Seminar-topics.in

Computer Seminar Topics >> Palm Vein Technology Seminar Report, PPT, PDF
 

 

Abstract of Palm Vein Technology

An individual first rests his wrist, and on some devices, the middle of his fingers, on the sensor's supports such that the palm is held centimeters above the device's scanner, which flashes a near-infrared ray on the palm. Unlike the skin, through which near-infrared light passes, deoxygenated hemoglobin in the blood flowing through the veins absorbs near-infrared rays, illuminating the hemoglobin, causing it to be visible to the scanner. Arteries and capillaries, whose blood contains oxygenated hemoglobin, which does not absorb near-infrared light, are invisible to the sensor. The still image captured by the camera, which photographs in the near-infrared range, appears as a black network, reflecting the palm's vein pattern against the lighter background of the palm.

An individual's palm vein image is converted by algorithms into data points, which is then compressed, encrypted, and stored by the software and registered along with the other details in his profile as a reference for future comparison. Then, each time a person logs in attempting to gain access by a palm scan to a particular bank account or secured entryway, etc., the newly captured image is likewise processed and compared to the registered one or to the bank of stored files for verification, all in a period of seconds. Numbers and positions of veins and their crossing points are all compared and, depending on verification, the person is either granted or denied access.

Contact less Palm Vein Authentication Device:

The completely contactless feature of this Device makes it suitable for use where high levels of hygiene are required It also eliminates any hesitation people might have about coming into contact with something that other people have already touched.

In addition to being contactless and thereby hygienic and user-friendly in that the user does not need to physically touch a surface and is free of such hygiene concerns, palm vein authentication is highly secure in that the veins are internal to the body and carry a wealth of information, thereby being extremely difficult to forge.

What happens if the registered palm gets damaged?

There may be a chance that the palm we had registered may get damaged then we cannot use this technology, so during the time of registration we take the veins of both the hands so that if one gets damaged we can access through the second hand. When hand get damaged up to large extent we can get veins because deeper into the hand veins are obtained. When we apply this method we can maintain complete privacy .


|

|

|

|

|

|

|

|

|

|

|

|

|

|

|

|

|

|

|

|

|

 

You may also like this :

Ipv6 - The Next Generation Protocol
Itanium Processor
Java Ring
Java Servlets
Jini Technology
Laptop Computer
Light Tree
Magnetic Random Access Memory
MANET
Millipede
Modems and ISDN
Modular Computing
Motes
MPEG Video Compression
MPEG-4 Facial Animation
MPEG-7
Multicast
Multiple Domain Orientation
Network Attached Storage
NRAM
Object Oriented Concepts
OpenRAN
Opera (web browser)
Optical Burst Switching
Optical Computer
Optical Fibre Cable
Optical Mouse
Ovonic Unified Memory
Palladium
Parallel Computing In India

 

 

 
Copyright © 2012 www.Seminar-topics.in      Contact us: seminar990@gmail.com