尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
Guide Prof. Umesh Kulkarni
Presented By :
Bhagyashree Angadi - 2GI16CS032
Shruti Chougule - 2GI16CS037
Laxmi Savgaonkar - 2GI17CS413
Asrarulhaq Maktedar - 2GI17CS440
Identifying Unconscious Patients using Face &
Fingerprint Recognition
Final Phase:
Department of Computer Science and Engineering
KLS, GIT, Belagavi
Academic Year 2019-20
Table
of contents
• Abstract
• Introduction
• Survey
• Problem Definition
• Block diagram of project
• Existing Algorithm
• Proposed Algorithm
• Functionality
• Implementation
• Weekly Plan
• Grands applied
• References
Abstract
In medical emergencies, the victims are not
able to talk about anything regarding
themselves. Medical information of patient is
not available at the time for doctors. Along with
this, victim’s wallet, mobile phones are
frequently separated by them because of theft,
or accidents.
In these situations, application that can provide
the doctors about patient's medical information
can be very useful. This application provides
proper identification and complete medical
information of every emergency patient to
doctor and thus ensure timely and appropriate
treatment decision.
Introduction
The application main aim is to develop an application to recognize
unconscious patient.
If a person met with an accident and unable to talk can be recognized
using face recognition. If face is damaged, alternative option is fingerprint.
One can get detail information of unconscious person such as name,
relative contact number etc and one can immediately contact their
relatives.
Introduction
 Doctor can also use this application to get
patients past medical records.
 Police can also use this application to get past
criminal records of patients and can start the
investigation immediately.
 Rare blood groups such as O –ve can be
immediately arranged using this application.
 Sensitive data is restricted to authorized
person only i.e. only Doctors can see patient’s
medical history. Only police can see criminal
records.
Survey
School/Colleges 1] For attendance purpose.
Hospital Registration of
new patients.
1] Managing visitors.
2] Accurate dispense of medicine.
3] Protecting privacy of patient
information and secure access to
the premise.
Aadhar Biometric
System
1] Biometric based Unique
Identification.
Simcard Activation 1] To purchase & activate simcard
like Airtel, Jio.
Problem Definition
Design and Develop an Application by applying
Automated Fingerprint Identification System
(AFIS) and Convolution Neural Network (CNN)
algorithm to “Identify an Unconscious person
using Fingerprint and Face Recognition
Techniques.”
Hardware
Requirements
• Processor (CPU) with
2GHz frequency and
above
• Minimum 3GB RAM
• Minimum 5GB Free
Space
• Fingerprint Sensor
Device
Software
Requirements
• Android Studio 3.6.3
• Windows 7/8.1/10
• Ubuntu 18.04 LTS
• Visual Studio Code
• Wamp Server
• Eclipse IDE
• Cloud (Diadem)
• NPM & NVM Packages
• Remote WSL Extension
Block Diagram of Project
User
Registration
Taking Input
Display Patient
Information
Call Relatives
View Past
Medical Records
View Past
Criminal
Records
Algorithm of Project
• Step1:Input Face Image.
• Step2:If it is recognized perform step 4 or Else Step3.
• Step3: 8-bit gray scale fingerprint image as Input.
• Step4: Displays detail information about unconscious person such as name, gender,
relatives contact number.
• Step5: Display Information & inform relatives Via Call or Message.
• Step6: Doctor can use this application to get past medical history (only for doctors).
• Step7: Police can use this application to get past criminal history(Only for police).
Block Diagram of AFIS (Automated Fingerprint
Identification System)
Capture
Fingerprints
from
External
Source
As .bmp, .jpeg
Format
Setup
Source AFIS
Import
Fingerprints
To Source AFIS
Extract
Fingerprint
Template and
Store it in
Database
Fingerprint
Verification
Source AFIS Setup (Step2)
Download and install Source AFIS.
Open the application any preferred environment.
Add Source AFIS.dll to references.
Open Source file where you want to call Source AFIS methods.
Create new fingerprint object and store it.
Importing Fingerprints and Template Extraction
(Step3)
Create fingerprint object using properties Ac Bit map Source, Ac Bitmap
and image
Wrap fingerprint in person object.
Extract minutiae from fingerprint image and store it in fingerprint
template.
Fingerprint Matching (Step4)
Pass 2 person objects to AfisEngine.Verify
Perform one to one matching.
If return value is zero, then
 Fingerprints are distinct.
If return score is greater than zero, then
 fingerprints match and Score represents accuracy.
Perform one to many matching.
If all conditions are below Afis.Engine.Thershold then
Returns Null
Else One with highest similarity score will be returned.
Algorithm
Step1: SourceAFIS algorithm is understanding the fingerprints with high-level abstractions.
Step 2: High-level abstractions are minutiae, or ridge endings and bifurcations.
Step3: This gets saved in the template.
Step4: After minutiae, Next step is to produces edges.
Step5: Edge is a line connecting two minutiae. Edge has length and two angles are inherited from its
minutiae.
Step6: Edge angles are expressed as relative to the edge.
Step7: These three properties of the edge (length and two relative angles) do not change when the edge is
moved or rotated.
Algorithm
Step8: Finds at least one edge shared by the two fingerprints being matched. This is done using a nearest neighbor
algorithm that has performance comparable to a hash table.
Step9: It gives root pair, which is the initial pair of matched minutiae, one from each fingerprint.
Step10: Crawls edges outwards and builds a pairing consisting of a number of paired minutiae and paired edges.
Step11: Now looks at the pairing and decides whether such pairing means a match or whether it's just a coincidence.
Step12: Counts various matched features and also scores them on how closely they match.
Step13: Final sum of the partial scores is shaped to align to some reasonable scale and returned from the algorithm.
Step14: Application takes the score and compares it to some threshold to decide whether it's a match or not.
Block Diagram of CNN (Convolution
Neural Network)
Algorithm of CNN
• Step 1: First step of face recognition is face detection
• Step 2: The most accurate face detector is a SSD (Single Shot Multibox Detector), which is basically a CNN
based on MobileNet V1.
• Step 3: The neural net will compute the locations of each face in an image and will return the bounding
boxes together with it's probability for each face.
• Step 4: .The networks return the bounding boxes of each face, with their corresponding scores.
• Step 5: The scores are used to filter the bounding boxes, as it might be that an image does not contain any
face at all.
• Step 6: If image contain face then it is sent for next step of face recognition.
• Step 7: Next step is Face Landmark Detection and Face Alignment to align bounding boxes, such that we
can extract the images centered at the face for each box.
• Step 8: For face landmark detection and alignment we use face-api.js implements a simple CNN, which
returns the 68 point face landmarks of a given face image.
Algorithm of CNN
• Step 9: Now the boxes are further sent for face recognition network.
• Step 10: Face recognition network is based on a ResNet-34 like architecture.
• Step 11: The network has been trained to learn to map the characteristics of human face to a face
descriptor.
• Step 12: Face Descriptor is used for comparing two faces.
• Step 13: A proper image filter is applied to the original image to remove the noise and enhance the
useful information.
• Step 14: Then certain pixel patterns on the filtered image are sampled and compared.
• Step 15: face descriptor compares the input and each of the face in reference data.
• Step 16: The encoded image is derived based on the comparison results at the second step and the
encoding rules.
Functionality
• Patient Face Recognition: Identify
Unconscious Patient Face from Database
• Patient Fingerprint Recognition: Identify
and Verify Unconscious Patient
Fingerprints using Fingerprint Module from
Database
• Patient Information: Patient Name,
Address, Relative & Friends Mobile
Numbers and Medical History.
• Access to authorized persons only.
• Specific data available to specific persons
only.
Implementation
Project Plan
Weekly Plan First Week Second
Week
Third Week Fourth Week Fifth
Week
Introduction and
analysis of our
project
Requirement
gathering
Survey on our
project
Referred
IEEE paper
Implementation User Interface
Doctor interface
Police interface
Study of
algorithm
Fingerprint and
Face
recognitions
Grands Applied
 Karnataka State Council for Science and Technology(KSCST)
 To identify areas for the application of Science and Technology to the development needs,
objective and goals for Karnataka and in particular, to the prevailing conditions of
backwardness, rural unemployment and poverty.
 New Age Incubation Network(NAIN)
 Main Objective of Nain Scheme is to encourage students, research scholars and alumni to
share their ideas to solve chosen problems which are local centric and to validate, refine
and nurture the ideas.
Achievements
Fingerprint Scanner
• Mantra MFS100 V54/V540TG
• Optical Fingerprint Sensor
• Supports -
• Windows
• Linux
• Android
• Does not Required RD Services
• Can be used in
• Airtel
• IDEA Sim Activation
• Jeevan Pramaan
• CSC
• Digital Signatures.
References
[1] Mary Lourde R and Dushyant Khosla, “Fingerprint Identification in
Biometric Security Systems”, International Journal of Computer and
Electrical Engineering, Vol. 2, No. 5, October, 2010.
[2] “Fingerprint Matching” by Anil K. Jain, Jianjiang Feng and Karthik
Nandakumar, Department of Computer Science and Engineering, Michign
State University
[3] Kwolek, Bogdan. "Face detection using convolutional neural networks and
Gabor filters." International Conference on Artificial Neural Networks.
Springer, Berlin, Heidelberg, 2005.
[4] Vaibhav Jain and Ajay Kumar Singh,”An approach for Minutiae Extraction
in Latent Fingerprint Matching“,International Journal, ISSN:2319-
1058,Volume 6,NO. 1,pp.51-58,Octomber 2015.
[5] M. Kanur, M. Singh, A Girdhar and P.S.Sandhu, “Fingerprint verification
system using minutiae extraction technique,” World Academy of Science
Engineering and Technology, vol.46, 2012, pp.497-502.

More Related Content

What's hot

Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system ppt
Ravi Kumar
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
Santosh Kumar
 
RFID in Waste Management
RFID in Waste ManagementRFID in Waste Management
RFID in Waste Management
iaitoinfotech
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
arvind carpenter
 
License Plate Recognition
License Plate RecognitionLicense Plate Recognition
License Plate Recognition
Amr Rashed
 
Face Recognition
Face Recognition Face Recognition
Face Recognition
nialler27
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
Vaibhav P
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and Security
Shreyans Jain
 
Facial Expression Recognition System using Deep Convolutional Neural Networks.
Facial Expression Recognition  System using Deep Convolutional Neural Networks.Facial Expression Recognition  System using Deep Convolutional Neural Networks.
Facial Expression Recognition System using Deep Convolutional Neural Networks.
Sandeep Wakchaure
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
ShubhamLamichane
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
priyabratamansingh1
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
Sonam1891
 
Types of animation in multimedia
Types of animation in multimediaTypes of animation in multimedia
Types of animation in multimedia
Proglobalbusinesssolutions
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
Mazin Alwaaly
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
JASHU JASWANTH
 
Face detection presentation slide
Face detection  presentation slideFace detection  presentation slide
Face detection presentation slide
Sanjoy Dutta
 
Face detection
Face detectionFace detection
Face detection
pritambanerjee999
 
Bio-metric Gait Recognition
Bio-metric Gait Recognition Bio-metric Gait Recognition
Bio-metric Gait Recognition
Usman Siddique
 
Lpr2003
Lpr2003Lpr2003
Lpr2003
bharatsvnit
 
SURF - Speeded Up Robust Features
SURF - Speeded Up Robust FeaturesSURF - Speeded Up Robust Features
SURF - Speeded Up Robust Features
Marta Lopes
 

What's hot (20)

Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system ppt
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
RFID in Waste Management
RFID in Waste ManagementRFID in Waste Management
RFID in Waste Management
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
License Plate Recognition
License Plate RecognitionLicense Plate Recognition
License Plate Recognition
 
Face Recognition
Face Recognition Face Recognition
Face Recognition
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and Security
 
Facial Expression Recognition System using Deep Convolutional Neural Networks.
Facial Expression Recognition  System using Deep Convolutional Neural Networks.Facial Expression Recognition  System using Deep Convolutional Neural Networks.
Facial Expression Recognition System using Deep Convolutional Neural Networks.
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
 
Types of animation in multimedia
Types of animation in multimediaTypes of animation in multimedia
Types of animation in multimedia
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
Face detection presentation slide
Face detection  presentation slideFace detection  presentation slide
Face detection presentation slide
 
Face detection
Face detectionFace detection
Face detection
 
Bio-metric Gait Recognition
Bio-metric Gait Recognition Bio-metric Gait Recognition
Bio-metric Gait Recognition
 
Lpr2003
Lpr2003Lpr2003
Lpr2003
 
SURF - Speeded Up Robust Features
SURF - Speeded Up Robust FeaturesSURF - Speeded Up Robust Features
SURF - Speeded Up Robust Features
 

Similar to Identifying unconscious patients using face and fingerprint recognition

Deep hypersphere embedding for real-time face recognition
Deep hypersphere embedding for real-time face recognitionDeep hypersphere embedding for real-time face recognition
Deep hypersphere embedding for real-time face recognition
TELKOMNIKA JOURNAL
 
IRJET- Credit Card Authentication using Facial Recognition
IRJET-  	  Credit Card Authentication using Facial RecognitionIRJET-  	  Credit Card Authentication using Facial Recognition
IRJET- Credit Card Authentication using Facial Recognition
IRJET Journal
 
IRJET - A Review on Face Recognition using Deep Learning Algorithm
IRJET -  	  A Review on Face Recognition using Deep Learning AlgorithmIRJET -  	  A Review on Face Recognition using Deep Learning Algorithm
IRJET - A Review on Face Recognition using Deep Learning Algorithm
IRJET Journal
 
IRJET- Digiyathra
IRJET-  	  DigiyathraIRJET-  	  Digiyathra
IRJET- Digiyathra
IRJET Journal
 
Facial Emotion Recognition: A Survey
Facial Emotion Recognition: A SurveyFacial Emotion Recognition: A Survey
Facial Emotion Recognition: A Survey
IRJET Journal
 
Virtual Contact Discovery using Facial Recognition
Virtual Contact Discovery using Facial RecognitionVirtual Contact Discovery using Facial Recognition
Virtual Contact Discovery using Facial Recognition
IRJET Journal
 
Facial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdfFacial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdf
talkaton
 
Criminal Identification using Arm7
Criminal Identification using Arm7Criminal Identification using Arm7
Criminal Identification using Arm7
IRJET Journal
 
Foreigners Authentication Based on Multi-Biometric System for Iraq
Foreigners Authentication Based on  Multi-Biometric System for IraqForeigners Authentication Based on  Multi-Biometric System for Iraq
Foreigners Authentication Based on Multi-Biometric System for Iraq
A. Shamel
 
IRJET- Analysing Wound Area Measurement using Android App
IRJET- Analysing Wound Area Measurement using Android AppIRJET- Analysing Wound Area Measurement using Android App
IRJET- Analysing Wound Area Measurement using Android App
IRJET Journal
 
Covid Norms Checker with IOT Based Health Monitoring
Covid Norms Checker with IOT Based Health MonitoringCovid Norms Checker with IOT Based Health Monitoring
Covid Norms Checker with IOT Based Health Monitoring
IRJET Journal
 
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET Journal
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
Siddharth Modi
 
Security by user through application to lock/unlock machine by face detection
Security by user through application to lock/unlock machine by face detectionSecurity by user through application to lock/unlock machine by face detection
Security by user through application to lock/unlock machine by face detection
IRJET Journal
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
Shravan Halankar
 
IRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET - Examination Forgery Avoidance System using Image Processing and IoTIRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET Journal
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
Poooi2
 
Project on fake currency recognition using image processing ppt final (3).pptx
Project on fake currency recognition using image processing ppt final (3).pptxProject on fake currency recognition using image processing ppt final (3).pptx
Project on fake currency recognition using image processing ppt final (3).pptx
426SahithiBaiMiriska
 
40120140505010 2-3
40120140505010 2-340120140505010 2-3
40120140505010 2-3
IAEME Publication
 
40120140505010
4012014050501040120140505010
40120140505010
IAEME Publication
 

Similar to Identifying unconscious patients using face and fingerprint recognition (20)

Deep hypersphere embedding for real-time face recognition
Deep hypersphere embedding for real-time face recognitionDeep hypersphere embedding for real-time face recognition
Deep hypersphere embedding for real-time face recognition
 
IRJET- Credit Card Authentication using Facial Recognition
IRJET-  	  Credit Card Authentication using Facial RecognitionIRJET-  	  Credit Card Authentication using Facial Recognition
IRJET- Credit Card Authentication using Facial Recognition
 
IRJET - A Review on Face Recognition using Deep Learning Algorithm
IRJET -  	  A Review on Face Recognition using Deep Learning AlgorithmIRJET -  	  A Review on Face Recognition using Deep Learning Algorithm
IRJET - A Review on Face Recognition using Deep Learning Algorithm
 
IRJET- Digiyathra
IRJET-  	  DigiyathraIRJET-  	  Digiyathra
IRJET- Digiyathra
 
Facial Emotion Recognition: A Survey
Facial Emotion Recognition: A SurveyFacial Emotion Recognition: A Survey
Facial Emotion Recognition: A Survey
 
Virtual Contact Discovery using Facial Recognition
Virtual Contact Discovery using Facial RecognitionVirtual Contact Discovery using Facial Recognition
Virtual Contact Discovery using Facial Recognition
 
Facial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdfFacial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdf
 
Criminal Identification using Arm7
Criminal Identification using Arm7Criminal Identification using Arm7
Criminal Identification using Arm7
 
Foreigners Authentication Based on Multi-Biometric System for Iraq
Foreigners Authentication Based on  Multi-Biometric System for IraqForeigners Authentication Based on  Multi-Biometric System for Iraq
Foreigners Authentication Based on Multi-Biometric System for Iraq
 
IRJET- Analysing Wound Area Measurement using Android App
IRJET- Analysing Wound Area Measurement using Android AppIRJET- Analysing Wound Area Measurement using Android App
IRJET- Analysing Wound Area Measurement using Android App
 
Covid Norms Checker with IOT Based Health Monitoring
Covid Norms Checker with IOT Based Health MonitoringCovid Norms Checker with IOT Based Health Monitoring
Covid Norms Checker with IOT Based Health Monitoring
 
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Security by user through application to lock/unlock machine by face detection
Security by user through application to lock/unlock machine by face detectionSecurity by user through application to lock/unlock machine by face detection
Security by user through application to lock/unlock machine by face detection
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
IRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET - Examination Forgery Avoidance System using Image Processing and IoTIRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET - Examination Forgery Avoidance System using Image Processing and IoT
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
 
Project on fake currency recognition using image processing ppt final (3).pptx
Project on fake currency recognition using image processing ppt final (3).pptxProject on fake currency recognition using image processing ppt final (3).pptx
Project on fake currency recognition using image processing ppt final (3).pptx
 
40120140505010 2-3
40120140505010 2-340120140505010 2-3
40120140505010 2-3
 
40120140505010
4012014050501040120140505010
40120140505010
 

Recently uploaded

Better Builder Magazine, Issue 49 / Spring 2024
Better Builder Magazine, Issue 49 / Spring 2024Better Builder Magazine, Issue 49 / Spring 2024
Better Builder Magazine, Issue 49 / Spring 2024
Better Builder Magazine
 
🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...
🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...
🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...
dulbh kashyap
 
High Profile Call Girls Ahmedabad 🔥 7737669865 🔥 Real Fun With Sexual Girl Av...
High Profile Call Girls Ahmedabad 🔥 7737669865 🔥 Real Fun With Sexual Girl Av...High Profile Call Girls Ahmedabad 🔥 7737669865 🔥 Real Fun With Sexual Girl Av...
High Profile Call Girls Ahmedabad 🔥 7737669865 🔥 Real Fun With Sexual Girl Av...
dABGO KI CITy kUSHINAGAR Ak47
 
Online train ticket booking system project.pdf
Online train ticket booking system project.pdfOnline train ticket booking system project.pdf
Online train ticket booking system project.pdf
Kamal Acharya
 
Butterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdfButterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdf
Lubi Valves
 
SELENIUM CONF -PALLAVI SHARMA - 2024.pdf
SELENIUM CONF -PALLAVI SHARMA - 2024.pdfSELENIUM CONF -PALLAVI SHARMA - 2024.pdf
SELENIUM CONF -PALLAVI SHARMA - 2024.pdf
Pallavi Sharma
 
Call Girls In Lucknow 🔥 +91-7014168258🔥High Profile Call Girl Lucknow
Call Girls In Lucknow 🔥 +91-7014168258🔥High Profile Call Girl LucknowCall Girls In Lucknow 🔥 +91-7014168258🔥High Profile Call Girl Lucknow
Call Girls In Lucknow 🔥 +91-7014168258🔥High Profile Call Girl Lucknow
yogita singh$A17
 
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
DharmaBanothu
 
🔥 Hyderabad Call Girls  👉 9352988975 👫 High Profile Call Girls Whatsapp Numbe...
🔥 Hyderabad Call Girls  👉 9352988975 👫 High Profile Call Girls Whatsapp Numbe...🔥 Hyderabad Call Girls  👉 9352988975 👫 High Profile Call Girls Whatsapp Numbe...
🔥 Hyderabad Call Girls  👉 9352988975 👫 High Profile Call Girls Whatsapp Numbe...
aarusi sexy model
 
Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)
Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)
Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)
Tsuyoshi Horigome
 
Intuit CRAFT demonstration presentation for sde
Intuit CRAFT demonstration presentation for sdeIntuit CRAFT demonstration presentation for sde
Intuit CRAFT demonstration presentation for sde
ShivangMishra54
 
❣Unsatisfied Bhabhi Call Girls Surat 💯Call Us 🔝 7014168258 🔝💃Independent Sura...
❣Unsatisfied Bhabhi Call Girls Surat 💯Call Us 🔝 7014168258 🔝💃Independent Sura...❣Unsatisfied Bhabhi Call Girls Surat 💯Call Us 🔝 7014168258 🔝💃Independent Sura...
❣Unsatisfied Bhabhi Call Girls Surat 💯Call Us 🔝 7014168258 🔝💃Independent Sura...
hotchicksescort
 
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdfSri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
Balvir Singh
 
Cricket management system ptoject report.pdf
Cricket management system ptoject report.pdfCricket management system ptoject report.pdf
Cricket management system ptoject report.pdf
Kamal Acharya
 
Hot Call Girls In Bangalore ✔ 9079923931 ✔ Hi I Am Divya Vip Call Girl Servic...
Hot Call Girls In Bangalore ✔ 9079923931 ✔ Hi I Am Divya Vip Call Girl Servic...Hot Call Girls In Bangalore ✔ 9079923931 ✔ Hi I Am Divya Vip Call Girl Servic...
Hot Call Girls In Bangalore ✔ 9079923931 ✔ Hi I Am Divya Vip Call Girl Servic...
Banerescorts
 
Call Girls Goa (india) ☎️ +91-7426014248 Goa Call Girl
Call Girls Goa (india) ☎️ +91-7426014248 Goa Call GirlCall Girls Goa (india) ☎️ +91-7426014248 Goa Call Girl
Call Girls Goa (india) ☎️ +91-7426014248 Goa Call Girl
sapna sharmap11
 
Call Girls Madurai 8824825030 Escort In Madurai service 24X7
Call Girls Madurai 8824825030 Escort In Madurai service 24X7Call Girls Madurai 8824825030 Escort In Madurai service 24X7
Call Girls Madurai 8824825030 Escort In Madurai service 24X7
Poonam Singh
 
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls ChennaiCall Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
paraasingh12 #V08
 
Call Girls Nagpur 8824825030 Escort In Nagpur service 24X7
Call Girls Nagpur 8824825030 Escort In Nagpur service 24X7Call Girls Nagpur 8824825030 Escort In Nagpur service 24X7
Call Girls Nagpur 8824825030 Escort In Nagpur service 24X7
sexytaniya455
 
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
IJCNCJournal
 

Recently uploaded (20)

Better Builder Magazine, Issue 49 / Spring 2024
Better Builder Magazine, Issue 49 / Spring 2024Better Builder Magazine, Issue 49 / Spring 2024
Better Builder Magazine, Issue 49 / Spring 2024
 
🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...
🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...
🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...
 
High Profile Call Girls Ahmedabad 🔥 7737669865 🔥 Real Fun With Sexual Girl Av...
High Profile Call Girls Ahmedabad 🔥 7737669865 🔥 Real Fun With Sexual Girl Av...High Profile Call Girls Ahmedabad 🔥 7737669865 🔥 Real Fun With Sexual Girl Av...
High Profile Call Girls Ahmedabad 🔥 7737669865 🔥 Real Fun With Sexual Girl Av...
 
Online train ticket booking system project.pdf
Online train ticket booking system project.pdfOnline train ticket booking system project.pdf
Online train ticket booking system project.pdf
 
Butterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdfButterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdf
 
SELENIUM CONF -PALLAVI SHARMA - 2024.pdf
SELENIUM CONF -PALLAVI SHARMA - 2024.pdfSELENIUM CONF -PALLAVI SHARMA - 2024.pdf
SELENIUM CONF -PALLAVI SHARMA - 2024.pdf
 
Call Girls In Lucknow 🔥 +91-7014168258🔥High Profile Call Girl Lucknow
Call Girls In Lucknow 🔥 +91-7014168258🔥High Profile Call Girl LucknowCall Girls In Lucknow 🔥 +91-7014168258🔥High Profile Call Girl Lucknow
Call Girls In Lucknow 🔥 +91-7014168258🔥High Profile Call Girl Lucknow
 
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
 
🔥 Hyderabad Call Girls  👉 9352988975 👫 High Profile Call Girls Whatsapp Numbe...
🔥 Hyderabad Call Girls  👉 9352988975 👫 High Profile Call Girls Whatsapp Numbe...🔥 Hyderabad Call Girls  👉 9352988975 👫 High Profile Call Girls Whatsapp Numbe...
🔥 Hyderabad Call Girls  👉 9352988975 👫 High Profile Call Girls Whatsapp Numbe...
 
Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)
Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)
Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)
 
Intuit CRAFT demonstration presentation for sde
Intuit CRAFT demonstration presentation for sdeIntuit CRAFT demonstration presentation for sde
Intuit CRAFT demonstration presentation for sde
 
❣Unsatisfied Bhabhi Call Girls Surat 💯Call Us 🔝 7014168258 🔝💃Independent Sura...
❣Unsatisfied Bhabhi Call Girls Surat 💯Call Us 🔝 7014168258 🔝💃Independent Sura...❣Unsatisfied Bhabhi Call Girls Surat 💯Call Us 🔝 7014168258 🔝💃Independent Sura...
❣Unsatisfied Bhabhi Call Girls Surat 💯Call Us 🔝 7014168258 🔝💃Independent Sura...
 
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdfSri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
 
Cricket management system ptoject report.pdf
Cricket management system ptoject report.pdfCricket management system ptoject report.pdf
Cricket management system ptoject report.pdf
 
Hot Call Girls In Bangalore ✔ 9079923931 ✔ Hi I Am Divya Vip Call Girl Servic...
Hot Call Girls In Bangalore ✔ 9079923931 ✔ Hi I Am Divya Vip Call Girl Servic...Hot Call Girls In Bangalore ✔ 9079923931 ✔ Hi I Am Divya Vip Call Girl Servic...
Hot Call Girls In Bangalore ✔ 9079923931 ✔ Hi I Am Divya Vip Call Girl Servic...
 
Call Girls Goa (india) ☎️ +91-7426014248 Goa Call Girl
Call Girls Goa (india) ☎️ +91-7426014248 Goa Call GirlCall Girls Goa (india) ☎️ +91-7426014248 Goa Call Girl
Call Girls Goa (india) ☎️ +91-7426014248 Goa Call Girl
 
Call Girls Madurai 8824825030 Escort In Madurai service 24X7
Call Girls Madurai 8824825030 Escort In Madurai service 24X7Call Girls Madurai 8824825030 Escort In Madurai service 24X7
Call Girls Madurai 8824825030 Escort In Madurai service 24X7
 
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls ChennaiCall Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
 
Call Girls Nagpur 8824825030 Escort In Nagpur service 24X7
Call Girls Nagpur 8824825030 Escort In Nagpur service 24X7Call Girls Nagpur 8824825030 Escort In Nagpur service 24X7
Call Girls Nagpur 8824825030 Escort In Nagpur service 24X7
 
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
 

Identifying unconscious patients using face and fingerprint recognition

  • 1. Guide Prof. Umesh Kulkarni Presented By : Bhagyashree Angadi - 2GI16CS032 Shruti Chougule - 2GI16CS037 Laxmi Savgaonkar - 2GI17CS413 Asrarulhaq Maktedar - 2GI17CS440 Identifying Unconscious Patients using Face & Fingerprint Recognition Final Phase: Department of Computer Science and Engineering KLS, GIT, Belagavi Academic Year 2019-20
  • 2. Table of contents • Abstract • Introduction • Survey • Problem Definition • Block diagram of project • Existing Algorithm • Proposed Algorithm • Functionality • Implementation • Weekly Plan • Grands applied • References
  • 3. Abstract In medical emergencies, the victims are not able to talk about anything regarding themselves. Medical information of patient is not available at the time for doctors. Along with this, victim’s wallet, mobile phones are frequently separated by them because of theft, or accidents. In these situations, application that can provide the doctors about patient's medical information can be very useful. This application provides proper identification and complete medical information of every emergency patient to doctor and thus ensure timely and appropriate treatment decision.
  • 4. Introduction The application main aim is to develop an application to recognize unconscious patient. If a person met with an accident and unable to talk can be recognized using face recognition. If face is damaged, alternative option is fingerprint. One can get detail information of unconscious person such as name, relative contact number etc and one can immediately contact their relatives.
  • 5. Introduction  Doctor can also use this application to get patients past medical records.  Police can also use this application to get past criminal records of patients and can start the investigation immediately.  Rare blood groups such as O –ve can be immediately arranged using this application.  Sensitive data is restricted to authorized person only i.e. only Doctors can see patient’s medical history. Only police can see criminal records.
  • 6. Survey School/Colleges 1] For attendance purpose. Hospital Registration of new patients. 1] Managing visitors. 2] Accurate dispense of medicine. 3] Protecting privacy of patient information and secure access to the premise. Aadhar Biometric System 1] Biometric based Unique Identification. Simcard Activation 1] To purchase & activate simcard like Airtel, Jio.
  • 7. Problem Definition Design and Develop an Application by applying Automated Fingerprint Identification System (AFIS) and Convolution Neural Network (CNN) algorithm to “Identify an Unconscious person using Fingerprint and Face Recognition Techniques.”
  • 8. Hardware Requirements • Processor (CPU) with 2GHz frequency and above • Minimum 3GB RAM • Minimum 5GB Free Space • Fingerprint Sensor Device Software Requirements • Android Studio 3.6.3 • Windows 7/8.1/10 • Ubuntu 18.04 LTS • Visual Studio Code • Wamp Server • Eclipse IDE • Cloud (Diadem) • NPM & NVM Packages • Remote WSL Extension
  • 9. Block Diagram of Project User Registration Taking Input Display Patient Information Call Relatives View Past Medical Records View Past Criminal Records
  • 10. Algorithm of Project • Step1:Input Face Image. • Step2:If it is recognized perform step 4 or Else Step3. • Step3: 8-bit gray scale fingerprint image as Input. • Step4: Displays detail information about unconscious person such as name, gender, relatives contact number. • Step5: Display Information & inform relatives Via Call or Message. • Step6: Doctor can use this application to get past medical history (only for doctors). • Step7: Police can use this application to get past criminal history(Only for police).
  • 11. Block Diagram of AFIS (Automated Fingerprint Identification System) Capture Fingerprints from External Source As .bmp, .jpeg Format Setup Source AFIS Import Fingerprints To Source AFIS Extract Fingerprint Template and Store it in Database Fingerprint Verification
  • 12. Source AFIS Setup (Step2) Download and install Source AFIS. Open the application any preferred environment. Add Source AFIS.dll to references. Open Source file where you want to call Source AFIS methods. Create new fingerprint object and store it.
  • 13. Importing Fingerprints and Template Extraction (Step3) Create fingerprint object using properties Ac Bit map Source, Ac Bitmap and image Wrap fingerprint in person object. Extract minutiae from fingerprint image and store it in fingerprint template.
  • 14. Fingerprint Matching (Step4) Pass 2 person objects to AfisEngine.Verify Perform one to one matching. If return value is zero, then  Fingerprints are distinct. If return score is greater than zero, then  fingerprints match and Score represents accuracy. Perform one to many matching. If all conditions are below Afis.Engine.Thershold then Returns Null Else One with highest similarity score will be returned.
  • 15. Algorithm Step1: SourceAFIS algorithm is understanding the fingerprints with high-level abstractions. Step 2: High-level abstractions are minutiae, or ridge endings and bifurcations. Step3: This gets saved in the template. Step4: After minutiae, Next step is to produces edges. Step5: Edge is a line connecting two minutiae. Edge has length and two angles are inherited from its minutiae. Step6: Edge angles are expressed as relative to the edge. Step7: These three properties of the edge (length and two relative angles) do not change when the edge is moved or rotated.
  • 16. Algorithm Step8: Finds at least one edge shared by the two fingerprints being matched. This is done using a nearest neighbor algorithm that has performance comparable to a hash table. Step9: It gives root pair, which is the initial pair of matched minutiae, one from each fingerprint. Step10: Crawls edges outwards and builds a pairing consisting of a number of paired minutiae and paired edges. Step11: Now looks at the pairing and decides whether such pairing means a match or whether it's just a coincidence. Step12: Counts various matched features and also scores them on how closely they match. Step13: Final sum of the partial scores is shaped to align to some reasonable scale and returned from the algorithm. Step14: Application takes the score and compares it to some threshold to decide whether it's a match or not.
  • 17. Block Diagram of CNN (Convolution Neural Network)
  • 18. Algorithm of CNN • Step 1: First step of face recognition is face detection • Step 2: The most accurate face detector is a SSD (Single Shot Multibox Detector), which is basically a CNN based on MobileNet V1. • Step 3: The neural net will compute the locations of each face in an image and will return the bounding boxes together with it's probability for each face. • Step 4: .The networks return the bounding boxes of each face, with their corresponding scores. • Step 5: The scores are used to filter the bounding boxes, as it might be that an image does not contain any face at all. • Step 6: If image contain face then it is sent for next step of face recognition. • Step 7: Next step is Face Landmark Detection and Face Alignment to align bounding boxes, such that we can extract the images centered at the face for each box. • Step 8: For face landmark detection and alignment we use face-api.js implements a simple CNN, which returns the 68 point face landmarks of a given face image.
  • 19. Algorithm of CNN • Step 9: Now the boxes are further sent for face recognition network. • Step 10: Face recognition network is based on a ResNet-34 like architecture. • Step 11: The network has been trained to learn to map the characteristics of human face to a face descriptor. • Step 12: Face Descriptor is used for comparing two faces. • Step 13: A proper image filter is applied to the original image to remove the noise and enhance the useful information. • Step 14: Then certain pixel patterns on the filtered image are sampled and compared. • Step 15: face descriptor compares the input and each of the face in reference data. • Step 16: The encoded image is derived based on the comparison results at the second step and the encoding rules.
  • 20. Functionality • Patient Face Recognition: Identify Unconscious Patient Face from Database • Patient Fingerprint Recognition: Identify and Verify Unconscious Patient Fingerprints using Fingerprint Module from Database • Patient Information: Patient Name, Address, Relative & Friends Mobile Numbers and Medical History. • Access to authorized persons only. • Specific data available to specific persons only.
  • 22. Project Plan Weekly Plan First Week Second Week Third Week Fourth Week Fifth Week Introduction and analysis of our project Requirement gathering Survey on our project Referred IEEE paper Implementation User Interface Doctor interface Police interface Study of algorithm Fingerprint and Face recognitions
  • 23. Grands Applied  Karnataka State Council for Science and Technology(KSCST)  To identify areas for the application of Science and Technology to the development needs, objective and goals for Karnataka and in particular, to the prevailing conditions of backwardness, rural unemployment and poverty.  New Age Incubation Network(NAIN)  Main Objective of Nain Scheme is to encourage students, research scholars and alumni to share their ideas to solve chosen problems which are local centric and to validate, refine and nurture the ideas.
  • 25. Fingerprint Scanner • Mantra MFS100 V54/V540TG • Optical Fingerprint Sensor • Supports - • Windows • Linux • Android • Does not Required RD Services • Can be used in • Airtel • IDEA Sim Activation • Jeevan Pramaan • CSC • Digital Signatures.
  • 26. References [1] Mary Lourde R and Dushyant Khosla, “Fingerprint Identification in Biometric Security Systems”, International Journal of Computer and Electrical Engineering, Vol. 2, No. 5, October, 2010. [2] “Fingerprint Matching” by Anil K. Jain, Jianjiang Feng and Karthik Nandakumar, Department of Computer Science and Engineering, Michign State University [3] Kwolek, Bogdan. "Face detection using convolutional neural networks and Gabor filters." International Conference on Artificial Neural Networks. Springer, Berlin, Heidelberg, 2005. [4] Vaibhav Jain and Ajay Kumar Singh,”An approach for Minutiae Extraction in Latent Fingerprint Matching“,International Journal, ISSN:2319- 1058,Volume 6,NO. 1,pp.51-58,Octomber 2015. [5] M. Kanur, M. Singh, A Girdhar and P.S.Sandhu, “Fingerprint verification system using minutiae extraction technique,” World Academy of Science Engineering and Technology, vol.46, 2012, pp.497-502.
  翻译: