Palm Vein Technology
Palm Vein Technology
TECHNICAL SEMINAR
ON
Submitted in partial fulfillment of the requirement for the award of the degree of
BACHELOR OF TECHNOLOGY
IN
By
P.CHANDRASHEKAR
(16R91A05H7)
Mr. KUNDHAN
(Asst .Professor)
Department of CSE
TKREC-CSE
DECLARATION BY THE CANDIDATE
This is a record of bonafide work carried out by me in Teegala Krishna Reddy Engineering
College and the result embodied in this Seminar have not been reproduced or copied from any
source. The results embodied in this seminar report have not been submitted to any other
University or Institute for the award of any other degree or diploma.
P.CHANDRASHEKAR (16R91A05H7)
Department of CSE,
Hyderabad.
TKREC-CSE
                                    CERTIFICATE
    This is to certify that the Technical Seminar entitled “PALM VEIN TECHNOLOGY ”
    Submitted by Mr. P.CHANDRASHEKAR bearing Roll No. 16R9A05H7 in partial
    fulfillment for the award of the Degree of Bachelor of Technology in Computer Science
    and Engineering. Is recorded of bonafide work carried out by him under my guidance.
    The result of investigation enclosed in this report have been verified and found satisfactory.
    The result embodied in this has not been submitted to any other University or Institute for
    the award of any other Degree or Diploma
Mr.Kundhan Dr.CH.Phanikrishna.
-------------------------- -------------------------------
DR.M.K.V.Madhan kumar
------------------ --------------------
TKREC-CSE
                                ACKNOWLEDGEMENT
The satisfaction and euphoria that accompanies the successful completion of any task would be
incomplete without the mention of the people who made it possible and whose encouragement and
guidance have crowned our efforts with success.
 I extend my deep sense of gratitude to Dr.K.M.V.Madhan Kumar, Principal Teegala Krishna Reddy
Engineering College, Meerpet, for Permitting me to undertake this technical Seminar.
Finally, I express thanks to one and all that have helped me in successfully completing this
technical seminar. I would like to thank my family and friends for their moral support and
encouragement
Submitted By
P.CHANDRASHEKAR
(16R91A05H7)
TKREC-CSE
                                       INTRODUCTION
Palm vein authentication device uses blood vessel patterns as a personal identifying factor. The
vein information is hard to duplicate since veins are internal to the human body. The palm vein
authentication offers a high level of accuracy. Palm vein authentication uses the vascular patterns
of an individual’s palm as personal identification data. Compared with a finger or the back of a
hand , a palm has a broader and more complicated vascular pattern and thus contains a wealth of
The importance of biometrics in the current field of security has been depicted in this work. We
have also outlined opinions about the utility of biometric authentication systems , comparison
between different techniques and their advantages and disadvantages in this paper. Several banks
in Japan have used the palm vein authentication technology for customer identification since July
2004. In addition, Fujitsu has integrated the technology into the access control of electronic door
lock systems. Fujitsu plans to further expand applications for this technology by downsizing the
Three components of above definition will determine what is and what is not a biometric and
also its different types and functionalities. Let’s start with the First component of the definition:
“Automated measurement”, which means no human intervention or involvement is required.
Biometrics are automated in as much as the processes involved in sample acquisition, feature
TKREC-CSE
extraction,   record retrieval,   and   algorithm-based matching are computerized or machine-
based. Also the record retrieval and comparison against another measurement must take place
in Real-Time. So for an instance, DNA sampling is NOT a biometric measurement because today
it still requires human intervention and it’s NOT done
 in real time. The second         component of the definition: “Physiological and/or behavioral
characteristics”,    determine the two main biometric categories: behavioral and physiological.
The behavioral characteristics measure the movement o f a user, when users walk, speak, type
on a keyboard or sign their name.         The physiological characteristics would be the physical
human traits like fingerprints, hand shape, eyes and face, veins, etc., and the last component
of the definition is “determine or authenticate identity”, which categorizes the two types
of biometric functionalities. The first type is identification systems or the systems that
answer the question who am I? and determine the identity of a person. The second type
is verification systems or systems that answer the question, am I who I claim to be? and
authenticate a person. An example of an Identification System using biometrics would be:
You approach an ATM with NO card, NO claimed identity, NO PIN.
The ATM scans your iris and determines who you are and gives you access to your money.
An example of a Verification System using biometrics would be: You approach an ATM
and swipe a card or enter an account number. The ATM scans your iris and uses it as a
password to authenticate you are the rightful owner of the card and therefore give you
access to your money.
TKREC-CSE
                         Fig-1.1 Threats in various security systems
TKREC-CSE
      No influence of Skin color
      Skin contamination
      Shallow injury
      Non-invasive near infrared radiation
  Biometrics authentication is a growing and controversial field in which civil liberties groups
express concern over privacy and identity issues. Today, biometric laws and regulations are in
process and biometric industry standards are being tested. Automatic recognition based on “who
you are” as opposed to “what you know” (PIN) or “what you have” (ID card). Recognition of a
person by his body & then linking that body to an externally established identity forms a very
powerful tool for identity management Biometric Recognition. Figure 1 shows the different type
of biometric authentication. Canadian airports started using iris scan in 2005 to screen pilots and
airport workers.
Pilots were initially worried about the possibility that repeated scans would negatively affect
their vision but the technology has improved to the point where that is no longer an issue.
 Canada Customs uses an iris scan system called CANPASS-Air for low-risk travelers at Pearson
airport. Junichi Hashimoto, 2006, has introduced finger vein authentication, a new biometric
method utilizing the vein patterns inside one’s fingers for personal identification. Vein patterns
are different for each finger and for each person, and as they are hidden underneath the skin’s
surface, forgery is extremely difficult. These unique aspects of finger vein pattern recognition set
it apart from previous forms of biometrics and have led to its adoption by the major Japanese
financial institutions as their newest security technology.
TKREC-CSE
       Palm vein scan                              sensor scan
Every individual have unique pattern of Palm veins, so the palm vein pattern is used to
authenticate some individual’s identity .The process of authentication and registration is
discussed in next topics. An individual first rests his wrist, and on some devices, the
middle of his fingers, on the sensor's supports such that the palm is held centimeters
above the device's scanner, which flashes a near-infrared ray on the palm . Unlike the
skin, through which near-infrared light passes, deoxygenated hemoglobin in the blood
flowing through the veins absorbs near-infrared rays, illuminating the hemoglobin, causing
  it to be visible to the scanner. Arteries and capillaries, whose blood contains oxygenated
hemoglobin, which does not absorb near-infrared light, are invisible to the sensor. The still image
captured by the camera, which photographs in the near-infrared range, appears as a
black network, reflecting the palm's vein pattern against the lighter background of the palm.
 An individual's palm vein image is converted by algorithms into data points, which is then
TKREC-CSE
compressed, encrypted, and stored by the software and registered along with the other
details in his profile as a reference for future comparison. Then, each time a person logs
in attempting to gain access by a palm scan to a particular bank account or secured
entryway, etc., the newly captured image is likewise processed and compared to the
registered one or to the bank of stored files for verification, all in a period of seconds.
STEP 1: Palm vein authentication technology consists of a small Palm vein scanner that's easy
and natural to use, fast and highly accurate. Simply hold your palm a few centimeters over the
scanner.
Fig-2.3 View of palm pattern at various stages of registering palm vein pattern
TKREC-CSE
STEP 3: The integrated optical system in the palm vein sensor uses this phenomenon to
generate an image of the palm vein pattern and the generated image is digitized, encrypted and
finally stored as a registered template in the database.
Once the palm vein pattern is registered in the system, user can authenticate him/herself in the
system. The working of Palm Vein Technology is described in following    steps.
                                                                P.V.T REVIEWS
STEP 1: Hold your palm over the palm vein image sensor and camera which will take the
snapshot of palm.
TKREC-CSE
            Fig-2.5   Magnified view of palm vein pattern.
STEP 3: This digitalized image is matched with the previously stored database and authenticates
user identity.
1.The human palm vein pattern is extremely complex and it shows a huge number of vessels.
2. The biometric information is located inside the human body, and therefore it is protected
against forgery and manipulation.
3. The position of the palm vein vessels remain the same for the whole life and its pattern is
absolutely unique.
4. The enrolment of the palm vein pattern can be done without any physical contact
to the sensor.
5. Skin color, skin dirtying, surface wounds, skin humidity, skin temperature, aging
do not have major influence to enroll and to authenticate the palm vein pattern correctly.
6. Palm Secure is based on a near infrared method, and it has no negative influence
   to the health.
7. Since it is contact less and uses infrared beam, it is more hygienic.
Palm Vein Technology uses different algorithms and programs for different stages of the
technology. Also different algorithms are proposed for same processes like ICP(Iterative Closest
Point), P2PM (Point to Point Matching), SMM (Similarity based Mixed Matching) etc. Usually,
in the image-based biometric systems, a number of pre-processing tasks are required prior to
enhance the image quality, such as: contrast, brightness, edge information, noise removal,
sharpen image, etc, furthermore, to produce a better quality of image that will be used on the
later stage as an input image and assuring that relevant information can be detected. Actually,
the better quality of image will gain the better accuracy rate to the biometric system itself.
In this paper we propose three required pre-processing tasks which are as follow:
1. Vascular pattern marker algorithm
2. Vascular pattern extraction algorithm
3. Vascular pattern thinning algorithm
TKREC-CSE
After vascular pattern thinning, extracted image is matched with the previously stored
database, for which various algorithm are used which are to be discussed in next chapter.
Here we will discuss the palm vein pattern extraction.
1 0 -1 131
3 0 -3 000
1 0 -1 3x3 -1 -3 -1 3 x 3
Step3.
a. Open resultant Grey scale Image File from Vascular Pattern Marker Algorithm,
   in input mode
b. Open Binary Image File in output mode
c. While not End of File
d. Loop
e. Read pixel intensity value
f. If pixel intensity value lies in between 20 and 130, then
TKREC-CSE
g. Convert the intensity value to 0 (black)
h. Else
i. Convert the intensity value to 255 (white)
j. End if
k. Write the intensity value to Binary Image
l. End Loop
m. Close all Image Files
TKREC-CSE
for(int i = 0; i < rows; ++i)
{
for(int j = 0; j < columns; ++j)
{
if((i==0) || (j==0) || (i==(rows-1)) || (j==(columns-1)))
matrix[i][j] = -1;
}
}
for(int r = 1; r < rows-1; r++)
{
for(int c = 1; c < columns-1; c++)
{
if((matrix[r][c] != -1))
{
if (((matrix[r][c+1] != -1) || (matrix[r][c-1] != -1))
&&((matrix[r+1][c] != -1) || (matrix[r-1][c] != -1)))
{
matrix[r][c] = -1 ;
}
}
}
}
for(int r = 1; r < rows-1; r++)
{
for(int c = 1; c < columns-1; c++)
{
if((matrix[r][c] != -1))
{
if(((matrix[r][c-1] == -1)) && ((matrix[r][c+1] == -1)))
{
if(((matrix[r-1][c] == -1)) && ((matrix[r+1][c] == -1)))
{
matrix[r][c] = -1;
}
}
}
}
d. Write the 2 Dimensional Matrixes into a Binary Image File. e. Close all Image Files
Generated Binary Image is stored in the Image Database. For each individual one or
multiple images are required to be stored. More Images for an individual are desired for
perfect Identification of the corresponding individual in future. Thinning is done for
capturing the Vascular Pattern of hand Palm of an individual.
TKREC-CSE
vein extraction. For palm vein extraction generally Multiscale Gaussian Matched filter is
used. Details of this method including mathematical equations are as follows:
Fig 3.1(a) shows an infrared image of a palm, which contains palm vein information. ROI
(with a fixed size of 128*128 pixels) is extracted according to the two key points between
                                                                                       COMPARISION WITH
fingers, as shown in Fig 3.1(b). There may be different ways to select ROI for different
devices.
                                                                                            Palm vein
extraction.(a) ROI; (b)&(c) response of match filter at different
scales
To reduce noise in the matched filter responses, a multiscale scheme is adopted. In this
scheme, the scale s is used to regulate size of the filter window: |x '| ≤ 3sσx, |y'| ≤ sL/2.
By using two different scales, we can get two different filter responses. And it has been
proved that the production of two filter responses at different scales can greatly reduce the
noise.
TKREC-CSE
Fig 3.2 (d) scale production of (b),(c); (e) binarized image of (d); (f) thinned image of (e)
After a low-noise palm vein image is obtained, some post processing operations such as
binarizing and thinning are applied. Fig-3.2 shows an example of the Multiscale Gaussian
Matched filter responses and palm vein extraction of an infrared palm image.
DISADVANTAGES
When processing a person’s voice over multiple channels such a microphone and then over a
telephone reduces the recognition rate.
Physical conditions of the voice, such as those due to sickness, affect the voice verification
process.
Environment noise reduces the overall accuracy and effectiveness of the recognition.
A person’s voice changes over time.
FRR is high because of that sometimes users are required to input the data or
TKREC-CSE
  speak 2-3 times, hence speed is much slower.
A fingerprint usually appears as a series of dark lines that represent the high, peaking
portion of the friction ridge skin, while the valleys between these appears as white space
and are the low, shallow portion of the friction ridge skin. Fingerprint identification is
based primarily on the minutiae, or the location and direction of the ridge endings and
bifurcations along a ridge path. The images below presents examples of the other detailed
characteristics sometimes used during the automatic classification and minutiae extraction
processes.
ADVANTAGES
Since fingerprints are the composition of protruding sweat glands, Everyone has
     unique fingerprints. They do not change naturally.
Its reliability and stability is higher compared to the iris, voice, and face
   recognition method.
Fingerprint recognition equipment is relatively low-priced compared to other
  biometric system and R&D investments are very robust in this field.
DISADVANTAGES
Vulnerable to noise and distortion brought on by dirt and twists.
Some people may feel offended about placing their fingers on the same place where many
other people have continuously touched.
Some people have damaged or eliminated fingerprints.
Since users have to touch the sensing device, so it gets damaged on scratches on it
and that’s why the FFR increases with increased used of COMPARISION
                                                        device.     WITH OTHER BIOMETRICS
TKREC-CSE
Every face has numerous, distinguishable landmarks, the different peaks and valleys that
make up facial features. It defines these landmarks as nodal points. Each human face has
approximately 80 nodal points. Some of these measured by the software are:
Distance between the eyes
Width of the nose
Depth of the eye sockets
The shape of the cheekbones
The length of the jaw line
DISADVANTAGES
2D recognition is affected by changes in lighting, the person’s hair, the age, and if
the person wear glasses.
It also depends on orientation/angle of user’s face with camera.
Requires camera equipment for user identification; thus, it is not likely to become
popular until most PCs include good resolution cameras as standard equipment.
Iris recognition is the process of recognizing a person by analyzing the random pattern of
the iris. The iris muscle within the eye regulates the size of the pupil, controlling the
amount of light that enters the eye [8]. It is the colored portion of the eye with coloring
based on the amount of melatonin pigment within the muscle. Although the coloration
and structure of the iris is genetically linked, the details of the patterns are not. The iris
TKREC-CSE
develops during prenatal growth through a process of tight forming and folding of the
tissue membrane. Prior to birth, degeneration occurs, resulting in the pupil opening and
random, unique patterns of the iris.
ADVANTAGES
Very high accuracy.
Verification time is generally less than 5 seconds.
The eye from a dead person would deteriorate too fast to be useful, so no extra
  precautions have to been taken with retinal scans to be sure the user is a living
  human being.
DISADVANTAGES
Intrusive.
A lot of memory for the data to be stored.
Very expensive.
Difficult to use because of positioning eye.
Requires more time for matching with database stored.
4.5 RETINA SCAN
The human retina is a thin tissue composed of neural cells that is located in the posterior
of the complex structure of the capillaries that supply the retina with blood; each person's
retina is unit ion of the eye. The network of blood vessels in the retina is so complex that
even identical twins do not share a similar pattern [8]. A biometric identifier known as a
retinal scan is used to map the unique patterns of a person's retina. The blood vessels
TKREC-CSE
within the retina absorb light more readily than the surrounding tissue and are easily
                                                           COMPARISION WITH OTHER BIOMETRICS
identified with appropriate lighting. A retinal scan is performed by casting an unperceived
beam of low-energy infrared light into a person’s eye as they look through the scanner's
eyepiece. This beam of light traces a standardized path on the retina. Because retinal
blood vessels are more absorbent of this light than the rest of the eye, the amount of
reflection varies during the scan. The pattern of variations is converted to computer code
and stored in a database.
TKREC-CSE
            APPLICATIONS AND BUSINESS
In Oct 2004, The Bank of Tokyo launched its “Super –IC Card”. This card combines
the functions of a bankcard, credit card, electronic money and palm vein authentication.
This Super –IC Card contains the customers palm Vein data and vein Authentication
algorithms and reforms vein Authentication by itself. This system is advantageous
because the customer’s information is not stored at the bank. When a customer applies for
a Super –IC Card, the bank sends the card to the customer’s home. To activate the palm
vein authentication function, the customer brings the card and his passbook and seal to
the bank counter where the customers vein information is registered on the card . After
registration the customer can make transactions at that branch counter and ATM using
palm vein authentication and a matching PIN number.
PVT is used in 92% of all Japanese ATMs including 18,000+ ATM machines for Bank of
Tokyo – Mitsubishi.
TKREC-CSE
also gets power and the sensor in the mouse/keyboard will be ready to sense palm veins.
When one place his/her palm the sensor sense the veins and if they are matched with the
registered ones the system allows the person to use it. One can use this technology even
to lock folders , that should be maintained as private information. This technology will be
very helpful in protecting data saved in computers and highly reducing the hacking of
password. It can also be used in multiuser computers where more than one people can use
the computer. The users previously having account or login account in particular
computer can access the computer. Also this can be possible over a network like top
secure sites of defence or other corporate sites or accounts where some of the officials can
access the network.
TKREC-CSE
            (a)                                               (b)
  Fig-5.2 PVT used in (a) Library (b) Hospitals for authentication.
Palm vein sensing devices can be used in offices, schools, colleges, universities for
attendance purpose. It also improves the security and prevents any sensitive case.
      Management in healthcare
      Access control to medication dispensing
      Identification of doctors and nurses when accessing protected health records
      Patient identification management
      Operator authentication
      Owner authentication
       Retrieval of checked luggage
      Driver authentication
      Attendance authentication
      Checking attendance in schools
      Clocking in and out of the workplace.
Although, palm vein technology is quite new but it is creating an impact on market and
TKREC-CSE
replacing the conventional biometric technologies. It can be seen from the fact that 92%
ATMs in JAPAN using this technology including TOKYO NATIONAL BANK. Also
some of public libraries in JAPAN are using palm vein authentication in place of IDcards.
Even PVT is used at front door of home.
 Fujitsu is the first one to invent the technology. Nowadays only Japan and Korea are the
leading manufacturers of Palm Secure devices. They supply the product mainly in Asia
and America. But because the size of the device needed in various applications is
different. For example, some companies want to incorporate this device in mobile phones
and also in laptops and palmtops. So the size of the device needed for these applications
is small. Hence research works are going on to reduce the size of device.
Resolution of image captured depends on ambient light intensity and temperature.
Because these two factors strongly affects the resolution of captured image and hence the
accuracy of the device, so still some improvements are required in the technology and
some progress is going on. In near future these problems are expected to be solved and
more enhanced, accurate and secure device will be manufactured.
MULTIMODAL BIOMETRIC
Error rates are high while using single biometric, so the fusion of two or more biometric
are also used. Mostly palm vein and palm print technologies are used for fusion. This
fused technology is also called multimodal biometric. The error rates decreases to a large
extent. In this technology, separate templates of palm print and palm vein pattern are
taken using sensors and camera and matched with database.
ADVANTAGES AND DISADVANTAGES
6.1 ADVANTAGES
1. Palm vein authentication can be done using the vascular pattern on the back of a hand
or a finger. However, the palm vein pattern is the most complex and covers the
widest area, because the palm has no hair, it is easier to photograph its vascular
pattern. The palm also has no significant variations in skin color compared with
fingers or back of the hand, where the color can darken in certain areas. Also we can
TKREC-CSE
use fusion of two technologies, palm vein and palm print, which will be more
complex and more reliable but costly.
2. Because ICP method is used in this technology so there will be no false rejections or
false acceptance cases because of orientation problem. So FRR and FAR are very low
in comparison to other biometric technologies. So it is more secure and reliable.
3. The completely contactless feature of this device makes it suitable for use
where high levels of hygiene are required. It also eliminates any hesitation
people might have about coming into contact with something that other people have
already touched.
4. The vascular pattern of our palm doesn’t change with our growth or age, Even palm
vein pattern is generated before birth. So once you registered the palm vein pattern,
you need not to re-register again anytime in whole life except any critical case of
accident. Even in case of accident if palm is not injured critically, palm vein pattern
can be extracted because vein are located deeper inside the hand. Also at the time of
registration you have to register the vein pattern of both the palms, so if one gets
injured other one can be used.
5. Palm vein pattern of any individual cannot be theft. Also since it is contactless,
privacy cannot be invaded.
6. The average-selling price of the standard PalmSecure technology is between $300
and $350. While this is slightly higher than the average cost of fingerprint biometric
technology solutions, customers are willing to pay the additional premium to receive
the wide array of benefits associated with palm vein biometrics. Fujitsu recently released a
scaled-down version of this technology – Fujitsu PalmSecure LT for SSO,
which will retain most of the benefits of the premium product and yet be priced
below $200.
6.2 DISADVANTAGES
   The only weaknesses of palm vein biometric system are the different factor that affects
the quality of captured image. Such factors include body temperature, ambient
temperature and humidity, unevenly distribution of heat, heat radiation, and nearness of
the vein to surface and camera calibration and focus. Most of these factors are natural
TKREC-CSE
cause which is difficult to overcome.
CONCLUSION
This paper introduces palm vein authentication. This technology is highly secure because it uses
information contained within the body and is also highly accurate because the pattern of veins in
the palm is complex and unique to each individual. Moreover, its contactless feature gives it a
hygienic advantage over other biometric authentication technologies.
This paper also describes some examples of financial solutions and product applications for the
general market that have been developed based on this technology. Many of our customers have
favorably evaluated this technology and have experienced no psychological resistance to using it.
This has encouraged us to start development of new products for various applications, beginning
with financial solutions and followed by access control units and login units.
TKREC-CSE
Fujitsu will continue to work on reducing the size of components & programs in order to expand
the application range of our authentication solutions. We will also develop products for North
America, Europe, Asia and other overseas markets and continue to promote international
standardization for this technology.
REFERENCES
1. WWW.ZENGINKYO.OR.JP/EN/NEWS/INDEX
2. www.btm.co.jp/english/index.html
3. WWW.networkworld.COM
4.http://www.hirogin.co.jp/eng/index.html
TKREC-CSE
     5.http://www.ikedabank.co.jp/index.html
6.http://www.surugabank.co.jp/surugabank/05/0501000000.html
TKREC-CSE