You are on page 1of 22

CHAPTER 1 INTRODUCTION

In the ubiquitous network society, where individuals can easily access their information anytime and anywhere, people are also faced with the risk that others can easily access the same information anytime and anywhere. Because of this risk, personal identification technology is used which includes Passwords, personal identification numbers and identification cards. However, cards can be stolen and passwords and numbers can be guessed or forgotten. To solve these problems, Fujitsu developed four methods: fingerprints, faces, voice prints and palm veins. Among these, because of its high accuracy, contact less palm vein authentication technology is being incorporated into various financial solution products for use in public places. This paper palm vein authentication technologies and some examples of its application to financial solutions. Palm vein recognition is a biometric technique for personal identification. The personal identification techniques are popularly used in the scientific, industrial, medical and forensic applications. Biometrics based vein recognition provides one of the promising solutions for the security of the software and the domain of applying this techniques for security is increasing day by day. Biometric features also include speech, handwriting, face identification etc. Face identification is one of the popular techniques for personal identification, but may fail in certain situations where two people look very similar. For example, in case of identical twins it may be very difficult to differentiate them. Even the speech and handwriting recognition systems may fail in certain situations, because there are experts who can modulate their speech or copy the handwriting in such a way that it is difficult to differentiate it from the original. This project is best suited for Law Enforcement Agency, Forensic application, Security of the software and the management applications.

1.1 The basis of palm vein technology


An individual first rests his wrist, and on some devices, the middle of his fingers, on the sensor's supports such that the palm is held centimeters above the device's scanner, which flashes a near-infrared ray on the palm. Unlike the skin, through which near-infrared light passes,

Fig 1.1 Palm Veins deoxygenated hemoglobin in the blood flowing through the veins absorbs near-infrared rays, illuminating the hemoglobin, causing it to be visible to the scanner. Arteries and capillaries, whose blood contains oxygenated hemoglobin, which does not absorb near-infrared light, are invisible to the sensor. The still image captured by the camera, which photographs in the nearinfrared range, appears as a black network, reflecting the palm's vein pattern against the lighter background of the palm.

An individual's palm vein image is converted by algorithms into data points, which is then compressed, encrypted, and stored by the software and registered along with the other

details in his profile as a reference for future comparison. Then, each time a person logs in attempting to gain access by a palm scan to a particular bank account or secured entryway, etc., the newly captured image is likewise processed and compared to the registered one or to the bank of stored files for verification, all in a period of seconds. Numbers and positions of veins and their crossing points are all compared and, depending on verification, the person is either granted or denied access.

1.2 Registering through palm vein technology


Step 1: Palm vein authentication technology consists of a small palm vein scanner that's easy and natural to use, fast and highly accurate. Simply hold your palm a few centimeters over the scanner and within a second it reads your unique vein pattern. A vein picture is taken and palm pattern is registered.

Fig 1.2 Reading palm veins Step 2: Scanned palm

Original Palm

Registered Pattern

Fig 1.3 Scanned palm

The registered palm pattern is stored into the database along with the personal details of the client.

1.3 Working of palm vein security system

1. One should place his/her palm near to scanner.

Fig 1.4 Palm on Sensor 2. The scanner makes use of a special characteristic of the reduced hemoglobin coursing through the palm veins. It absorbs near-infrared light. This makes it possible to take a snapshot of what's beneath the outer skin, something very hard to read or steal.

Fig 1.5 Infrared on Palm

3. The integrated optical system in the palm vein sensor uses this phenomenon to generate an image of the palm vein pattern and the generated image is digitized, encrypted and finally stored as a registered template in the database.

Fig 1.6 Short region on palm

CHAPTER 2 LITERATURE SURVEY


A biometric system is essentially a pattern recognition system that recognizes a person by determining the authenticity of a specific physiological and/or behavioral characteristic possessed by that person. An important issue in designing a practical biometric system is to determine how an individual is recognized. Depending on the application context, a biometric system may be called either a verification system or an identification system. A verification system authenticates a persons identity by comparing the captured biometric characteristic with his/her own biometric template restored in the system. It conducts one-to-one comparison to determine whether the identity claimed by the individual is true. A verification system either rejects or accepts the submitted claim of identity. An identification system recognizes an individual by searching the entire template database for a match. It conducts one-to-many comparisons to establish the identity of the individual. In an identification system, the system establishes a subjects identity without the subject having to claim an identity. The term a uthentication is also frequently used in the biometric field, sometimes as a synonym for verification; actually, in the information technology language, authenticating a user means to let the system know the user identity regardless of the mode. The enrollment module is responsible for registering individuals in the biometric system database. During the enrollment phase, the biometric characteristic of an individual is first scanned by a biometric reader to produce a raw digital representation of the characteristic. A quality check is generally performed to ensure that the acquired sample can be reliably processed by successive stages. In order to facilitate matching, the raw digital representation is usually further processed by a feature extraction to generate a compact but expressive representation called a template. Depending on the application, the template may be stored in the central database of the biometric system or be recorded on a magnetic card or smartcard issued to the individual. The verification task is responsible for verifying individuals
6

at the point of access. During the operation phase, the users name or PIN is entered through a keyboard; the biometric reader captures the characteristic of the individual to be recognized and converts it to a digital format, which is further processed by the feature extractor to produce a compact digital representation. The resulting representation is fed to the feature matcher, which compares it against the template of a single user. In the identification task, no PIN is provided and the system compares there presentation of the input biometric against templates of all the users in the system database; the output is either the identity of an enrolled user or an alert message such as user not identified. B ecause identification in large databases is computationally expensive classification and indexing techniques are often deployed to limit the number of templates that have to be matched against the input. A biometric system could operate either as an online system or an off-line system. An on-line system requires the recognition to be performed quickly and an immediate response is imposed. On the other hand, an off-line system usually does not require the recognition to be performed immediately and a relatively long response delay is allowed. An application could operate either in a positive or a negative recognition mode: In a positive recognition application, the system establishes whether the person is who he claims to be. The purpose of a positive recognition is to prevent multiple people from using the same identity. For example, if only Alice is authorized to enter a certain secure area, then the system will grant access only to Alice. If the system fails to match the enrolled template of Alice with the input, a rejection results; otherwise, an acceptance results. In a negative recognition application, the system establishes whether the person is who he denies being. The purpose of negative recognition is to prevent a single person from using multiple identities. For example, if Alice has already received welfare benefits and now she claims that she is Becky and would like to receive the welfare benefits of Becky, the system will establish that Becky is not who she claims to be. If the system fails to match the input biometric of Becky with a database of people who have already received benefits, an acceptance results; otherwise, a rejection results.

A biometric system can be classified according to a number of other application-dependent characteristics. Wayman suggests that all the biometric applications may be classified into categories based on their characteristics Cooperative versus non-cooperative Overt versus covert Habituated versus non-habituated Attended versus non-attended Standard versus non-standard Operating environment public versus private Open versus closed

Cooperative versus non-cooperative dichotomy refers to the behavior of the impostor in interacting with the system. Electronic banking is an example of a cooperative application whereas an airport application to identify terrorists who will try to break the system is an example of a non-cooperative application. If a user is aware that he is being subjected to a biometric recognition, the application is categorized as overt. If the user is unaware, the application is covert. Facial recognition can be used in a covert application while fingerprint recognition cannot be used in this mode. Habituated versus non-habituated use of a biometric system refers to how often the enrolled users are subjected to biometric recognition. For example, a computer network logon application typically has habituated users due to their use of the system on a regular basis. However, a drivers license application typically has no habituated users since a drivers license is renewed only once in several years. Attended versus nonattended classification refers to whether the process of biometric data acquisition in an application is observed, guided, or supervised by a human. Furthermore, an application may have an attended enrollment but non-attended recognition. For example, a banking application may have a supervised enrollment when an ATM card issued to a user but the subsequent uses of the biometric system for ATM transaction will be non-attended. Non-cooperative applications generally require attended operation. Standard versus non-standard environments refer to

whether the system is being operated in a controlled environment. Public or private dichotomy refers to whether the users of the system are customers or employees of the organization deploying the biometric system. For example, a network logon application is used by the employees and managed by the information technology manager of the same company. Closed versus open systems refers to whether a persons biometric template is used for a single or multiple applications.

CHAPTER 3 ANALYSIS
3.1 Current and proposed system:
In each and every organization security plays an important role. All employees working in the organization are allowed entrance only when they satisfy the security requirements. The security guards at the main entrance check the identity of the person with the help of his ID card. A record is maintained where the person has to enter the details of the time he is walking in, his name, ID, designation, department etc. When he walks out he has to enter his out time. This process is time consuming and not full proof. The employees as well as the visitors have to spend so much time and effort at the entrance to enter in the records and satisfy the security requirements. We can as well utilize this time and effort in something productive. To provide a solution to this problem we took up the job of automating the security check and providing the security guard with a personal computer to crosscheck with the employee details. Now an employee or visitor can gain entrance when their ID is scanned and the fingerprint of the employee is matched with the database maintained with the security. First the employee ID is retrieved from the ID card and then the employee record is opened and the palm veins are matched electronically, if there is a match the other details are matched then, we are successful in identifying the person such that the person gains entrance. The whole process is fast and accurate. Hence the main criterion for checking whether the employee belongs to the organization is done by cross checking the ID and mainly the palm veins of the employee with the database of employee records. In the process we are making the task of the security personnel easy and fast and guaranteeing that only authenticated employees and visitor gain entrance and the safety of the organization is maintained.

10

3.2 Limitations of current system:

Current technologies are related to measuring external features. Fingerprint scanners and various other technologies require the device be touched. Cuts, scars, tattoos, nor skin color affect the scans outcome. Current technologies are not accurate.

3.3 Advantages of Proposed system:

Difficult to forge. Contactless, hygienic and non-invasive. Highly accurate. The palm vein scanner has no deleterious effect on the body. Palm vein recognition seems not to be affected by aging.

11

3.4 Modules: 1) Palm vein scanning:


An individual first rests his wrist, and on some devices, the middle of his fingers, on the sensor's supports such that the palm is held centimeters above the device's scanner, which flashes a near-infrared ray on the palm. Unlike the skin, through which nearinfrared light passes, deoxygenated hemoglobin in the blood flowing through the veins absorbs near-infrared rays, illuminating the hemoglobin, causing it to be visible to the scanner. Arteries and capillaries, whose blood contains oxygenated hemoglobin, which does not absorb near-infrared light, are invisible to the sensor. The still image captured by the camera, which photographs in the near-infrared range, appears as a black network, reflecting the palm's vein pattern against the lighter background of the palm.

2) Representation and feature extraction:


An individual's palm vein image is converted by algorithms into data points, which is then compressed, encrypted, and stored by the software and registered along with the other details in his profile as a reference for future comparison.

3) Matching and authentication:


Each time a person logs in attempting to gain access by a palm scan to a particular bank account or secured entryway, etc., the newly captured image is likewise processed and compared to the registered one or to the bank of stored files for verification, all in a period of seconds. Numbers and positions of veins and their crossing points are all compared and, depending on verification, the person is either granted or denied access.

12

CHAPTER 4 System Requirement Specifications


4.1 Purpose of the system:
Today, in our daily life we are often being asked for verification of our identity. Normally this is done through the use of password when pursuing activities with line domain access, single signon, application logon etc. In the process, the role of personal identification and verification becomes increasingly important in our society. With the onslaught of improved forgery and identity impression methods, previous ways of correct authentication are not sufficient. Palm veins are believed to have the critical properties of universality, uniqueness, permanence and collect ability for personal authentication. Faking a palm vein is more difficult than faking a fingerprint because the palmprint texture is more complicated and are seldom leaves his/her complete palmprint somewhere unintentionally. Also compare to finger vein, palm are more robust to damage and dirt. What is more low resolution imaging can be employed in the palmprint recognition based on creases and palm lines, making it possible to perform real time image processing and feature extraction.

13

4.2 Scope of the system:


Texture and palm lines are the most clearly observable palmprint feature in low resolution image and thus have attracted most researchers. Our work is concentrated on particular one of palm where principal lines having maximum intensity. A famous fortuneteller Kiroo written in his book that every person have different pattern of veins. Such lines dont match with other person. The line structure are stable and remain unchanged throughout the life of an individual. More importantly, no two palm veins from different individuals are same. This concept inspired to use these principal lines for person identification and authentication. This process is less complex and less time consuming because it dont require any information about biometrics, hand geometry and palm veins etc. Hence, this method can be used in various security systems, criminal identification, person identification etc. These palm lines can be used in authentication.

14

4.3 Product Requirements:


4.3.1 Hardware Specifications:

Pentium IV Processor onwards. Min 256 MB RAM. 40GB Hard Disk space. CCD Sensor.

4.3.2 Software Specifications:

Operating System Database Language IDE

: : : :

Windows 2000 and its compatible versions. Oracle 10g. Java. Net Beans IDE.

15

4.4 Requirement analysis:

4.4.1 Functional requirements: Creation of proper user interface, with GUI features. Administrators can perform all related activities like employee maintenance, system maintenance etc. Administrator performs vein matching by using vascular pattern algorithm. Employee can access his/her information after successful matching of vein pattern.

4.4.2 Non-Functional requirements: a. Usability: The system is provided with a good user interface in order to make user to provide certain operation. b. Reliability: The system is more reliable because of the qualities that are inherited from the chosen platform java. The code built by using java is more reliable. Oracle provides a good deal of data reliability in terms of data storage and retrieval. c. Performance:

Performing Result analysis includes high level of data processing which hampers performance of the software rapidly. JDBC with oracle provide improved database accessing performance exhibiting system integrity and consistency. The system exhibits high performance because it is well optimized.

d. Supportability: The system is designed to be the cross platform supportable. The system is supported on a wide range of hardware and any software platform which is having JVM built into the system.

16

CHAPTER 4 CHAPTER 5 DESIGN


5.1 UML DIAGRAMS:
Unified Modeling Language: The Unified Modeling Language is a third-generation method for specifying,visualizing, and documenting the artifacts of an object-oriented system under development. The Unified Modeling Language represents the unification of the Booch, Objectory, and Ivar Jacobson methods and is their direct and upwardly compatible to any type. Conceptual as well as executable artifacts: To address the issues of scale inherent successor. We can model just about any type of application, running on any type and combination of hardware, operating system, programming language, and network, in UML. Its flexibility lets us model distributed applications that use just about any middleware on the market. As unification began, it established four goals to bound efforts: To model systems (and not just software) using object-oriented concepts. To establish an explicit coupling to conceptual as well as executable artifacts. To address the issues of scale inherent in complex, mission-critical systems. To create a method usable by both humans and machines.

It's architecture-driven, and it's incremental and iterative. UML diagrams are classified as: Structural diagrams: These include Class, Object, Component and Deployment Diagrams.

17

Behavior diagrams: These include Use Case, Sequence, Activity and Collaboration.

5.2 Class Diagram:

Fig 5.1 Class diagram Description: The above class diagram has 4 different classes namely admin, emp1, emp2 and emp3. Admin class consists of operations applyFeatureExtraction operation is used to extract features of scanned image. View Details operation is used to know the details of employee. addEmp inorder to add employee to database.

Employee class consists of attributes and operations Emp Name which is the name of employee.
18

Emp No which is the number of employee. View Details operation is used to display the details of employee.

5.3 Sequence diagram:

Fig 5.2 Sequence diagram of PVT Description: The above sequence diagram has different objects like employee, Image scanner, Admin, Palm vein matching and database. An employee first rests his wrist on Image scanner. The still image captured by the camera, which photographs in the near-infrared range, appears as a black network, reflecting the palm's vein pattern against the lighter background of the palm. An individual's palm vein image is converted by algorithms into data points, which is then stored in database.The newly captured image is likewise processed and compared to the registered one by using palm vein matching. Numbers and positions of veins and their crossing points are all compared and depending on verification, the person is either granted or denied access.

19

5.4 Collaboration diagram:

Fig 5.3 Collaboration diagram of PVT Description: The above collaboration diagram consists of different objects like employee, Image scanner, admin, palm vein matching and database. An employee first rests his wrist on Image scanner. The still image captured by the camera, which photographs in the near-infrared range, appears as a black network, reflecting the palm's vein pattern against the lighter background of the palm. An individual's palm vein image is converted by algorithms into data points, which is then stored in database. The newly captured image is likewise processed and compared to the registered one by using palm vein matching. Numbers and positions of veins and their crossing points are all compared and depending on verification, the person is either granted or denied access.

20

5.5 Use case Diagram:

Fig 5.4 Use case diagram of PVT Description: The above use case diagram has two actors namely admin and employee. The use cases used in the above use case diagram are o o o o o o FeatureExtraction which is used to extract features of scanned image. View Details which is used to know the details of employee. AddEmp is used to add employee to database. Upadte database is used to update details of employee. Apply matching usecase is used to verify the scanned image is same as stored image. Image scanner is used to capture vascular pattern of employee.

21

22

You might also like