Facial Recognition and Mobile Based System for Patient Identification/Verification in Medical Emergencies for Developing Economies

Similar documents
# $ pages In Stock. Report Description

PATIENT AND STAFF IDENTIFICATION Understanding Biometric Options

A PROPOSED PROTOTYPE OF COOPERATIVE MEDICAL TREATMENT SYSTEM FOR HOSPITALS IN GCC COUNTRIES

BIOMETRICS IN HEALTH CARE : A VALUE PROPOSITION FROM HEALTH CARE SECTOR

Implementation of Automated Knowledge-based Classification of Nursing Care Categories

Matching System for Creative Projects and Freelance Workers: PaylancerHK

ENRS: an Object Oriented Approach. By Faris Kateb

ARKANSAS HEALTHCARE TRANSPARENCY INITIATIVE: DATA SUBMISSION GUIDE & ONBOARDING FREQUENTLY ASKED QUESTIONS

Advanced Clinical Workflow for Connecting Clinic

Patient Unified Lookup System for Emergencies (PULSE) System Requirements

International Journal of Information Technology and Business Management 29 th January Vol.33 No JITBM & ARF. All rights reserved

Quanum Electronic Health Record Frequently Asked Questions

Nursing Theory Critique

Chapter 9 Legal Aspects of Health Information Management

A Study on Personal Health Information De-identification Status for Big Data

PRIVACY IMPACT ASSESSMENT (PIA) For the

Cost effectiveness of telemedicine for the delivery of outpatient pulmonary care to a rural population Agha Z, Schapira R M, Maker A H

THE USE OF SIMULATION TO DETERMINE MAXIMUM CAPACITY IN THE SURGICAL SUITE OPERATING ROOM. Sarah M. Ballard Michael E. Kuhl

CSE255 Introduction to Databases - Fall 2007 Semester Project Overview and Phase I

UNCLASSIFIED R-1 ITEM NOMENCLATURE. FY 2014 FY 2014 OCO ## Total FY 2015 FY 2016 FY 2017 FY 2018

NIAGARA FALLS POLICE DEPARTMENT GENERAL ORDER

Technology Standards of Practice

Care360 EHR Frequently Asked Questions

NCRIC ALPR FAQs. Page: FAQ:

Enterprise On-Demand Attachment Last Revised 8/6/ Enterprise On-Demand

For Fusion '98 Conference Proceedings

Building the Hospital Concierge system of the Future in the Cloud

A program for collaborative research in ageing and aged care informatics

EPILEPSY AT A GLANCE: A MOBILE MEDICAL RECORD

1 Title Improving Wellness and Care Management with an Electronic Health Record System

Evaluation and Management Auditing Back to the Basics. Objectives. Audit Start with the benchmarks CMS MEDPAR by specialty 4/22/2013

SMART HEALTH MONITORING SYSTEM

A Study on Computerization of Medical Record at a Corporate Hospital

DoD Biometrics Architecture Briefing to Industry

Component Description Unit Topics 1. Introduction to Healthcare and Public Health in the U.S. 2. The Culture of Healthcare

Global study on Crisalix 3D benefits within the aesthetics field

PRIVACY IMPACT ASSESSMENT (PIA) For the

during the EHR reporting period.

UNCLASSIFIED ID Card USV-JSC 1000 RECORD OF CHANGE DATE ENTERED

The TeleHealth Model THE TELEHEALTH SOLUTION

Patient Care Coordination Variance Reporting

Essentials of Best Practice Recommendations for the Collection of Key Patient Data Attributes

System Qualification Test Report Clear Ballot Group, Inc.

Impact of OK AuthentiCare Electronic Visit Verification (EVV) on ADvantage Program Budget

Call for Projects LIRA 13

Ophthalmology Meaningful Use Attestation Guide 2016 Edition Updated July 2016

Pilot Study: Optimum Refresh Cycle and Method for Desktop Outsourcing

Texas Commission on Environmental Quality

Unique Health Safety Identifier. Across The Continuum of Care

SM Agent Technology For Human Operator Modelling

PRIVACY IMPACT ASSESSMENT (PIA) For the

Sensor Assisted Care. Medical Automation Conference December 12, 2008

HMSA Physical and Occupational Therapy Utilization Management Guide

Development of the Emergency Room Patient Record in Theodor Bilharz Research Institute Hospital

ICT Access and Use in Local Governance in Babati Town Council, Tanzania

Calibrating your tablet allows you to ensure accuracy as you handwrite on the screen and/or select items on the screen. Prime Clinical Systems, Inc 1

Health Workforce 2025

Participant Information Sheet Adults

The UPLOADS Project: Development of an Australian National Incident Dataset for led outdoor activities

Guidelines for the practice of home telemedicine (2011 edition)

1. When will physicians who are not "meaningful" EHR users start to see a reduction in payments?

ABSTRACT. dose", all steps in the setup of the secondary infusion must be conducted correctly.

The future of patient care. 6 ways workflow automation will transform the healthcare experience

1/21/2011. Cindy C. Parman, CPC, CPC H Coding Strategies, Inc.

Structured Model for Healthcare Job Processes: QMS-H

INCENTIVE OFDRG S? MARTTI VIRTANEN NORDIC CASEMIX CONFERENCE

Defense Biometric Identification System (DBIDS) Overview

I. Researcher Information

The Verification for Mission Planning System

Your Guide to Writing a Grant Management Software RFP

Mobile App Process Guide

I. LIVE INTERACTIVE TELEDERMATOLOGY

WARFIGHTER ANALYTICS USING SMARTPHONES FOR HEALTH (WASH) Angelos Keromytis. Proposer s Day 16 May 2017

SEVEN SEVEN. Credentialing tips designed to help keep costs down and ensure a healthier bottom line.

Prediction of High-Cost Hospital Patients Jonathan M. Mortensen, Linda Szabo, Luke Yancy Jr.

International Journal of Advance Engineering and Research Development

THE JOURNEY FROM PHI TO RHI: USING CLINICAL DATA IN RESEARCH

GLOBAL BROADCAST SERVICE (GBS)

NHS RESEARCH PASSPORT POLICY AND PROCEDURE

Report on the Pilot Survey on Obtaining Occupational Exposure Data in Interventional Cardiology

Using the patient s voice to measure quality of care

Complex example of CWW for Osteosarcoma Online

SMART Careplan System for Continuum of Care

PRIVACY IMPACT ASSESSMENT (PIA) For the

Palomar College ADN Model Prerequisite Validation Study. Summary. Prepared by the Office of Institutional Research & Planning August 2005

Incident Reporting & Investigation

Best Practice Model Determination: Oxygenator Selection for Cardiopulmonary Bypass. Mark Henderson, CPC, CCP,

Acute Care Nurses Attitudes, Behaviours and Perceived Barriers towards Discharge Risk Screening and Discharge Planning

Allergy & Rhinology. Manuscript Submission Guidelines. Table of Contents:

Offshoring of Audit Work in Australia

Active Stabilization of Firearms by Optical Target Tracking

A Randomized Trial of Supplemental Parenteral Nutrition in. Under and Over Weight Critically Ill Patients: The TOP UP Trial. CRS & REDCap Manual

LifeBridge Health HIPAA Policy 4. Uses of Protected Health Information for Research

1 LAWS of MINNESOTA 2014 Ch 250, s 3. CHAPTER 250--H.F.No BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF MINNESOTA:

Licensed Nurses in Florida: Trends and Longitudinal Analysis

Introduction to Handwritten Signature Verification

Your Software. Medical Device

GLI Standards Composite Submission Requirements Initial Release, Version: 1.0 Release Date: August 25, 2011

Factorial Design Quantifies Effects of Hand Hygiene and Nurse-to-Patient Ratio on MRSA Acquisition

Keywords: Traditional Medical Monitoring, Questionnaire, Weighted Average, Remote Medical Monitoring, Vital Signs.

Transcription:

Facial Recognition and Mobile Based System for Patient Identification/Verification in Medical Emergencies for Developing Economies Kingsley C. Nwosu, Ph.D., Okey A. Igbonagwam, Ph.D. Department of Computer Science and Information Systems, Saint Leo University, Virginia Peninsula, Virginia, USA. Abstract Medical emergencies are part of the common daily lives of people in developing and under-developed economies. Frequently, some of these medical emergencies end up tragically for many people in these countries due to many reasons, one of which depends on the delivery of the medical treatment especially when the patient is uncommunicative or unresponsive. The ability of the attending medical personnel to access a patient s medical history is critical for the quality of the treatment rendered during emergencies. Unfortunately, today many lives are lost in low income economies during medical emergencies due to lack of and inaccessibility of a patient s medical information. Keywords medical emergencies, developing economies, patient identification, facial recognition I. INTRODUCTION In spite of the global efforts by healthcare providers to focus on preventive healthcare systems, medical emergencies continue to claim many lives in low income economies due to many reasons including, but not limited to, insufficiencies of qualified medical personnel, unavailability of appropriate medical equipment, cultural barriers, cost, and unreliable delivery systems. Medical emergencies are usually handled in three phases at point of occurrence, during transportation, and at a health facility. However, as concluded by [1] in their works in Zimbabwe, the fate of an emergency patient depends greatly on what happens during the first phase of the treatment. The issues and problems surrounding the insufficiencies of medical personnel and unavailability of equipment have been amply discussed in [2][3][4][5][6][7][8]. The recent incidents surrounding the Ebola virus and its transmission to the United States have significantly highlighted and elevated the issues concerned with international medical emergencies. The focus of this paper is on the issues contributing to the unreliability of the emergency healthcare delivery process. Under normal healthcare delivery process, the quality of the services rendered is greatly impacted by the knowledge and/or accessibility of a patient s medical information. Many healthcare delivery accidents and mistreatments (especially the way that the first Ebola patient was initially handled in the US) have happened, in part, due to the absence or inaccessibility of a patient s medical history [9][10][11]. This situation is complicated in a medical emergency situation when a patient is uncommunicative, unresponsive or uneager or unwilling to provide some medical information. What is needed to effectively address this problem is a system that can securely and reliably capture, store, and retrieve a patient s relevant medical information. The reliability depends greatly on how to verify or identify a patient during a medical emergency situation described earlier. Low income economies are notorious with the absence of healthcare infrastructure that facilities storage and access of necessary patients medical information. This system is an attempt to design and develop an affordable, reliable system, and platform to facilitate the capture, storage, access, and retrieval of critical patients medical information for medical emergencies in developing and underdeveloped economies; and the ease of accessibility of this information globally, when necessary. II. GENERAL SYSTEM DESCRIPTION This system comprises a frontend for patient registration or enrollment and patient identification; and a backend for data storage and retrieval (see Fig. 1). The patient registration or enrollment can be done either by the patient s Primary Care Physician (PCP) with the authorization of the patient or by the patient. Only critical medical information necessary 1

for emergency medical care is captured during the enrollment, including the patient s passport-sized digital image. All textual information is stored in the backend in encrypted form. Only authorized persons who have successfully authenticated biometrically are allowed access via the frontend mobile application. A. The Frontend Applications The system s frontend comprises two mobile applications for (1) Patient Enrollment and (2) Patient Identification. Fig. 1: General conceptual architecture of the system. 1) Patient Enrollment Application (PEA) The PEA is used to enroll a patient in the system (Fig. 2). The enrollment process involves the capture of critical and necessary emergency medical information including the patient s passport-sized digital photograph. One of the critical emergency medical information is the patient s list of allergies which include, but not limited to: Cockroach Allergy, Drug Allergies, Dust Allergy, Eye Allergies, Food Allergies, Insect Sting Allergies, Latex Allergy, Mold Allergy, Pet Allergies, Rhinitis, Sinusitis, and Skin Allergies. In addition to the allergies, the enrollment process captures some personal information about the patient such as the name, age and gender, which are vital during the identification process. Furthermore, other optional pieces of information can be captured such as the patient s past medical history, past surgical history, social history, family history, and medications. The patient enrollment can be done by either the patient s Primary Care Physician (PCP) with the authorization of the patient or by the patient. Some of the enroller s information are automatically retrieved from the associated mobile phone and stored for security purposes and post enrollment validation. Distinction is made between information obtained via enrollment from a patient or the PCP during storage, retrieval, and display of the information. This is to convey the degree of reliability based on the sources of the information. For security purposes, all textual data that will never be part of the identification criteria are stored in encrypted form. 2

Fig. 2: Patient enrollment flow diagram. 2) Patient Identification Application (PIA) The other component of the frontend is the Patient Identification Application (Fig. 3) which is used to identify a patient during an emergency situation. In the best case scenario during a medical emergency, the patient s name, age, and gender are known. In that case, a verification operation is performed with the age, name, and gender to retrieve the associated information, if available. In the worst case scenario, neither the name nor age is known. In this case, an identification operation is required as described below (see System s Facial Recognition Technique ) using the patient s gender and estimated age. Depending on the result of each matching request, the user can repeatedly modify the patient s age and perform another matching request, as detailed in the matching technique below. Fig. 3: Patient identification flow diagram. B. The Backend The system s backend (Fig. 4) is responsible for performing the facial matching, encryption, decryption, storage, and retrieval. The backend accepts the enrollment data from the frontend application, formats the data by encryption and 3

facial template extraction, and stores in the database. The enrollment fails if the facial template extraction was unsuccessful. During patient identification, the backend performs the facial matching activity and returns the matching patients facial images and associated medical information. The frontend controls whether to modify the request and repeat the process. C. The Facial Recognition Engine Biometrics verification and identification are the processes of using an individual s measurable physiological or behavioral attributes to either confirm or deny the stated identity of the individual or determine the identity of the individual. Fig. 4: Backend flow diagram. Fig. 5: Examples of Biometrics 4

The physiological or behavioral attributes of an individual have to do with the measurable characteristics of the individual with respect to the functioning of the body such as fingerprints, face, DNA, Iris, Palm, voice, signature, keystroke dynamics, etc. (Fig. 5.) Basically, physiological has to do with data derived from the measurement of a part of a person s anatomy; while behavioral has to do with data derived from measurement of an action performed by a person. Verification is the process of determining whether someone or something is, in fact, who or what it is declared to be; while identification is the process of establishing the identity of an individual. Verifying or confirming a person s identity can be accomplished by using something the person knows (password), something the person has (token) or something that s part of the person (biometrics). Collectively, they provide the highest degree of security, however, individually; biometrics has the highest degree of security and reliability. Why Facial Recognition? Facial recognition is the least intrusive of all the biometric technologies. Facial recognition systems can surreptitiously take a picture of a person's face when they are present within the defined area. The facial recognition software operates by detecting a face and then measuring the various features of the face. Everyone's face has several, distinguishable characteristics that constitute the facial features. These features include, but not limited to: distance between the eyes, width of the nose, depth of the eye sockets, the shape of the cheekbones, and the length of the jaw line. These features are then measured and aggregated to produce a quantifiable numerical code that is used in facial recognition process. The entire process involves the following steps: Detection/Capturing An image can be obtained by scanning an existing photograph or using a manually controlled video camera or by a camera automatically detecting a face. Extraction/Representation - Unique data (code) is extracted from the sample and a template is created. This may involve using and comparing serial samples. Matching - The system then decides if the features extracted from the new sample are matching or not. D. The System s Facial Recognition Technique The facial matching (recognition) approach used in this system uses a patient s gender, estimated age, and photo image (live or stored) to retrieve a set of patients facial templates that meet a given similarity threshold in comparison with the target patient. The age and similarity parameters can be adjusted during successive iterations of an identification session in order to obtain an optimal result. A similarity value measures the degree of similarity between two facial objects. Therefore, a value of 1.0 indicates a 100% match between two facial objects. The lower the similarity value, the higher the probability that more facial objects will match the target object. To describe the facial matching technique utilized here, we let: a represent the estimated age of a patient and a z represent the estimated age during the z th iteration of a given identification session. g represent the gender of the patient. S represent a set of similarity threshold values 0.1 to 1.0 with 0.1 differential, where S = {.1,.2,.3,...,1.0} and S i represents the i th element of S; and S sys represents the system default threshold value. F(a z,g,j) represent the face matching function that compares two face objects and returns a value y where 0 <= y <= 1.0; j represents any face object from the target database that meets the a z and g selection criteria. H represent the face matching process that uses F(a z,g,j) and yields a set of facial objects, Ω. zh represent the z th iteration within a given identification session where z >= 0. zh(all,s i ) represent the result of applying S i threshold value, that is, F(a z,g,j) >= S i. 5

zh(max,s i ) represent the result of applying S i threshold value such that there exists F(a z,g,j) = max and for all m!= j, F(a z,g,m) <= max. Therefore, for a given t th iteration within an identification session, Ω = t H(all,S sys ) U t H(max,S sys ) if t = 0 (1) Ω = t H(all,S i ) if t > 0 (2) Consequently, the associated pseudo code for the z th iteration for an identification session is thus: PROCEDURE G(a z,g,s i ) Initialize z H(max,S i ) to empty Obtain Ω for F(a z,g,j) For each face template in Ω Compute the similarity value If similarity value >= S i then Add face template ID to z H(all,S i ) End if If similarity value > similarity value of z H(max,S i ) then Set z H(max,S i ) to current face ID End if End For each If z == 0 then Add z H(max,S i ) to z H(all,S i ) End if Return z H(all,S i ) End PROCEDURE III. SYSTEM STATUS AND TESTING RESULTS The frontend of this system has been designed and partially implemented. The PEA and PIE has been prototyped as Java applications for testing and demonstration purposes. The backend has been fully implemented. The test database was populated with one to three thousand facial templates with 1:1 male/female ratio. Due to the fact that an identification process may be time-intensive because of its O(N) 1 execution time when matching N facial templates, it s always a concern in any facial matching system to determine the performance efficiency of the system. Our evaluation environment used a LINUX 32-bit machine with Apache Web Server, MySQL Database Server, (2) 2.4 GHz Processors and 4 GB RAM. The CPU matching time for 1,000 to 3,000 facial templates in the database with 1 Big O notation is used to describe the performance or complexity of an algorithm. It s mostly used to describe the worst-case scenario of an algorithm either in the execution time or space used. 6

a percentage hit of 30%-50% ranged from 7.5 milliseconds to 38.3 milliseconds. The total CPU time to retrieve all the applicable facial templates and IDs from the database ranged from 32.0 milliseconds to 163.0 milliseconds. This system is still in-progress and we are planning to complete the application development, system integration, and system testing using our Computer Technology Excellence Laboratory (CTEL) which is currently under development. Also, we plan to extend this work into the area of Google glass as a platform for automated identification and verification of patients via facial recognition. IV. CONCLUSIONS This paper attempts to address the issue of patient identification during a medical emergency when a patient s medical information is inaccessible as a result of the patient s inability to respond to provide the needed pieces of information. The system comprises two frontend mobile applications that are used to enroll and identify a patient based on the patient s facial recognition in conjunction with the gender and tunable age parameters. This system utilizes efficient and effective facial template management and matching technique to determine whether a given patient already exists in the database; and to retrieve the associated medical information. The ability to quickly identify a patient even when the patient is unresponsive enables healthcare providers to access a patient s medical history which is invaluable for quality of care. REFERENCES [1] O. Razum, P. A. Keller, Emergency medical care in developing countries: is it worthwhile?, Bulletin of the World Health Organization : the International Journal of Public Health 2002 ; 80(11) : pages 900-905. [2] B. S. Roudsariemail et al, "Emergency Medical Service (EMS) systems in developed and developing countries", International Journal of the Care of the Injured, Volume 38, Issue 9, Pages 1001 1013, September 2007. [3] P. Conrad, E. B. Gallagher (Eds), "Health and health care In developing countries: Sociological perspectives", ISBN: 978-1-56639-027-9. [4] J. A. Razzak et al, "Assessing emergency medical care in low income countries: A pilot study from Pakistan", BMC Emergency Medicine 2008, Vol. 8, No. 8, http://www.biomedcentral.com/1471-227x/8/8 [5] K. Chandran, T. E. Lyn, "Lack of medical workers causes new health crisis in developing countries", New York Times (Asia Pacific), Oct. 1, 2008. [6] M. L. Scott et al, Brain drain or ethical recruitment?", Medical Journal of Australia, 2004; 180 (4): pages 174-176. [7] Y. Kinfu et al, "The health worker shortage in Africa: are enough physicians and nurses being trained?", Bulletin of the World Health Organization 2009;87: pages 225-230. [8] S. Naicker et al, "Shortage of healthcare workers in developing countries--africa", Ethnicity & Disease 02/2009; 19(1 Suppl 1):S1-60-4. [9] I. CASTREJO N et al, "Importance of Patient History and Physical Examination in Rheumatoid Arthritis Compared to Other Chronic Diseases: Results of a Physician Survey", Arthritis Care & Research, Vol. 64, No. 8, August 2012, pages 1250 1255. 7

[10] T. Tsukamoto, "The contribution of the medical history for the diagnosis of simulated cases by medical students", International Journal of Medical Education. 2012; 3:78-82. [11] J. Grif Alspach (Editor), "The Importance of Family Health History: Your Patients and Your Own", Critical Care Nurse, 2011 vol. 31 no. 1, pages 10-15 8

9