Personal identification system

ABSTRACT

A personal identification system, which uses a vein pattern of a finger, optimizes the amount of light of a light source based on a captured finger image and emphasizes the vein pattern during image processing for identification.

This application is a Continuation of nonprovisional application Ser.No. 10/733,396 filed Dec. 12, 2003 now U.S. Pat. No. 6,912,045 which isa continuation of Ser. No. 09/954,067 filed Sep. 18, 2001 now U.S. Pat.No. 6,813,010 which claims the priority of Japanese application2000-290325 filed on Sep. 20, 2000.

BACKGROUND OF THE INVENTION

The present invention relates to a technology for identifying a personusing a living body, and more particularly to a technology foridentifying a person using a finger vein pattern.

Today, the typical personal identification technology is fingerprintidentification. However, the problem is that other person's fingerprintis easily obtained, for example, a criminal's fingerprint is taken inthe scene of a crime, and therefore a finger-print may be forged. Thisproblem leads to the development of personal identification technologiesother than fingerprint identification. For example, JP-A-7-21373,laid-open Jan. 24, 1995, discloses a personal identification technologythorough the use of a finger blood vessel pattern, and JP-A-10-295674,laid-open Nov. 10, 1998, discloses a personal identification technologythrough the use of a vein pattern on the back of a hand. Thesetechnologies shine a light on a finger or on the back of a hand, capturethe reflected light or transmitted light, extract the blood vesselpattern from the captured image, and compare the captured blood vesselpattern with the previously-registered blood vessel pattern to identifya person.

SUMMARY OF THE INVENTION

However, there are some problems in implementing a personalidentification system that uses finger vein patterns.

One of the problems is the reproducibility of a captured image. Althougha conventional personal identification system has positioning parts suchas a pin or a grasping bar for stabilizing the imaging region, an errorin the imaging region is unavoidable, for example, when a finger isrotated or moved in the plane or when a finger is rotated on its majoraxis. Therefore, it is difficult to completely match a registered veinpattern with a vein pattern obtained at identification time, with theresult that the performance of identification is reduced. In particular,on a fully-non-contact system on which the finger is not put onsomething for fixing, a registered vein pattern and a captured veinpattern may differ largely and this difference further reduces theperformance of identification.

Another problem is a light source. A conventional personalidentification system has no function to adjust the amount of light fromthe light source. This generates several image-quality problems such asa blurred outline of a captured image, a lack in sharpness, and a lowcontrast. These problems require a complex image-processing algorithmfor correction and sometimes result in the low performance ofidentification.

According to one aspect of the present invention, means described belowis used for improving reproducibility. First means is an algorithm forcorrecting an error detected during image processing that is executedfor matching an imaged finger blood vessel pattern with a registeredpattern. This correction prevents the performance of identification frombeing degraded.

Second means is a three-dimensional imaging of a living body fromvarious angles using a plurality of imaging devices. Even if aregistered vein pattern was imaged from only one direction, that is, theregistered pattern is two-dimensional data, the finger may be placedfreely when imaged for identification. Therefore, even if there is anerror in the imaging region, one of the plurality of images may beselected for use in matching. This prevents the performance ofidentification from being degraded. It is also possible to registerthree-dimensional vein patterns as patterns to be registered by imagingthe vein pattern from a plurality of directions. In this case, one ofthe plurality of registered vein patterns is selected for matching. Thisalso prevents the performance of identification from being degraded evenif there is an error in the imaging region.

Combining the first means with the second means further increases theperformance of identification.

A light source with means for optimizing the amount of light at imagingtime is used as the light source. This configuration optimizes theamount of light from the light source to make the quality of a capturedimage best.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a diagram showing an example of the configuration of a systemthat captures the blood vessel image of a living body using an opticalmethod.

FIG. 2 is an external view of a personal identification system in anembodiment of the present invention.

FIGS. 3A and 3B are diagrams showing a low-contact finger positioningmethod.

FIG. 4 is a diagram showing a light source composed of arrangedlight-emitting devices.

FIG. 5 is a diagram showing a three-dimensional imaging method using thethree-dimensional arrangement of imaging devices.

FIG. 6 is a flowchart showing a procedure for capturing a finger imagein the embodiment of the present invention.

FIG. 7 is a diagram showing the positioning of fingers at identificationtime when air is jetted.

FIG. 8 is a diagram showing an identification device using air jet usedin an embodiment of the present invention.

FIGS. 9A, 9B, and 9C are diagrams showing the sterilization method usedon a contact identification device.

FIG. 10 is a diagram showing the overview of processing from fingerimage capturing to identification in the embodiment of the presentinvention.

FIG. 11 is a diagram showing a procedure executed from finger imagecapturing to identification in the embodiment of the present invention.

FIGS. 12A-12G are diagrams showing a first example of the creation of animage to be registered and an image to be authenticated in theembodiment of the present invention.

FIGS. 13A, 13B, and 13C are diagrams showing a second example of thecreation of an image to be registered and an image to be authenticatedin the present invention of the present invention.

FIG. 14 is a diagram showing a first example of the method fornormalizing identification processing results in the embodiment of thepresent invention.

FIG. 15 is a diagram showing a second example of the method fornormalizing identification processing results in the embodiment of thepresent invention.

DETAILED DESCRIPTION OF THE EMBODIMENTS First Embodiment

FIG. 1 is an example of the basic configuration of a personalidentification system. FIG. 2 shows an embodiment of a personalidentification system according to the present invention. The systemcomprises a light source unit 101 that shines a light on a finger, animaging unit 103 that captures the image of a finger, and an imagingprocessing unit 104 that processes captured image data. As the lightsource, a semiconductor light source, such as an LED (Light EmittingDiode), is usually used because of its responsiveness andcontrollability. A CCD camera is used as the imaging unit. A personalcomputer is conveniently used as the imaging processing unit 104 thatcaptures an image into the computer via the interface such as an imagecapture board. The imaging processing unit 104 performs processingnecessary for identifying a captured image. Numeral 201 indicates awindow through which a light from the light source transmits. Anautomatic shutter may be provided on the window to prevent a light frombeing leaked from the surrounding part of the finger to ensure accuracyin image processing. An automatic shutter may also be providedseparately between the light source and the finger. Numeral 202 indicatepins that fix the imaging region. These pins are optional. If there isno pin, the system is a fully non-contact system. The imaging unit 103captures a vein pattern image formed by the light transmitted throughthe finger.

As a vein pattern for use in personal identification, it is morepreferable to use the vein pattern of a palm-side finger than to use thevein pattern of a back-side finger. This is because the vein pattern ofthe back-side finger, which is always exposed externally, is more likelyto be stolen. In this embodiment, the system always images the veinpattern of the palm-side finger.

FIG. 3A is a diagram showing the fingers exposed to the light sourceunit 101 shown in FIG. 1, as viewed from the front. FIG. 3B is a diagramshowing the positional relation among light-emitting devices 301constituting the light source, positioning pins 205, a finger 302, andan imaging device 303, as viewed from the tip of the finger. Numeral 304indicates a transmitted light.

A plurality of light-emitting devices, which make up the light source,are arranged according to the shape of a finger, as shown in FIG. 4.Although near-infrared, high-intensity light-emitting diodes (LEDs) areused as the light source, a laser beam may also be used. Numerals 401,402, 405, and 406 are the front views of many types of light source.Numeral 401 indicates the shape of a light source made up of a pluralityof conventional mold-type near infrared light-emitting diodes(near-infrared LEDs) arranged linearly. Because each of the plurality oflight-emitting devices indicated by numeral 401 is round, the brightnessof the light source is uneven. To solve this problem, the round edges ofthe plurality of mold-type LEDs are removed to form the light source inthe shape indicated by numeral 402. Numeral 407 is the front view, andnumeral 408 is the cross sectional view, of an LED whose edges have beenremoved. The shaded areas indicated by numeral 407 are the areas thatare removed. The view indicated by numeral 403, a cross sectional viewof the light source indicated by numeral 402, indicates the light sourceformed by arranging a plurality of LEDs each in the shape indicated bynumerals 407 and 408. This arrangement eliminates unevenness in thesource light and increases the packing density and the light sourceintensity. Numeral 405 is an example of a light source made up of aplurality of chip-type LEDs arranged in the plane. In any case, aplurality of LEDs are arranged to detect the location of a finger basedon the image monitored by the imaging unit, and the light sourceelements to be turned on are selected to form a light source accordingto the thickness and the length of a finger.

FIG. 6 shows the procedure for capturing a finger image. As the lightsource, a weak light is kept on at all times (601). The system checks ifa finger is exposed to the weak light (602) and, if a finger is present,detects the location of the finger (603). The presence and the locationof the finger are detected based on the pixel value data of the monitorimage. Based on the location data of the detected finger, the systemdecides which elements of the light source to be turned on (604). Inaddition, the system acquires the pixel data of the monitor image (605)to optimize the amount of light to be supplied from the light source.

The procedure for optimizing the amount of light is as follows. Whenhuman being's finger or toe is imaged, the light transmission factor ishighest in joints. Therefore, the system detects a joint from the lightintensity profile of a finger in the major axis in the image data anduses the maximum intensity value as the intensity value (B) of thejoint. This value is compared with the reference value (A) of intensitythat is previously set. If A−B<0, the light source is subjected to afeedback to reduce the input current to the light source. If A−B>0, thecurrent input to the light source is increased. When A−B=0, the systemends the adjustment of light intensity, captures the image, and startsimage processing. Performing this processing for each light-emittingdevice optimizes not only the amount of light but also the area of thelight source. In this case, the light source with the configurationcomposed of chip-type, small LEDs arranged in the plane, such as the oneindicated by numeral 405 in FIG. 4, is best. This configuration iseffective for shining a light on a finger whose thickness and lengthvary greatly.

The method described above adjusts the light source output to optimizethe light intensity. Alternatively, adjusting the time during which thelight stays on may also optimize the light intensity.

To optimize the amount of light, it is required that the joint beidentified. Two sample procedures for identifying the joint will bedescribed. In one procedure, a portion with a relatively highlight-intensity value is detected in the image profile of a blood vesselpattern of a finger, imaged through the use of transmitted light, toidentify the joint of the finger. Then, a feedback is effected such thatno pixel reaches the intensity value of 255 in the 8-bit dynamic range.In another procedure, an image to which a spatial low-pass filter isapplied in the major axis direction of a finger in the captured image isevaluated, and the amount of light of the light source striking thejoint is adjusted. Any of the procedures described above forms a lightsource with a spatial intensity distribution.

The above-described configuration for automatically adjusting the amountof light is suitable for capturing a high-contrast blood vessel image.Adjusting the amount of light significantly increases the quality of ablood vessel image, allowing person identification throughimage-to-image operation of captured images to be performed smoothly.

With a previously registered finger blood vessel as the template,personal identification operation is performed through the calculationof correlation to find a similarity between the blood vessel patternimage of a finger imaged at authentication time and the template. Thecalculation of correlation is a monotone increasing calculation in whichan output value increases in proportion to the degree of matching oftwo-dimensional array elements. Most typically, a two-dimensionalconvolution calculation (formula 1) is used.

$\begin{matrix}{{{z( {{k1},{k2}} )} = {\sum\limits^{m}{\sum\limits^{n}{{x( {i,j} )}{y( {{{k1} + 1 - i},{{k2} + 1 - j}} )}}}}}( {{{k1} = 1},2,{{\ldots\mspace{14mu} m} + n - 1},\;{{k2} = 1},2,{{\ldots\mspace{14mu} m} + n - 1}} )} & ( {{Formula}\mspace{20mu} 1} )\end{matrix}$

One to ten fingers, usually up to all fingers and toes may beregistered. Depending upon the required security level, the number offingers to be compared may be increased. In some cases, a non-fingerblood vessel image may also be used with a finger image.

FIG. 10 is a block diagram showing the personal identification procedureexecuted based on the image of a detected finger. Personalidentification processing is divided roughly into two: registrationprocessing and authentication processing. Registration processing,blocks 1000-1001, is processing in which a database 100 is created basedon the images registered at registration time. Authenticationprocessing, blocks 1002-1005, is processing in which a person isaccepted or rejected based on the calculation of correlation between animage that is input for identification and a registered image.

During registration processing, the image detecting means captures aperson's finger image to be registered (block 1000). At the same time,registration image creation processing, which will be described later,is performed to create a finger-vein emphasized image and the createdimage is registered (block 1001). On the other hand, duringauthentication processing, the personal information receiving meansreceives a person's ID (block 1002) and, at the same time, theregistered image corresponding to the received ID is selected from thedatabase (block 1003). In addition, the image detecting means capturesan identfee's image to be authenticated (block 1004) and, at the sametime, authentication image creation processing, which is similar toregistration image creation processing and will be described later, isperformed to create a blood vein emphasized image (block 1005), and thecalculation of correlation between the captured image and the registeredimage is executed.

Then, the result of the calculation of correlation is evaluated, and theauthentication result indicating whether or not he/she is an identicalperson is output. Most typically, a two-dimensional convolutioncalculation is used as the calculation of correlation. In this case,even if the finger is translated in the image plane, the distributionobtained as a result of the two-dimensional convolution operation isalso translated with no change in size and shape. Therefore, theevaluation of similarity between these two images automatically correctserrors generated by the translation in the image plane. In addition,taking advantage of the fact that the convolution operation between twodata units is equivalent to the inverse Fourier transformation of theproduct of the Fourier-transformed data units, two-dimensional FastFourier Transform (hereinafter called FFT) may be used to speed up thecalculation of correlation.

FIG. 11 is a block diagram showing the image operation procedure whenFFT is used to speed up the calculation of correlation. Finger-edgeextraction and image-rotation processing (block 1101) is performed forthe captured image to be registered or for the captured image to beauthenticated. During this processing, the finger edge is extracted and,based on the extracted edge, the image is rotated so that the fingerinclination becomes constant. Even when the physical location of thefinger is inadequate, this processing corrects an error in the rotationin the image plane and precisely locates the finger in the image space.This processing, combined with the characteristics of thetwo-dimensional calculation of correlation described above, correctserrors associated with finger movement operations (both translation androtation) in the image place and correctly locates the finger in theimage space.

The image to be registered and the image to be authenticated, for whichfinger-edge extraction and image-rotation processing has been performed,are each converted to a finger-vein emphasized image (block 1102), andthe two-dimensional FFT operation is executed for the converted result(block 1103). The result generated for the former image is registered.The result generated for the latter image is multiplied by theregistered image selected based on the received ID (block 1104). Then,two-dimensional fast inverse Fourier transformation (Inverse FFT,hereinafter called IFFT) is performed for the result (block 1105) toproduce the correlation distribution of the registered image and theimage to be authenticated. As described above, the same image processingis performed for blocks 1101 to 1103 during registration image creationprocessing (block 1001) and during authentication image creationprocessing (block 1005).

The personal identification system may include a light source whichshines a light on the imaging region of a living body, an imaging unitwhich detects a transmitted light from the imaging region to image theliving body, and an imaging processing unit which extracts the bloodvessel pattern of the living body from the image converted by theimaging unit and compares the pattern with a previously-registered bloodvessel pattern, wherein the image processing unit may comprises meansfor correcting an error between the registered blood vessel pattern andthe imaged blood vessel pattern.

FIG. 12A is a block diagram describing in detail an example of the bloodvessel emphasizing processing procedure. FIGS. 12B-12D are the generalviews of a finger image generated by each processing procedure.

An input image is divided roughly into a finger 120, an edge 121, and asurrounding part 122. In general, the image also includes various noises123 that must be removed. In FIG. 12A, blocks (1201)-(1203) execute theprocedure for extracting the edge of a finger, blocks (1204)-(1206)execute the procedure for extracting an image corresponding to thebackground (back-trend) that is the part where no finger vein pattern ispresent, and blocks (1207)-(1211) execute the procedure for removing theback-trend from the original image to extract only the necessary veinpattern.

In response to a captured finger image (block 1200), a high-cut filterfilters out small components such as noises 123 (block 1201) andemphasizes only relatively large components such as the edge. Then, theprocedure executes directional differentiation (block 1202) to give anedge-enhanced image (FIG. 12C).

As shown in the image in FIG. 12C, the edge 121 in the edge enhancedimage is enhanced and has a large pixel value. Based on the pixel value,the procedure performs edge detection processing to obtain only thelocation information on the edge 121 (block 1203). Then, based on thelocation information on the detected edge, the procedure produces animage (FIG. 12D) generated by clipping out only the finger 120 from theoriginal image shown in FIG. 12B (block 1204).

In the image shown in FIG. 12D, the average of the pixel values outsidethe finger is made equal to the average of the pixel values inside thefinger. Without this averaging operation, the finger edge componentemphasized by finger the edge emphasizing processing would affect theoperation, preventing personal identification operation through the veinpattern from being performed properly.

When the average of the pixel values inside the finger is shifted to 0,the pixel value of 0 is inserted into the surrounding part 122 of theimage shown in FIG. 12D. Then, after an image (FIG. 12E) is created byextraporation of the values of the surrounding part 122 of the imageshown in FIG. 12D in the vertical direction by use of the values of theedge 121 (block 1205), only the large component, that is, theback-trend, is extracted with a high-cut filter (block 1206). In theblock 1205, extrapolation is performed to prevent the high-cut filter inthe block 1206 from unintentionally emphasizing the pixel value near theedge 121.

Next, after creating a difference image between the original image (FIG.12B) and the back-trend image (block 1208), the clipped-out image (FIG.12F) of the difference image is obtained based on the detected edgelocation. The difference corresponds to a part processed by a low-cutfilter. This processing removes the back-trend component generated by alight transmitted through muscles or fat tissue or by diffused lights.Therefore, an image where only the blood vessel component is emphasized,such as the one shown in FIG. 12F, is obtained.

Finally, according to the inclination of the finger obtained from thedetected edge location, the image is rotated such that the finger isinclined at a fixed angle, typically, at an angle of 0 degree (FIG. 12G)(block 1209). This image is output as the image to be registered or asthe image to be authenticated (block 1210).

FIG. 15 is a block diagram showing the authentication procedure that isexecuted after the image to be authenticated is obtained by theprocedure in FIG. 12. The calculation result of correlation between theregistered image and the image to be authenticated is normalized by theformula shown below (formula 2) (block 1503), followed by the extractionof the maximum value M of the distribution (block 1504).Cab(x, y)/(√{square root over (Caa(x,y))}×√{square root over(Cbb(x,y))})  (Formula 2)where, Cab(x,y) is the correlation distribution of the registered imageand the image to be authenticated. Caa(x,y) and Cbb(x,y) represent a sumof squares of respective pixel data of a registered image and a sum ofsquares of respective pixel data of an image to be authenticated,respectively.

If the calculated maximum correlation value M of the registered imageand the image to be authenticated is larger than the threshold Mo, theidentifee is regarded as valid and is accepted (block 1009). If thevalue M is less than the threshold Mo, the identifee is not regarded asvalid and is rejected (block 1010). The threshold Mo should bestatistically calculated in advance by entering sample images. When theaverage of pixel values inside the finger is shifted to the value of 0,the value of Mo ranges from 0.45 to 0.55. However, the value is notlimited to this range.

If a person is not acknowledged, he or she must re-enter data, such asfinger image capture data, to make a re-authentication request apredetermined number of times. For example, a person who is successfullyacknowledged is allowed to access managed data or areas. On the otherhand, a person who is not acknowledged makes a re-authentication requesta predetermined number of times and, if the person is not yetacknowledged, access to the managed data or areas is rejected.

It is desirable that the personal information input means, which is usedto select a person's registered finger image from the database, not be akeyboard but a non-contact device. For example, personal informationsuch as a name or a password, or a keyword that is known only to theperson, may be input via voice or, alternatively, stored on anon-contact IC card. This type of input means makes it possible to builda personal identification system that takes advantage of non-contactfeatures. This processing may be done independently by the CPU of theidentification system or by an online system via computers.

An image to be authenticated is stored on a fixed medium connected tothe authentication server, a medium containing semiconductor memory, ora portable medium such as a floppy disk. This method eliminates the needfor keyboard operation on a banking ATM, solves the problems associatedwith a contact input device, and relieves a maintenance nuisance. Theadvantages described above make this method suitable for gaining accessto personal information in an electronic government or forauthentication in online transactions.

Second Embodiment

In the first embodiment, a finger is imaged with one CCD camera. Afinger may also be imaged with a plurality of CCD cameras duringauthentication or image capturing to increase the performance ofidentification.

FIG. 5 shows the arrangement of this embodiment where a plurality of CCDcameras are used; that is, a light source 301, a finger 302, and CCDcameras (303-1-303-5) are arranged as shown. In this embodiment, aplurality of finger vein patterns are captured from a plurality ofdirections using a plurality of CCD cameras, and the pattern mostsimilar to the registered vein pattern is selected for authentication.Alternatively, a plurality of vein patterns to be registered arecaptured and saved as three-dimensional data and, from these patterns,the pattern most similar to the vein pattern to be authenticated isselected for authentication. This method is particularly effective forpreventing the performance of identification from being degraded whenthe finger is rotated in the major axis direction and, at the same time,effective for implementing a complete-non-contact device.

Not only a still image but also a moving image may be imaged. Whenimaging and registering a three-dimensional moving image, a finger isrotated in the configuration, shown in FIG. 3B, which is composed of thelight source LED (301), finger (302), and imaging device (303).Alternatively, as shown in FIG. 5, a plurality of CCD cameras may beused to capture an image from a plurality of points. A person isauthenticated either by a two-dimensional image imaged by the imagingunit in the configuration shown in FIGS. 3A and 3B or by athree-dimensional image imaged by the imaging unit in the configurationshown in FIG. 5.

The image is captured into the processing unit for use in imageoperation and authentication. Because the most similar vein pattern tobe registered or the most similar vein pattern to be authenticated isselected for authentication, this method is advantageous in that theperformance of identification is increased and the image operation loadis reduced.

Third Embodiment

FIGS. 13A-13C are block diagrams showing in detail one example of bloodvessel emphasizing processing (corresponds to blocks 1101-1103 in FIG.11). When a finger image is received (block 1000 or 1004), edgedetection processing is performed to detect the location of the fingeredge (block 1300). Based on the detected edge location, image rotationprocessing is performed so that the image is rotated such that thefinger is inclined at a fixed angle, typically, at an angle of 0 degree(block 1301). Blood pattern emphasizing processing is performed for theobtained image (block 1302).

For example, blood pattern enhancement processing is performed using afilter, such as the one shown in FIG. 13B, designed to removehigh-frequency components in the major axis direction of the finger, andlow-frequency components in the minor axis direction. Filtering may bedone either by the convolution operation (formula 1) in the real spaceor by the multiplication operation in the frequency domain. For theimage where the blood vessel pattern is enhanced, the average of thepixel values outside the finger is made equal to the average of thepixel values inside the finger, based on the edge location detected bythe edge detection processing (block 1300), as in FIGS. 12A-12G (block1303). When shifting the average of the pixel values inside the fingerto 0, the pixel values outside the edge are set to 0.

Two-dimensional FFT transform operation is performed for the obtainedimage (block 1103), squaring of respective pixel data of the obtained isperformed (block 1304), and then two-dimensional IFFT operation isperformed (block 1305). For the obtained result, the parameters forevaluation are calculated (block 1306). Because vessels usually run inthe major axis direction of the finger rather than in the minor axisdirection, the difference in the blood vessel pattern is most reflectedin the peak shape in the minor axis direction of the finger in thetwo-dimensional convolution operation result. Therefore, the parametersfor evaluation are calculated, for example, using a kernel composed onlyof the elements in the minor-axis direction of the finger such as theone shown in FIG. 13C, to perform convolution operation in the realspace or multiplication in the frequency domain.

If the input image is an m×n matrix and the kernel is a p×1 matrix, thenthe result of the calculation of parameters for evaluation is a(m+p−1)×n matrix. The maximum value Mx of the resulting matrix iscalculated for each of the registered image and the image to beauthenticated. Let the maximum value be M1 and M2, respectively. M1 isstored in the database (100).

FIG. 14 is a block diagram showing the authentication procedure executedafter block 1007 when an image is processed according to the procedureshown in FIG. 13A. Calculation of parameters for evaluation (block 1403)is executed for the result of the calculation of correlation between theregistered image and the image to be authenticated. For the calculatedmaximum value M, normalization operation (block 1404) is performedaccording to the formula (formula 3) based on M1 and M2 described above.M=M ₁₂/√{square root over (M ₁ ×M ₂)}  (Formula 3)

If the calculated value MX of correlation between the registered imageand the image to be authenticated is larger than the threshold Mxo, theidentifee is regarded as valid and is accepted (block 1009). If thevalue Mx is less than the threshold Mxo, the identifee is not regardedas valid and is rejected (block 1010). The threshold Mxo should bestatistically calculated in advance by entering sample images. When theaverage of pixel values inside the finger is shifted to 0 as describedabove, the value of Mxo ranges from 0.3 to 0.4 but is not limited tothis range.

Fourth Embodiment

Because a fully non-contact method is not always advantageous in cost,processing time, and compactness, it is more practical for a device,while still retaining the non-contact features described above, to havethe minimum positioning parts required for fixing an imaging region suchas a finger or a hand. Note that more bacilli are present on the palm ofa hand of a human being than on the back. Therefore, even on a device onwhich the imaging region contacts the positioning parts, the palm of thehand should not contact the device. The following describes an example.

FIG. 7 shows a finger positioning method using air jet instead of thepins in FIGS. 3A and 3B. Compressed air is jetted from the jet hole(FIG. 7(700), FIG. 8(800)). Numeral 802 indicates an air compressor anda control system, and numeral 801 indicates a compressed-air intake. InFIG. 8, an air jet from the air jet hole on the palm side of the handprevents the palm from contacting the device. At identification time, aperson places his or her hand naturally in the position where the airjet from the hole 700 in FIG. 7 does not blow strongly against thefingers.

An optical sensor, which measures the distance between the device andthe palm to check to see if the height, from the device to the palm, iscorrect, is provided to control image capturing. If the height isincorrect, incorrect-height information is sent to the identifee.Because the palm does not contact any object as described above, thisembodiment reduces the possibility of bacillus contagion caused by anunspecified number of persons using the device. Therefore, it can besaid that the method in this embodiment in which the palm does notcontact any object is better than a method in which the palm contactsthe device.

Winding a palm-contact sheet (900) or sterilizing the sheet with aultraviolet light source (901) or a disinfectant (902) allows even apalm-contact device to take advantage of the identification systemaccording to the present invention that keeps the device clean. For fullsterilization, an optical-catalyzed (titanic-oxide) coated sheet is usedas the palm-contact sheet (900) and a ultraviolet light is shown on thesheet. Including this type of sterilizer keeps the device clean.

The embodiments described above allow a reliable, secure, andeasy-to-use personal identification system to be built. That is, afamiliar, forgery-proof, highly-accurate personal identification systemmay be implemented while eliminating or minimizing maintenancemanagement work executed for preventing contagion caused by dirt on thedevice or for preventing errors in obtained data.

1. A personal identification apparatus comprising: a positioning devicethat positions a body part of the person in a predetermined region; alight source that radiates light onto the body part; an imaging unitwhich captures a transmitted light from the body part irradiated by thelight and creates an image from the captured transmitted light; an imageprocessing unit which processes the image so as to enhance or extract ablood vessel pattern included in the image, compares the blood vesselpattern with at least one registered blood vessel pattern stored in thepersonal identification apparatus, and identifies the person, whereinthe image processing unit detects a setting of the identification regionto the position from the image created by the image unit, and starts theirradiation with the light source.
 2. A personal identificationapparatus according to claim 1, wherein the body part is a finger.
 3. Apersonal identification apparatus according to claim 2, wherein thelight source irradiates light to detect a positioning of the body partbefore irradiating the light onto the body part to create the image. 4.A personal identification apparatus according to claim 2, wherein thelight source comprises a plurality of light-emitting elements.
 5. Apersonal identification apparatus according to claim 2, wherein, thepositioning device is sterilized.
 6. A personal identification apparatusaccording to claim 2, further comprising: a memory to store at least onefeature quantity of a blood vessel pattern as the at least oneregistered blood vessel pattern along with information of at least oneperson to be identified.
 7. A personal identification apparatusaccording to claim 2, further comprising: input means that inputspersonal information to select one of the registered blood vesselpatterns corresponding to the information.
 8. A personal identificationapparatus according to claim 7, wherein the input means is selected froma group consisting of a voice input device, an IC card and a keyboard.9. A personal identification apparatus according to claim 2, wherein theat least one registered blood vessel pattern is stored in a mediumconnected to an authentication server or a portable medium.
 10. Apersonal identification apparatus according to claim 1, wherein thelight source irradiates light to detect a positioning of the body partbefore irradiating the light on to the body part to create the image.11. A personal identification apparatus according to claim 10, whereinthe light source comprises a plurality of light-emitting elements.
 12. Apersonal identification apparatus according to claim 1, wherein thelight source comprises a plurality of light-emitting elements.
 13. Apersonal identification apparatus according to claim 1, wherein thepositioning device is sterilized.
 14. A personal identificationapparatus according to claim 1, further comprising: a memory to store atleast one feature quantity of a blood vessel pattern as the at least oneregistered blood vessel pattern along with information of at least oneperson to be identified.
 15. A personal identification apparatusaccording to claim 1, further comprising: input means that inputspersonal information to select one of the registered blood vesselpatterns corresponding to the information.
 16. A personal identificationapparatus according to claim 15, wherein the input means is selectedfrom a group consisting of a voice input device, an IC card and akeyboard.
 17. A personal identification apparatus according to claim 1,wherein the at least one registered blood vessel pattern is stored in amedium connected to an authentication server or a portable medium.
 18. Apersonal identification method comprising the steps of: illuminating anarea at which a body part of a person is to be located with a lighthaving a first intensity; detecting the body part in response to thelight being interrupted by the body part; irradiating the body part witha light having a second intensity stronger than the first intensity;capturing a transmitted light from the body part; processing an imagecreated from the captured transmitted light so as to enhance or extracta blood vessel pattern included in the image; comparing the blood vesselpattern with one or plurality of registered blood vessel patterns storedin the personal identification apparatus; identifying the person whenthe maximum correlation value between the extracted or enhanced bloodvessel pattern and the one or one of the plurality of registered bloodvessel patterns is larger than a predetermined threshold value; andoutputting data regarding the person identified.
 19. A personalidentification method according to claim 18, wherein the body part is afinger.
 20. A personal identification apparatus, comprising: apositioning device that positions a finger of a person in apredetermined region; a light source configured to selectively irradiatea first light having a first intensity and a second light having asecond intensity stronger than the first intensity, the light sourceirradiating the second light to the finger in response to the fingerbeing detected by detecting interruption of the first light by thefinger; an imaging unit which captures transmitted light derived fromthe second light through the finger and creates an image from thetransmitted light; and an image processing unit which processes theimage so as to enhance or extract a blood vessel pattern of the fingerincluded in the image, compares the blood vessel pattern with at leastone registered blood vessel pattern stored in the personalidentification apparatus, and identifies the person.