Finger vein authentication technology and financial applications

Size: px
Start display at page:

Download "Finger vein authentication technology and financial applications"

Transcription

1 1 Finger vein authentication technology and financial applications Mitsutoshi Himaga 1 and Katsuhiro Kou R&D Division, Hitachi-Omron Terminal Solutions, Corp., Owari-asahi, Aichi, Japan. [email protected] Terminal Systems Group, Hitachi-Omron Terminal Solutions, Corp., Shinagawa-ku, Tokyo, Japan. [email protected] 1 Introduction 1.1 What is finger vein? Vascular network patterns are unique biometric feature that are robust against temporal and environmental changes. Researchers at Hitachi Central Research Laboratory started the fundamental research of finger vein biometrics for personal identification in mid 90 s and revealed that the biometric feature was extremely competitive (Kono, Ueki, and Umemura 2000). From medical point of view, the following features of finger vein are known: 1) Universality Arteries and veins are vital organ that supply and circulate sufficient oxygen and nutrition to finger and other part of human body. It is well-known anatomical and clinical fact that veins of mm diameter exist in every finger of healthy individuals. 2) Uniqueness Embryology proves that blood vessel paths are generated by probabilistic factors such as tissue hypoxia (low-oxygen condition). The influence of inherited factors are almost ignorable in the peripheral and it is reasonable to regard finger vein patterns as individually unique feature. 3) Permanency

2 2 Fundamental blood vessel network is formed before birth. The vascular patterns, whose diameter is mm, are then kept stable by tight interfaces of endothelial cells forming blood vessels and other cells exist in the neighbouring area. Blood vessel patterns of this thickness are supported by constant blood flow and do not disappear by age-related factor. Neovascularisation is, in principle, only caused by pathological conditions such as cancer or arteriosclerosis and does not occur to healthy tissue. 1.2 Why finger vein? Unlike other conventional biometric features such as fingerprint or hand geometry, finger vein patterns do not leave any traces or information that can be used to duplicate the biometric data. As finger veins exist beneath human being s skin, they are completely hidden and unexposed even during the authentication process. It is, therefore, impossible to steal or copy the biometric patterns by photography or video recording, which makes it extremely difficult to duplicate the biometric data. Yet another advantage of using finger vein is its flexibility. Most finger vein devices are designed to accept four to six fingers per person (i.e. index, middle and ring fingers of both hands), which means this biometric feature can be applied for far more people than other modalities that have less samples per person. This feature is even more important if the biometric data should be duplicated by some unknown method. Unlike PIN number, biometric features including finger vein cannot be changed for life. However, as long as finger vein biometrics concerns, the enrolled pattern can be replaced up to six times (!) The compactness of finger vein biometric features is also an important advantage. Finger vein biometric systems can be easily implemented and embedded into small spaces such as computer mice, telephone handsets or even door handles, by which users can obtain authorisation of the devices without paying any special attention. 2 System overview 2.1 Introduction In this section, a typical hardware architecture of finger vein authentication system and its related technologies are described by taking an example of one of the most successful commercial products. The finger vein authentication device illustrated here is Hitachi-Omron Terminal Solutions Model TS-E3F1 UB Reader series, the world s first finger vein authentication device widely applied for banking use.

3 3 Fig.1 shows the exterior of TS-E3F1. This compact device is designed to be used as a part of larger system such as ATMs or door access control. For that reason, it does not have a keypad or any other similar devices for ID number input. TS-E3F1 has instead an interface port on its back (USB1.1 or RS-232C, depending on the model), so that an external computer can control the device. The communication between TS-E3F1 and the controller and is fully encrypted and only one authorized computer is permitted to connect to the FV device at a time for even higher security. The grey and black part is the Fig. 1. Finger vein authentication device UB Reader optical unit on which users are to place an enrolled finger to be authenticated. A large World s first finger vein authentication device introduced for banking. multi-colour LED indicator is embedded on the optical unit to show the status of the device. The detail specifications of TS-E3F1 series can be found at (Hitachi-Omron 2006). 2.2 Hardware architecture TS-E3F1 is comprised of four major parts, namely an optical unit, CPU, SD-RAM, Flash memory and a communication interface (Fig. 2). The finger vein device is connected to a control unit such as PC by either RS-232C or USB interface and controlled by the commands sent through the interface. The commands are received by the communication LSI and processed by the firmware stored on the Flash memory and the SD-RAM. Up to 1,000 finger vein templates can be stored in the Flash memory. The optical unit has a pair of infrared LEDs aligned on both sides above the CCD camera as shown in Fig.3. The light intensity of LEDs is adaptively controlled in order to capture images optimised for finger vein pattern extraction. The hardware specifications of TS-E3F1 are shown in Table 1.

4 4 RS-232C / USB Optical Unit (Camera + IR LEDs) Control unit (e.g. PCs or custom controllers) Communication LSI CPU (HITACHI SH-4) SD-RAM Flash Memory Fig. 2. Block diagram of TS-E3F1 Table 1 Hardware specifications of TS-E3F1 Interface USB1.1 or RS-232C OS Windows NT4.0/2000/XP (USB not supported by NT4.0) Dimensions 75 x 157 x 48 (mm) (WxDxH) Weight Approx. 0.2 (kg) Power DC12V Fig. 3. Infrared LED illumination LEDs are coloured in this picture for visualisation.

5 5 2.3 Image capturing technology Finger vein patterns are extracted by utilizing the optical characteristics of blood, or more precisely, haemoglobin. Blood flowing in veins contains deoxidised haemoglobin, which absorbs near infrared light. Since blood vessel walls are almost transparent in the range of infrared light wavelength, rays of infrared light incident on the blood vessel are not reflected but absorbed by the haemoglobin flowing inside, which results in dark network vein patterns. The optical unit of finger vein authentication device is equipped with a pair of aligned LEDs placed on both sides of the finger, which supplies infrared illuminations while capturing the finger vein pattern. The wavelength of infrared light is carefully selected by evaluation so that the contrast between the veins and the background is maximised. The infrared rays emitted from the LEDs penetrate through the finger and reach the CCD camera unit embedded beneath the tinted acrylic cover under the finger, where the raw infrared images are generated (Fig 4). LEDs Acrylic cover LEDs Veins Camera unit Fig. 4. Finger vein imaging The raw infrared images themselves are, however, not suitable for biometric base images as the contrast is not homogeneous across the field of view. Fig 5 shows a pair of raw infrared images of an identical finger. Image (a) was captured by using the illumination such that the lefthand side LEDs are brighter than the right-hand LEDs. Image (b) was captured by using the illumination of the opposite settings. As illustrated, some parts of the finger are too bright and saturated whilst (a) (b) Fig. 5. Infrared images of finger vein patterns The upper side of these images corresponds to the left-hand side of finger. Veins can be seen in the finger as a dark network patterns. others are too dark to locate veins. As the quality of finger vein patterns largely affect to the accuracy and the reliability of the entire authentication system, the LED

6 6 illumination control is very important and one of the key technologies used in the FV systems. It is noted that the near infrared illumination used by Hitachi s finger vein system is completely safe for human beings and animals as the intensity of the light is no more than one part per million of the natural near infrared rays contained in sunlight. Additionally, arteries are not imaged by this device as they are laying in deeper part of finger and have much less deoxidised haemoglobin. 2.4 Typical implementations Fig. 6 shows two of the most popular implementations of finger vein authentication system. The first one is a smart card system, in which user s biometric templates are encrypted and stored in a smart card that is owned by the user. In this architecture, neither a large-scale biometric database nor data security measures to protect the database are required and, consequently, the system maintenance costs are typically low. Since smart cards are equipped with a processor inside, it is possible to use it to execute matching processes on the card. This approach is very safe because biometric templates are always in the secured area on the smart card and never loaded out to the system. This method is known as match-on-card technology and regarded as one of the most protected Fig. 6. Two typical implementations of FVsystem for financial use

7 7 authentication procedure to date. The match-on-card technology is increasingly popular and employed for high security systems such as banks. The second one is a server system, which is relatively complicated than the smart card system. Users biometric templates are stored in a data storage system, typically located in a remote processing centre. Users are normally required to input an ID code by keypad or swiping a magnetic card so that the system can identify the user and retrieve the user s biometric templates from the server. The matching processes can be executed at the remote server, terminal computers or anywhere depending on the system requirement. In the case of TS-E3F1, however, all matching and image processing algorithms are executed inside the hardware itself for higher security. Although the data maintenance costs tend to be higher than the smart card systems, the initial cost can be suppressed by employing this framework especially when the biometrics is introduced as an additional security for an existing magnetic card system. This framework is also preferred in case 1:N matching is required for a relatively small system of a limited number of users. In both systems, typically two or more fingers per person are enrolled in preparation for troubles such as injury. In order to exclude frauds and to guarantee the quality of template data, it is very important to have a trusted administrator attended during the enrolment process. The features of both systems are compared and summarised in Table 2. Matching process Biometric data management Security measures Templates Table 2 System comparison Smartcard system match-on-card or intradevice matching End-users are responsible for their own biometric template stored on smartcard. Security measures for lost cards are necessary: Bio template encryption Card R/W validation Template must be re-written when issuing a new card. Server system Intra-device matching System administrator is responsible for the users biometric templates stored on server. Security measures for bio database at server are necessary: Network security Database encryption No template needs to be written on card.

8 8 3 Matching algorithm 3.1 Introduction In general, the preferable characteristics for a matching algorithm are as follows. - Extremely low FAR - Reasonable FRR - Practical processing time In the real world, however, the performance requirements are largely dependent on the system applied and the following features may also need to be considered in practical use. - Configurable FAR/FRR - Robust security measures such as encryption The FAR/FRR are typically configured by the threshold value to determine the acceptable similarity scores. It is well known that these two performance indices have a trade-off relationship and the threshold value configuration is one of the most sensitive and critical factors to characterise the identification system s behaviour. 3.2 Pattern Extraction The infrared images captured by the optical unit (see section 2.3) are firstly given to the pattern extraction algorithm before matching. The pattern extraction algorithm locates finger veins appear in the infrared images and converts the infrared images from 256-level greyscale to three-level image. In the conversion process, the intensity values of all pixels in the input 256-level images are re-assigned by the following rules. 0, if the pixel of interest belongs to the background I(x,y) = 2, if the pixel of interest belongs to finger vein (1) 1, otherwise where I(x,y) is the intensity value of the pixel at (x,y). More intuitively, pixels most likely to be a part of finger veins are assigned to be white and those likely to be the background are assigned to be black. Grey is assigned to all other pixels, which are literally classified as grey area. These three-level images are tested by the feasibility checking logic and only those passed the check-

9 9 ing are used as valid templates or samples in the next matching algorithm. In the actual implementation, the enrolment process is typically repeated several times in order to reduce false enrolment due to poor image contrast and to obtain the most representative vein pattern of the finger. Fig.7 shows an input greyscale image and its corresponding threelevel image. Fig. 7. Finger vein pattern extraction 3.3 Matching algorithm The matching algorithm is rather simple. The similarity of the template and the input pattern is evaluated by the distance. The distance is calculated based on the number of pixels of the same intensity value at the corresponding coordinate on each of the three-level images. In order to calculate the distance precisely, image segmentation and registration techniques are carefully applied in both software and hardware approach. The details of the matching algorithm employed for TS-E3F1 is, however, not to be disclosed for security reason. For relevant matching technology, please refer (Miura, Nagasaka, and Miyatake 2003) and (Miura, Nagasaka, and Miyatake 2004) 4 Performance evaluations 4.1 Introduction In order to evaluate and compare the performances of biometric systems, it is extremely important to employ a widely recognised, objective methodology. Hitachi- Omron s TS-E3F1 was tested and evaluated based on two different evaluation standards, namely, JIS TR X0079 and INCITS JIS TR X0079 is a performance evaluation guideline titled Evaluation Method for Accuracy of Vein Authentication Systems defined by Japan Industrial Standard in 2003, which is especially designed for vascular biometric systems. JIS TR X0079 is mainly focuses on the accuracy of the identification systems and the performances are evaluated in terms of FAR and FRR at a fixed threshold configuration. INCITS is a scenario testing and reporting standard for biometric performance evaluations defined by the American

10 10 National Standards Institute (ANSI) in The ANSI compliant scenario testing for TS-E3F1 was conducted by a third-party testing organisation the International Biometric Group, LLC [ as a part of its public biometric system testing programme called Comparative Biometric Testing Evaluation based on JIS-TR X0079 (a) Evaluation method In compliant with JIS TR X0079, FAR and FRR were calculated at a fixed threshold value using an adequately large number of samples. FRR was calculated based on on-line genuine attempts. Subjects are to present each finger until either the finger is accepted as a genuine attempt or rejected by time-out. The attempt duration was set to five seconds, which is a typical configuration for the commercial use of this device. The FV device captures images at a frame rate of approximately 100 ms and evaluates the distance (or similarity, in other words) between each frame and its enrolled template at real time. The device stops image capturing as soon as the distance becomes lower than the preset threshold value and gives a message authenticated to the test subject. If the distance does not become lower than the threshold value within the attempt duration of five seconds, the attempt is regarded as rejection, i.e. false rejection. FAR was, on the other hand, calculated by an off-line batch process. The templates and samples obtained in the genuine attempts were used for the batch process. FAR was computed by matching all combinations of the templates and samples except one genuine combination and counting the number of falsely accepted cases. (b) Evaluation samples Samples are collected from a population of office workers in Japan from October to December in Four fingers per subject are used for the evaluation, e.g. index and middle fingers of both hands. Each test subject presents a finger for 10 times. The number of test subjects was 2,673 and the number of tested genuine attempts was 2,673 subjects * 4 fingers * 10 times = 106,920. (2) The number of impostor attempts was (2,473 subjects * 4 fingers) * (2,673 subjects * 4 fingers -1) * 10 = 1,143,081,720. (3) (c) Results

11 11 There was no false rejection in 106,920 genuine attempts and a very small number of false acceptances in 1,143,081,720 impostor attempts at the device s default threshold value. FAR was less than % and FRR was %. 4.3 Third-party evaluation by International Biometric Group (a) Testing organisation International Biometric Group, LLC (New York, USA) conducts a third-party objective evaluation tests called Comparative Biometric Testing approximately once a year since CBT is one of the most reliable and influential third-party testing programmes specialised in biometric systems. The evaluated modalities in the past CBTs include finger print, iris, face, voice, hand geometry, key strokes and signature biometrics and more than 50 biometric systems from the world were tested so far. The CBT reports are distributed to thousands of commercial and governmental organisations throughout the world and provide them useful information. The CBT methodology is compliant with ANSI INCITS and the performance tests are conducted independently from participating biometrics vendors. CBT is a scenario testing that is designed in compliant with ISO/IEC JTC1 SC : Testing Methodologies for technology and Scenario Evaluation. (b) Evaluation method In CBT programme, biometric systems are evaluated in both usability and accuracy. The usability was assessed in terms of failure to enrol rates (FTE), failure to acquire rates (FTA), and transaction duration. The FTE and FTA represent the system s ability to successfully enrol or acquire biometric features from test subjects, which is important especially when the system is to be applied to a large population. Transaction duration was measured for both enrolment and matching process and includes not only the hardware s processing time but also the time test subjects spent to operate the system. The accuracy was assessed in terms of match rates, namely, False Match Rate (FMR) and False Non-Match Rate (FNMR). Since FMR and FNMR have a trade-off relationship that are determined by the given threshold value, the system s overall characteristics were evaluated by Detection Error Trade-off curves, or DET (Martin, Doddington, Kamm, Ordowski, and Przybocki 1997).

12 12 Unlike FAR or FRR, samples failed to capture were excluded from the FMR and FNMR calculation. FAR and FRR are given by the equations below: FAR = FMR * (1-FTA) (4) FRR = FTA + FNMR * (1-FTA) (5) (c) Evaluation samples Two templates were created per test subject by scanning the right index finger and the right middle finger during the enrolment process. The matching samples were collected in a form of streaming image volume. One streaming image volume contains 50 frames of biometric feature, which corresponds to a five-second presentation of finger in the real-time implementation. In order to emulate real world applications such as ATMs, the streaming image volumes are captured on transaction basis. Three streaming volumes are created per transaction and three transactions per finger were executed. Total of nine streaming image volumes were collected per finger as matching sample data. 650 test subjects are publicly recruited from the residents of New York City and its neighbouring area. The test subject population has a variety of ethnicity and wide range of age. The statistics profile of the test subject population is shown in Fig. 8 (a) (c). (a) (b) (d) Usability results Table XX shows the usability results. Levels are rated by IBG according to its original rating criteria, where level 4 is the best and level 1 is the poorest. (c) Fig. 8. Statistics profile of test subject population

13 13 Table 3 Usability evaluation results Usability index Result Level Failure to Enrol Rate (FTE) 0.08% Level 4 Median Enrolment Transaction Duration (seconds) 33.3 Level 3 Transactional Failure to Acquire Rate (T-FTA) 0.06% Level 4 Median Recognition Attempt Duration (seconds) 1.23 Level 4 (e) Accuracy results The attempt-level and transactional DET curves are shown in Fig. 9. FMR and FNMR values are plotted over various threshold values. The closer a DET plot is to the origin (i.e. the bottom-left corner), the more preferable configuration of the threshold. Please note that both the horizontal and vertical axes are in logarithmic scale, where 1.00E+00 corresponds to 100%. Detection Error Tradeoff Curves 1.00E+00 Attempt level Transactional False Non-Match Rate (FNMR) 1.00E E E E E E E E E E E+00 False Match Rate (FMR) Fig. 9. Detection Error Tradeoff Curves of TS-E3F1

14 Evaluation summary The usability performance of TS-E3F1 was one of the best results ever marked in the history of CBT; three out of four indices marked the highest ratings Level 4 and one index rated as Level 3 was very close to Level 4. This proves that finger vein systems are quicker and more widely applicable than other modalities. As for the accuracy, TS-E3F1 once again demonstrated very competitive performance. FAR/FRR results in the JIS compliant evaluation was one of the best performances among many biometric systems. The CBT results were, on the other hand, not as good as JIS results despite of its stable performance over various threshold values. The possible reasons for this difference are as follows: (a) Non-interactive sample data collection: In CBT, sample streaming images are simply recorded without matching, which may have caused for some fingers to be kept in a wrong position. This may result in higher False Non-Match Rate. (b) Differences in user instruction: A printed instruction and minimum guidance by IBG staff were provided during CBT data collection, whilst skilled engineers gave detailed instructions for test subjects in JIS evaluation. Both of the performance evaluations are carefully designed and strictly compliant with their relevant standards as described earlier in this section. Although the results of these two evaluations are not directly comparable, evaluations based on these publicly-recognized standards are extremely informative and useful when choosing a biometric system from a variety of modalities. For further information of CBT round 6, refer (IBG 2006).

15 15 5 Applications in financial sector 5.1 Background of Biometrics Implication (a) Social problem of illegal withdrawal using counterfeit or stolen cash cards In Japan, the number of illegal withdrawal cases from ATM using counterfeit or stolen cash cards are rapidly increasing and it has been an object of public concern. The total amount of withdrawals using counterfeit or stolen cash cards from ATMs in Japan was reported to be as much as 19million US dollars in Those who lost a fortune by illegal withdrawals claim that banks are to blame for not taking sufficient precautions against this sort of frauds and the scope of legal responsibility has been actively discussed. (b) Government policy In reaction to these trends of public opinion, Japanese government embarked on a tougher new policy against illegal withdrawal. On 10th of February 2006, the Law concerning the Protection of Depositors from Illicit Deposit Withdrawals Using Counterfeit/Stolen Cash Cards through ATMs (so-called the Depositor Protection Law) went into effect aiming to prevent this sort of crimes. This law clearly defines the scope of legal responsibilities of financial institutions and account holders and requests financial institutions to compensate for the damage if the account holder is proven free from fault and innocent for the illegal withdrawal. (c) Financial institutions responses Financial institutions responses may be categorised into the following three measures. PIN code renewal (normally four digits) Introduction of smart cards Introduction of biometrics It is well known that some people are using their birthday or telephone numbers as PIN, which makes swindlers job easy. If a cash card was stolen together with a driving license for example, it is easy for the fraudster to obtain the genuine PIN code within a small number of trials and errors. For this reason, almost all financial institutions encourage their account holders to change PIN codes frequently.

16 16 Introduction of smart card and biometrics is relatively a new movement among financial institutions in Japan. The trend is, however, rapidly spreading nationwide and forming the mainstream of financial security measure. 5.2 Introduction of biometric systems (a) Biometric modalities Currently, there are two biometrics modalities adopted for ATM application in Japan. Finger vein authentication systems Palm vein authentication systems (b) Current situation of finger vein authentication in Japan As of the end of September 2006, 42 users in financial sector adopted finger vein authentication system in Japan. Among them are Japan Post and three out of four Japanese mega banks. More than 10,000 finger vein authentication equipments had been installed at ATMs (Fig.10), and over 30,000 finger vein enrolment equipments (Fig.11) had been set up at teller s windows of financial institutions by the end of September Fig. 11. Finger vein enrolment device Fig. 10. Automated teller machine with FV device The world s first ATM equipped with finger vein biometrics AK-1 was released in 2004 and approximately 30,000 units are working in Japan as of November A smartcard reader/writer is attached to an FV device. Encrypted finger vein biometric data is securely recorded onto a smart card on site so that it can be issued to end users straightforwardly.

17 17 5 Conclusion and future plan Hitachi-Omron s TS-E3F1 is the first finger vein identification device tested by an internationally recognised third-party organization. The objective evaluations proved that finger vein identification technology is extremely competitive and superior in many aspects to other conventional biometric modalities in terms of both usability and accuracy. By taking advantage of the compactness of finger vein biometrics, even smaller hardware units are being developed. The compact FV module shown in Fig. 12 is as small as mobile phone (69mm(W)*85mm(D)*43mm(H)) and equipped with everything necessary for personal identification. Since all identification processes are executed in this small module, no powerful CPU or large memory is required for the control unit; virtually any processor can drive this module. Fig. 12. Finger vein authentication module One of the unique applications of this module is a key management system shown in Fig.13. As shown in Fig.13, the key management system has a keypad by which users input IDs before presenting their enrolled finger to the compact FV device installed below. The system allows the authenticated users to loan keys and records the status of key along with the user s information. Even smaller units are now being developed and some epoch-making prototype systems are proposed (Fig.14). This miniature implementation of FV system further enhances the scope of application and brings new concepts to conventional systems. Fig. 13. Key management system (a) (b) Fig. 14. Applications for automobiles (a) Keyless engine starter (b) Door handle with FV system. Only enrolled people are entitled to use the car. Users are required to type an ID number and place a finger to obtain a key to a restricted area / resources.

18 18 6 Acknowledgments Authors thank Prof Yoichi Seto at AIIT for his support, Dr Takafumi Miyatake, Dr Akio Nagasaka and Mr Naoto Miura at Hitachi Central Research Laboratory for providing technical information, Hitachi-Omron Terminal Solutions, Corp. for providing product information, photographs and evaluation data. References Kono, M., Ueki, H., and Umemura, S. (2000) A new method for the identification of individuals by using of vein pattern matching of a finger, Proceedings of the Fifth Symposium on Pattern Measurement, pp.9-12 (in Japanese) Miura, N., Nagasaka, A., and Miyatake, T. (2004) Feature Extraction of finger-vein patterns based on repeated line tracking and its Application to Personal Identification, Machine Vision and Applications, IAPR, Vol. 15, No. 4, pp Miura, N., Nagasaka, A., and Miyatake, T. (2003) Feature Extraction of Finger Vein Patterns Based on Iterative Line Tracking and Its Application to Personal Identification, IEICE transactions Vol.J86-D-II, No.5, pp (in Japanese) Hitachi-Omron Terminal Solutions, Corp.(2006) URL. Martin, A., Doddington G., Kamm T., Ordowski M. and Przybocki M.(1997) The DET Curve in Assessment of Detection Task Performance, Proceedings of the 5th European Conference on Speech Communication and Technology, vol. 4, pp IBG (2006) Comparative Biometric Testing Round 6 Public Report. International Biometric Group, LLC. New York.

May 2010. For other information please contact:

May 2010. For other information please contact: access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: [email protected] www.bsia.co.uk Form No. 181.

More information

Biometric Authentication Platform for a Safe, Secure, and Convenient Society

Biometric Authentication Platform for a Safe, Secure, and Convenient Society 472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.

More information

White paper Fujitsu Identity Management and PalmSecure

White paper Fujitsu Identity Management and PalmSecure White paper Fujitsu Identity Management and PalmSecure To protect your business, it s critical that you can control who accesses your data, systems and premises. Today, many organizations rely on passwords

More information

ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY

ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

Trends in Finger Vein Authentication and Deployment in Europe

Trends in Finger Vein Authentication and Deployment in Europe Hitachi Review Vol. 64 (2015), No. 5 275 Featured Articles Trends in Finger Vein Authentication and Deployment in Europe Yuji Nakamaru Makiko Oshina Shuichi Murakami Ben Edgington Ravi Ahluwalia OVERVIEW:

More information

Framework for Biometric Enabled Unified Core Banking

Framework for Biometric Enabled Unified Core Banking Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty

More information

Development of Attendance Management System using Biometrics.

Development of Attendance Management System using Biometrics. Development of Attendance Management System using Biometrics. O. Shoewu, Ph.D. 1,2* and O.A. Idowu, B.Sc. 1 1 Department of Electronic and Computer Engineering, Lagos State University, Epe Campus, Nigeria.

More information

Biometrics in Physical Access Control Issues, Status and Trends White Paper

Biometrics in Physical Access Control Issues, Status and Trends White Paper Biometrics in Physical Access Control Issues, Status and Trends White Paper Authored and Presented by: Bill Spence, Recognition Systems, Inc. SIA Biometrics Industry Group Vice-Chair & SIA Biometrics Industry

More information

This method looks at the patterns found on a fingertip. Patterns are made by the lines on the tip of the finger.

This method looks at the patterns found on a fingertip. Patterns are made by the lines on the tip of the finger. According to the SysAdmin, Audit, Network, Security Institute (SANS), authentication problems are among the top twenty critical Internet security vulnerabilities. These problems arise from the use of basic

More information

Advanced Authentication

Advanced Authentication White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is

More information

Fingerprint Based Biometric Attendance System

Fingerprint Based Biometric Attendance System Fingerprint Based Biometric Attendance System Team Members Vaibhav Shukla Ali Kazmi Amit Waghmare Ravi Ranka Email Id [email protected] [email protected] Contact Numbers 8097031667 9167689265

More information

Published International Standards Developed by ISO/IEC JTC 1/SC 37 - Biometrics

Published International Standards Developed by ISO/IEC JTC 1/SC 37 - Biometrics Published International Standards Developed by ISO/IEC JTC 1/SC 37 - Biometrics Revised October 25, 2007 These standards can be obtained (for a fee) at ANSI s estandards Store: http://webstore.ansi.org/

More information

Voice Authentication for ATM Security

Voice Authentication for ATM Security Voice Authentication for ATM Security Rahul R. Sharma Department of Computer Engineering Fr. CRIT, Vashi Navi Mumbai, India [email protected] Abstract: Voice authentication system captures the

More information

De-duplication The Complexity in the Unique ID context

De-duplication The Complexity in the Unique ID context De-duplication The Complexity in the Unique ID context 1. Introduction Citizens in India depend on the Government for various services at various stages of the human lifecycle. These services include issuance

More information

Accessing the bank account without card and password in ATM using biometric technology

Accessing the bank account without card and password in ATM using biometric technology Accessing the bank account without card and password in ATM using biometric technology Mini Agarwal [1] and Lavesh Agarwal [2] Teerthankar Mahaveer University Email: [email protected] [1], [email protected]

More information

PHOTOGRAMMETRIC TECHNIQUES FOR MEASUREMENTS IN WOODWORKING INDUSTRY

PHOTOGRAMMETRIC TECHNIQUES FOR MEASUREMENTS IN WOODWORKING INDUSTRY PHOTOGRAMMETRIC TECHNIQUES FOR MEASUREMENTS IN WOODWORKING INDUSTRY V. Knyaz a, *, Yu. Visilter, S. Zheltov a State Research Institute for Aviation System (GosNIIAS), 7, Victorenko str., Moscow, Russia

More information

Biometric Performance Testing Methodology Standards. Michael Thieme, Vice President IBG, A Novetta Solutions Company

Biometric Performance Testing Methodology Standards. Michael Thieme, Vice President IBG, A Novetta Solutions Company Biometric Performance Testing Methodology Standards Michael Thieme, Vice President IBG, A Novetta Solutions Company Overview Published standards In-development ISO/IEC standards Scope and status 2 Published

More information

Global Deployment of Finger Vein Authentication

Global Deployment of Finger Vein Authentication Global Deployment of Finger Vein Authentication Hitachi Review Vol. 61 (2012), No. 1 35 Yutaka Matsui Akihito Sawada Shigenori Kaneko Yuji Nakamaru Ravi Ahluwalia Dipak Kumar OVERVIEW: Finger vein authentication

More information

Ozbytes Design Biometric Fingerprint Time and Attendance and Access Control Unit Item Code: OZD-ABC-AV100

Ozbytes Design Biometric Fingerprint Time and Attendance and Access Control Unit Item Code: OZD-ABC-AV100 Biometric Fingerprint Time and Attendance and Access Control Unit Item Code: OZD-ABC-AV100 The OZD-ABC-AV100 Biometric Fingerprint Time and Attendance and Access Control Unit is a Professional Time and

More information

Data Security 2. Implement Network Controls

Data Security 2. Implement Network Controls UNIT 19 Data Security 2 STARTER Consider these examples of computer disasters. How could you prevent them or limit their effects? Compare answers within your group. 1 You open an email attachment which

More information

22 nd NISS Conference

22 nd NISS Conference 22 nd NISS Conference Submission: Topic: Keywords: Author: Organization: Tutorial BIOMETRICS - DEVELOPING THE ARCHITECTURE, API, ENCRYPTION AND SECURITY. INSTALLING & INTEGRATING BIOMETRIC SYSTEMS INTO

More information

Hitachi to Expand Finger Vein Authentication System Business on a Global Basis

Hitachi to Expand Finger Vein Authentication System Business on a Global Basis FOR IMMEDIATE RELEASE Hitachi to Expand Finger Vein Authentication System Business on a Global Basis Establishes Organizations to Promote Business in North America, Europe, China and Asia, Aspires for

More information

Intelligent Home Automation and Security System

Intelligent Home Automation and Security System Intelligent Home Automation and Security System Ms. Radhamani N Department of Electronics and communication, VVIET, Mysore, India ABSTRACT: In todays scenario safer home security is required, As the technology

More information

Keywords: fingerprints, attendance, enrollment, authentication, identification

Keywords: fingerprints, attendance, enrollment, authentication, identification Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com 94 POS Terminal

More information

PalmSecureID for the EDUCATION MARKETPLACE

PalmSecureID for the EDUCATION MARKETPLACE PalmSecureID for the EDUCATION MARKETPLACE with Student Identity Integrity With the continued effort to increase efficiencies in the world of education, PalmSecureID can be utilized in a variety of settings

More information

Biometrics and Cyber Security

Biometrics and Cyber Security Biometrics and Cyber Security Key Considerations in Protecting Critical Infrastructure Now and In The Future Conor White, Chief Technology Officer, Daon Copyright Daon, 2009 1 Why is Cyber Security Important

More information

ATM Transaction Security Using Fingerprint/OTP

ATM Transaction Security Using Fingerprint/OTP ATM Transaction Security Using Fingerprint/OTP 1 Krishna Nand Pandey, 2 Md. Masoom, 3 Supriya Kumari, 4 Preeti Dhiman 1,2,3,4 Electronics & Instrumentation Engineering, Galgotias College of Engineering

More information

Explaining Ellipse I 2 PL

Explaining Ellipse I 2 PL Explaining Ellipse I 2 PL CLINICALLY PROVEN SAFE AND EFFECTIVE Ellipse I 2 PL stands for Ellipse secondgeneration Intense Pulsed Light The Ellipse I 2 PL system is used for the treatment of a wide range

More information

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative

More information

Moving to Multi-factor Authentication. Kevin Unthank

Moving to Multi-factor Authentication. Kevin Unthank Moving to Multi-factor Authentication Kevin Unthank What is Authentication 3 steps of Access Control Identification: The entity makes claim to a particular Identity Authentication: The entity proves that

More information

FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM

FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,

More information

GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES

GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES ATM SECURITY IMPROVEMENT USING FINGER PRINT Neelam Verma 1, Rakesh Patel 2, Priya Bag 3 Student,B.E.(IT) Kirodimal Institute of Technology,Raigarh(C.G.),India

More information

Smart Card Security How Can We Be So Sure?

Smart Card Security How Can We Be So Sure? Smart Card Security How Can We Be So Sure? Ernst Bovelander TNO Centre for Evaluation of Instrumentation and Security Techniques PO Box 5013 2600 GA Delft, The Netherlands [email protected] 1. Introduction

More information

SNC-VL10P Video Network Camera

SNC-VL10P Video Network Camera SNC-VL10P Video Network Camera CHANGING THE WAY BUSINESS 2AM. WATCHING HIS NEW PRODUCTION LINE. 10,000 MILES AWAY. COMMUNICATES www.sonybiz.net/netstation CORPORATE COMMUNICATIONS SURVEILLANCE VIDEOCONFERENCING

More information

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management

More information

Traceable Physical Security Systems for a Safe and Secure Society

Traceable Physical Security Systems for a Safe and Secure Society Hitachi Review Vol. 63 (2014), No. 5 254 Featured Articles Traceable Physical Security Systems for a Safe and Secure Society Tatsuhiko Kagehiro, Ph.D. Kenichi Yoneji Harumi Kiyomizu Yuki Watanabe, Dr.

More information

Smart Cards for Payment Systems

Smart Cards for Payment Systems White Paper Smart Cards for Payment Systems An Introductory Paper describing how Thales e-security can help banks migrate to Smart Card Technology Background In this paper: Background 1 The Solution 2

More information

ATM FRAUD AND COUNTER MEASURES

ATM FRAUD AND COUNTER MEASURES ATM FRAUD AND COUNTER MEASURES GENESIS OF ATMs An automated teller machine was first introduced in 1960 by City Bank of New York on a trial basis. The concept of this machine was for customers to pay utility

More information

Signature Verification Why xyzmo offers the leading solution.

Signature Verification Why xyzmo offers the leading solution. Dynamic (Biometric) Signature Verification The signature is the last remnant of the hand-written document in a digital world, and is considered an acceptable and trustworthy means of authenticating all

More information

A New Imaging System with a Stand-type Image Scanner Blinkscan BS20

A New Imaging System with a Stand-type Image Scanner Blinkscan BS20 A New Imaging System with a Stand-type Image Scanner Blinkscan BS20 21 A New Imaging System with a Stand-type Image Scanner Blinkscan BS20 Tetsuro Kiyomatsu Yoshiharu Konishi Kenji Sugiyama Tetsuya Hori

More information

solutions Biometrics integration

solutions Biometrics integration Biometrics integration Challenges Demanding access control and identity authentication requirements drive the need for biometrics. Regulations such as Sarbanes-Oxley (SOX), Health Insurance Portability

More information

Prof. Dr. M. H. Assal

Prof. Dr. M. H. Assal Prof. Dr. M. H. Assal AS 26/10/2014 Computer hardware is the collection of physical elements that comprise a computer system Computer hardware can be classified as following: o Input devices o Output devices

More information

HandPunch. Overview. Biometric Recognition. Installation. Is it safe?

HandPunch. Overview. Biometric Recognition. Installation. Is it safe? HandPunch Overview Biometric Recognition Installation This section describes the HandPunch series of biometric scanners from RSI (Recognition Systems). These instructions apply to all the different HandPunch

More information

Automatic Biometric Student Attendance System: A Case Study Christian Service University College

Automatic Biometric Student Attendance System: A Case Study Christian Service University College Automatic Biometric Student Attendance System: A Case Study Christian Service University College Dr Thomas Yeboah Dr Ing Edward Opoku-Mensah Mr Christopher Ayaaba Abilimi ABSTRACT In many tertiary institutions

More information

Full page passport/document reader Regula model 70X4M

Full page passport/document reader Regula model 70X4M Full page passport/document reader Regula model 70X4M Full page passport reader with no moving parts inside. Automatic reading and authenticity verification of passports, IDs, visas, driver s licenses

More information

Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means.

Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means. Definition Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means. Description Physiological biometrics is based

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 10 Authentication and Account Management Objectives Describe the three types of authentication credentials Explain what single sign-on

More information

Biometric Fingerprint Time and Attendance and Access Control Unit OZD-ABC-T60 Technical Specification Data Sheet. Ozbytes Design

Biometric Fingerprint Time and Attendance and Access Control Unit OZD-ABC-T60 Technical Specification Data Sheet. Ozbytes Design Biometric Fingerprint Time and Attendance and Access Control Unit Item Code: OZD-ABC-T60 The OZD-ABC-T60 Biometric Fingerprint Time and Attendance and Access Control Unit is a Professional Time and Attendance

More information

Efficient on-line Signature Verification System

Efficient on-line Signature Verification System International Journal of Engineering & Technology IJET-IJENS Vol:10 No:04 42 Efficient on-line Signature Verification System Dr. S.A Daramola 1 and Prof. T.S Ibiyemi 2 1 Department of Electrical and Information

More information

COMPUTER AND COMPUTERISED ACCOUNTING SYSTEM

COMPUTER AND COMPUTERISED ACCOUNTING SYSTEM MODULE - 2 Computer and Computerised Accounting System 12 COMPUTER AND COMPUTERISED ACCOUNTING SYSTEM With the expansion of business the number of transactions increased. The manual method of keeping and

More information

FINGERPRINT BASED STUDENT ATTENDANCE SYSTEM WITH SMS ALERT TO PARENTS

FINGERPRINT BASED STUDENT ATTENDANCE SYSTEM WITH SMS ALERT TO PARENTS FINGERPRINT BASED STUDENT ATTENDANCE SYSTEM WITH SMS ALERT TO PARENTS K.Jaikumar 1, M.Santhosh Kumar 2, S.Rajkumar 3, A.Sakthivel 4 1 Asst. Professor-ECE, P. A. College of Engineering and Technology 2

More information

Mobile Onboarding for Bank Customers, Including KYC, Biometrics and Payments

Mobile Onboarding for Bank Customers, Including KYC, Biometrics and Payments Mobile Onboarding for Bank Customers, Including KYC, Biometrics and Payments Executive Summary Modern Banks increasingly find the need to enable customers to sign up for Banking products without having

More information

User Guide. for Card Reader and Payment Application

User Guide. for Card Reader and Payment Application User Guide for Card Reader and Payment Application Introduction to Pogo> This document provides detailed information on how best to use the Pogo> application to benefit your business. The intention is

More information

Biometrics for payments. The use of biometrics in banking

Biometrics for payments. The use of biometrics in banking Biometrics for payments The use of biometrics in banking Biometrics for payments Biometrics for payments The use of biometrics in banking The use of biometrics for authentication is nothing new. But historically,

More information

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public

More information

Detecting Credit Card Fraud

Detecting Credit Card Fraud Case Study Detecting Credit Card Fraud Analysis of Behaviometrics in an online Payment environment Introduction BehavioSec have been conducting tests on Behaviometrics stemming from card payments within

More information

WHITE PAPER. Let s do BI (Biometric Identification)

WHITE PAPER. Let s do BI (Biometric Identification) WHITE PAPER Let s do BI (Biometric Identification) Fingerprint authentication makes life easier by doing away with PINs, passwords and hint questions and answers. Since each fingerprint is unique to an

More information

Development of Integrated Management System based on Mobile and Cloud service for preventing various dangerous situations

Development of Integrated Management System based on Mobile and Cloud service for preventing various dangerous situations Development of Integrated Management System based on Mobile and Cloud service for preventing various dangerous situations Ryu HyunKi, Moon ChangSoo, Yeo ChangSub, and Lee HaengSuk Abstract In this paper,

More information

Mouse Control using a Web Camera based on Colour Detection

Mouse Control using a Web Camera based on Colour Detection Mouse Control using a Web Camera based on Colour Detection Abhik Banerjee 1, Abhirup Ghosh 2, Koustuvmoni Bharadwaj 3, Hemanta Saikia 4 1, 2, 3, 4 Department of Electronics & Communication Engineering,

More information

Multimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems

Multimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems Multimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems Erik J Bowman Principal Technologist Advanced Technology Group 24 September 2009 Agenda Problem Statements Research

More information

NFC & Biometrics. Christophe Rosenberger

NFC & Biometrics. Christophe Rosenberger NFC & Biometrics Christophe Rosenberger OUTLINE GREYC - E-payment & Biometrics Contactless transactions Biometric authentication Solutions Perspectives 2 GREYC Research Lab Research Group in Computer science,

More information

Smart Card in Biometric Authentication

Smart Card in Biometric Authentication Smart Card in Biometric Authentication Željka Požgaj, Ph.D. Faculty of Economics and Business 10000 Zagreb, Trg. J.F. Kennedy-a 6 E-mail: [email protected] Ivor Đurinek, Bs.C. 10090 Zagreb, Dvoriček 1 E-mail:

More information

Chapter 5 Input. Chapter 5 Objectives. What Is Input? What Is Input? The Keyboard. The Keyboard

Chapter 5 Input. Chapter 5 Objectives. What Is Input? What Is Input? The Keyboard. The Keyboard Chapter 5 Objectives Chapter 5 Input Define input List characteristics of of a keyboard Describe different mouse types and how they work Summarize how pointing devices work Explain how a digital camera

More information

An Example of Mobile Forensics

An Example of Mobile Forensics An Example of Mobile Forensics Kelvin Hilton K319 kchilton@staffsacuk [email protected] www.soc.staffs.ac.uk/kch1 Objectives The sources of evidence The subscriber The mobile station The network

More information

DATA PROTECTION REQUIREMENTS FOR ATTENDANCE VERIFICATION SYSTEMS (AVSs)

DATA PROTECTION REQUIREMENTS FOR ATTENDANCE VERIFICATION SYSTEMS (AVSs) DATA PROTECTION UNIT OPERATIONS AND PROGRAMME IMPLEMENTATION DIRECTORATE OFFICE OF THE PRIME MINISTER MALTA DATA PROTECTION REQUIREMENTS FOR ATTENDANCE VERIFICATION SYSTEMS (AVSs) INTRODUCTION It is within

More information

Assignment 1 Biometric authentication

Assignment 1 Biometric authentication Assignment 1 Biometric authentication Internet Security and Privacy Alexandre Fustier Vincent Burger INTRODUCTION:...3 I. TYPES AND DESCRIPTION OF BIOMETRICS...4 1. PHYSIOLOGICAL BIOMETRIC...4 a. Fingerprints...4

More information

A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA

A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA N. Zarrinpanjeh a, F. Dadrassjavan b, H. Fattahi c * a Islamic Azad University of Qazvin - [email protected]

More information

BIOMETRIC AUTHENTICATION SECURITY AND USABILITY

BIOMETRIC AUTHENTICATION SECURITY AND USABILITY BIOMETRIC AUTHENTICATION SECURITY AND USABILITY Václav Matyáš and Zdeněk Říha Faculty of Informatics, Masaryk University Brno, Czech Republic {matyas, zriha} @fi.muni.cz Abstract We would like to outline

More information

Biometrics for public sector applications

Biometrics for public sector applications Technical Guideline TR-03121-1 Biometrics for public sector applications Part 1: Framework Version 3.0 Bundesamt für Sicherheit in der Informationstechnik Postfach 20 03 63, 53133 Bonn, Germany Email:

More information

ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology

ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Khatmode Ranjit P 1, Kulkarni Ramchandra V 2, Ghodke Bharat S 3, Prof. P. P. Chitte 4, Prof. Anap S. D 5 1 Student

More information

The concept of biometric digital signatures based on Hitachi activities in Japan

The concept of biometric digital signatures based on Hitachi activities in Japan The concept of biometric digital signatures based on Hitachi activities in Japan Koncepcja biometrycznego podpisu kwalifikowanego na podstawie działań Hitachi w Japonii Hitachi, Hitachi, Ltd. Ltd. 2010.

More information

User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device

User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device 2008 International Conference on Computer and Electrical Engineering User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device Hataichanok

More information

Conformance test specification for BSI-TR 03121 Biometrics for public sector applications

Conformance test specification for BSI-TR 03121 Biometrics for public sector applications Technical Guideline TR-03122-1 Conformance test specification for BSI-TR 03121 Biometrics for public sector applications Part 1: Framework Version 3.0 Bundesamt für Sicherheit in der Informationstechnik

More information

Development of Hybrid Radio Frequency Identification and Biometric Security Attendance System

Development of Hybrid Radio Frequency Identification and Biometric Security Attendance System International Journal of Applied Science and Technology Vol. 4, No. 5; October 2014 Development of Hybrid Radio Frequency Identification and Biometric Security Attendance System Z.K Adeyemo O. J. Oyeyemi

More information

PRODUCT SHEET. [email protected] [email protected] www.biopac.com

PRODUCT SHEET. info@biopac.com support@biopac.com www.biopac.com EYE TRACKING SYSTEMS BIOPAC offers an array of monocular and binocular eye tracking systems that are easily integrated with stimulus presentations, VR environments and other media. Systems Monocular Part

More information

CCTV User Group GUIDE FOR SMALL USERS. PRIVATE and COMMERCIAL

CCTV User Group GUIDE FOR SMALL USERS. PRIVATE and COMMERCIAL CCTV User Group GUIDE FOR SMALL USERS PRIVATE and COMMERCIAL 1 CONTENTS Section Number Description Page number 1. Introduction 3 2. Human Rights Act and its implications for you 3 3. Data Protection and

More information

FAQs Electronic residence permit

FAQs Electronic residence permit FAQs Electronic residence permit General 1) When was the electronic residence permit introduced? Since 1 September 2011, foreigners in Germany have been issued with the new electronic residence permit

More information

integrated fire and security solutions Maximum protection for buildings

integrated fire and security solutions Maximum protection for buildings integrated fire and security solutions Maximum protection for buildings integrated fire and security solutions Johnson Controls: expert qualified in building protection Johnson Controls is the recognised

More information

Development of Integrated Management System based on Mobile and Cloud Service for Preventing Various Hazards

Development of Integrated Management System based on Mobile and Cloud Service for Preventing Various Hazards , pp. 143-150 http://dx.doi.org/10.14257/ijseia.2015.9.7.15 Development of Integrated Management System based on Mobile and Cloud Service for Preventing Various Hazards Ryu HyunKi 1, Yeo ChangSub 1, Jeonghyun

More information

LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. [email protected]

LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. indhubatchvsa@gmail.com LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE 1 S.Manikandan, 2 S.Abirami, 2 R.Indumathi, 2 R.Nandhini, 2 T.Nanthini 1 Assistant Professor, VSA group of institution, Salem. 2 BE(ECE), VSA

More information

SIGNATURE VERIFICATION

SIGNATURE VERIFICATION SIGNATURE VERIFICATION Dr. H.B.Kekre, Dr. Dhirendra Mishra, Ms. Shilpa Buddhadev, Ms. Bhagyashree Mall, Mr. Gaurav Jangid, Ms. Nikita Lakhotia Computer engineering Department, MPSTME, NMIMS University

More information

Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France

Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France OUTLINE Le pôle TES et le sans-contact Introduction User authentication GREYC - E-payment & Biometrics Introduction

More information

Audio: This overview module contains an introduction, five lessons, and a conclusion.

Audio: This overview module contains an introduction, five lessons, and a conclusion. Homeland Security Presidential Directive 12 (HSPD 12) Overview Audio: Welcome to the Homeland Security Presidential Directive 12 (HSPD 12) overview module, the first in a series of informational modules

More information

Expertise for biometric solution

Expertise for biometric solution Expertise for biometric solution Biometrics Solutions from Kaba Kaba is the leading manufacturer for biometric solutions in time and attendance, shop floor data collection and access control. From the

More information

W.A.R.N. Passive Biometric ID Card Solution

W.A.R.N. Passive Biometric ID Card Solution W.A.R.N. Passive Biometric ID Card Solution Updated November, 2007 Biometric technology has advanced so quickly in the last decade that questions and facts about its cost, use, and accuracy are often confused

More information

ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan

ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan Handwritten Signature Verification ECE 533 Project Report by Ashish Dhawan Aditi R. Ganesan Contents 1. Abstract 3. 2. Introduction 4. 3. Approach 6. 4. Pre-processing 8. 5. Feature Extraction 9. 6. Verification

More information

HANDS-FREE PC CONTROL CONTROLLING OF MOUSE CURSOR USING EYE MOVEMENT

HANDS-FREE PC CONTROL CONTROLLING OF MOUSE CURSOR USING EYE MOVEMENT International Journal of Scientific and Research Publications, Volume 2, Issue 4, April 2012 1 HANDS-FREE PC CONTROL CONTROLLING OF MOUSE CURSOR USING EYE MOVEMENT Akhil Gupta, Akash Rathi, Dr. Y. Radhika

More information

Reliable Security Solutions

Reliable Security Solutions Reliable Security Solutions Challenger10 The proven solution for access control, intrusion detection and video integration. An integrated security solution for your most challenging environments The Tecom

More information

Data Transfer Technology to Enable Communication between Displays and Smart Devices

Data Transfer Technology to Enable Communication between Displays and Smart Devices Data Transfer Technology to Enable Communication between Displays and Smart Devices Kensuke Kuraki Shohei Nakagata Ryuta Tanaka Taizo Anan Recently, the chance to see videos in various places has increased

More information

Freedom and Security

Freedom and Security Freedom and Security At ARCA, cash handling is all we do. We have a unique perspective on cash automation and are a leading supplier of solutions for financial institutions. An American owned and run company,

More information

Security Model in E-government with Biometric based on PKI

Security Model in E-government with Biometric based on PKI Security Model in E-government with Biometric based on PKI Jaafar.TH. Jaafar Institute of Statistical Studies and Research Department of Computer and Information Sciences Cairo, Egypt Nermin Hamza Institute

More information