm has a broader and more complicated vascular
forge. It is highly accurate. This technology can pattern and thus contains a wealth of
be used in various fields like banking, hospitals, differentiating features for personal identification.
government offices, in passport issuing etc.
Business growth will be achieved with these The importance of biometrics in the current field
solutions by reducing the size of the palm vein of security has been depicted in this work. Wehave
sensor and shortening the authentication time. also outlined opinions about the utility of
This paper is review the palm vein technology, its biometric authentication systems, comparison
applications, how this technology is applied in between different techniques and their advantages
real time applications and the advantages of and disadvantages in this paper. Several banksin
using this technology. Japan have used the palm vein authentication
technology for customer identification since
INTRODUCTION July2004. In addition, Fujitsu has integrated the
technology into the access control of electronic
Palm vein authentication device uses blood vessel doorlock systems. Fujitsu plans to further expand
patterns as a personal identifyingfactor. The vein applications for this technology by downsizing
information is hard to duplicate since veins are thesensor and improving the verification speed.
internal to the human body. Thepalm vein
authentication offers a high level of accuracy. Palm In the ubiquitous network society, where
vein authentication uses the vascular patterns of an individuals can easily access their information any
individual’s palm as personal identification data. time and anywhere, people are also faced with the
Compared with a finger or the back of a hand , a risk that others can easily access the same
palm has a broader and more complicated vascular information anytime and anywhere. Because of
pattern and thuscontains a wealth of differentiating this risk, personal identification technology is used
features for personal identificationThe importance which includes Passwords, personal identification
of biometrics in the current field of security has numbers and identification cards.
been depicted in this work. Wehave also outlined
opinions about the utility of biometric However, cards can be stolen and passwords and
authentication systems , comparisonbetween numbers can be guessed or forgotten. To solve
different techniques and their advantages and these problems, four methods are developed:
disadvantages in this paper. Several banksin Japan fingerprints, faces, voice prints and palm veins.
have used the palm vein authentication technology Among these, because of its high accuracy, contact
for customer identification since July2004. less palm vein authentication technology is being
incorporated into various financial solution
In addition, Fujitsu has integrated the technology products for use in public places. Palm vein
into the access control of electronic doorlock authentication is one of the vascular pattern
systems. Fujitsu plans to further expand authentication technologies [5] Vascular pattern
applications for this technology by downsizing the authentication includes vein pattern authentication
sensor and improving the verification speed.
using the vein patterns of the palm, back of the
hand or fingers as personal identification data, and
retina recognition using the vascular patterns at the
back of the eye as personal identification.

The vascular pattern used in this authentication


technology refers to the image of vessels within
the body that can be seen as a random mesh at the
surface of the body. Since everyone has vessels,
vascular pattern authentication can be applied to
almost all people. If vascular patterns were
compared to the features used in other biometric
authentication technologies, such as the face, iris, Fig1: veins in palm
fingerprint, voice, and so on, the only difference
would be whether or not the feature is at the Deoxygenated hemoglobin in the blood flowing
surface of the body. Consequently, vascular through the veins absorbs near-infrared rays,
patterns cannot be stolen by photographing, illuminating the hemoglobin, causing it to be
tracing, or recording them. This means that forgery visible to the scanner. Arteries and capillaries,
would be extremely difficult under ordinary whose blood contains oxygenated hemoglobin,
conditions. Vein patterns are unique to each which does not absorb near-infrared light, are
individual; even identical twins have different vein invisible to the sensor. The still image captured by
patterns. Furthermore, vein patterns do not change the camera, which photographs in the nearinfrared
within a human’s lifetime except in the case of range, appears as a black network, reflecting the
injury or disease. Although these facts have not palm's vein pattern against the lighter background
been medically proven, as with the fingerprint, iris, of the palm.
and so on, experimental results based on extensive
data and large-scale practical results obtained from An individual's palm vein image is converted by
financial institutions prove that palm vein algorithms into data points, which is then
authentication has the merits of consistency and compressed, encrypted, and stored by the software
high accuracy for confirming a person’s identity. and registered along with the other details in his
profile as a reference for future comparison. Then,
A prototype low cost automatic thermos graphic each time a person logs in attempting to gain
imaging system which has been developed by access by a palm scan to a particular bank account
J.M.Cross and C.L.Smith [6] to obtain vein or secured entryway, etc., the newly captured
patterns for positive identification and describe to image is likewise processed and compared to the
use the subcutaneous vascular network of the back registered one or to the bank of stored files for
of the hand as a unique personal biometric for verification, all in a period of seconds. Numbers
identification. Vein image processing includes and positions of veins and their crossing points are
threshold segmentation and thinning of the vein all compared and, depending on verification, the
pattern is demonstrated by Y.Ding et al. person is either granted or denied access.

LITERATURE REVIEWS M.Wantanbe et al [11] provides software for vein


An individual first rests his wrist, and on some pattern authentication. This vein pattern
devices, the middle of his fingers, on the sensor's authentication software translates the black lines
supports such that the palm is held centimeters into a blood vessel pattern of the palm, and then
above the device's scanner, which flashes a near- matches the translated vein pattern with a pre-
infrared ray on the palm. Unlike the skin, through registered template pattern, while correction for
which near-infrared light passes, position and orientation of the palm by a pattern
matching method. The techniques presented for
personal authentication [8, 10-11] are based on
unimodal biometric system, which have some
limitations such as noise in sensed data, intra-class
variations, distinctiveness, and nonuniversality and
spoof attacks. The “Laplacian” and Junction Point
approach multimodal presented in [9, 12] are
based on fusion at imaging level.
in with your left - the patterns of an individual's
One of the major issues in imaging fusion is image two hands differ. And if you registered your profile
alignment or registration, which refer to pixel-by as a child , it'll still be recognized as you grow, as
pixel alignment of the images. The proposed palm an individual's patterns of veins are established in
vein recognition system is expected to overcome utero (before birth). No two people in the world
some of the limitations of the existing work. share a palm vein pattern - even those of identical
twins differ . In addition the devices ability to
Palm Vein Technology perform personal authentication was verified using
the following:
Palm vein authentication works by comparing the
pattern of veins in the palm (which appear as blue 1. Data from people ranging from 6 to 85 years old
lines) of a person being authenticated with a including people in various occupations in
pattern stored in a database. Vascular patterns are accordance with the demographics realized by the
unique to each individual, according to Fujitsu Statistics Center of the Statistics Bureau.
research even identical twins have different
patterns and since the vascular patterns exist inside 2. Data about foreigners living in Japan in
the body, they cannot be stolen by means of accordance with the world demographics released
photography, voice recording or fingerprints, by the united nations.
thereby making this method of biometric
authentication more secure than others. 3. Data taken in various situations in daily life
including gafter drinking alcohol, taking a bath,
Palm vein authentication uses the vascular patterns going outside and waking up.
of an individual’s palm as personal identification
data. Compared with a finger or the back of a Working Principle
hand, a palm has a broader and more complicated
vascular pattern and thus contains a wealth of Every individual have unique pattern of Palm
differentiating features for personal identification. veins, so the palm vein pattern is used to
authenticate some individual’s identity. One should
The palm is an ideal partof the body for this place his/her palm near to scanner.
technology; it normally does not have hair which
can be an obstacle for photographing the blood
vessel pattern, and it is less susceptible to a change
in skin color, unlike a finger or the back of a hand.
The deoxidized hemoglobin in the vein vessels
absorbs light having a wavelength of about 7.6 x
10-4 mm within the near-infrared area. When the
infrared ray image is captured, only the blood
vessel pattern containing the deoxidized
hemoglobin is visible as a series of dark lines.
Based on this feature, the vein authentication
device translates the black lines of the infrared ray
image as the blood vessel pattern of the palm, and
then matches it with the previously registered
blood vessel pattern of the individual.
Fig2: Palm on Sensor

How Secure is the Technology? The scanner makes use of a special characteristic
of the reduced hemoglobin coursing through the
On the basis of testing the technology on more palm veins it absorbs near-infrared light.
than 70,000 individuals , Fujitsu declared that the
new system had a false rejection rate of 0.01%
(i.e., only one out of 10,000 scans were incorrect
denials for access), and a false acceptance rate of
less than 0.00008% (i.e., incorrect approval for
access in one in over a million scans). Also, if your
profile is registered with your right hand, don't log
damaged up to large extent we can get veins
because deeper into the hand veins are obtained.

Fig4: Registering two palms

We maintain complete privacy when we apply this


method.
Fig3: Infra red on Palm

The integrated optical system in the palm vein


sensor uses this phenomenon to generate an image
of the palm vein pattern and the generated image is
digitized, encrypted and finally stored as a
registered template in the database.

The parameters a false rejection rate (FRR) and a


false acceptance rate (FAR) is to be calculated for
performance measurement. Also, if your profile is
registered with your right hand, don't log in with
your left, the patterns of an individual's two hands
differ. And if you registered your profile as a child,
it’ll still be recognized as you grow, as an
individual's patterns of veins are established in Contact Less Palm Vein Authentication Device
utero (before birth). No two people in the world The completely contact less feature of this Device
share a palm vein pattern even those of identical makes it suitable for use where high levels of
twins. In addition the devices ability to perform hygiene are required .It also eliminates any
personal authentication was verified using the hesitation people might have about coming into
following: contact with something that other people have
already touched.
1. Data from people ranging from 6 to 85 years old
including people in various occupations in
accordance with the demographics realized by the
Statistics Center of the Statistics Bureau.

2. Data about foreigners living in Japan in


accordance with the world demographics released
by the United Nations.

3. Data taken in various situations in daily life


including after drinking alcohol, taking a bath,
going outside and waking up. There may be a
chance that the palm we had registered may get
damaged then we cannot use this technology, so
during the time of registration we take the veins of
both the hands so that if one gets damaged we can
access through the second hand. When hand get
FEATURES OF PALM VEIN TECHNOLOGY A number of studies showing the advantages of
multimodal biometrics fusion have appeared in the
1. The human palm vein pattern is extremely literature. Brunelli and Falavigna [1] used
complex and it shows a huge number hyperbolic tangent (tanh) for normalization and
of vessels. weighted geometric average for fusion of voice
and face biometrics. They also proposed a
2. The biometric information is located inside the hierarchical combination scheme for a multimodal
human body, and therefore it is identification system.
protected against forgery and manipulation.
Kittler et al. [2] have experimented with several
3. The position of the palm vein vessels remain the fusion techniques for face and voice biometrics,
same for the whole life and its Palm Vein including sum, product, minimum, median, and
Technology pattern is absolutely unique. maximum rules and they have found that the sum
rule outperformed others. Kittler et al. [2] note that
4. The enrolment of the palm vein pattern can be the sum rule is not significantly affected by the
done without any physical contact to the sensor. probability estimation errors and this explains its
superiority.
5. Skin colour, skin dirtying, surface wounds, skin
humidity, skin temperature, aging do not have Hong and Jain [3] proposed an identification
major influence to enrol and to authenticate the system based on face and fingerprint, where
palm vein pattern correctly. fingerprint matching is applied after pruning the
database via face matching. Ben-Yacoub et al.
6. Palm Secure is based on a near infrared method, considered several fusion strategies, such as
and it has no negative influence to the health. support vector machines, tree classifiers and multi-
layer perceptron, for face and voice biometrics.
7. Since it is contact less and uses infrared beam, it The Bayes classifier is found to be the best
is more hygienic. method. Ross and Jain combined face, fingerprint
and hand geometry biometrics with sum, decision
tree and linear discriminant-based methods. The
authors report that sum rule outperforms others.

IMPLEMENTATION

In addition to the palm, vein authentication can be


done using the vascular pattern on the back of a
hand or a finger. However, the palm vein pattern is
the most complex and covers the widest area,
because the palm has no hair, it is easier to
photograph its vascular pattern. The palm also has
no significant variations in skin color compared
with fingers or back of the hand, where the color
can darken in certain areas. As veins are internal in
the body and have a wealth of differentiating
features, attempts to forge an identity are
extremely difficult, thereby enabling a high level
Fig5: Contact less sensor of security [4].

In addition to being contact less and thereby ATM


hygienic and user-friendly in that the user does not
need to physically touch a surface and is free of This service features high security for customers
such hygiene concerns, palm vein authentication is using vein authentication , does not require a bank
highly secure in that the veins are internal to the card or pass book and prevents withdrawals from
body and carry a wealth of information, thereby branches other than the registered branch and
being extremely difficult to forge. ATMs thereby minimizing the risk of fraudulent
withdrawals. To open a Bio-Security Deposit
account, customers go to a bank and have their
palm veins photographed at the counter in order to
guarantee secure data management, the palm vein Authentication
data is stored only on the vein data base server at In front of our homes we can apply this Palm vein
the branch office where the account is opened. technology so that by registering the veins of our
This Super IC Card contains the customer’s palm. family members and relatives we can maintain
Vein data and vein authentication algorithms and high range security which is not possible through
performs vein authentication by itself. This system other technologies. Japanese recently used this
is advantageous because the customer’s technology before front doors and getting high
information is not stored at the bank. range security.

When a customer applies for a Super IC Card, the


bank sends the card to the customer’s home. To
activate the palm vein authentication function, the
customer brings the card and his passbook and seal
to the bank Counter where the customer’s vein
information is registered on the card. After
registration the customer can make transactions at
that branch Applications of the Palm Vein Technology:
The palm vein technology is used in distinct fields
because of its features and some of its application
fields are as follows:
 ATM
 Hospitals
 Authentication
 Government offices
 Personal computers
 Libraries
 Banking
 Issuing of passport

Fig6: ATM Sensor

Counter and ATM using palm vein authentication


and a matching PIN number.

PCS & Hospitals


In personal computers palm vein technology can
apply by inserting the vein sensor inside mouse.
When power is supplied to system the mouse also
gets power and the sensor in the mouse will be
ready to sense palm veins. When one place his/her
palm the sensor sense the veins and if they are
matched with the registered ones the system allows
the person touse it. One can use this technology
even to lock folders that should be maintained as
private information. The hospital has done delivery
of a contact less palm vein authentication system
to secure physical access to its Department of
Planning, Information and Management.
Pattern Biometrics,” Pattern Recognition, 41(3),
CONCLUSION pp.920-929,2008.

Palm secure authentication system utilizes the [5] Cope, M. (1991) The application of near
latest Biometric Security that is palm vein infrared spectroscopy to non invasive monitoring
Technology. Answering a worldwide need from of cerebral oxygenation in the newborn infant,
governments to the private sector, this contact less Ph.D. thesis of University College London,
device offers an easy-to-use, hygienic solution for Appendix B, 316–323.
verifying identity. This technology is highly secure
because it uses information contained within the [6] J.M.Cross, C.L.Smith, “Thermo graphic
body and is also highly accurate because the imaging of the subcutaneous vascular network of
pattern of veins in the palm is complex and unique the back of the hand for biometric identification”,
to each individual. Moreover, its contact less 0-7803-2627-x/95-IEEE-1995
feature gives it a hygienic advantage over other
biometric authentication technologies. It describes [7] Ding, Y., Zhuang, D. and Wang, K. “A study of
some examples of financial solutions and product Hand Vein Recognition Method”, IEEE
applications for the general market that have been International Conference Mechatronics and
developed based on this technology. Palm Secure Automation, pp. 2106-2110, 2005.
can be implemented within a wide range of
markets, including security, government, [8] L.Wang and C.G Leedham, “A Thermal Hand
healthcare, financial/banking, commercial Vein Pattern Verification System”, In Lecture
enterprises and educational facilities. Notes in Computer Science, Springer, 2005.

Finally, conclusion can be made that Fujitsu Palm


vein pattern authentication technology was being
used in a wide range. If this technology is [9] Jian-Gang Wang, Wei-Yun yau, Andy
currently being introduced in India with which we Suwandy, “Fusion of Palm print and palm vein
can solve many problems such as password images for person recognition based on
protection in ATM, security in various fields and if “laplacianpalm” feature”, 1-4244-1180-7/07/
we implement this technology in government IEEE- 2007.
offices we can make the employees to work
according the government timings, surely this [10] Zhongli Wang, Baochang Zhang, Weiping
technology will bring a revolution in the field of Chen, Yongsheng Gao, “A performance Evaluation
science and technology in the near future. of Shape and Texture based methods for vein
recognition”, DOI 10.1109/CSIP.2008.106 – 978-
0-7695- 3119/08- IEEE – 2008.
REFERENCES
[1] R. BRUNELLI, D. FALAVIGNA, "Person [11] Watanabe, M., Endoh, T., Shiohara, M, and
identification using multiple cues," IEEE Sasaki, S., “Palm Vein Authentication Technology
Transactions on Pattern Analysis and Machine and Its Applications”, In Biometric Consortium
Intelligence 1995. Conference, USA, 2005.

[2] J. KITTLER, R. P.W. DUIN, "The combining [12] Jian-Gang Wang, Wei-Yun yau, Andy
classifier: to train or not to train," in Proceedings Suwandy, “Feature Level Fusion of Palm print and
of the International Conference on Pattern palm vein for person recognition based on a
Recognition, vol. 16, no. 2, pp. 765–770, 2002. “Junction Point” Representation”, 978-1-4244-
1764-3/08/IEEE-2008.
[3] L. HONG and A. K. JAIN, "Integrating faces
and fingerprints for personal identification," IEEE
Trans. PAMI, vol. 20, no. 12, pp. 1295- 1307,
1998.

[4] L. Wang, G. Leedham and Siu-Yeung Cho,


Minutiae Feature Analysis for Infrared Hand Vein

Vous aimerez peut-être aussi