Abstract

Palm vein authentication has high level of accuracy because it is located inside the body and does not change over the life and cannot be stolen. These papers present an analysis of palm vein pattern recognition algorithms, techniques, methodologies and system. It discusses the technical aspects of recent approaches for the following processes; detection of region of interest (ROI), segment of palm vein pattern, features extraction, and matching. The results show that, there is no benchmark database exists for palm vein recognition. For all processes, there are many machine learning techniques with very high accuracy.

Highlights

  • In the ubiquitous network society, where individual can access their information anytime and anywhere, people are faced with the risk that others can access the same information anytime and anywhere

  • Because of its high accuracy, contact less palm vein authentication technology is being incorporated into various, financial products for use in public places

  • This palm vein authentication technology and some example of its application to financial solution. These papers will provide a broad overview of palm vein authentication, a biometric technology whose time has come and is being more widely adopted every year

Read more

Summary

Introduction

In the ubiquitous network society, where individual can access their information anytime and anywhere, people are faced with the risk that others can access the same information anytime and anywhere. Cards can be stolen, and password and numbers can be guessed or forgotten. To solve these problems, Fujitsu developed four method fingerprints, faces, voice prints and palm vein. Because of its high accuracy, contact less palm vein authentication technology is being incorporated into various, financial products for use in public places. This palm vein authentication technology and some example of its application to financial solution. These papers will provide a broad overview of palm vein authentication, a biometric technology whose time has come and is being more widely adopted every year

Palm Vein Authentication Technology
Miniaturization of Palm Vein Sensors
Personal Computers
In Hospitals and Library
Authentication
Working of Palm Vein Security System
What Happens if the Registered Palm Gets Damaged?
Future Developments
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.