Biology:Vein matching: Difference between revisions
Tag: Reverted |
MainEditor (talk | contribs) (expired processing fee) Tag: Manual revert |
||
(One intermediate revision by one other user not shown) | |||
Line 37: | Line 37: | ||
[[Biography:Lambert Sonna Momo|Lambert Sonna Momo]] developed in 2020 a new generation of scanner, the VenoScannerF, which scans finger veins in multiple views and extracts a key that is encrypted from end to end with a constantly changing random code.<ref>{{Cite web|url=https://global-id.swiss/global-id-3d-vein-biometrics-patent-filing-published-in-hong-kong/|title=Global ID 3D vein biometrics patent filing published in Hong Kong|date=13 April 2021}}</ref> | [[Biography:Lambert Sonna Momo|Lambert Sonna Momo]] developed in 2020 a new generation of scanner, the VenoScannerF, which scans finger veins in multiple views and extracts a key that is encrypted from end to end with a constantly changing random code.<ref>{{Cite web|url=https://global-id.swiss/global-id-3d-vein-biometrics-patent-filing-published-in-hong-kong/|title=Global ID 3D vein biometrics patent filing published in Hong Kong|date=13 April 2021}}</ref> | ||
It is developing a new floating-hand version available for the market in 2022.<ref>{{Cite web|url=https://www.idiap.ch/en/allnews/sanitary-and-cyber-precautions-a-key-challenge-for-hospitals|title = Sanitary and cyber precautions, a key challenge for hospitals}}</ref> | It is developing a new floating-hand version available for the market in 2022.<ref>{{Cite web|url=https://www.idiap.ch/en/allnews/sanitary-and-cyber-precautions-a-key-challenge-for-hospitals|title = Sanitary and cyber precautions, a key challenge for hospitals}}</ref> | ||
==Palm vein biometrics key generation== | ==Palm vein biometrics key generation== |
Latest revision as of 06:35, 11 September 2024
Part of a series on |
Forensic science |
---|
Vein matching, also called vascular technology,[1] is a technique of biometric identification through the analysis of the patterns of blood vessels visible from the surface of the skin.[2] Though used by the Federal Bureau of Investigation and the Central Intelligence Agency,[3] this method of identification is still in development and has not yet been universally adopted by crime labs as it is not considered as reliable as more established techniques, such as fingerprinting. However, it can be used in conjunction with existing forensic data in support of a conclusion.[2][4]
While other types of biometric scanners are more widely employed in security systems, vascular scanners are growing in popularity. Fingerprint scanners are more frequently used, but they generally do not provide enough data points for critical verification decisions. Since fingerprint scanners require direct contact of the finger with the scanner, dry or abraded skin can interfere with the reliability of the system. Skin diseases, such as psoriasis, can also limit the accuracy of the scanner, not to mention direct contact with the scanner can result in need for more frequent cleaning and higher risk of equipment damage. On the other hand, vascular scanners do not require contact with the scanner, and since the information they read is on the inside of the body, skin conditions do not affect the accuracy of the reading.[5] Vascular scanners also work very quickly, scanning in less than a second. As they scan, they capture the unique pattern formed by veins as they branch through the hand. The retinal scanner is more reliable than the vascular scanner, but is less widely used because of its intrusive nature. People generally are uncomfortable exposing their eyes to an unfamiliar source of light, and retinal scanners are more difficult to install than vascular scanning equipment, since variations in angle of height and face in relation to the device must be accounted for.[6]
History
Joe Rice, an automation controls engineer at Kodak's Annesley factory, invented vein pattern recognition in the early 1980s in response to his bank cards and identity being stolen. He developed what was essentially a barcode reader for use on the human body and assigned the rights to the UK's NRDC (National Research Development Corporation).[7] The NRDC/ BTG (Thatcher privatised NRDC into BTG) made little headway in licensing vein pattern technology. The world was wedded to fingerprints and Iris patterns and governments (the main buyers of biometric solutions) wanted open view biometrics for surveillance purposes, not a hidden, personal biometric solution.
In the late 1990s BTG said they were dropping vein patterns through no commercial interest. Rice was unhappy with the BTG's decision and their implementation of vein pattern technology so he gave a talk at the Biometric Summit in Washington DC, on how he would develop vein pattern recognition.[8] This view was countered by a following speaker from IBG (The US based international Biometric Group) who said there was insufficient information content in vein patterns for them to be used as a viable biometric.
In 2002 Hitachi and Fujitsu launched vein biometric products and veins have turned out to be one of the most consistent, discriminatory and accurate biometric traits. In the mid 2000s, Rice received an invitation from Matthias Vanoni to partner in a Swiss company, Biowatch SA, to develop and commercialise the biowatch.
See: https://sites.google.com/site/veinpatternhome/
Commercial applications
Vascular/vein pattern recognition (VPR) technology has been developed commercially by Hitachi since 1997,[9] in which infrared light absorbed by the hemoglobin in a subject's blood vessels is recorded (as dark patterns) by a CCD camera behind a transparent surface.[10] The data patterns are processed, compressed, and digitized for future biometric authentication of the subject. Computer security expert Bruce Schneier stated that a key advantage of vein patterns for biometric identification is the lack of a known method of forging a usable "dummy", as is possible with fingerprints.[11]
Blood vessel patterns are unique to each individual, as are other biometric data such as fingerprint recognition or the patterns of the iris.[12] Unlike some biometric systems, blood vessel patterns are almost impossible to counterfeit because they are located beneath the skin's surface. Biometric systems based on fingerprints can be fooled with a dummy finger fitted with a copied fingerprint; voice and facial characteristic-based systems can be fooled by recordings and high-resolution images. The finger vein identification system is much harder to fool because it can only authenticate the finger of a living person.[13][12]
Finger vein recognition
Finger vein recognition is based on images of human finger vein patterns beneath the skin's surface. The technology is currently in use or development for a wide variety of applications, including credit card authentication, automobile security, employee time and attendance tracking, computer and network authentication, end point security and automated teller machines.[14]
To obtain the pattern for the database record, an individual inserts a finger into an attester terminal containing a near-infrared light-emitting diode (LED) light and a monochrome charge-coupled device (CCD) camera. The hemoglobin in the blood absorbs near-infrared LED light, which makes the vein system appear as a dark pattern of lines. The camera records the image and the raw data is digitized, certified, and sent to a database of registered images. For authentication purposes, the finger is scanned as before and the data is sent to the database of registered images for comparison. The authentication process takes less than two seconds.[15]
Finger scanning devices have been deployed for use in Japanese financial institutions, kiosks, and turnstiles.[16] Mantra Softech marketed a device in India that scans vein patterns in palms for attendance recording.[17] Fujitsu developed a version that does not require direct physical contact with the vein scanner for improved hygiene in the use of electronic point of sale devices.[18]
Lambert Sonna Momo developed in 2020 a new generation of scanner, the VenoScannerF, which scans finger veins in multiple views and extracts a key that is encrypted from end to end with a constantly changing random code.[19]
It is developing a new floating-hand version available for the market in 2022.[20]
Palm vein biometrics key generation
Palm vein authentication is one of the vascular pattern authentication technologies. Fujitsu offers contactless authentication and provides a hygienic and non-invasive solution [21] so that it could be used for contactless authentication like laptop, mobile or even an ATM. When compared to other vascular pattern recognition, the Palm vein plays a predominant role since it has a wide region of interest-RoI Region of interest, while other similar technologies like eye Eye vein verification, finger vein has a very small RoI comparatively. Also, compared to other biometric recognition, palm vein does not include any noise data like hair, electrical/thermal/environmental conditions, or even sensor drift. Since a huge area of interest is available, even an irrevocable biometric key is proposed by Prasanalakshmi [22] to be generated from the bifurcations and minutiae patterns Fingerprint. The points of these patterns, in turn, are used to generate a key that protects data in smart cards, devices, and many others. The Palm vein biometric key generation is thus an "irrevocable cryptographic key from the biometric template" used for smart card/device authentication.
Forensic identification
According to a 31,000-word investigative report published in January 2011 by Georgetown University faculty and students,[23][24][25][26][27] U.S. federal investigators used photos from the video recording of the beheading of American journalist Daniel Pearl to match the veins on the visible areas of the perpetrator to that of captured al-Qaeda operative Khalid Sheikh Mohammed, notably a "bulging vein" running across his hand.[4] The FBI and the CIA used the matching technique on Mohammed in 2004 and again in 2007.[3] Officials were concerned that his confession, which had been obtained through torture (namely waterboarding), would not hold up in court and used vein matching evidence to bolster their case.[2]
Other applications
Some US hospitals, such as NYU Langone Medical Center, use a vein matching system called Imprivata PatientSecure, primarily to reduce errors. Additional benefits include identifying unconscious or uncommunicative patients, and saving time and paperwork.[28] Dr. Bernard A. Birnbaum, chief of hospital operations at Langone, says "vein patterns are 100 times more unique than fingerprints".[29] However, news reports on the use of vein matching for Mr. Pearl's murderer quote experts who say "that its reliability as a forensic identification tool is unproven.[30]
See also
References
- ↑ Finn, Peter (20 January 2011). "Report: Top al-Qaeda figure killed Pearl". The Washington Post. https://www.washingtonpost.com/wp-dyn/content/article/2011/01/19/AR2011011907114.html.
- ↑ 2.0 2.1 2.2 Blackburn, Bradley (20 January 2011). "Report Says Justice Not Served in Murder of Daniel Pearl, Wall Street Journal Reporter". ABC News. pp. 1–2. https://abcnews.go.com/US/report-justice-served-murder-daniel-pearl/story?id=12721909.
- ↑ 3.0 3.1 Cratty, Carol (20 January 2011). "Photos of hands backed up Pearl slaying confession, report finds". CNN. http://www.cnn.com/2011/WORLD/asiapcf/01/20/pakistan.daniel.pearl.execution/.
- ↑ 4.0 4.1 Ackerman, Spencer (20 January 2011). "Qaeda Killer's Veins Implicate Him in Journo's Murder". Wired. https://www.wired.com/dangerroom/2011/01/qaeda-killers-veins-implicate-him-in-journos-murder/.
- ↑ Zhang, Yi-Bo; Li, Qin; You, Jane; Bhattacharya, Prabir (2007), "Palm Vein Extraction and Matching for Personal Authentication", Advances in Visual Information Systems, Lecture Notes in Computer Science, 4781, Berlin, Heidelberg: Springer Berlin Heidelberg, pp. 154–164, doi:10.1007/978-3-540-76414-4_16, ISBN 978-3-540-76413-7, http://dx.doi.org/10.1007/978-3-540-76414-4_16, retrieved 2021-04-03
- ↑ Bryn Nelson (30 June 2008). "Giving biometrics a hand". nbcnews.com. http://www.nbcnews.com/id/25378726/ns/technology_and_science-innovation/.
- ↑ See his website from 1993 onwards at Vein PatternTemplate:User-generated inline:
- His original patent on vein matching Google "WO1985004088A1"
- His US Patent on Vein Matching issued 1987 Google "US patent 4699149"
- Details of his 1990 Smart door handle
- His biometric Summit Talk Google "A third way for Biometrics"
- His predictions for the future of Vein pattern technology: http://biometrics.mainguet.org/types/vein_JoeRice.htm
- ↑ ""A Third Way for Biometrics" –Google Groups". https://groups.google.com/forum/#!msg/comp.society.privacy/gynQOQHXzmQ/6LpJubLOWmwJ.
- ↑ [1] US Patent no. 7,526,111 "Personal Identification Device and Method"
- ↑ "HRSID Vein Recognition overview". http://www.hrsid.com/company/technology/vein-recognition.
- ↑ Schneier, Bruce (8 August 2007). "Another Biometric: Vein Patterns". Schneier on Security. http://www.schneier.com/blog/archives/2007/08/another_biometr.html.
- ↑ 12.0 12.1 Finger vein recognition study
- ↑ info needed;[|permanent dead link|dead link}}]
- ↑ "Barclays – Hitachi Digital Security". http://digitalsecurity.hitachi.eu/case-studies/barclays/.
- ↑ "Archived copy". http://www.hitachi.eu/veinid/documents/articleforfvforbankingvision2010final.pdf.
- ↑ "Finger Vein Authentication Technology". Hitachi America, Ltd. http://www.hitachi-america.us/products/business/smart_solutions/finger_vein/.
- ↑ "PV2000". India: Mantra Softech Pvt. Ltd. http://www.mantratec.com/Palm-Vein-Scanner/PV2000.
- ↑ "Your hand is the key: The world's first contactless palm vein authentication technology". PalmSecure (Fujitsu). http://www.fujitsu.com/emea/products/biometrics/.
- ↑ "Global ID 3D vein biometrics patent filing published in Hong Kong". 13 April 2021. https://global-id.swiss/global-id-3d-vein-biometrics-patent-filing-published-in-hong-kong/.
- ↑ "Sanitary and cyber precautions, a key challenge for hospitals". https://www.idiap.ch/en/allnews/sanitary-and-cyber-precautions-a-key-challenge-for-hospitals.
- ↑ "Palm vein authentication technology and its applications". https://www.fujitsu.com/downloads/GLOBAL/labs/papers/palmvein.pdf.
- ↑ Prasanalakshmi, B.; Kannammal, A. (2009). "A secure cryptosystem from palm vein biometrics". Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human. pp. 1401–1405. doi:10.1145/1655925.1656183. ISBN 9781605587103. https://dl.acm.org/doi/abs/10.1145/1655925.1656183/. Retrieved 24 November 2009.
- ↑ Stanglin, Douglas (20 January 2011). "Report: Forensic evidence ties 9/11 plotter to Pearl's killing". USA Today. http://content.usatoday.com/communities/ondeadline/post/2011/01/report-forensic-evidence-shows-911-plotter-killed-journal-reporter/1.
- ↑ Benjamin Wittes (2011-01-20). "So KSM Really Did Kill Daniel Pearl". Lawfare. https://www.lawfaremedia.org/2011/01/so-ksm-really-did-kill-daniel-pearl/.
- ↑ Asra Q. Nomani (2011-01-20). "The Pearl Project". The Center for Public Integrity. http://www.documentcloud.org/documents/26296-pearl-project-diagram.html.
- ↑ Peter Finn (2011-01-20). "Khalid Sheik Mohammed killed U.S. journalist Daniel Pearl, report finds". The Washington Post. https://www.washingtonpost.com/wp-dyn/content/article/2011/01/20/AR2011012000057.html?hpid=topnews. "A recently completed investigation of the killing of Daniel Pearl in Pakistan nine years ago makes public new evidence that a senior al-Qaeda operative executed the Wall Street Journal reporter."
- ↑ Ben Farmer (2011-01-20). "Daniel Pearl was beheaded by 9/11 mastermind". The Telegraph (UK). https://www.telegraph.co.uk/news/worldnews/asia/afghanistan/8271845/Daniel-Pearl-was-beheaded-by-911-mastermind.html. "They replied: 'The photo you sent me and the hand of our friend inside the cage seem identical to me.' Both the CIA and FBI use the mathematical modelling technique, though it is not considered as reliable as fingerprinting."
- ↑ Allen, Jonathan (28 July 2011). "New York hospital using palm-scanners". Stuff.co.nz. http://www.stuff.co.nz/technology/5355188/New-York-hospital-using-palm-scanners.
- ↑ By Plasencia, Amanda (28 July 2011). "Hospital Scans Patient Hands to Pull Medical Info". NBC New York. http://www.nbcnewyork.com/news/local/Hospital-Scans-Patient-Hands-to-Pull-Medical-Info-126142628.html.
- ↑ "Report Says Justice Not Served in Murder of Daniel Pearl, Wall Street Journal Reporter" (in en). https://abcnews.go.com/US/report-justice-served-murder-daniel-pearl/story?id=12721909.
Further reading
- Prasanalakshmi, Balaji; Sampath, Kannammal (2009). "A secure cryptosystem from palm vein biometrics". Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human. Icis '09. pp. 1401–1405. doi:10.1145/1655925.1656183. ISBN 9781605587103. http://dl.acm.org/citation.cfm?id=1656183.
- Watanabe, Masaki; Shiohara, Morito; Sasaki, Shigeru (September 2005). "Palm vein authentication technology and its applications". Proceedings of the Biometric Consortium Conference. https://www-s.fujitsu.com/downloads/GLOBAL/labs/papers/palmvein.pdf.
- Zhang, Yi-Bo; Li, Qin; You, Jane; Bhattacharya, Prabir (2007). "Palm Vein Extraction and Matching for Personal Authentication". Advances in Visual Information Systems. Lecture Notes in Computer Science. 4781. Concordia University. pp. 154–164. doi:10.1007/978-3-540-76414-4_16. ISBN 978-3-540-76413-7.
- Kumar, A.; Prathyusha, K.V. (September 2009). "Personal Authentication Using Hand Vein Triangulation and Knuckle Shape". IEEE Transactions on Image Processing 18 (9): 2127–2136. doi:10.1109/TIP.2009.2023153. ISSN 1057-7149. PMID 19447728. Bibcode: 2009ITIP...18.2127K.
- Chen, Haifen; Lu, Guangming; Wang, Rui (December 2009). "A new palm vein matching method based on ICP algorithm". Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human. Harbin Institute of Technology. pp. 1207–1211. doi:10.1145/1655925.1656145. ISBN 978-1-60558-710-3.
External links
- Finger-vein image recognition combining modified hausdorff distance with minutiae feature matching at The Free Library
- The Truth Left Behind: Inside the Kidnapping and Murder of Daniel Pearl at the Center for Public Integrity
Original source: https://en.wikipedia.org/wiki/Vein matching.
Read more |