CFP last date
20 January 2025
Reseach Article

High Security using Palm Vein Recognition Technology

by Lakshmi Sudha.k, Neha Bhanushali, Pooja Nikam, Priti Tripathi and
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 119 - Number 1
Year of Publication: 2015
Authors: Lakshmi Sudha.k, Neha Bhanushali, Pooja Nikam, Priti Tripathi and
10.5120/21035-3141

Lakshmi Sudha.k, Neha Bhanushali, Pooja Nikam, Priti Tripathi and . High Security using Palm Vein Recognition Technology. International Journal of Computer Applications. 119, 1 ( June 2015), 39-44. DOI=10.5120/21035-3141

@article{ 10.5120/21035-3141,
author = { Lakshmi Sudha.k, Neha Bhanushali, Pooja Nikam, Priti Tripathi and },
title = { High Security using Palm Vein Recognition Technology },
journal = { International Journal of Computer Applications },
issue_date = { June 2015 },
volume = { 119 },
number = { 1 },
month = { June },
year = { 2015 },
issn = { 0975-8887 },
pages = { 39-44 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume119/number1/21035-3141/ },
doi = { 10.5120/21035-3141 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:02:54.692333+05:30
%A Lakshmi Sudha.k
%A Neha Bhanushali
%A Pooja Nikam
%A Priti Tripathi and
%T High Security using Palm Vein Recognition Technology
%J International Journal of Computer Applications
%@ 0975-8887
%V 119
%N 1
%P 39-44
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Palm Vein Recognition (PVR) technology uses a near-infrared light to capture a user's palm vein pattern, generating a unique biometric template that is matched against pre-registered users' palm vein patterns. It is a contactless authentication technology that offers an easy-to-use, hygienic solution to verify identity. This advanced, vascular pattern recognition solution is highly reliable and in a form factor that is non-intrusive and generates extremely fast authentication. The PVR device connects via USB to any PC or laptop. The interface included enables users to enjoy the simplicity associated with functionality while adding robust biometric authentication to enhance Security and protect mission-critical information and systems

References
  1. Mansi Manocha and Parminder Kaur, "Palm Vein Recognition for Human Identification Using NN", International Journal of Innovative Technology and Exploring Engineering(IJITEE)
  2. Junichi Hashimoto, "Finger Vein Authentication Technology and its Future", 2006 Symposium on VLSI Circuits Digest of Technical Papers, 2006, pp. 5-8. [Jain, 04] Anil K. Jain, Arun Ross and SalilPrabhakar, "An Introduction to Biometric Recognition", IEEE Transactions on Circuits and Systems for Video Technology, Vol. 14, No. 1, January 2004, pp. 4-20.
  3. P. Ghosh and R. Dutta, "A new approach towards Biometric Authentication System in Palm Vein Domain"
  4. David Mulyono, Horng Shi Jinn, "A Study of Finger Vein Biometric for Personal Identification", International Symposium on Biometrics and Security Technologies, 2008, 23-24 April, 2008, Islamabad, pp. 1-8.
  5. KornelijeRabuzin, Miroslav Baca and MirkoMalekovic, "A Multimodal Biometric System Implemented within an Active Database Management System", Journal of Software, Vol. 2, No. 4, October 2007, pp. 24-31.
  6. Toshiyuki Tanaka, Naohiko Kubo, "Biometric Authentication by Hand Vein Patterns", SICE Annual Conference, Sapporo, August 4-6, 2004, pp. 249-253.
  7. Shi Zhao, Yiding Wang and Yunhong Wang, "Extracting Hand Vein Patterns from Low-Quality Images: A New Biometric Technique Using Low-Cost Devices", Fourth International Conference on Image and Graphics, 2007, pp. 667-671.
  8. Mansi Manocha and Parminder Kaur, "Palm Vein Recognition for Human Identification Using NN", International Journal of Innovative Technology and Exploring Engineering(IJITEE)
  9. Ding, Yuhang Ding, Dayan Zhuang and Kejun Wang, "A Study of Hand Vein Recognition Method", The IEEE International Conference on Mechatronics & Automation Niagara Falls, Canada, July 2005, pp. 2106-2110.
  10. Basics of Image Processing. http://www. visionsystem. com/technology/machinevision_overview. php
  11. Fujustu "Palm Vein Pattern Authentication Technology" White paper printed in the U. S. A. Qty. 3M WP10800306
Index Terms

Computer Science
Information Sciences

Keywords

Region of Interest Vein Bio-metrics Segmentation Thresholding Imposter Attacks Image Thinning