Abstract
A unique way to identify victims is an essential requirement for maintaining health records in hospital information systems. Although significant steps have been made in medical innovation and enhanced technologies, there are still major concerns regarding identifying a victim and their blood group in the event of an emergency. Information and Communication Technology (ICT) can help in identifying the location of an accident through a global positioning system (GPS) and can send a request for the emergency need for a required blood group. This chapter presents an application and proposes a novel approach to victim identification based on an autoencoder and extreme learning machine (ELM) techniques that can enhance accuracy. An autoencoder is employed to images of a victim’s fingerprint to emphasize the spatial gradients of the edges on the finger. Application of autoencoder not only denoises the input data, but also minimizes the dimensionality of the data. An ELM is applied to a preprocessed image to extract the unique features for victim identification. An effective optimal cost region matcher (OCRM) with deep learning techniques is applied to enhance the accuracy of victim recognition. This application enables “the man in the street” to inform the family members of a victim to be informed of their status. Further, the system detects and deals with blood group aids in mitigating risk in initial treatment.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Agarwal N, Sebastian MP (2014) Technology investment determinants for usage patterns in different sized healthcare institutions. In: 2014 IEEE international technology management conference (ITMC). IEEE, pp 1–4
Ali MM, Yannawar P, Gaikwad AT (2016) Study of edge detection methods based on palmprint lines. In: International Conference on electrical, electronics, and optimization techniques (ICEEOT). IEEE, pp 1344–1350
Anif M, Putra AS, Ernawati D, Prabuwono AS (2015) HoMeTrack: RFID-based localization for hospital medicine tracking system. In: 2015 2nd international conference on information technology, computer, and electrical engineering (ICITACEE). IEEE, pp 449–453
Ashour AS, Beagum S, Dey N, Ashour AS, Pistolla DS, Nguyen GN, Shi F (2016) Light microscopy image de-noising using optimized LPA-ICI filter. Neural Comput Appl, pp 1–17
Ashwin S, Loganathan S, Kumar SS, Sivakumar P (2013) Prototype of a fingerprint based licensing system for driving. In International conference on information communication and embedded systems (ICICES). IEEE, pp 974–987
Astilean A, Avram, C, Letia, T, Mihele F (2009) Fingerprint based temporary identity supporting emergency actions in collective accidents. In: International conference on eHealth, telemedicine, and social medicine. eTELEMED’09. IEEE, pp 93–98
Barra S, Casanova A, De Marsico M, Riccio D (2014) Babies: biometric authentication of newborn identities by means of ear signatures. In: IEEE workshop on proceedings of biometric measurements and systems for security and medical applications (BIOMS). IEEE, pp 1–7
Beagum S, Dey N, Ashour AS, Sifaki-Pistolla D, Balas VE (2016) Nonparametric de-noising filter optimization using structure-based microscopic image classification. Microsc Res Tech 80(4):419–429
Cambria E, Huang GB, Kasun LLC, Zhou H, Vong CM, Lin J, Leung VC (2013) Extreme learning machines [trends & controversies]. IEEE Intell Syst 28(6):30–59
Chan FKS, Kong AWK (2015) Using hair follicles with leg geometry to align androgenic hair patterns. In: Intelligence and security informatics conference (EISIC), 2015 European. IEEE, pp 137–140
Chen CL, Hu JX, Fan CL, Wang KH (2016) Design of a secure medical data sharing system via an authorized mechanism. In: IEEE International conference on systems, man, and cybernetics (SMC), 2016. IEEE, pp 002478–002482
Choosang P, Vasupongayya S (2015) Using fingerprints to identify personal health record users in an emergency situation. In: 2015 international computer science and engineering conference (ICSEC). IEEE, pp 1–6
Deepa SN, Arunadevi B (2013) Extreme learning machine for classification of brain tumor in 3D MD images/elm za klasifikaciju tumora mozga kod 3D MR snimaka. Informatologia 46(2):111
Dey M, Dey N, Mahata SK, Chakraborty S, Acharjee S, Das A (2014) Electrocardiogram feature based inter-human biometric authentication system. In: 2014 international conference on electronic systems, signal processing and computing technologies (ICESC). IEEE, pp 300–304
Dey N, Ashour AS, Beagum S, Pistola DS, Gospodinov M, Gospodinova EP, Tavares JMR (2015) Parameter optimization for local polynomial approximation based intersection confidence interval filter using genetic algorithm: an application for brain MRI image de-noising. J Imaging 1(1):60–84
Dey N (ed) (2016) Classification and clustering in biomedical signal processing. IGI Global
Dey N, Nandi B, Das P, Das A, Chaudhuri SS (2013) Retention of electrocardioGram features insiGnificantly devalorized as an effect of water marking for. Adv Biometr Secure Human Authentication Recogn 175
Fan X, Bai J, Shen P (2006) Diagnosis of breast cancer using HPLC metabonomics fingerprints coupled with computational methods. In: 27th annual international conference of the engineering in medicine and biology society. IEEE-EMBS 2005. IEEE, pp 6081–6084
Huang Z, Yu Y, Gu J, Liu H (2017) An efficient method for traffic sign recognition based on extreme learning machine. IEEE Trans Cybern 47(4):920–933
Ibrahim S, Jaafar H, Ramli DA (2014) Robust palm print verification system based on evolution of kernel principal component analysis. In: 2014 IEEE international conference on control system, computing and engineering (ICCSCE). IEEE, pp 202–207
Jain AK, Arora SS, Cao K, Best-Rowden L, Bhatnagar A (2017) Fingerprint recognition of young children. IEEE Trans Inf Forensics Secur 12(7):1501–1514
Jin Q, Jeon W, Lee C, Choi Y, Won D (2013) Fingerprint-based user authentication scheme for home healthcare system. In: 2013 fifth international conference on ubiquitous and future networks (ICUFN). IEEE, pp 178–183
Jayant NK, Borra S (2016) Attendance management system using hybrid face recognition techniques. In: Conference on advances in signal processing (CASP). IEEE, pp 412–417
Ma HT, Ye C, Wu J, Yang P, Chen X, Yang Z, Ma J (2014) A preliminary study of DTI Fingerprinting on stroke analysis. In: 2014 36th annual international conference of the IEEE engineering in medicine and biology society (EMBC). IEEE, pp 2380–2383
Rajeswari P, Raju SV, Ashour AS, Dey N (2017) Multi-fingerprint unimodel-based biometric authentication supporting cloud computing. In: Intelligent techniques in signal processing for multimedia security. Springer International Publishing, pp 469–485
Rao NG, Sravani T, Kumar VV (2014) OCRM: optimal cost region matching similarity measure for region based image retrieval. Int J Multimedia Ubiquitous Eng 9(4):327
Reddi S, Borra S (2017) Identity-based signcryption groupkey agreement protocol using bilinear pairing. Informatica 41(1):31
Rodionov D, Kolev G, Bushminkin K (2013) A hybrid localization technique for patient tracking. In: 2013 35th annual international conference of the IEEE engineering in medicine and biology society (EMBC). IEEE, pp 6728–6731
Rodrigues EO, Porcino TM, Conci A, Silvah AC (2016) A simple approach for biometrics: finger-knuckle prints recognition based on a Sobel filter and similarity measures. In 2016 international conference on systems, signals and image processing (IWSSIP). IEEE, pp 1–4
Similä H, Immonen M (2014) Disease state fingerprint for fall risk assessment. In: 2014 36th annual international conference of the IEEE engineering in medicine and biology society (EMBC). IEEE, pp 3176–3179
Sugandhi N, Mathankumar M, Priya V (2014) Real time authentication system using advanced finger vein recognition technique. In: 2014 international conference on communications and signal processing (ICCSP). IEEE, pp 1183–1187
Surekha B, Nazare KJ, Raju SV, Dey N (2017) Attendance recording system using partial face recognition algorithm. In Intelligent techniques in signal processing for multimedia security. Springer International Publishing, pp 293–319
ViswanadhaRaju S, Vidyasree P, Gudavalli M, Sekhar BC (2016) Minimum cost fused feature representation and reconstruction with autoencoder in bimodal recognition system. In: Proceedings of the international conference on big data and advanced wireless technologies. ACM, p 17
Wu H, Xie Q, Zhou C (2009) Establishing fingerprint pollution source identification system of the accidental water pollution emergency based on mapinfo. In: 2009 1st international conference on information science and engineering (ICISE). IEEE, pp 2051–2054
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this chapter
Cite this chapter
Vidyasree, P., Madhavi, G., Viswanadharaju, S., Borra, S. (2018). A Bio-application for Accident Victim Identification Using Biometrics. In: Dey, N., Ashour, A., Borra, S. (eds) Classification in BioApps. Lecture Notes in Computational Vision and Biomechanics, vol 26. Springer, Cham. https://doi.org/10.1007/978-3-319-65981-7_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-65981-7_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-65980-0
Online ISBN: 978-3-319-65981-7
eBook Packages: EngineeringEngineering (R0)