Human Identifier Tag

Similar documents
Content Based Image Retrieval Using Color Histogram

ACADEMIC YEAR

3D Face Recognition System in Time Critical Security Applications

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER

ISO/IEC TR TECHNICAL REPORT. Information technology Biometrics tutorial. Technologies de l'information Tutoriel biométrique

Multimodal Biometric Surveillance using a Kinect Sensor Ross Savage 1, Nathan Clarke 1,2 and Fudong, Li 1,

ZKTECO COLLEGE- FUNDAMENTAL OF FINGER VEIN RECOGNITION

Human Authentication from Brain EEG Signals using Machine Learning

Multi-modal Face Recognition

UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910 CLASS FINAL REPORT

Office hrs: QC: Tue, 1:40pm - 2:40pm; GC: Thur: 11:15am-11:45am.or by appointment.

Biometric Recognition: How Do I Know Who You Are?

Sketch Matching for Crime Investigation using LFDA Framework

ELG 5121/CSI 7631 Fall Projects Overview. Projects List

COMBINING FINGERPRINTS FOR SECURITY PURPOSE: ENROLLMENT PROCESS MISS.RATHOD LEENA ANIL

Combined Approach for Face Detection, Eye Region Detection and Eye State Analysis- Extended Paper

Stamp detection in scanned documents

Authenticated Document Management System

A Proposal for Security Oversight at Automated Teller Machine System

Biometric Authentication for secure e-transactions: Research Opportunities and Trends

Fingerprint Combination for Privacy Protection

1. First printing, TR , March, 2000.

An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression

Fahad Al Mannai IT 104 C01 7/8/2016. Biometrics Authentication: An Emerging IT Standard

Face Recognition Based Attendance System with Student Monitoring Using RFID Technology

INTERMEDIATE SCIENCE Grade 8

Applied Surveillance using Biometrics on Agents Infrastructures

Soft Biometrics and Their Application in Person Recognition at a Distance Pedro Tome, Julian Fierrez, Ruben Vera-Rodriguez, and Mark S.

Biometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics

A SURVEY ON FORENSIC SKETCH MATCHING

3 Department of Computer science and Application, Kurukshetra University, Kurukshetra, India

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1

Effective and Efficient Fingerprint Image Postprocessing

INTELLIGENT GUIDANCE IN A VIRTUAL UNIVERSITY

I C T. Per informazioni contattare: "Vincenzo Angrisani" -

REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING

The Center for Identification Technology Research (CITeR)

Feature Extraction Technique Based On Circular Strip for Palmprint Recognition

Node Localization using 3D coordinates in Wireless Sensor Networks

Introduction to Video Forgery Detection: Part I

Subjective Study of Privacy Filters in Video Surveillance

New Age Vital Statistics Services: What They Do and Don t Do

The Use of Static Biometric Signature Data from Public Service Forms

Development and Integration of Artificial Intelligence Technologies for Innovation Acceleration

Fast Subsequent Color Iris Matching in large Database

Vein and Fingerprint Identification Multi Biometric System: A Novel Approach

Card IEEE Symposium Series on Computational Intelligence

Biometry from surveillance cameras forensics in practice

This list supersedes the one published in the November 2002 issue of CR.

A Spiral Development Model for an Advanced Traffic Management System (ATMS) Architecture Based on Prototype

Improved Human Identification using Finger Vein Images

The Design of Teaching System Based on Virtual Reality Technology Li Dongxu

1. Redistributions of documents, or parts of documents, must retain the SWGIT cover page containing the disclaimer.

Biometrics - A Tool in Fraud Prevention

A New Fake Iris Detection Method

Shannon Information theory, coding and biometrics. Han Vinck June 2013

Computer Vision in Human-Computer Interaction

Accident prevention and detection using internet of Things (IOT)

A Novel Approach For Recognition Of Human Face Automatically Using Neural Network Method

Recent Trends of Using ICT in Modern College Libraries

IJRASET 2015: All Rights are Reserved

Paresh Virparia. Department of Computer Science & Applications, Sardar Patel University. India.

Challenges to human dignity from developments in AI

MSc(CompSc) List of courses offered in

Forensic Sketch Recognition: Matching Forensic Sketches to Mugshot Images

BIOMETRICS BY- VARTIKA PAUL 4IT55

Improved Version of Customers Security at ATM Using Noise Level Detector & PIR Sensor

Touchless Fingerprint Recognization System

AUTOMATIC SPEECH RECOGNITION FOR NUMERIC DIGITS USING TIME NORMALIZATION AND ENERGY ENVELOPES

Automatic Licenses Plate Recognition System

How to Guide: Controlling Blinds in C-Bus

ISSUANCE AND CIVIL REGISTRATION

Soldier Tracking and Health Indication System Using ARM7 LPC-2148

An Enhanced Biometric System for Personal Authentication

Evaluation of Biometric Systems. Christophe Rosenberger

A Novel Approach for Human Identification Finger Vein Images

ity Multimedia Forensics and Security through Provenance Inference Chang-Tsun Li

Fingerprinting. Forensic Science

Information Visualizations that Improve Access to Scholarly Knowledge and Expertise

Biometrics Acceptance - Perceptions of Use of Biometrics

About user acceptance in hand, face and signature biometric systems

CORC 3303 Exploring Robotics. Why Teams?

International Conference on Innovative Applications in Engineering and Information Technology(ICIAEIT-2017)

Development of Virtual Reality Simulation Training System for Substation Zongzhan DU

Retrieval of Large Scale Images and Camera Identification via Random Projections

Abstract Terminologies. Ridges: Ridges are the lines that show a pattern on a fingerprint image.

DESIGN STYLE FOR BUILDING INTERIOR 3D OBJECTS USING MARKER BASED AUGMENTED REALITY

M.L.I.Sc. DEGREE EXAMINATION, DEC MASTER OF LIBRARY INFORMATION SCIENCE. Paper - I : Information Communication

CRIME SCENE SEARCH STUDY GUIDE 2010

GPS TECHNOLOGY IN COMMUNITY SERVICES

Design of WSN for Environmental Monitoring Using IoT Application

ARTIFICIAL INTELLIGENCE BASED SELF PROTECTION DEVICE FOR WOMEN PROJECT REFERENCE NO: 38S0037

Specific Sensors for Face Recognition

ENHANCHED PALM PRINT IMAGES FOR PERSONAL ACCURATE IDENTIFICATION

END EXAMINATION TIME TABLE OF II-B.TECH-I-SEM-R07-SUPPLE-NOV-DEC 2016 Examination Timings: A.M. To P.M.

Capstone Jeopardy. Chapter 3 Ghosts in the Machine. Internet Appendix. Chapter 2 Naked in the Sunlight. Chapter 1 Digital Explosion

Efficiently multicasting medical images in mobile Adhoc network for patient diagnosing diseases.

PALM VEIN TECHNOLOGY

Electric Field Analysis of High Voltage Condenser Bushing

Segmentation of Fingerprint Images Using Linear Classifier

Transcription:

Human Identifier Tag Device to identify and rescue humans Teena J 1 Information Science & Engineering City Engineering College Bangalore, India teenprasad110@gmail.com Abstract If every human becomes an identifier then the humans will form into data themselves. Every human when attached with a particular digital identification in their body, this will form internet of things among them. A sensing device which is kept in human body makes the human as an identifier. The identifier in the body will store some information which can be accessed by security servers. This device will be placed in human body such that the human won t face any problem. In today s world there are many devices that user wears or uses to connect to others. The Human Identifier Tag will let the humans to connect to each other without even carrying anything as the device would be placed in their body. Scientific studies have been conducted to prove the working of this device without proving any harm to humans. Index Terms Introduction, Methodology, Comparison, Discussion, Conclusion, Future Enhancement. I. INTRODUCTION Human Identifier Tag is a very tiny device which would be placed in a human s ear lobe. Ear lobe is a part of the body which found to be the best place to mount this device. This device can be placed once in human ear lobe and it can stay there forever. This part of human ear is safe and tested. The user will never feel any disturbance due to Human Identifier Tag. The device is having a size of 0.3mm. As the size of device is very small, it does not harm or irritate user. The device has a signal receiving and sending section which manage the identifier tag. This device is accessed with a secure server through radio magnetic signals. This server shall be organized and maintained by government security officials. This device stores user information into its memory. This information contains all details to verify the identity of the human. Each device is assigned with a unique identification number to distinguish with other devices connected to the same server. II. METHEDOLOGY The approach which is used in the making of this device is purely based on scientific study and technical credibility. 700

Before discussing the working of the device, the design of the device is discussed. A. Design The device is circular in shape and has a size of 3mm. The device contains three sections. commands the acknowledgement sender to pass the signal to the server. Same action is taken if uneven value of blood pressure and body temperature is detected. This section is also responsible for receiving signals from the server to provide the location of the device or the human. B. Working The sensing area The Memory Acknowledgement sender and receiver. The working of the device can be discussed in reference to different scenario that the human may face. At the normal stage, the device monitor the heart beat, blood pressure and body temperature regularly. The device takes the body heat to work efficiently. The sensing area after collecting new information about human s condition, it updates the previously stored information. The sensing Area The sensing area is a part of the device which senses and reads the heart rate, blood pressure and body temperature of the user. This area consists of a heat sensor and heart beat sensor. After sensing, it stores the respective result in the memory section. The sensors keep sensing the required fields and warn the acknowledgement sender receiver if anything serious is sensed. The Memory This part of the device stores all the information about the human as well as it keeps updating the results from the sensing area. It erases the previous result from the sensing area when an updated value is available. Acknowledgement Sender and Receiver This section is responsible for the sending and receiving signals from the secure server. When the sensing device detects a heart beat which is too high or too low then it The moment when the device detects too high or too low blood pressure, uneven heart rate and high body temperature, the device passes the command to acknowledgement sender. The acknowledge sender send a signal out of human body which is received by the nearest mobile tower. This signal finally reaches the secure server. At secure server, the inbuilt processor sends another acknowledgement signal to the human identifier tag. The Acknowledgement Receiver in Human Identifier Tag detects the signal. This signal is passed to access the memory of the device. The processor at the server reads the memory in the tag and retrieves all details about the human condition. Now the server will find out whether the condition of human is normal or not. If it is not normal then the server immediately traces the location of the human through satellite mapping. The server is already programmed to check the different conditions of human. If the processor at the server detects the condition as a health issue, then the server automatically sends a message about the human to the nearest hospital from the location traced earlier. 701

If the processor at the server detects the condition as the human is in some danger, then the server automatically sends a message about the human to the nearest hospital and police station from the location traced earlier. The server also makes an automated phone call to the above. The server will keep tracking the location of the human to guide the police and hospital. To understand the use of Human Identifier Tag in depth, two situations are considered. During any natural disaster like tsunami and earthquake, it is very much difficult to trace humans. But if the human has the Human Identifier Tag, then it is easy to detect and save them. Today there is a major issue with the women security. If the woman have the Human Identifier Tag and if someone attacks on her, then automatically the Human Identifier Tag will send signal to server for her rescue. The server will bring police quickly to the scene and even guide them with the exact location of the victim. The server also informs relatives and friends of the human immediately about the situation. Only authorized secure server officials can access the device so there is no question about the security and privacy of the human. III. COMPARISON There are two other creations which resemble working of the Human Identifier Tag. A wrist band which tracks the human location and makes the human behave as an identifier. The other is software which sends message to friends and relative indicating that the human is in danger. The software also sends the current location of the human. The Human Identifier Tag is a permanent fix to a human body and informs about the danger to the nearest police station, nearest hospital, relatives and friends. IV. DISCUSSION The band and the software mentioned above does the task but there are many limitations to them. The human always have to wear the band for getting traced. The human also have to carry mobile to send messages indicating danger. But in this case the human is not traced but the mobile phone will be traced. If the human lost the phone then the software will not do any good. Whereas the Human Identifier Tag do not require human to send messages as it will automatically sense the situation and takes the necessary actions. The human need not to carry anything to get help as the Human Identifier Tag is placed inside human body. V. CONCLUSION As mentioned above the human need not to wear or carry anything to ask for help. When the user is in danger, he might not know the contact details of nearest police station or hospital. In that case it is almost impossible for the human to get help. But the Human Identifier Tag senses the problem and automatically takes the necessary actions. VI. FUTURE ENHANCEMENT Human Identifier Tag can be used as a mandatory inclusion to human body such that every human can be traced at the time of disaster by the security department. It can be further enhanced by allowing all government departments to access the Human Identifier Tag for the verification of the human. This device can be placed in other animals also. REFERENCES [1] S. Samangooei and M. S. Nixon, Performing Content-based Retrieval of Humans using Gait Biometrics, Multimedia Tools and Applications, vol. 49, no. 1, pp. 195 212, 2010. [2] H. Ailisto, M. Lindholm, S. M. Makela, and E. Vildjiounaite, Unobtrusive user identification with light biometrics, in Proc. NordiCHI, 2004, pp. 327 330. [3] A. K. Jain, K. Nandakumar, X. Lu, and U. Park, Integrating faces, fingerprints, and soft biometric traits for user recognition, in BioAW, vol. LNCS 3087, 2004, pp. 259 269. [4] U. Park and A. K. Jain, Face Matching and Retrieval Using Soft Biometrics, IEEE Trans on Information Forensics and Security, vol. 5, no. 3, pp. 406 415, Sep. 2010. [5] A. Dantcheva, J. Dugelay, and P. Elia, Soft biometrics systems: Reliability and asymptotic bounds, in BTAS, 2010, pp. 1 6. [6] E. F. Loftus, Eyewitness testimony. Harvard U. Pr., 1996. 702

[7] C. A. Meissner, S. L. Sporer, and J. W. Schooler, Person descriptions as eyewitness evidence, Handbook of eyewitness psychology, vol. 2, pp. 3 34, 2007. [8] Daniel A. Reid, Mark S. Nixon, Sarah V. Stevenage, "Soft Biometrics; Human Identification using Comparative Descriptions," IEEE Transactions on Pattern Analysis and Machine Intelligence, 21 Nov. 2013. IEEE computer Society Digital Library. IEEE Computer Society, [9] L. L. Kuehn, Looking down a gun barrel: Person perception and violent crime. Perceptual and Motor Skills, vol. 39, no. 3, pp. 1159 1164, 1974. [10] M. D. MacLeod, J. N. Frowley, and J. W. Shepherd, Whole body information: Its relevance to eyewitnesses, in Adult eyewitness testimony: Current trends and developments. Cambridge University Press, 1994, ch. 6. [11] R. H. Flin and J. W. Shepherd, Tall Stories: Eyewitnesses Ability to Estimate Height andweight Characteristics, Human Learning: Journal of Practical Research & Applications, vol. 5, no. 1, pp. 29 38, 1986. [12] D. A. Reid, S. Samangooei, C. Chen, M. S. Nixon, and A. Ross, Soft Biometrics for Surveillance: An Overview, in Handbook of statistics. Elsevier, 2013, vol. 31, ch. 13, pp. 327 351. [13] J. Shutler, M. Grant, M. S. Nixon, and J. N. Carter, On a large sequence-based human gait database, in Proc RASC.Springer Verlag, 2002, pp. 66 72. [14] S. Denman, C. Fookes, A. Bialkowski, and S. Sridharan, Soft-Biometrics: Unconstrained Authentication in a Surveillance Environment, Digital Image Computing: Techniques and Applications, pp. 196 203, 2009. [15] Chen Wang, Junping Zhang, Liang Wang, Jian Pu, Xiaoru Yuan, "Human Identification Using Temporal Information Preserving Gait Template," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 34, no. 11, pp. 2164-2176, Nov. 2012, doi:10.1109/tpami.2011.260. 703