Вы находитесь на странице: 1из 25

A Seminar Report On

PALM VEIN BIOMETRIC TECHNOLOGY: AN APPROACH


FOR SECURTIY IN ATM TRANSACTIONS
Submitted to
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY, ANANTAPUR
In partial fulfillment for the award of the degree
Of
Bachelor of Technology
In
COMPUTER SCIENCE & ENGINEERING
By
14F61A0572 SHAIK NADEEM AHMAD
Under the esteemed guidance of
Mr. R.G.Kumar, B.E., M.Tech., (Ph.D.,)
Assistant Professor in Department of CSE

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING


SIDDHARTH INSTITUTE OF ENGINEERING & TECHNOLOGY
(Accredited By NBA, New Delhi)
(Approved by AICTE & Affiliated to JNTUA, Anantapuramu)
(An ISO 9001:2008 CERTIFIED INSTITUTION)
Siddharth Nagar, Narayanavanam road, PUTTUR-517583, A.P
2018- 2019
SIDDHARTH INSTITUTE OF ENGINEERING & TECHNOLOGY
(Accredited By NBA, New Delhi)(Approved by AICTE & Affiliated to JNTUA, Anantapuramu)
(An ISO 9001:2008 CERTIFIED INSTITUTION)
Siddharth Nagar, Narayanavanam Road, Puttur-517583

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING

BONAFIDE CERTIFICATE
This is to certify that the Seminar entitled “PALM VEIN BIOMETRIC

TECHNOLOGY: AN APPROACH FOR SECURITY IN ATM


TRANSACTIONS” being submitted by B.PAVANKUMAR REDDY

bearing Roll Number: 14F61A0553 in partial fulfillment for the award of


BACHELOR OF TECHNOLOGY in COMPUTER SCIENCE &
ENGINEERING discipline is a bonafide record work carried out by him from
“SIDDHARTH INSTITUTE OF ENGINEERING &TECHNOLOGY, PUTTUR”
during the period of 2018-2019 and is a record of bonafide work carried out under our
supervision and guidance.

SEMINAR COORDINATOR HEAD OF THE DEPARTMENT


Mr. R.G.Kumar, M.Tech., (Ph.D), Prof. P. Nirupama, M.E.,(Ph.D.,)
Assistant Professor, Professor & Head,
Department of CSE Department of CSE

Submitted Seminar report held on ________________________

SEMINAR COORDINATOR HEAD OF THE DEPARTMENT


Acknowledgement

The satisfaction that accompanies the successful completion of any task would be
incomplete without the mention of people who made it possible, without whose guidance,
encouragement and help this venture would not been success.

I own my gratitude to our honorable chairman Dr. K. Ashok Raju Ph.D., and also

deep sense of gratitude to our honorable principal Dr. K. Chandra Sekhar Reddy,

M.Tech, Ph.D., for providing all the facilities and support for successful completion of my
seminar work.

I wish to thank our Head of the Department of CSE, Prof. P. Nirupama, M.E.,

(Ph.D.,) for her guidance and encouragement given to us during this work.

I express my deep sense of gratitude to our seminar coordinator Mr. R.G.Kumar,


M.Tech., (Ph.D.,) who evinced keen interest in our efforts and provided their valuable
guidance throughout my seminar work.

I extend my thanks to all the staff members of CSE Department, for helping
us to complete this seminar work giving valuable suggestions.

As a gesture of respect towards my Family members, Friends and their support I


whole heartedly dedicate this work.
DECLARATION

SHAIK NADEEM AHMAD, bearing Hall Ticket No:14F61A0572, here by

submit that the seminar report entitled “PALM VEIN BIOMETRIC

TECHNOLOGY: AN APPROACH FOR SECURITY IN ATM

TRANSACTIONS” under the guidance of Seminar Coordinator Mr. R.G.Kumar,

M.Tech., (Ph.D.,) Assistant Professor, Department of Computer science &

engineering, SIDDHARTH INSTITUTE OF ENGINEERING &

TECHNOLOGY in partial fulfillment for the award of the degree of bachelor of

technology in Computer Science & Engineering , and this is a record of bonafide

work carried out by me and the work have been submitted during the final year

second semester for the academic year 2018-2019

Date: SHAIK NADEEM AHMAD

Place: (14F61A0572)
CONTENTS

Chapter No. Title Page No.

ABSTRACT vi

LIST OF FIGURES vii

1 INTRODUCTION 1-2

2 PATTERN RECOGNITION OF 3-4


PALM VEIN

3 LITERATURE REVIEW 5-6

4 METHODOLOGY USED 7-8

4.1 REGISTERING 9

4.2 MATCHING 10

4.3 ACCURACY 10

4.4 WORKING OF PALM VEIN SECURITY


SYSTEM 11-13

4.5 HOW SECURE IS THE TECHNOLOGY 13-14

5 RESULTS 16

6 CONCLUSION 17

7 FUTURE ENHANCEMENT 18

REFERENCES 19-20
ABSTRACT

Technology advances day by day, the growth of malpractice in electronic transactions

has also been increasing. Many hacking techniques for traditional passwords had come to

authorize an unauthorized person while performing ATM transactions. One of the security

mechanism to erase such fraudulent activities (in which an unauthorized person is performing

transactions as an authorized one) is to identify and authenticate a user with their biometrics

i.e., with their physical or behavioral characteristics as fingerprint, iris, palm vein, etc. This

proposes an enhanced ATM system which provides security using palm vein technology with a

unique identification number of an individual unlike traditional passwords. Fujitsu has

developed a palm vein pattern authentication technology that uses vascular patterns as personal

identification data .Vein recognition technology is secure because the authentication data exists

inside the body and is therefore very difficult to forge. It is highly accurate.

Keywords- ATM, Palm vein, biometric technology, Pattern recognition, Infrared detectors.
LIST OF FIGURES

Fig No NAME of the Figure Page No

1 Palm Vein Technology 1

2 Infrared Light With A Short Wave Length 3

3 Pattern Of Human Vein In Palm 4

4 Flow Chart Of Proposed Atm 7

5 Registering And Matching Of Palm Vein 9

6 Application Of Palm Vein In Various Sectors 11

7 Matching The Pattern 12

8 Digitized Conversion Method 13

9 Palm Vein Recognition 14

10 Registering Two Palms 15

11 Contact Less Sensor 15

12 High Authentication Accuracy 16


1. INTRODUCTION

An Automated Teller Machine (ATM) is an electronic information transfer's gadget


that allows the users of a monetary organization to perform their transactions without any
prerequisite of human clerk, assistant or bank employee. On most of the modern ATMs, the
client is known by inserting a plastic ATM card with a magnetic stripe or a plastic smart card
with a chip that contains a novel card number. A personal identification number (PIN) is given
to the user for the sake of their authentication, yet at the same time burglaries are happening.
This paper constitutes biometric authentication (palm vein technology) by linking it to Unique
Identification Number (UIN) to provide more security and authentication.

FIG:1 PALM VEIN TECHNOLOGY

The above fig illustrates palm secure works by capturing an individual's vein pattern
image while radiating it with near infrared rays. The Palm Secure identifies the structure of the
pattern of veins on the palm of the human hand with the at most precision. The sensor radiates
a near-infrared beam towards the palm of the hand and the blood flowing through these back to
the heart with reduced oxygen absorbs this radiation, causing the veins to appear as a black
pattern. This pattern is recorded by the sensor and is stored in encrypted form in a database, on
a token or on a smart card.
The Unique Identification Authority of India (UIAI) is an agency of the Government of
India responsible for implementing a novel ID task based on the Unique Identification Number
scheme, to identify individuals, was established in February 2009.

It is the process of authentication where the UIN number, along with other attributes
(demographic/biometrics/OTP) is submitted to UIDAI's Central Identities Data Repository
(CIDR) for a check; the CIDR confirms whether the information submitted matches the
information accessible in CIDR and reacts with a “yes/no”. No personal identity information is
returned as part of the response. The purpose of authentication is to enable residents to prove
their identity and for service providers to confirm that the residents are „who they say they are'
in order to supply services and offer access to benefits. Biometrics is the study identifying an
individual based on their physical or behavioral characteristics

In the ubiquitous network society, where individuals can easily access their information
anytime and anywhere, people are also faced with the risk that others can easily access the
same information anytime and anywhere. Because of this risk, personal identification
technology is used which includes Passwords, personal identification numbers and
identification cards. However, cards can be stolen and passwords and numbers can be guessed
or forgotten. To solve these problems, Fujitsu developed four methods: fingerprints, faces,
voice prints and palm veins. Among these, because of its high accuracy, contact less palm vein
authentication technology is being incorporated into various financial solution products for use
in public place.
2. PATTERN RECOGNITION OF PALM VEIN

Everyone has a unique vein pattern in their palm. Reference points in the pattern can
therefore be stored and the pattern can be used as an identification and security technique.
Most systems that use vein pattern recognition store the vein pattern as an image, which may
or may not be encoded. With the Palm-ID, on the other hand, the scanned reference points are
stored directly as an encrypted template, which means the vein pattern is converted into
code inside the scanner itself. This method of palm vein pattern recognition therefore offers an
extremely high level of security.

FIG: 2 Infrared light with a short wavelength.

Palm vein recognition examines the unique patterns in your palm veins, using a
safe, near infrared light source like that in a TV remote. This new technology is fast,
highly accurate and secure, with many safeguards built in to protect your privacy. Palm
vein technology:
• Records the vein pattern, which stays unique over time, to provide a positive ID
• Gives each test taker a single record that’s virtually impossible to forge
• Prevents people from testing under assumed identities
To use the device, simply place your hand on the guide above the sensor for less than a
second. Palm vein recognition is quick and simple — the process takes only seconds, yet
represents the most advanced authentication technology available in high-stakes testing.

Palm vein patterns are unique even among identical twins. According to Fujitsu,
they compared 140000 palms, TFA -False Acceptance Rate is less than 0.00008%. In vein
detection process a device takes a snapshot of the person’s veins under a source of
infrared radiation at a specific wavelength.

When someone’s hand is illuminated with infrared light, the vein of that person
appears black then it is recorded as an “id-card” in a database and can use during
authentication. These days this technology has a very popular use in banking, hospitals,
government offices, libraries etc. also Business growth will be achieved by reducing the
palm vein sensor’s size and shortening the authentication time.

FIG: 3 PATTERNS OF HUMAN VEINS IN PALM


3. LITERATURE REVIEW

Biometrics authentication is a growing field in which civil liberties groups express


concern over privacy and identity issues. Today, biometric laws and regulations are in process
and biometric industry standards are being tested. Zhang et al. (2010) developed a palm vein
recognition system that uses blood vessel patterns as a personal identification factor. This
paper discusses about an image preprocessing and feature extraction of palm vein image.
Lingyu and Leedham (2006), investigates two infrared imaging technologies, far-infrared
thermographs and near-infrared imaging, to acquire hand vein pattern images for biometric
purposes. The imaging principles for both technologies were studied in depth. Deepamalar and
Madheswaran (2010), discusses the shape and texture features; which have been considered for
recognition of authenticated users and it was validated using neural network classifier. It is
found that the recognition accuracy was 99.61% when the multimodal features fused at
matching score level. This proposed multimodal system was expected to provide reliable
security. Harmer and Howells (2012), did an investigation into the feasibility of applying the
palm-vein biometric modality within a template-free key generation framework were
conducted. The experiments resulted in both the key reproducibility and key uniqueness rates
achieving 100% with considerable effective key length. Hartung Olsen, Xu, and Busch (2011),
shows an approach to extract vein minutiae and to transform them into a fixed-length,
translation and scale invariant representation where rotations could be easily compensated. The
proposed solution based on spectral minutiae was evaluated against other comparison
strategies on three different datasets of wrist and palm vein samples.

An individual first rests his wrist, and on some devices, the middle of his fingers, on
the sensor's supports such that the palm is held centimeters above the device's scanner, which
flashes a near-infrared ray on the palm. Unlike the skin, through which near infrared light
passes, deoxygenated hemoglobin in the blood flowing through the veins absorbs near-infrared
rays, illuminating the hemoglobin, causing it to be visible to the scanner. Arteries and
capillaries, whose blood contains oxygenated hemoglobin, which does not absorb near-infrared
light, are invisible to the sensor. The still image captured by the camera, which photographs in
the near-infrared range, appears as a black network, reflecting the palm's vein pattern against
the lighter background of the palm. An individual's palm vein image is converted by
algorithms into data points, which is then compressed, encrypted, and stored by the software
and registered along with the other details in his profile as a reference for future comparison.
4. METHODOLOGY

Palm vein authentication technology consists of a small scanner that's easy to use, fast
and highly accurate. Palm vein authentication uses the vascular patterns of an individual’s
palm which is used as the information for personal identification of them. In Comparison with
a finger or the back of a hand, a palm has a wider and more complicated vascular pattern and
thus contains a wealth of differentiate features for personal identification. One should place
his/her palm over the scanner.

Initially bankers will gather the client's UIN numbers and palm vein samples with the
assistance of palm vein scanner at the time of opening the accounts. Retrieved palm vein
images are normalized and some features can be concentrated among them, which is put away
as enrolled information in a database. The entire procedure is presented in terms of flow chart
as shown in fig

FIG: 4 FLOW CHART OF PROPOSED ATM

Here, the authentication happens at two levels; at first, at the time of verification at the
ATM machine our palm vein will be contrasted and that of the sample given at the time of
enrollment and secondly, UIN number related to that sample is compared with that of UIN in
CDIR archive.
Thus the palm vein technology provides a two way authentication along with the UIN
number. Basically, there are two steps as shown in fig 4 while dealing with biometrics to
perform the transactions: Registration and Matching.
In addition to the palm, vascular pattern on the back of a hand or a finger can also
become the good source of vein authentication. As the palm has no hair, it is easier to
photograph its vascular pattern, even though its complex pattern covers the widest area.
If we compare the skin color tone of back of the hand and finger the palm also has no
significant variation. Veins are internal in the body and have a wealth of differentiating
features, so the security level becomes very high as it is very difficult to falsify or copy the
palm vein identity of anyone.

FIG:5 REGISTERING AND MATCHING OF PALM VEIN

4.1 REGISTRATION

During the acquisition of the palm vein pattern, various mathematical operations are
applied to the information in order to digitize that image which are captured by using Near
Infrared Cameras later it is continued by pre-processing in which aims at the improvement of
the image information that suppress unsought distortions or enhances some image options
important for further processing. Noise reduction is the method of removing noise from a
signal. The first step in image pre-processing is image cropping. Some immaterial parts of the
image can be removed and therefore image region of interest is concentrated. Thinning is a
morphological operation that is used to remove selected foreground pixels from binary images,
somewhat like erosion or opening. When the input data is too large to process for an algorithm
and it is suspected to be notoriously redundant (much data, but not much information) then the
input data will be transformed into a reduced representation set of features (also named feature
vector). This step is called feature extraction. Then the input data are ready to perform specific
tasks in its transformed way.

4.2 MATCHING
Template matching is a technique in digital image processing for finding small parts of
an image which match a template image. Template matching can be subdivided into two
approaches: feature-based and template-based matching. The feature-based approach uses the
features of the search and template image, such as edges or corners, as the primary match-
measuring metrics to find the best matching location of the template in the source image. The
template-based, or global, approach uses the entire template, with generally a sum-comparing
metric that determines the best location by testing all or a sample of the viable test locations
within the search image that the template image may match. Pattern matching is a method of
identifying features in an image that match a smaller template image (that is, the "pattern" to
be matched). The process involves two phases: an off-line learning phase in which the
template is processed, and a matching phase that can be executed in real time.

4.2.1 Region of Interest Segmentation


It is used to find firstly ROI (region of interest) which is that part of an image from
where we get maximum number of veins and then that are used to taken for further pre-
processing. In order to account for the potential in the captured contactless palm vein images,
the size and location of ROI is selected based on the instance between two webs.

4.3 ACCURACY
It is also highly accurate in testing using 1,40,000 palm profiles of 70,000 individuals
in Japan; it had a false acceptance rate of less than 0.00008% and a false rejection rate of
0.01%
FIG: 6 APPLICATON OF PALM VEIN IN VARIOUS SECTORS

4.3.1 False acceptance rate (FAR)

FAR measures how frequently unauthorized persons are accepted by the system due to
erroneous matching or A rate at which someone, other than the actual person is falsely
recognized.

4.3.2 False rejection rate (FRR)

FRR is probability that the system fails to detect a match between the input pattern and
a matching template in the database (or) the rate at which the actual person is not recognized
accurately.

4.4 WORKING OF PALM VEIN SECURITY SYSTEMS

Breaches of credit card server security and the incidence of card forgery and theft have
highlighted the need for an increase in the security measures employed. The application of
biometric solutions in ATMs or bank teller machines provides this high security environment.
By using a smartcard, on which the client's unique palm vein pattern is stored, the client can
authorize himself at an ATM by scanning his palm vein pattern to let the ATM compare it with
palm vein pattern stored on the smartcard.
In July 2004, to ensure customer security, Suruga bank launched its ―Bio Security
Deposit‖ the world’s first financial service to use Palm Secure. This service features high
security for customers using vein authentication, does not require a bank card or pass book and
prevents withdrawals from branches other than the registered branch and ATMs thereby
minimizing the risk of fraudulent withdrawals. To open a Bio-Security Deposit account,
customers go to a bank and have their palm veins photographed at the counter in order to
guarantee secure data management, the palm vein data is stored only on the vein data base
server at the branch office where the account is opened. In October 2004, The Bank of Tokyo
launched its ―Super –IC Card‖. This card combines the functions of a bankcard, credit card,
electronic money and palm vein authentication. This Super –IC Card contains the customer’s
palm Vein data and palm authentication algorithms and performs vein authentication by itself.
This system is advantageous because the customer’s information is not stored at the bank.
When a customer applies for a Super –IC Card, the bank sends the card to the customer’s
home. To activate the palm vein authentication function, the customer brings the card and his
passbook and seal to the bank counter where the customer’s vein information is registered on
the card. After registration the customer can make transactions at that branch counter and
ATM using palm vein authentication and a matching PIN number.

FIG:7 MATCHING THE PATTERN


PROCESS:

1. One should place his/her palm near to scanner

2. The scanner makes use of a special characteristic of the reduced hemoglobin coursing
through the palm veins — it absorbs near-infrared light. This makes it possible to take a
snapshot of what's beneath the outer skin, something very hard to read or steal.

3. The integrated optical system in the palm vein sensor uses this phenomenon to generate an
image of the palm vein pattern and the generated image is digitized, encrypted and finally
stored as a registered template in the database. Based on this feature, the vein authentication
device translates the infrared ray image’s black lines as palm’s blood vessel pattern, and after
that then matches it with previously registered blood vessel pattern.

FIG:8 DIGITIZED CONVERSION METHOD

4.5 HOW SECURE IS THE TECHNOLOGY?

On the basis of testing the technology on more than 70,000 individuals , Fujitsu
declared that the new system had a false rejection rate of 0.01% (i.e., only one out of 10,000
scans were incorrect denials for access), and a false acceptance rate of less than 0.00008% (i.e.,
incorrect approval for access in one in over a million scans). Also, if your profile is registered
with your right hand, don't log in with your left - the patterns of an individual's two hands
differ. And if you registered your profile as a child , it'll still be recognized as you grow, as an
individual's patterns of veins are established in utero (before birth). No two people in the world
share a palm vein pattern - even those of identical twins differ. In addition the devices ability
to perform personal authentication was verified using the following:

1. Data from people ranging from 6 to 85 years old including people in various occupations in
accordance with the demographics realized by the Statistics Center of the Statistics Bureau.

2. Data about foreigners living in Japan in accordance with the world demographics released
by the United Nations. 3. Data taken in various situations in daily life including grafter
drinking alcohol, taking a bath, going outside and waking up.

FIG:9 PALM VEIN RECOGNITION

4.5.1. What Happens If The Registered Palm Gets Damaged?

There may be a chance that the palm we had registered may get damaged then we
cannot use this technology, so during the time of registration we take the veins of both the
hands so that if one gets damaged we can access through the second hand. When hand get
damaged up to large extent we can get veins because deeper in to the hand vein is obtained
When we apply this method we can maintain complete privacy.
FIG:10 REGISTERING TWO PALMS

4.5.2. Contact Less Palm Vein Authentication Device (Hygiene Concern):


The complete contactless feature of this device makes it suitable for us where high
levels of hygiene are required. It also eliminates any hesitation people might have about
coming into contact with something that other people have already touched.

FIG: 11 CONTACT LESS SENSOR

It consists of image sensing and software technology. The palm vein sensor captures the
infrared ray image of an individual’s palm. The infrared ray’s lighting is controlled. Depending
on the illumination around the sensor, the sensor is able to capture the palm image in spite of
the position and movement of the palm. With the help of pattern matching method, software
matches the translated vein pattern with the registered pattern by measuring the position and
orientation of the palm.
5. RESULTS

The percentage for match making of palm-print is 89.43. All the modules are working
efficiently. Palm-print algorithm that we have implemented in our project has higher accuracy
and Efficiency rate.

Line-based approaches are developed as an edge detector or use existing edge detection
methods to extract palm lines. These lines are either matched directly or represented in other
formats for matching. The edge operator to detect palm lines and is useful for the task of
feature

The area, bounding box and centric of palm print principal line image values is being
calculated. The Perfect Match can be drawn by matching a testing palm print principal line
image sample with the trained sample depending upon the area, bounding box and centric of
palm print principal line image values.

FIG:12 High Authentication Accuracy


6. CONCLUSION

This palm vein technology and UIN card mechanism has a biometric live to boost the
safety options of the ATM for effective banking dealing for banks. The paradigm of the
developed application has been found promising on the account of its sensitivity to the
popularity of the customers‟ palm vein samples & UIN card recognition as contained within
the information. This technique once absolutely deployed will certainly cut back the speed of
deceitful activities on the ATM machines such solely the registered owner of a card access to
the checking account. Associate embedded palm vein biometric identification theme for ATM
banking systems is planned in conjunction with UIN authentication for a lot of security;
additionally enclosed during this paper. Finally, conclusions square measure drawn out when
perceptive the UIN& Palm vein Authentication theme results.

The biometric use of palm prints uses ridge patterns to identify an individual. Palms of
hands epidermal ridges, thought to provide a friction surface to assist with gripping an object
on surface. Palm print identification systems measure and compare ridges, lines and Minutiae
found on the palm. Palm print is a unique and reliable biometric characteristic with high
usability. The biometric use of palm prints uses ridge patterns to identify an individual. The
introduction is followed by the problem definition; in which general concepts and methods of
palm print recognition is introduced. Then some of the palm prints recognition methods and
system are introduced.
7. FUTURE ENHANCEMENT

Forget about signatures and photo IDs, forget about PIN numbers, forget about
fingerprint, voiceprint, iris scan, or facial recognition security technologies to counter forged
or stolen user IDs. Enter Fujitsu’s palm vein ID authentication, which uses an infrared sensor
to capture the user’s vein pattern unique to every individual’s palm for an exquisitely sensitive
biometric authentication technique. Fujitsu’s novel ID technology has a few other advantages
over other biometric technologies.
The palm vein scanner has no deleterious effect on the body, nor does it require that the
device be touched, unlike current fingerprint scanners, which proved to be disadvantageous
because of sanitary and/or psychological issues related to hygiene or association with
criminals, as well as reasons of usability. Other limitations of various other technologies are
related to measuring external features. Aging or the camera angle could affect facial
recognition systems; fingerprints can be forged. On the contrary, palm vein recognition seems
not to be affected by aging; neither cuts, scars, tattoos, nor skin color affect the scan’s
outcome; and, given that veins are internal, they can hardly be tampered with.
REFERENCES

[1] Babatunde and Charles, J, “A Fingerprint-based Authentication Framework for ATM


Machines”, Journal of Computer Engineering & Information Technology, Volume 3,
Issue 3, 2013.

[2] Prathyusha Kanakam, K.C.B. Rao, S. Mahaboob Hussain, “Olfactory Biometric


Technique: An Emerging Technology”, Journal of Advancement in Robotics, Volume
1, Issue 1, pp 1-11. JoARB (2014) 1-11 © STM Journals 2014.

[3] Harbi AlMahafzah, Maen Zaid AlRwashdeh “A Survey of Multibiometric Systems”,


International Journal of Computer Applications, Volume 43, no.15, 2012.

[4] Abhishek Nagar, Karthik Nandakumar, Anil K.Jain, “Multibiometric Cryptosystems


Based on Feature-Level Fusion”, IEEE transactions on information Forensics and
Security, vol. 7, no. 1255-268. February, 2012

[5] K. Nandakumar and A. K. Jain “Multibiometric Template Security Using Fuzzy


Vault,” in Proc. IEEE 2nd International Conerence of. Biometrics: Theory,
Applications and Systems, Washington, DC, September, 2008.

[6] Kande Archana, Dr. A. Govardhan, “Enhance the Security in the ATM System with
Multimodal Biometrics and Two-Tier Security”, Volume 3, Issue 10, October 2013.

[7] S Mahaboob Hussain, Dr. A. S. N. Chakravarthy, “An Integrated Approach to Provide


Security and Resist Thefts on Digital Data Finger Vein Biometric Match-on
Smartcards”, in Proc. 3 rd World Conference on Applied Sciences, Engineering and
Technology (WCSET 2014) Kathmandu, NEPAL, Sep 2014.
[8] Zhang, Y. B., Li, Q., You, J., & Bhattacharya, P. (2007). “Palm vein extraction and
matching for personal authentication”. In 9 th International conference VISUAL
(pp.154–164).

[9] L. Wang and G. Leedham, “A thermal hand-vein pattern verification system,” in


Pattern Recognition and Image Analysis, S. Singh, M. Singh, C. Apte, and P. Perner,
Eds. New York: Springer, 2005, vol. 3687, pp. 58–65.

[10] D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, “Handbook of Fingerprint


Recognition”. New York: Springer, 2003.

[11] Y. Ding, D. Zhuang, and K. Wang, “A study of hand vein recognition method,” in
Proc. IEEE Int. Conf. Mechatronics & Automation, Niagara Falls, Canada, Jul. 2005,
pp. 2106–2110.
[12] Santhi B, Kumar RK, “Novel Hybrid Technology in ATM Security Using Biometrics”.
Journal of Theoretical and Applied Information Technology 37: 217-223, 2012.

[13] S. S. Das and Debbarma “Designing a Biometric Stradegy fingerprint Measure for
enhancing ATM Security in Indian e-banking system”, International Journal of
Information and Communication Technology Research, Volume 1, Issue 5, pp.197-
203, 2011.

[14] A. Mallikarjuna, S. Madhavi, “Palm Vein Technology Security”, IJARCSSE, Volume,


3 Issue 7, July2013.

[15] A. Sai Suneel, S. B. Sridevi, K. Nalini, “Dual Security Using Fingerprint and Password
in Banking System”, Internactional Journal of Review in Electronics &
Communication Engineering (IJRECE), Volume 1, Issue 3 August 2013.

NOTE:
 All Headings 14 Times New Roman - BOLD
 All content 12 Times New Roman - Bold
 All Line spacing 1.5
 Heading – UPPER CASE (14 Times New Roman-BOLD)
 Side-Heading – UPPER CASE (12 Times New Roman-Bold)
 Sub-Heading – Sentence Case (12 Times New Roman-Bold)
 Fig.1.4 – mention like this for figures
 Justify the entire document
 Start each Chapter in fresh page
 Use only one side to print in a A4 sheet
 Seminar Book Binding color is BLUE.
 Take color print on cover sheet, 1st and 2nd page (title page & bonafide)
 Total no.of pages : 20 – 30 (minimum 20 & maximum 30)
 Mark page no’s as i,ii,iii….. in the right bottom- till List of Figures
 Mark page no’s as 1,2,3….. in the right bottom- after List of Figures
 Images should be clear even if u copy paste from internet, if it’s not clear draw it on
your own using the paint tools or word tools.
 Abstract should be only 1 paragraph with minimum 12 lines and maximum 20 lines
 Example if it is 1. - 14 TNR – All Caps, Bold
1.1 - 12 TNR – All Caps, Bold
1.1.1 - 12 TNR – Capitalize Each Word, Bold
Fig. 1.2 - Name of the figure

Вам также может понравиться