CHAPTER to 10 percent of patients are misidentified
CHAPTER ONEINTRODUCTION1.1BACKGROUND OF THE STUDYPositive patient identification is the foundation of effective healthcare. It considers the right care to be conveyed to every patient in light of his or her individual needs.
Recently, ECRI Institute analysts found that patient identification issues were common in healthcare, and these mistakes have critical patient wellbeing and financial implication. According to Michael (2012), 7 to 10 percent of patients are misidentified amid therapeutic record seeks. Besides, around 6 percent of those patients experience the ill effects of generally preventable unfavorable occasions, for example, wrong-side surgery or off base systems performed, medication errors, radiation exposures, blood transfusion responses, radiology blunders, or research facility blunders. (Michael, 2012).When a patient walks through the door of the emergency room, if the correct medical chart with the correct patient information is not accessed, there can be serious repercussions. Diagnosis and treatment is a complex process.
Even seemingly minor inaccuracies can lead to big mistakes, because caregivers are basing many high-risk/high-reward treatments on that information. Data, such as past medical history or medication and allergy lists, can be easily omitted or inaccurately listed if a patient is not identified properly.Patient misidentification commonly occurs when a staff member begins a new patient chart and certain imperative information is missing. When this happens without a physician’s knowledge, it could seriously impact a patient’s health.
For example, if a patient has a severe allergy to IV contrast but the patient’s medical chart does not note this, he or she could experience a life-threatening allergic reaction when the physician orders a CT scan with IV contrast. (Bártlová et al., 2015)Another common danger is inaccurate medication lists.
Consider anticoagulants, for example. These are important and potentially life-saving medications that can prevent strokes or heart attacks. But if a caregiver is unaware that a patient is taking anticoagulants, they may prescribe another, seemingly unrelated medication (antibiotics for treatment of a minor infection, for example) that could interact with the anticoagulant therapy and cause life-threatening hemorrhaging. (Sean, 2016)The availability of an accurate past medical history is another crucial piece of a patient medical record. When a physician evaluates a patient’s signs and symptoms but does not have access to their complete medical history (or even worse, accidentally viewing another patient’s medical history due to improper patient identification upon registration), there is a chance of misdiagnosis and mistreatment, which can lead to potentially serious medical consequences. If a patient has a history of stomach ulcers and their doctor starts them on aspirin or ibuprofen, they could have a massive, life-threatening GI bleed.
If a patient has a history of blood clots in the leg and starts hormone therapy, they are at an increased risk of developing more clotting, including a pulmonary embolism (a blood clot in the lungs) that could be life threatening. (Sean, 2016)Even in this day and age of technology, clerical errors play a significant role in patient misidentification. Patients may have multiple duplicate charts throughout a healthcare organization due to simple typographical errors, name misspellings, inaccurate birthdates, language barriers, misinterpretations, misunderstandings, and communication errors between hospital staff, patients, outside caregivers, and family members.
And remember, sometimes patients may be confused and unable to provide accurate information due to delirium, shock, dementia, psychosis, intoxication, or drug overdoses or they may even intentionally give inaccurate information for purposes of fraud.Particularly in emergency situations with fast-paced triage, acutely ill patients, and oftentimes overcrowded environments, it can be difficult for hospital registrars to obtain accurate information and correctly identify the patient presenting for care. In these cases, in order to get the patient registered as quickly as possible, the registrar, rather than struggling for a prolonged time (precious moments when someone is in respiratory distress or bleeding profusely, believe me), may choose to just create a new chart rather than delay registration or risk picking the wrong patient’s chart and creating an overlay chart (one that has two different patients’ information tangled together in one chart). This, of course, results in a chart that includes none of the patient’s history and leads to all of the problems described above, compounding the situation further. (Bártlová et al.
, 2015 and Sean, 2016)It’s important to remember that, in addition to the effect on patient safety, misidentification of patients also has a large financial effect. For example, if a doctor doesn’t know a patient has had a test in the past, he or she may order another CT scan, exposing the patient to unnecessary radiation, risk, and costs for both the patient and the healthcare system. Excessive and duplicate studies are a major problem in the practice of medicine, and without accurate patient identification, it is difficult to properly assess exactly who has had which studies and who needs a new test. Hospitals spend large amounts of money per year in human resources and information technology to sift through patient records after the fact and try to merge duplicate charts and separate out overlay charts. Furthermore, intentional patient misidentification (fraud) and unintentional incorrect patient identifiers lead to major financial losses for hospitals and the healthcare system as a whole, in part due to patient harm, liability and adverse events, inefficiencies in billing, and insurance claims denials. (Bártlová et al., 2015 and Sean, 2016)1.
2STATEMENT OF THE PROBLEMMisidentification of patients is a common problem that many hospitals face on the daily basis. Patient misidentification is one of the leading causes of medical errors and medical malpractice in hospitals and it has been recognized as a serious risk to patient safety.Recent studies have shown that an increasing number of medical errors are primarily caused by adverse drug events which are caused directly or indirectly by incorrect patient identification. In recognition of the increasing threat to patient safety, it is important for hospitals to prevent these medical errors from happening by adopting a suitable patient identification system that can improve upon current safety procedures.In a nutshell patient misidentification causes the following problem:Medication errors, blood transfusion errors, Testing errors, Wrong person procedures, Discharge of infants to the wrong families, Phlebotomy and surgical interventions. Patient misidentification is a widely reported problem in medical literature. For example, the National Patient Safety Agency quoted this problem as a “significant risk in the NHS” (Thomas and Evans, 2009).
1.3AIM AND OBJECTIVES OF THE STUDY The aim of this project work is to develop and implement biometrics based system for patient identification that will improve on the manual method of identifying a patient. The objective of the project is to develop a system that should be able to:Reduce or possibly eliminate Patient misidentification in hospitals To increase accuracy of patient identification systemTransform the manual process of patient identification to a computerized system through an improved method.Provide guidance for doctor and nurses accurately identification of patient related issues.Eliminate paper costs, and provide all the reports for patient on demand.To reduce the risk of patient misidentification.
1.4.SIGNIFICANCE OF THE STUDYThe fingerprint based patient identification system will be of great benefit as it identifies patients accurately and retrieves their correct medical record. Also the biometric identification will create a one-to-one link between patients’ identities and their medical records.
The biometric patient identification solution will enable healthcare providers to improve patient safety. By positively identifying patients, physicians ensure that the right care is provided to the right patient. Smoother, more accurate recordkeeping also increases revenue cycle efficiency by reducing duplicate medical records, overlays, and insurance fraud; enhances patient satisfaction by accelerating the patient check-in processes; reduces the risk of identity theft posed by conventional patient identifiers; and seamlessly integrates with existing electronic medical record (EMR) solution.1.5SCOPE OF THE STUDY Since the topic of patient misidentification is very broad, this thesis concentrates on the technical aspects of the design, implementation, and evaluation of a patient identification system – while providing only references for further reading concerning the medical background of this topic. Therefore, the information in this thesis is of technical nature and aimed at readers with a background in medical informatics or IT managers working in healthcare institutions. This project is to produce a working prototype, including both hardware and software as the proof of concept system.
The prototype will need to demonstrate:Identifying a patient using biometrics with a high degree of confidence. Code the software required for data mining techniques to match the patterns with known patterns. In addition, the proof of concept will include Web portal to show results to an operator such as a healthcare professional.
Using the biometric system to confirm a patient’s’ identification. This includes writing software that prompts patient to scan their vein patterns, and confirms a patient’s identity via the use of biometrics1.6METHODOLOGY OF THE STUDYAccording to Ndunagu, (2004) he defined Methodology as a way of thinking about and studying social reality”.
“Potter in 1996 defined methodology as strategies that lay out the means for achieving the goals of research”. They all defined methods as procedures and techniques used to reach the study’s goal. “Potter in 1996 sums up the inter-relationship and differences by stating: “Methodologies are the blue prints; methods are the tools”. The research methodology used helps to ensure that a thorough study of the present system is effectively carried out, thus helping the project research team to completely understand the modus operandi of the present existing system so as to know how the new system should be structured and the functionalities needed in it to address the seemingly, existing problems discovered. This helps to know if there should be a total over hailing of the existing system or if only improvements should be made. Hence, after duly considering the above reasons, out of the whole software engineering standard for transforming ideas into an inference Engine which includes prototyping, experts’ system methodology and usability Engineering methodology, this work will adopt the steps of structured system analysis and design methodology (SSDM). SSDM is a methodology used in the analysis of design stages of system development.
The step includes:iProblem identification iiSystem designiiiSystem implementation and maintenance.The proposed system in its all whole is intended to totally take out the issue of the current system. The proposed system as a stand-alone application would empower the identification of patient using fingerprint biometric. The propose system is very easy to use and viable.
It takes care of the issue of multifaceted nature by building a basic stand-alone application that can be effectively be utilized and comprehended by users at the hospital. The proposed system is intended to appear as the current system; the main change is in the stage that is from a manual one to an automated platform that is using patient fingerprint for identification. The reason is that new systems are better worked around a current system, so the administration can abstain from investing part of energy in manually identifying patient(s) that with the use of card numbers. The bedrock of this system is it utilizes fingerprint biometrics, and an all-around organized database, this database is intended for each table to go about as different patient record keeping. The excellence about the proposed system is that any information that should be entered with the database naturally shares assets with the information entered.CHAPTER TWOLITERATURE REVIEW2.
1CHALLENGES IN PATIENT IDENTIFICATIONDistinctively distinguishing patients in the health system has evaded the Nigerian health section players. Advanced health instruments are being sent to address various difficulties in the Nigerian health system with small hinting at any scale. Regardless of worldwide enthusiasm for computerized identity system and its capability to enhance health result, little advancement has been enrolled in Nigeria. Nigeria has a convoluted patient identity system at the point of writing with patient identity local to health facility and occasionally in departmentHealth system in Nigeria is feeble and faces numerous overwhelming difficulties. Poor patient records persist in spite of immense investment in recent decade.
Routine health office created information regularly can’t be depended on for planning or for critical decision-making. Health facilities are progressively utilizing advanced digital health instruments with limited versatility. This remains constant independent of any meaning of the word ‘scale’. Various copies of individual patient records have resolute the health system by and large and computerized tools specifically. Adaptability of these tools has been hampered by lack of unique patient identity system. Proof demonstrate that the general public’s most vulnerable remain the ones most with no form of Identifiers.
They are frequently monetarily prohibited, and do not have access to essential social benefits including health. (National Populations Commission, 2008; National Populations Commission, 2013; Federal Ministry of Health, 2016; World Bank Group, 2016). In Nigeria, Identification systems for patients at most health office (essential, auxiliary or tertiary) are local to the health facilities. The case is the same independent of their proprietorship private or public. Patient data are as of now scattered over various departments, and facilities and every health institution utilizes their individual identifiers that can’t be utilized beyond the facility or sometimes department The numbering classification regularly can’t be comprehended beyond the generating health facility. Consider a speculative instance of a pregnant lady ‘Uduak’ that registers at a Primary Health Center (PHC) close to her.
A patient number is produced for her at her first visit, if she gets tested at the clinic’s laboratory, another identification may be created depending on the health facility. For a situation that Uduak requires expert care and should be alluded, she may get another registration at the referral center. In the event that she chooses to change health facility for any reason, either in light of the fact that she needs to deliver close to her relatives or just required medical care while travelling, she will get another new registration. And all these happen notwithstanding when she recalls or has her registration data from past health facilities. (Chukwu, 2017) Medical writing routinely uncovered the requirement for significant changes in the delivery of healthcare. Medical blunders result in no less than 44,000 superfluous death every year in the United States, with the most helpless patients, for example, the old or incessantly sick enduring the worst part of these mistakes (Weingart, et al, 2000). In the UK, around 5% of patients conceded yearly encountered some sort of medicinal mistake, which thusly has a quantifiable monetary effect – costing around £1 billion in additional bed days (Murphy and Kay, 2004).
While medical mistakes occur in numerous parts of healthcare, for example, analytic and surgical strategies, antagonistic medication responses and lab tests – precise and productive patient ID is a basic angle in these methodology. For instance, especially in blood transfusion, understanding misidentification can have disastrous impacts. In the blood transfusion setting, tolerant misidentification is the absolute most contributing component to mistransfusion, with it being sufficiently regular that the danger of mistransfusion is considerably more prominent than the transmission of HIV by blood, with the recognizable proof process really deteriorating as time passes by (Murphy and Kay, 2004) In a study carried out by Bártlová et al. (2015), the goal of the study was to assess the opinions of nurses regarding patient safety associated with patient misidentification. The investigation was focused on actual patient misidentification as well as loss of patient materials (e.g., blood samples, X-rays, etc.
). These are problems often associated with patient identification methods and/or confusing patients with the same surname assigned to the same ward. The risks of misidentification incidents pose a considerable threat to patient health especially when the confusion extends to the operating room. their objective was to identify the potential causes of patient misidentification and offers solutions to correct the issue. A survey as part of a sociological investigation was carried out through the use of questionnaires.
The selected sample included, in accordance with the needs of the project and methodology of the Institute for Health Care Information and Statistics of the Czech Republic, registered nurses working shifts on inpatient wards. The study took place across the Czech Republic between Sept. 15 and 30, 2013. The sample consisted of 772 registered nurses. According to the result of Bártlová et al. (2015), the potential for patient misidentification (PM) was described as non- negligible by 38.8% of respondents.
33.1% of nurses admitted problems associated with patient misidentification. Respondents reported that the greatest potential for patient misidentification was associated with patients having the same surname staying on the same ward. The study shows that registered nurses regard patient misidentification as a likely event. Nonetheless, statistics suggest education, changes in protocols, and new technologies are needed to improve the precision of patient identification. (Bártlová et al.
, 2015)2.2 BIOMETRICS IDENTIFICATIONThere are many biometrics in use today and a range of biometrics that are still in the early stages of development. Biometrics can, therefore, be divided into two categories: those that are currently in use across a range of environments and those still in limited use or under development, or still in the research realm. 2.
2.1. Biometrics Currently in Use across a Range of Environments184.108.40.206.
FingerprintFingerprint is the pattern of ridges and valleys on the tip of a finger and is used for personal identification of people. Fingerprint based recognition method because of its relatively outstanding features of universality, permanence, uniqueness, accuracy and low cost has made it most popular and a reliable technique and is currently the leading biometric technology (Jain et al. 2004). There is archaeological evidence that Assyrians and Chinese ancient civilizations have used fingerprints as a form of identification since 7000 to 6000.
Henry Fauld in 1880 laid the scientific foundation of the modern fingerprint recognition by introducing minutiae feature for fingerprint matching (Maltoni et al. 2003). Current fingerprint recognition techniques can be broadly classified as Minutiae-based, Ridge feature-based, Correlation-based and Gradient based (Aggarwal et al.
2008).Most automatic fingerprint identification systems employ techniques based on minutiae points. Although the minutiae pattern of each finger is quite unique, noise and distortion during the acquisition of the fingerprint and errors in the minutiae extraction process result in a number of missing and spurious minutiae (Chikkerur et al. 2006). To overcome the difficulty of reliably obtaining minutiae points from a poor quality fingerprint image, ridge feature-based method is used.
A ridge is a pattern of lines on a finger tip. This method uses ridge features like the orientation and the frequency of ridges, ridge shape and texture information for fingerprint matching. However, the ridge feature-based methods suffer from their low discrimination capability (Maltoni et al. 2003). The correlation-based techniques make two fingerprint images superimposed and do correlation (at the intensity level) between the corresponding pixels for different alignments.
These techniques are highly sensitive to non-linear distortion, skin condition, different finger pressure and alignment (Yousiff et al. 2007). Most of these techniques use minutiae for alignment first.The smooth flow pattern of ridges and valleys in a fingerprint can be also viewed as an oriented texture.
Jain et al. (2000) describe a global texture descriptor called ?Finger Code’ that utilizes both global and local ridge descriptions for an oriented texture such as fingerprints. A variation to this method is used by Chikkerur that use localized texture features of minutiae and another one by Zhengu that uses texture correlation matching. Further, Aggarwal et al. (2008) proposed gradient based approach to capture textural information by dividing each minutiae neighbourhood locations into several local regions of which histograms of oriented gradients are then computed to characterize textural information around each minutiae location.
Recently, Jhat et al. (2011) proposed that Texture feature of Energy of a fingerprint can be used for effecting fingerprint identification.220.127.116.11.
Face recognitionFace recognition for its easy use and non intrusion has made it one of the popular biometric. A summary of the existing techniques for human face recognition can be found in (Zhao et al. 2003). Further, a survey of existing face recognition technologies and challenges is given (Abate et al.
2007). A number of algorithms have been proposed for face recognition. Such algorithms can be divided into two categories: geometric feature-based and appearance-based. Appearance-based methods include: Eigenfaces, Independent Component Analysis (ICA), Kernel Principal Component Analysis (KPCA), Kernel Fisher Discriminant Analysis (KFDA), General Discriminant Analysis (GDA), Neural Networks and Support Vector Machine (SVM). An inherent drawback of appearance-based methods is that the recognition of a face under a particular lighting and pose can be performed reliably when the face has been previously seen under similar circumstances. Further, in appearance-based methods the captured features are global features of the face images and facial occlusion is often difficult to handle in these approaches.
Geometric feature-based methods are robust against variations in illumination and viewpoints but very sensitive to feature extraction process. The geometry feature-based methods analyze explicit local facial features, and their geometric relationships. The geometry feature-based methods include: Active Shape Mode, Elastic Bunch Graph matching and Local Feature Analysis (LFA) (Penev and Atick 2002).According to Mccool et al.
, (2008). Recognition of faces from still images or 2D images is a difficult problem, because the illumination, pose and expression changes in the images create great statistical differences and the identity of the face itself becomes shadowed by these factors. To overcome this problem 3D face recognition has been proposed which has the potential to overcome feature localization, pose and illumination problems, and it can be used in conjunction with 2D systems. Research using 3D face data to identify humans was first published by Cartoux. The 3D face data encodes the structure of the face and so is inherently robust to pose and illumination variations.
Applying HMMs to 3D face identification was first attempted by Achermann. A recent advance for 3D face identification has been to show the applicability of the Gaussian Mixture Model (GMM) parts-based approach (Mccool et al. 2008).
The drawbacks of 3D face recognition include high cost and decreased ease-of-use for laser sensors, low accuracy for other acquisiton types, and the lack of sufficiently powerful algorithms.2.1.
1.3. The IrisThe iris is a thin circular diaphragm, which lies between the cornea and the lens of the human eye. A survey on the current iris recognition technologies is available in (Bowyer et al. 2008). Flom and Ara, first proposed the concept of automated iris recognition.
It was John Daugman who implemented a working automated iris recognition system (Daugman, 2003). Though Daugman’s system is the most successful and most well-known, many other systems have also been developed. An automatic segmentation algorithm based on the circular Hough transform is employed by Wildes.
Boles and Boashash, extracted iris features using a 1-D wavelet transform. Sanchez-Avila and Sanchez-Reillo further developed the iris representation method proposed by Boles. Lim et al.
(2001) extracted the iris feature using 2-D Haar wavelet transform and (Park et al. 2003) utilized directional filter banks to extract the normalized directional energy as a feature. (Kumar et al.
2003) employed correlation filters. Recently Ma et al. proposed two iris recognition methods, one using multi-channel Gabor filters and the other using circular symmetric filters. Later, they proposed an improved method based on characterizing key local variations with a particular class of wavelets, recording a position sequence of local sharp variation points in these signals as features.
Several other methods have also been developed for iris recognition. Chen et al. (2006) proposed using Daugman’s 2-D Gabor filter with quality measure enhancement.
Du et al. (2006) proposed using 1-D local texture patterns and (Sun et al. 2005) proposed using moment- based iris blob matching.18.104.22.168 Hand geometryHand geometry refers to the geometric structure of the hand that is composed of the lengths of fingers, the widths of fingers, and the width of a palm, etc.
The advantages of a hand geometry system are that it is a relatively simple method that can use low resolution images and provides high efficiency with great users’ acceptance (Jain et al. 1999). A brief survey of reported systems for hand-geometry identification can be found in Sanchez-Reillo et al.
(2000). An elaborate survey on hand geometry identification is given in (Dutan, 2009). Geometrical features of the hand constitute the bulk of the hand features adopted in most of the hand recognition systems. One advantage is that geometrical features are more or less invariant to the global positioning of the hand and to the individual planar orientations of the fingers. Among numerous geometrical measures include lengths, widths, areas, and perimeters of the hand, fingers and the palm. (Jain et al.
2005), have shown that hand geometrical features solely are not sufficiently discriminative. Therefore, for more demanding applications one must revert to alternative features such as hand global shape, appearance and/or texture. (Jain et al.
2005) thus use 16 axes predetermined with the aid of five pegs. Sanchez-Reillo et al. (2007) use a similar set of geometric features, containing the widths of the four fingers measured at different latitude, the lengths of the three fingers and the palm. Wong and Shi, (2009), in addition to finger widths, lengths and interfinger baselines, employ the fingertip regions. Bulatov et al.
(2010) describe a peg-free system where 30 geometrical measures are extracted from the hand images. In addition to widths, perimeters and areas of the fingers, they also incorporate the radii of inscribing circles of the fingers.The other approach in hand geometry identification is contour-based (Jain and Duta, 2002). The contour is completely determined by the black-and-white image of the hand and can be derived from it by means of simple image-processing techniques. It can be modelled by features that capture more details of the shape of the hand than the standard geometrical features do. Accordingly, various techniques have been proposed to obtain and mathematically represent these hand features (Alexandra et al.
2002). Yoruk et al. (2006) introduced a more accurate and detailed representation of the hand using the Hausdorff distance of the hand contour, and Independent Component Analysis (ICA).2.3FINGERPRINT BASED IDENTIFICATION AND RECOGNITION SYSTEMSHuman fingerprints have been discovered on a large number of archaeological artifacts and historical items. The English plant morphologist, Nehemiah Grew, published the first scientific paper reporting his systematic study on the ridge, furrow, and pore structure and detailed description of the anatomical formations of fingerprints was made by Mayer.
Konda, (2010) stated biometrics is an automated method that recognizes people based on their physical and action characteristics, and is a field that used to authenticate a certain individual’s characteristics, recognize a person’s character, or study a person’s measurable characteristics Pankanti, (2000). People have unique fingerprints that do not change, and fingerprints consist of ridge and furrow parts of a finger’s surface. Fingerprints can be categorized according to many key patterns that include lops, whirl polls and arches.Fingerprint matching is the process used to determine whether two sets of fingerprint come from the same finger. One fingerprint is stored into the database and other is employee’s current fingerprint.
Minutiae point refers to the topical characteristic at the end point of the ridge part. The best way to compare fingerprints is to compare al visual information on the fingerprints. However, this is realistically impossible. Comparing all visual information requires too much data, and this is inappropriate to making a commercialized system. Actual commercialized systems do not store the fingerprint itself, but characteristics of the fingerprints, and codes related to the position of these points of characteristics. Since only characteristics are stored, they cannot be revived as fingerprint visuals, and therefore cannot be used as evidence in legal facilities Geng, (2012).Josphineleela, (2012) proposed one system, in which attendance is being taken using fingerprint.
This system can be used for student and staff. In this system the fingerprint is taken as an input for attendance management and it is organized into the following modules Pre-processing, Minutiae Extraction, Reconstruction, Fingerprint Recognition, Report generation. In this system, novel fingerprint reconstruction algorithm is used. In 2013, Seema and Satoa proposed one new system for employee attendance using fingerprint. In this system, fingerprint identification is done using extraction of minutiae technique and the system automates the whole process of taking attendance.
For employee fingerprint checking, it checks one fingerprint template with all templates stored in the database, like wise it checks for all student which will take more time. In Neha, (2013) fingerprint recognition based identification system is designed for student identification. This system is being designed for taking attendance in institutes like NIT Rourkela. In this system, fingerprint template matching time is reduced by partitioning database. Fingerprint scanner will be used to input fingerprint of teachers/ students into the computer software.
2.4 FACE RECOGNITION AND VERIFICATION SYSTEMYohei et al., (2005), proposed a system where the student identification is monitored by continuous observation. Continuous observation is the method of using video streaming so that the students sitting position, presence, status and other information is collected. Active Student Detecting (ASD) approach is used to estimate the existence of a student sitting on the seat by using the background subtraction and inter-frame subtraction of the image from the sensing camera on the ceiling. Wei et al., (2009), came up with the half face template face detection method.
In a classroom, the camera is used for capturing the video, sometimes this video contains the half face of students. The half face template can capture side face images in great angle, which improves the correctness of side face detection. This method decreases the time complexity in face detection and adopts face in greater angle. The half face template increases the speed of face detection.
Senthamil et.al., (2014), Face recognition based Attendance marking system.
In this project work, the team sort to find the attendance, positions and face descriptions in classroom lecture, by projecting the presence administration system based on face detection in the classroom lecture. The system estimates the presence and the location of each student by continuous inspection and footage. The result of our beginning experiment shows continuous inspection improved the performance for estimation of the attendance. Patil et al., (2014), Student Attendance Recording System Using Face Recognition with GSM Based Student footage system using face validation was considered and implemented. It was tested with dissimilar face images.
This idea is working properly with different panel. All windows are running separately and equivalent. If appreciation is to participate as a viable biometric for validation, then a further order of improvement in detection score is necessary. Under controlled condition, when lighting and pose can be controlled, this may be possible. It is more likely, that future improvement will rely on making better use of video knowledge and employing fully 3D face models.
Chintalapati et al., (2013), develop an Automated Attendance Management System based on Face Recognition Algorithm. This system is based on face detection and recognition algorithm that automatically detects the student when he enters the class room and mark the attendance by recognizing him. This technique is to be used in order to handle the threats like spoofing. The problem with this approach is that it captures only one student image at a time when he enters the classroom, thus it is time consuming and may distract the attention of the student. Sajid et al., (2014), came up with a Conceptual Model.
Their model captured the image from a fixed camera in the classroom. The noise from the image is reduced and Gabor Filters or jets are used for extracting the facial fiducially points of every detected face. Calculated facial measurements are matched or verified with the data stored in the database. This all computation will be headed on the server. Humans have a diverse set of facial expressions which can reduce the accuracy of facial recognition software. Fernandes et al., (2013), analyzed and reviewed the current face recognition algorithms in order to deduce a new and robust algorithm.
They used ORL and SHEFFIELD database for analyzing the performance of combination of appearance-based methods like Principal Component Analysis (PCA) and Linear Discriminant Analysis (LDA). PCA works better when the images are capture with no disturbance. The paper inferred that PCA is better than LDA at recognizing individuals even with background disturbance, since it took shorter time span for recognition. Thus, PCA and its variants are the best facial recognition algorithms.
Srivastava (2013), suggested about using Emgu CV which is a cross platform .NET wrapper to the OpenCV image processing library. It allows OpenCV functions to be called from .NET compatible languages such as C#, VB, VC++, Iron Python etc.
The software proposed here takes images from a CCTV camera instead of using still images database. Most of the web cameras face the problem of non-uniform lightning since they are dependent on the natural light and cannot have an artificial lighting source. The grayscale images from the camera must be of the same size so as to equalize the histograms. This equalization is crucial for better performance during natural lighting.
Fuzail et al., (2014), Face Detection System for Attendance of Class’ Students. A regular attendance supervision system is an essential tool for any LMS. Most of the existing system are time taking and necessitate for a semi instruction manual work from the instructor or students. This approach aims to explain the issues by integrates face detection in the procedure. Even though this method still lacks the capability to identify each student in attendance on class, there is still much more room for enhancement.
Since we implement a modular approach we can get better different module until we reach an acceptable detection and identification rate. Another issue that has to be taken in consideration in the opportunity is a process to ensure users privacy. Whenever you like a representation is stored on servers, it must be impossible for a person to use that image. Gopala et al., (2015), Implementation of Automated Attendance System using Face Recognition”, automated presence System has been envisioned for the purpose of falling the errors that occur in the conventional (manual) attendance taking system. The aim is to computerize and make a system that is useful to the institute such as an organization. The efficient and exact method of attendance in the office atmosphere that can reinstate the old manual methods.
This technique is secure enough, reliable and available for use. No need for dedicated hardware for installing the system in the office. It can be constructed using a camera and computer. 2.5 SUMMARYAn attempt has been made to review existing works on biometric implementation with a view of knowing the current tools used in its various application. Fingerprint technology is so far the most suitable and reliable approach for the system development as it basically takes care of security and prevents misidentification among patients. It is less prone to error compared to the existing method on ground and hence can be deployed to solve the problem of patient misidentification at hospitals.