QuestionsAnswered.net

What's Your Question?

How to Write a Research Paper

Writing a research paper is a bit more difficult that a standard high school essay. You need to site sources, use academic data and show scientific examples. Before beginning, you’ll need guidelines for how to write a research paper.

Start the Research Process

Before you begin writing the research paper, you must do your research. It is important that you understand the subject matter, formulate the ideas of your paper, create your thesis statement and learn how to speak about your given topic in an authoritative manner. You’ll be looking through online databases, encyclopedias, almanacs, periodicals, books, newspapers, government publications, reports, guides and scholarly resources. Take notes as you discover new information about your given topic. Also keep track of the references you use so you can build your bibliography later and cite your resources.

Develop Your Thesis Statement

When organizing your research paper, the thesis statement is where you explain to your readers what they can expect, present your claims, answer any questions that you were asked or explain your interpretation of the subject matter you’re researching. Therefore, the thesis statement must be strong and easy to understand. Your thesis statement must also be precise. It should answer the question you were assigned, and there should be an opportunity for your position to be opposed or disputed. The body of your manuscript should support your thesis, and it should be more than a generic fact.

Create an Outline

Many professors require outlines during the research paper writing process. You’ll find that they want outlines set up with a title page, abstract, introduction, research paper body and reference section. The title page is typically made up of the student’s name, the name of the college, the name of the class and the date of the paper. The abstract is a summary of the paper. An introduction typically consists of one or two pages and comments on the subject matter of the research paper. In the body of the research paper, you’ll be breaking it down into materials and methods, results and discussions. Your references are in your bibliography. Use a research paper example to help you with your outline if necessary.

Organize Your Notes

When writing your first draft, you’re going to have to work on organizing your notes first. During this process, you’ll be deciding which references you’ll be putting in your bibliography and which will work best as in-text citations. You’ll be working on this more as you develop your working drafts and look at more white paper examples to help guide you through the process.

Write Your Final Draft

After you’ve written a first and second draft and received corrections from your professor, it’s time to write your final copy. By now, you should have seen an example of a research paper layout and know how to put your paper together. You’ll have your title page, abstract, introduction, thesis statement, in-text citations, footnotes and bibliography complete. Be sure to check with your professor to ensure if you’re writing in APA style, or if you’re using another style guide.

MORE FROM QUESTIONSANSWERED.NET

palm vein technology research paper

Palm Vein Technology

8 Pages Posted: 22 Sep 2021

Aditya Bhargav Vankamamidi

Kakatiya Institute of Technology and Science, Warangal

Date Written: August 21, 2021

Security has become one of the key concerns in our day to day life. Personal identification technology is becoming popular now-a –days. Personal identificationsare not guessable, cannot be reproduced easily. They are fingerprint, iris, retina,veins and these are called as Biometric identifiers. Of all these biometric identifying techniques “Palm vein authentication technology” has the highest accuracy, false rejection rate of 0.01% and false acceptance rate of 0.00008% or lower and this is based on research done by Fujitsu over 140,000 palms.The Palm vein Technology uses veins in palms as authentication feature. The palm is placed over palm vein sensor and IR rays are emitted by the sensor ,the deoxygenated haemoglobin in veins absorbs the IR rays and the veins are recorded as dark lines .IR rays are being used because deoxygenated haemoglobin absorbs light in range of 7.6*10^(-4)mm. This type of method is called a reflection method. This technology is not only limited to login authentication but also physical access control systems, payment systems, financial services, healthcare and airport security. In the present an attempt was made to narrate and explain the uses of palm vein technology, how it is being implemented, why it is safer than other biometric identifying technologies.

Suggested Citation: Suggested Citation

Aditya Bhargav Vankamamidi (Contact Author)

Kakatiya institute of technology and science, warangal ( email ), do you have a job opening that you would like to promote on ssrn, paper statistics, related ejournals, development of innovation ejournal.

Subscribe to this fee journal for more curated articles on this topic

Innovation & Management Science eJournal

Human-computer interaction ejournal, electrical engineering ejournal, bioengineering ejournal.

Skip to Main Content

IEEE Account

Purchase Details

Profile Information

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2023 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

Book cover

Handbook of Vascular Biometrics pp 145–158 Cite as

Use Case of Palm Vein Authentication

16k Accesses

1 Citations

2 Altmetric

Part of the Advances in Computer Vision and Pattern Recognition book series (ACVPR)

Palm vein authentication is a vein feature authentication technology that uses palm veins as the biometric feature. Palm vein patterns are normally captured using near-infrared light via either the reflection or the transmission methods. In the reflection method, near-infrared rays are emitted towards the palm to be identified and the reflected light is captured for authentication. Because veins are beneath human skin, it is difficult for someone else to copy or steal them, so the palm vein is more secure compared to some other biometric features. Moreover, because palm vein patterns are diverse and complex, they give sufficient information to identify one individual among a large population. As a result, palm vein authentication is secure and highly accurate. As a contactless type of biometric identification, it is suitable for use in applications that require a high level of hygiene or for use in public applications. Several banks in Japan have been using palm vein authentication for ATM security since July 2004. In addition, palm veins have been used in a variety of applications such as door security systems, login management systems for PCs, financial services , payment services and patient identification systems in hospitals. This chapter introduces the technical outline of palm vein authentication and its use cases .

Download chapter PDF

1 Introduction

Palm vein authentication is a vein pattern authentication technology that uses palm veins as the biometric feature. Because palm vein patterns exist beneath human skin, it is very difficult to copy or steal someone’s palm vein pattern. This means that forgery is very difficult under normal conditions.

Fujitsu Lab started to develop Palm Vein Authentication as Contactless Hand Biometrics in 2000. At the time, we didn’t know which accuracy to expect from hand features, so we evaluated hand features by experimental cameras and illumination. We set up four different cameras to capture different parts of the hand. By using these cameras, we collected about 1,400 hands vein images (palm , finger, back of hand and wrist) from 700 persons. As a result of authentication performance evaluation using these images, we chose palm vein for our product. Because a person’s palm vein patterns have web-like complex patterns (Fig.  5.1 ), they give sufficient information to identify one individual from a large population of people. Compared to the back of the hand or the back of a finger, the palm is a good area for authentication because it does not have any hair which can obscure the vein capture process.

figure 1

Palm vein image captured by experiment device

Palm vein patterns are believed to be unique to each individual as with fingerprints or other biometrics. To confirm this, we collected 140,000 palm vein images by 70,000 persons for verification in 2005 [ 1 ]. Experiments based on large-scale data show that palm vein patterns have the advantages of consistency and accuracy as a method of personal identification. It has also been shown that palm vein patterns are stable for a sufficiently long time period for the purpose of personal identification.

A patent for hand vein authentication was filed in 1985 by Joseph Rice in the United States [ 2 ]. The first device for palm vein authentication was presented by Advanced Biometrics, Inc. in the United States in 1997. In 2003, a novel contactless device was released by Fujitsu in Japan. In 2004, Japanese financial institutions, the Bank of Tokyo-Mitsubishi first adopted Fujitsu’s technology for confirming the identity of their customers. This was the first major application in Japan in which a private enterprise adopted vein authentication in a service for the general public. Fujitsu’s concept and implementation of a contactless sensor was awarded the Wall Street Journal’s 2005 Technology Innovation Award for Security in Networks [ 3 ]. This chapter will provide a broad use case of contactless palm vein authentication.

2 Palm Vein Sensing

Vein patterns sit within the subcutaneous tissue of a person’s palm and are captured using near-infrared rays. This technology is called near-infrared spectroscopy (NIRS) and imaging. This field of research has been investigated as a technology of in vivo “within the living” measurement for over 10 years [ 4 ].

Palm vein images can be captured using two different methods: the reflection method and the transmission method. In the reflection method, the palm is illuminated from the front side and the image is captured on the same side. In the transmission method, the palm is illuminated from the backside of the hand and the image is captured from the front side. In the transmission method, the illumination device and the capture device are separated, facing each other across a palm . While in the reflection method, the illumination device and the capture device can be integrated together to create a more compact device because the direction of the illumination is the same as the direction of image capturing.

3 Sensor Products with Reflection Method

We commercialised reflective type of palm vein sensors (Fig.  5.2 ). Users don’t need to touch the sensor; they only have to show their palms to the sensor. To obtain a high-quality palm vein image, the imaging process should be adequately controlled due to the movement or position of the hand. In addition, the illumination should be controlled depending on the environmental light conditions around the sensor.

figure 2

Palm vein sensor product with reflection method

The contactless method eliminates user concerns about hygiene as users don’t have to have direct contact with publicly used devices. The method is also suitable for identification in environments where high hygiene standards are required such as in medical facilities or food factories.

The intensity of the near-infrared rays emitted from the sensor is deemed safe as it is less than the intensity specified in the “Light and Near-Infrared Radiation” guidelines of the American Conference of Governmental Industrial Hygienists (ACGIH) [ 5 ].

The first palm vein authentication systems were introduced in ATM services in 2004. To expand the application of palm vein authentication, miniaturisation of the palm vein sensor is continually being promoted. The lighting component was designed to provide a wide radiation range and very bright luminosity, despite its compact implementation, by carefully positioning the LED and optimising the shape of the waveguide. The authentication algorithm was also upgraded to better match the properties of images captured by the miniature sensor.

For security reasons, the sensor should encrypt the palm image prior to transmission to the host PC; templates should also be encrypted for storage or transmission. These functions protect the palm vein image from any unauthorised access or fraud.

In Fujitsu’s implementation [ 6 , 7 , 8 ], a palm vein authentication sensor is made in the shape of a small box, 25 mm deep × 25 mm wide × 6.0 mm high (Fig.  5.3 ). Capturing is executed in a contactless manner. With the advancement of sensor miniaturisation, it became possible to incorporate the sensors into laptop PCs and tablets .

figure 3

Compact size palm vein sensor

As a result, Fujitsu launched a laptop PC with the world’s first built-in vein sensor in 2011. In 2014, a tablet with a built-in palm vein authentication sensor was commercialised.

4 Matching Performance

At the first stage of palm vein authentication, the palm vein pattern is extracted from the near-infrared image taken by the palm vein sensor. As palm veins exist under human skin, the vein pattern is generally not as clear as other biometric features like fingerprints, so the extraction method is one of the key technological components of palm vein authentication.

The similarity between the captured palm vein to be authenticated and the registered template stored in the database is then calculated. The similarity can be calculated using various methods.

In the verification process (one-to-one matching), the user is authenticated if the similarity score is greater than or equal to the predetermined threshold. In the identification process (one-to-many matching), similarity scores are calculated between the input palm vein image and all of the registered templates in the database. The user’s identity is determined to be the user that shows the highest score among these calculated scores and whose score is greater than or equal to the predetermined threshold.

Our latest matching algorithm achieves a false rejection rate of 0.01% (including one retry) and false acceptance rate of 0.00001% or less. This algorithm enables 1:N authentication of up to 10,000 hands (5,000 with both hands registration). Palm vein images of 16,000 hands were collected from 8,000 people for this verification. This authentication performance was calculated based on the ISO/IEC 19795 series.

5 Use Cases of Palm Vein Authentication

5.1 usage situation.

Palm vein authentication is used worldwide. Commercial palm vein sensors are shipped in over 1 million units. And in our survey, 86 million people have registered their palm veins. Because palm vein authentication has many public uses, it tends to have more registrants than sensors. This chapter introduces some use cases .

5.2 Login Authentication

Palm vein sensors can be embedded in a PC mouse. Using a mouse as a palm vein authentication sensor offers convenience and space-saving advantages. Most companies and government agencies have internal information systems which handle sensitive personal data. Using a mouse with an integrated palm vein authentication sensor enables advanced, high-level security for system logins with the high accuracy and reliability of palm vein authentication in comparison with the conventional combination of ID and password.

With these laptop PCs equipped with palm vein authentication (Fig.  5.4 ) [ 9 ], it is possible to perform pre-boot authentication at BIOS start-up. Furthermore, tablets with built-in palm vein authentication have been put to practical use (Fig.  5.5 ) [ 8 ]. These are mainly used in PC login and second factor authentication solutions. Hundreds of thousands of employees and staff are using this in technology large companies and governments.

figure 4

Laptop with built-in palm vein authentication

figure 5

Tablet with built-in palm vein authentication

Palm vein authentication is also applied to logins for virtual desktops. In Fujitsu, approximately 40,000 employees access their thin-client terminal by using palm vein authentication [ 10 ].

5.3 Physical Access Control Systems

Palm vein authentication sensors have been installed in many access control systems (Fig.  5.6 ). They are used to control entry and exit for rooms or buildings. Palm vein authentication is well suited to access control systems because of the following reasons:

figure 6

Entry control device

Palm vein authentication works in a contactless manner; this is an optimal feature for public usage.

It is simple and easy to use; users only have to show their palms to the device.

Palm vein patterns are difficult to counterfeit.

Because of the Personal Information Protection Act that went into full effect in Japan on April 2005, the Department of Planning, Information and Management of the University of Tokyo Hospital began using palm vein authentication in a new security system to control room access. The security levels of the system were divided into three access levels: access to the administrative room, the development room and the server room. An access control unit that uses palm vein authentication has been installed at the entrance to each room. The system has been able to restrict an individual’s entry in stages.

Additionally, the smart-card-based authentication installed at the entrances to two offices in Japan (Fujitsu Solution Square and the Tokai Branch Office) will make the switch over to palm vein authentication, and a field trial covering some 5,200 employees working at these locations will take place over the course of approximately 1 year. In both cases, identity authentication and integrated operations and management will be performed on a cloud-based platform. Users can pass the gate by waving their hand over the sensor (Fig.  5.7 ).

figure 7

Trial at flapper gate

5.4 Payment Systems

A payment system using palm vein authentication called “Hand Pay Service” has been introduced by the major Korean credit card company Lotte Card Co., Ltd. Making full use of the palm vein authentication technology proudly provided by Fujitsu, Lotte Card started the first bio-pay service in Korea on May 2016, which allows Lotte Card customers to make lump-sum credit card payments even when they are not carrying their cards, by just using biometrics and phone numbers to authenticate who they are. The encrypted data are divided and stored in the Bio-Information Distributed Data Management Center of the Korea Financial Telecommunications & Clearing Institute (KFTC) and the system environment of Lotte Card, to strengthen security even further. Moreover, it was Fujitsu Korea that established the system that works with the Biometric Information Distributed Data Management Center of the KFTC to which the Lotte Card “Hand Pay Service” is linked (Fig.  5.8 ).

figure 8

Payment system by using palm vein

AEON Credit Service and Fujitsu will begin a field trial of a cardless payment system using Fujitsu’s palm vein biometric authentication technology. Starting in September 2018, the trial will take place in selected Ministop convenience stores. Customers use this service by registering in advance, then adding their palm vein pattern to their AEON card information. When paying at a register, customers can pay with their registered AEON card by inputting their date of birth and then scanning the palm of their hand over the reader. Customers can use their AEON card with greater convenience, without the bother of taking the card out of their wallet or purse. AEON Credit Service and Fujitsu will be conducting a field trial for AEON Group employees at a number of Ministop locations beginning in September 2018. Based on the results of the field trial, the companies plan to roll out the technology for use in store locations for the various AEON Group companies.

5.5 Financial Services

In 2003, Japan saw a rapid increase in financial damage, caused by fraudulent withdrawals from bank accounts through spoofing with fake bank cards that were made from stolen or skimmed cards. It was a significant social problem. This caused a sharp increase in the number of lawsuits brought forward by victims against financial institutions for their failure to control information used for personal identification. The “Act for the Protection of Personal Information” came into effect on May 2005, and in response, financial institutions in Japan have been focusing on biometric authentication methods together with smart cards, as a way to reinforce the security of personal identification. Palm vein authentication is the form of biometric authentication that was most quickly introduced for customer confirmation at banking facilities; it was first introduced in July 2004, before the act came into effect.

Palm vein authentication in financial services is applied as follows. A user’s palm vein pattern is registered at a bank counter and stored on a smart card. This has the advantage of allowing users to carry their own palm vein pattern with them. In the verification process for ATM transactions, the palm vein pattern of the user is captured by a palm vein authentication sensor on the ATM (Fig.  5.9 ). The captured palm vein pattern is transferred to the user’s smart card and compared to the template stored in the smart card. Finally, a matching result score is transmitted back from the smart card, keeping the palm vein template within the smart card.

figure 9

ATM using palm vein authentication

In addition to Japan, Brazil has also adopted palm vein authentication to identify users in ATM banking transactions. Banco Bradesco S.A., the largest private bank in Latin America, has tested palm vein authentication with various other biometric technologies. Bradesco chose palm vein authentication because of its outstanding features, such as its high level of verification accuracy and the fact that it is non-invasive and hygienic, making it more easily accepted by customers of the bank.

In 2012, Ogaki Kyoritsu Bank Ltd. in Japan started a new cardless biometric ATM system service applying palm vein authentication. With this system, customers are able to use ATM services for withdrawals, deposits and balance inquiries without passbooks or ATM cards. By combining their date of birth, palm vein authentication and PIN, customers have access to financial services that combines both security and convenience. In a huge disaster situation such as an earthquake, people would evacuate their houses immediately, so they wouldn’t have any identifying documents like ATM cards or driver’s licenses. Even in a situation like this, the new ATM system will provide financial services to customers by applying the high accuracy rate of palm vein authentication [ 11 ].

5.6 Health Care

Palm vein authentication is being deployed throughout the Carolinas HealthCare System (CHS) in the United States as part of a solution to effectively register patient information and ensure that the proper medical care is given to the right person, while protecting their medical record and privacy from identity theft and insurance fraud. For this system, the CHS team developed a unique hand guide for the sensor. This hand guide is adapted for a hospital environment, since it incorporates a paediatric plate that adapts the guide so it can be used with young children, accommodating all CHS patients.

The Sapporo Hospital of the Keiyu Association in Japan also adopted palm vein authentication for patient authentication in their electronic medical records system. Patients who are to undergo an operation register their palm vein patterns before the operation. On the day of the operation the registered palm vein pattern and the palm vein pattern scanned from the patient are compared, confirming that the patient to be operated on is the correct person. This avoids the wrong patient being operated on, which might occur if two patients have the same name, for example. Other applications for health care , such as secure access to patient medical records, can also be achieved due to the contactless nature of palm vein authentication and its excellence in terms of hygiene.

In Turkey, the Ministry of Health decided to introduce a nationwide biometric patient authentication system with palm vein authentication for the SSI (Social Security Institution) in order to prevent billing fraud in hospitals and pharmacies. In order to apply for insurance from the government through MEDULA, medical institutions (hospitals, clinics, family doctors, pharmacies and opticians) must implement palm vein authentication. The service started in 2012 and more than 10,000 units are being used.

(MEDULA: the social security application system for customers’ medical expenses at all medical institutions.)

5.7 Airport Security

In South Korea, the Korea Airports Corporation (KAC) has deployed palm vein authentication system at all 14 domestic airports under its jurisdiction, to ameliorate congestion by identifying boarding passengers with biometric authentication (Fig.  5.10 ). The domestic airports under KAC’s jurisdiction are currently used by about 32 million people per year. Korean citizens, over the age of 14, travelling on domestic flights must have their identity checked before passing through boarding security, and this had previously been done on-site by showing a citizen ID card to security personnel. Because visually confirming a passenger’s identity takes time, this process could lead to congestion in the airports, and it had become an issue for KAC.

figure 10

Palm vein authentication for airport security

In addition, passengers who had not brought their citizen ID cards were not able to board their flights, which compromised the quality of customer service.

KAC has given attention to the high identification accuracy and convenience of palm vein authentication, and therefore decided to deploy a personal identification system using palm vein authentication.

Users can register in advance at registration devices installed in airports, linking their palm vein pattern with their citizen ID number, name and phone number. Then, after scanning a barcode on their ticket, users can confirm their identity by holding out their hand at the newly installed identity confirmation gates before security checkpoints. Users will not have to constantly carry their citizen ID cards, and the system will slash waiting times and enable smoother processing at airports.

This system began operation on 28 December 2018, and it has been used over 1 million times, with 160,000 individuals who have already registered their palm vein patterns.

5.8 Government and Municipal

The Japan Agency for Local Authority Information Systems introduced palm vein authentication for user authentication of the Resident Registry Network (JUKI-net), implemented for all local government offices. All municipalities, prefectures and governmental agencies use this system to protect the private information of residents. Operational costs such as issuing ID cards and reissuing forgotten or lost IDs or passwords have been reduced. More than 10,700 terminals are connected to this system. The operator can easily understand that he/she has been identified, which will act as a psychological barrier to the intentional leaking of information.

Naka city in Ibaraki prefecture, Japan, introduced a system utilising palm vein authentication technology for the city’s new public library in October 2006. The library system is the first of its kind in the world. Users can check out books from the library by using palm vein authentication. Users of the Naka City Public Library will be given a choice between using an ID card with an embedded IC chip or using the palm vein authentication system for identity verification. Users who select palm vein authentication will be able to check out library materials or use its audiovisual section without using ID cards. First, users input their date of birth, then they simply suspend their hand above the authentication device and their palm vein pattern is compared to their pre-registered pattern for verification.

Now, more than 90% of the 20,000 users choose to use palm vein authentication for convenience (Fig.  5.11 ).

figure 11

Book lending system

6 Conclusion

Palm vein authentication has been used in a variety of applications such as door security systems, login management systems for PCs, financial services , payment services and patient identification systems in hospitals. The vein pattern of the palm has a two-dimensional complexity, and because the image exists under the skin, the acquired image is very stable. Based on these advantages, we believe that palm vein authentication will become more widespread.

Sasaki S, Kawai H, Wakabayashi A (2005) Business expansion of palm vein pattern authentication technology. Fujitsu 56(4):346–351

Google Scholar  

Rice J (1985) Apparatus for the identification of individuals. US Patent 4,699,149

Totty M (2005) A better idea. Wall St J

Kim JG, Xia M, Liu H (2005) Extinction coefficients of hemoglobin for near-infrared spectroscopy of tissue. IEEE Eng Med Biol Mag 24:118–121

CrossRef   Google Scholar  

Light and near-infrared radiation: TLV physical agents 7th edition documentation. ACGIH

Watanabe M, Endoh T, Shiohara M, Sasaki S (2005) Palm vein authentication technology and its applications. In: Proceedings of biometrics symposium. pp 37–38

Iwasaki S, Higashiura Y, Komura K, Nakamura A, Suzuki T, Iwaguchi I (2013) World’s smallest and slimmest palm vein biometric authentication sensor. Fujitsu 6(4):350–354

Yokozawa H, Morihara T (2013) Palm vein authentication technology embedded in laptop. Fujitsu 64(3):287–292

Yokozawa H, Shinzaki T, Yonenaga A, Wada A (2016) Biometric authentication technologies of client terminals in pursuit of security and convenience. Fujitsu Sci Tech J 52(3):23–27

Y Suzuki, A Niigata, M Hamada (2016) In-house practice of cloud-based authentication platform service focusing on palm vein authentication. Fujitsu Sci Tech J 52(3):8–14

Hattori Y (2015) Realizing new ATM service using palm vein authentication technology Fujitsu 66(3):2–7

Download references

Author information

Authors and affiliations.

Digital Innovation Core Unit, Fujitsu Laboratories Ltd., 1-1 Kamikodanaka 4-chome, Nakahara-ku, Kawasaki, 211-8588, Japan

Takashi Shinzaki

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Takashi Shinzaki .

Editor information

Editors and affiliations.

Department of Computer Science, University of Salzburg, Salzburg, Salzburg, Austria

Prof. Dr. Andreas Uhl

Hochschule Darmstadt, Darmstadt, Germany

Prof. Christoph Busch

Swiss Center for Biometrics Research and Testing, Idiap Research Institute, Martigny, Switzerland

Dr. Sébastien Marcel

Faculty of EEMCS, University of Twente, Enschede, The Netherlands

Prof. Dr. Raymond Veldhuis

Rights and permissions

Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

The images or other third party material in this chapter are included in the chapter's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the chapter's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.

Reprints and Permissions

Copyright information

© 2020 The Author(s)

About this chapter

Cite this chapter.

Shinzaki, T. (2020). Use Case of Palm Vein Authentication. In: Uhl, A., Busch, C., Marcel, S., Veldhuis, R. (eds) Handbook of Vascular Biometrics. Advances in Computer Vision and Pattern Recognition. Springer, Cham. https://doi.org/10.1007/978-3-030-27731-4_5

Download citation

DOI : https://doi.org/10.1007/978-3-030-27731-4_5

Published : 14 November 2019

Publisher Name : Springer, Cham

Print ISBN : 978-3-030-27730-7

Online ISBN : 978-3-030-27731-4

eBook Packages : Computer Science Computer Science (R0)

Share this chapter

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

IJERT

NSRCL - 2015 (Volume 3 - Issue 28)

Palm vein technology.

palm vein technology research paper

Creative Commons License

Anjitha Ajith K1 1Computer Science Vimala College Thrissur, India

Resija P. R2 2Computer Science Vimala College Thrissur, India

Abstract :- With the increase in technology, threat to personal data and national security had also increased. The methods that were emerged to secure important information from external intercession were chancy. Thereupon was a need to introduce a technology that secures our data more efficiently from unlawful intervention. Palm vein technologies are one of the upcoming technologies which are highly secure as it uses vascular patterns as personal identification data. Vein recognition technology is secure because the authentication data exists inside the body and is therefore very difficult to forge. It is highly accurate. The palm vein image sensor is used for palm vein authentication. The device captures an image of vein pattern in the palm by emitting near-infrared rays that are absorbed by the deoxygenated hemoglobin in the veins and then reflected back to the device for image capturing[1]. This technology can be used in various fields like banking, hospitals, and government offices; in passport issuing etc. Business growth will be achieved with these solutions by reducing the size of the palm vein sensor and shortening the authentication time.

Keywords: Palm vein, vein recognition, vascular patterns

INTRODUCTION

In the ubiquitous network society, where individuals can easily access their information anytime and anywhere, people are also faced with the risk that others can easily access the same information anytime and anywhere. Because of this risk, personal identification technology, which can distinguish between registered legitimate users and imposters, is now generating interest. Currently, passwords, Personal Identification Numbers (4-digit PIN numbers) or identification cards are used for personal identification. However, cards can be stolen, and passwords and numbers can be guessed or forgotten. To solve these problems, biometric authentication technology, which identifies people by their unique biological information, is attracting attention [2]. In biometric authentication, an account holders body characteristics or behaviors (habits) are registered in a database and then compared with others who may try to access that account to see if the attempt is legitimate.

Fujitsu, a Japanese multinational information technology equipment and services company, is researching and

developing biometric authentication technology focusing on four methods: fingerprints, faces, voiceprints, and palm veins. Among these, because of its high accuracy,

contactless palm vein authentication technology is being incorporated into various financial solution products for use in public places [3].

TECHNOLOGY BEHIND PALM VEIN

The Basis of Palm Vein Technology

An individual first rests his wrist on some devices, the middle of his fingers, on the sensors supports such that the palm is held centimeters above the devices scanner, which flashes a near-infrared ray on the palm. Unlike the skin, through which near-infrared passes, deoxygenated hemoglobin in the blood flowing through the veins absorbs near-infrared rays, illuminating the hemoglobin, causing it to be visible to the scanner. Arteries and capillaries, whose blood contains oxygenated hemoglobin, which does not absorb near-infrared light, are invisible to the sensor. The still image captured by the cameras, which photographs in the near-infrared range, appears as a black network, reflecting the palms vein pattern against the lighter background of the palm. The palm vein image is converted by algorithms into data points, which is then compressed, encrypted, and stored by the software and registered along with the other details in his profile as a reference for future comparison. Then, each time a person logs in attempting to gain access by a palm scan; the newly captured image is likewise processed and compared to the registered one, all in a period of seconds. Numbers and positions of veins and their crossing points are all compared and, depending on verification, the person is either granted or denied access.

REGISTERING THROUGH PALM VEIN

Step 1: Palm vein authentication technology consists of a small Palm vein scanner that's easy and natural to use, fast and highly accurate. The palm is to be held a few centimeters over the scanner and within a second it reads the unique vein pattern. A vein picture is taken and palm pattern is registered.

Step 2: The registered palm pattern is stored into the database along with the personal details of the client.

WORKING OF PALM VEIN SECURITY

One should place his/her palm near to scanner.

The scanner makes use of a special characteristic of the reduced hemoglobin coursing through the palm veins it

absorbs near-infrared light. This makes it possible to take a snapshot of what's beneath the outer skin, something very hard to read or steal.

The integrated optical system in the palm vein sensor uses this phenomenon to generate an image of the palm vein pattern and the generated image is digitized, encrypted and finally stored as a registered template in the database.

HOW SECURE IS THE TECHNOLOGY?

As the patterns of an individuals two hands differ, the hand used on registration must be used for logging in. No two people in the world share a palm vein pattern – even those of identical twins differ. And if you registered your profile as a child, it'll still be recognized as you grow, as an individual's patterns of veins are established in uterus (before birth). Over and above the devices ability to perform personal authentication was verified taking into account the age factor, the state of the person whether drunk or not, just after a bath etc.

WHAT HAPPENS IF THE REGISTERED PALM GETS MUTILATED?

It may happen that the palm we had registered may get mutilated [4]. In such a case we cannot use this technology, so during the time of registration we take the veins of both the hands so that if one gets damaged we can access through the second hand. When hand get mutilated up to large extent we can get veins because deeper into the hand veins are obtained. When we apply this method we can maintain complete privacy.

CONTACT LESS PALM VEIN AUTHENTICATION DEVICE (HYGIENE CONCERN)

The complete contactless feature of this device makes it suitable for us where high levels of hygiene are required [5]. It minimizes hygiene concerns and psychological resistance Fujitsu is a pioneer in designing a completely contactless palm vein authentication device. With this device, authentication simply involves holding a hand over the vein sensor. The completely contactless feature of this device makes it suitable for use where high levels of hygiene are required, such as in public places or medical facilities. It also eliminates any hesitation people might have about coming into contact with something that other people have already touched.

In addition to being contactless and thereby germ-free and fool-proof, palm vein authentication is highly secure in that the veins are internal to the body and carry a wealth of information, thereby being extremely difficult to forge.

WHY PALM SECURE FOR SECURITY?

Vein patterns are unique to individuals and contain detailed characteristics for formulation of algorithm template. The sensor of the palm vein device can only recognizethe pattern if the deoxidized hemoglobin is actively flowing within the individual's veins.

Contactless authentication is hygienic and non-invasive, thus promoting high-level of user acceptance.

Advanced authentication algorithm produces high level of accuracy and application versatility.

Technology based on more than two decades of Fujitsu image recognition experience [6].

In addition to the palm, vein authentication can be done using the vascular pattern on the back of a hand or a finger. However, the palm vein pattern is the most complex and covers the widest area, because the palm has no hair, it is easier to photograph its vascular pattern. The palm also has no significant variations in skin color compared with fingers or back of the hand, where the color can darken in certain areas.

APPLICATIONS

This palm vein authentication technology is used in various areas for more security. The following are some of the important areas where it is used.

This amenity which features high security for customers using vein certification does not require a bank card or pass book [3]. Further it prevents withdrawals from branches other than the registered branch and ATMs thereby minimizing the risk of illicit withdrawals. To open a Bio- Security Deposit account, customers go to a bank and have their palm veins photographed at the counter in order to vow secure data management, the palm vein data is stored only on the vein data base server at the branch office where the account is opened. Later on, a card facility was introduced. This card combines the functions of a bankcard, credit card, electronic money and palm vein authentication. The card encloses the customers palm vein data and palm authentication algorithms and performs vein authentication by itself. This system is advantageous because the customers information is not saved in the bank.

Personal Computers

In personal computers palm vein technology can applied, by inserting the vein sensor inside mouse. When power is supplied to system the mouse also gets power and the sensor in the mouse will be ready to sense palm veins. When one place his/her palm the sensor sense the veins and if they are matched with the registered one the system allows the person to use it. One can use this mechanization even to lock folders, so that privacy can be maintained.

In Hospitals And Libraries

A public library in Japan is set to become the first in the world to use palm-vein biometrics as a substitute for conventional library cards. The University of Tokyo hospital has taken delivery of a contactless palm vein authentication system to secure physical access to its Department of Planning, Information and Management.

Authentication

In front of our homes we can apply this Palm vein technology so that by registering the veins of our family members and relatives we can maintain high range security which is not possible through other technologies. Japanese recently used this technology before front doors and getting high range security.

Palm vein pattern authentication technology developed by Fujitsu was being used in a wide range in Japan. Sooner or later this higher end security system use will be inevitable in the world. This is surely going to ensure fool proof tamper free security systems and different other advantages also. Surely this technology will bring a revolution in the field of science and technology in the near future.

https://books.google.co.in/books?id=0bQbOYVULQcC&pg=P A1033&dq=Palm+vein+technology&hl=en&sa=X&redir_esc= y#v=onepage&q=Palm%20vein%2

https://en.wikipedia.org/wiki/Biometrics0technology&f=false

https://en.wikipedia.org/wiki/Fujitsu

http://www.authorstream.com/Presentation/sridaddu41- 1266638-palm-vein-technology/

https://www.fujitsu.com/us/Images/palmsecure.pdf

http://www.fujitsu.com/global/solutions/business- technology/security/palmsecure/

Leave a Reply

You must be logged in to post a comment.

IMAGES

  1. Palm Vein Technology: A Contactless Identification System

    palm vein technology research paper

  2. Palm Vein Technology (PDF)

    palm vein technology research paper

  3. Palm Vein Technology PDF

    palm vein technology research paper

  4. Palm vein technology

    palm vein technology research paper

  5. Palm Vein Technology (PDF)

    palm vein technology research paper

  6. Palm Vein Technology (PDF)

    palm vein technology research paper

VIDEO

  1. har pal meri yaad tume tarpayegi 💔😭💔||‎@officialamit_75 #shorts #shortvideo #youtubeshorts

  2. The Great Pakistani Debates

  3. BioAffix WinLogon

  4. Palm Vein Recognition using Image Processing

  5. MAXSafes Patented Vein Technology Biometric Pistol Safe!

  6. [VDC]Introducing Contactless Palm Vein Authentication Technology

COMMENTS

  1. How Do You Make an Acknowledgment in a Research Paper?

    To make an acknowledgement in a research paper, a writer should express thanks by using the full or professional names of the people being thanked and should specify exactly how the people being acknowledged helped.

  2. How to Write a Research Paper

    Writing a research paper is a bit more difficult that a standard high school essay. You need to site sources, use academic data and show scientific examples. Before beginning, you’ll need guidelines for how to write a research paper.

  3. What Are Some Examples of Action Research Papers?

    An action research paper documents a “cycle of inquiry,” in which the writer evaluates a problem and develops a strategy of reform. Educators and educational administrators typically use this writing format to foster continual improvement i...

  4. Palm Vein Technology by Aditya Bhargav Vankamamidi

    The Palm vein Technology uses veins in palms as authentication feature. The palm is placed over palm vein sensor and IR rays are emitted by the

  5. A research on palm vein recognition

    Abstract: Palm vein recognition is a promising biometric technology, it uses vascular pattern as personal identification data. In this paper, we propose a

  6. (PDF) A review of palm vein recognition

    wet hand surface do not affect the vein structure. This paper provides an overview of current palm vein research,. describing the steps of palm

  7. (PDF) Palm Vein Technology for Biometrics

    We have worked on Palm vein recognition for detecting palm veins in applications for biometric security using near infrared absorption phenomena

  8. Use Case of Palm Vein Authentication

    Palm veinPalm vein authentication is a veinVein feature authentication technology that uses palm veins as the biometric feature.

  9. A Study on Palm Vein Recognition Technologies

    you to contact the scanner. An in-depth look at current advances in palm vein identification research is presented in this paper, which covers.

  10. Research Paper Engineering Abstract on Palm Vein Technology

    Research Paper. Engineering. Abstract on Palm Vein Technology. Jenny Priya. C. Final year CSE Dept., Mookambigai College of Engineering,Trichy. Divya. R.

  11. Palm Vein Technology

    Palm Vein Technology - written by Anjitha Ajith K, Resija P. R published on 2018/04/24 download full article with reference data and citations.

  12. PALM VEIN AUTHENTICATION TECHNOLOGY

    papers will provide a broad overview of palm vein authentication

  13. Palm Vein Pattern Authentication Technology

    This paper describes this technology and its expected business expansion. * Internal research by Fujitsu resulted in a false acceptance rate of less than

  14. Biometric Security: Palm Vein Recognition Using Lbp and Sift

    Palm Vein Authentication Technology, white paper, Bioguard,. Innovative Biometric Solutions, March, 2007. 8. Mona A. Ahmed, Hala M. Ebied, El-