Skip to main content

A Bio-application for Accident Victim Identification Using Biometrics

  • Chapter
  • First Online:

Part of the book series: Lecture Notes in Computational Vision and Biomechanics ((LNCVB,volume 26))

Abstract

A unique way to identify victims is an essential requirement for maintaining health records in hospital information systems. Although significant steps have been made in medical innovation and enhanced technologies, there are still major concerns regarding identifying a victim and their blood group in the event of an emergency. Information and Communication Technology (ICT) can help in identifying the location of an accident through a global positioning system (GPS) and can send a request for the emergency need for a required blood group. This chapter presents an application and proposes a novel approach to victim identification based on an autoencoder and extreme learning machine (ELM) techniques that can enhance accuracy. An autoencoder is employed to images of a victim’s fingerprint to emphasize the spatial gradients of the edges on the finger. Application of autoencoder not only denoises the input data, but also minimizes the dimensionality of the data. An ELM is applied to a preprocessed image to extract the unique features for victim identification. An effective optimal cost region matcher (OCRM) with deep learning techniques is applied to enhance the accuracy of victim recognition. This application enables “the man in the street” to inform the family members of a victim to be informed of their status. Further, the system detects and deals with blood group aids in mitigating risk in initial treatment.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Agarwal N, Sebastian MP (2014) Technology investment determinants for usage patterns in different sized healthcare institutions. In: 2014 IEEE international technology management conference (ITMC). IEEE, pp 1–4

    Google Scholar 

  2. Ali MM, Yannawar P, Gaikwad AT (2016) Study of edge detection methods based on palmprint lines. In: International Conference on electrical, electronics, and optimization techniques (ICEEOT). IEEE, pp 1344–1350

    Google Scholar 

  3. Anif M, Putra AS, Ernawati D, Prabuwono AS (2015) HoMeTrack: RFID-based localization for hospital medicine tracking system. In: 2015 2nd international conference on information technology, computer, and electrical engineering (ICITACEE). IEEE, pp 449–453

    Google Scholar 

  4. Ashour AS, Beagum S, Dey N, Ashour AS, Pistolla DS, Nguyen GN, Shi F (2016) Light microscopy image de-noising using optimized LPA-ICI filter. Neural Comput Appl, pp 1–17

    Google Scholar 

  5. Ashwin S, Loganathan S, Kumar SS, Sivakumar P (2013) Prototype of a fingerprint based licensing system for driving. In International conference on information communication and embedded systems (ICICES). IEEE, pp 974–987

    Google Scholar 

  6. Astilean A, Avram, C, Letia, T, Mihele F (2009) Fingerprint based temporary identity supporting emergency actions in collective accidents. In: International conference on eHealth, telemedicine, and social medicine. eTELEMED’09. IEEE, pp 93–98

    Google Scholar 

  7. Barra S, Casanova A, De Marsico M, Riccio D (2014) Babies: biometric authentication of newborn identities by means of ear signatures. In: IEEE workshop on proceedings of biometric measurements and systems for security and medical applications (BIOMS). IEEE, pp 1–7

    Google Scholar 

  8. Beagum S, Dey N, Ashour AS, Sifaki-Pistolla D, Balas VE (2016) Nonparametric de-noising filter optimization using structure-based microscopic image classification. Microsc Res Tech 80(4):419–429

    Google Scholar 

  9. Cambria E, Huang GB, Kasun LLC, Zhou H, Vong CM, Lin J, Leung VC (2013) Extreme learning machines [trends & controversies]. IEEE Intell Syst 28(6):30–59

    Article  Google Scholar 

  10. Chan FKS, Kong AWK (2015) Using hair follicles with leg geometry to align androgenic hair patterns. In: Intelligence and security informatics conference (EISIC), 2015 European. IEEE, pp 137–140

    Google Scholar 

  11. Chen CL, Hu JX, Fan CL, Wang KH (2016) Design of a secure medical data sharing system via an authorized mechanism. In: IEEE International conference on systems, man, and cybernetics (SMC), 2016. IEEE, pp 002478–002482

    Google Scholar 

  12. Choosang P, Vasupongayya S (2015) Using fingerprints to identify personal health record users in an emergency situation. In: 2015 international computer science and engineering conference (ICSEC). IEEE, pp 1–6

    Google Scholar 

  13. Deepa SN, Arunadevi B (2013) Extreme learning machine for classification of brain tumor in 3D MD images/elm za klasifikaciju tumora mozga kod 3D MR snimaka. Informatologia 46(2):111

    Google Scholar 

  14. Dey M, Dey N, Mahata SK, Chakraborty S, Acharjee S, Das A (2014) Electrocardiogram feature based inter-human biometric authentication system. In: 2014 international conference on electronic systems, signal processing and computing technologies (ICESC). IEEE, pp 300–304

    Google Scholar 

  15. Dey N, Ashour AS, Beagum S, Pistola DS, Gospodinov M, Gospodinova EP, Tavares JMR (2015) Parameter optimization for local polynomial approximation based intersection confidence interval filter using genetic algorithm: an application for brain MRI image de-noising. J Imaging 1(1):60–84

    Article  Google Scholar 

  16. Dey N (ed) (2016) Classification and clustering in biomedical signal processing. IGI Global

    Google Scholar 

  17. Dey N, Nandi B, Das P, Das A, Chaudhuri SS (2013) Retention of electrocardioGram features insiGnificantly devalorized as an effect of water marking for. Adv Biometr Secure Human Authentication Recogn 175

    Google Scholar 

  18. Fan X, Bai J, Shen P (2006) Diagnosis of breast cancer using HPLC metabonomics fingerprints coupled with computational methods. In: 27th annual international conference of the engineering in medicine and biology society. IEEE-EMBS 2005. IEEE, pp 6081–6084

    Google Scholar 

  19. Huang Z, Yu Y, Gu J, Liu H (2017) An efficient method for traffic sign recognition based on extreme learning machine. IEEE Trans Cybern 47(4):920–933

    Article  Google Scholar 

  20. Ibrahim S, Jaafar H, Ramli DA (2014) Robust palm print verification system based on evolution of kernel principal component analysis. In: 2014 IEEE international conference on control system, computing and engineering (ICCSCE). IEEE, pp 202–207

    Google Scholar 

  21. Jain AK, Arora SS, Cao K, Best-Rowden L, Bhatnagar A (2017) Fingerprint recognition of young children. IEEE Trans Inf Forensics Secur 12(7):1501–1514

    Article  Google Scholar 

  22. Jin Q, Jeon W, Lee C, Choi Y, Won D (2013) Fingerprint-based user authentication scheme for home healthcare system. In: 2013 fifth international conference on ubiquitous and future networks (ICUFN). IEEE, pp 178–183

    Google Scholar 

  23. Jayant NK, Borra S (2016) Attendance management system using hybrid face recognition techniques. In: Conference on advances in signal processing (CASP). IEEE, pp 412–417

    Google Scholar 

  24. Ma HT, Ye C, Wu J, Yang P, Chen X, Yang Z, Ma J (2014) A preliminary study of DTI Fingerprinting on stroke analysis. In: 2014 36th annual international conference of the IEEE engineering in medicine and biology society (EMBC). IEEE, pp 2380–2383

    Google Scholar 

  25. Rajeswari P, Raju SV, Ashour AS, Dey N (2017) Multi-fingerprint unimodel-based biometric authentication supporting cloud computing. In: Intelligent techniques in signal processing for multimedia security. Springer International Publishing, pp 469–485

    Google Scholar 

  26. Rao NG, Sravani T, Kumar VV (2014) OCRM: optimal cost region matching similarity measure for region based image retrieval. Int J Multimedia Ubiquitous Eng 9(4):327

    Article  Google Scholar 

  27. Reddi S, Borra S (2017) Identity-based signcryption groupkey agreement protocol using bilinear pairing. Informatica 41(1):31

    MathSciNet  Google Scholar 

  28. Rodionov D, Kolev G, Bushminkin K (2013) A hybrid localization technique for patient tracking. In: 2013 35th annual international conference of the IEEE engineering in medicine and biology society (EMBC). IEEE, pp 6728–6731

    Google Scholar 

  29. Rodrigues EO, Porcino TM, Conci A, Silvah AC (2016) A simple approach for biometrics: finger-knuckle prints recognition based on a Sobel filter and similarity measures. In 2016 international conference on systems, signals and image processing (IWSSIP). IEEE, pp 1–4

    Google Scholar 

  30. Similä H, Immonen M (2014) Disease state fingerprint for fall risk assessment. In: 2014 36th annual international conference of the IEEE engineering in medicine and biology society (EMBC). IEEE, pp 3176–3179

    Google Scholar 

  31. Sugandhi N, Mathankumar M, Priya V (2014) Real time authentication system using advanced finger vein recognition technique. In: 2014 international conference on communications and signal processing (ICCSP). IEEE, pp 1183–1187

    Google Scholar 

  32. Surekha B, Nazare KJ, Raju SV, Dey N (2017) Attendance recording system using partial face recognition algorithm. In Intelligent techniques in signal processing for multimedia security. Springer International Publishing, pp 293–319

    Google Scholar 

  33. ViswanadhaRaju S, Vidyasree P, Gudavalli M, Sekhar BC (2016) Minimum cost fused feature representation and reconstruction with autoencoder in bimodal recognition system. In: Proceedings of the international conference on big data and advanced wireless technologies. ACM, p 17

    Google Scholar 

  34. Wu H, Xie Q, Zhou C (2009) Establishing fingerprint pollution source identification system of the accidental water pollution emergency based on mapinfo. In: 2009 1st international conference on information science and engineering (ICISE). IEEE, pp 2051–2054

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. Vidyasree .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Vidyasree, P., Madhavi, G., Viswanadharaju, S., Borra, S. (2018). A Bio-application for Accident Victim Identification Using Biometrics. In: Dey, N., Ashour, A., Borra, S. (eds) Classification in BioApps. Lecture Notes in Computational Vision and Biomechanics, vol 26. Springer, Cham. https://doi.org/10.1007/978-3-319-65981-7_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-65981-7_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-65980-0

  • Online ISBN: 978-3-319-65981-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics