Ch. 7: Forensic Biometrics, FORENSICS
Alphonse Bertillon
French police officer who realized law enforcement was consistently misidentifying people - proposed a system in which we measure human beings by things that are 'unique' when used in conjunction with one another - 18 different measurements: wingspan, height, width, shape of ear, etc. - early use of the product rule: however, these measurements are NOT unique to one person
[blank] is the most commonly used type of behavioral biometrics.
Handwriting
The NGI system has replaced the _______ fingerprint system.
IAFIS
the NGI system has replaced the _____ fingerprint system
IAFIS
The [blank] is a NGI database containing 30 million front-facing photos of individuals with tenprints on file.
Interstate Phote System
The _____ is a NGI database containing 30 million front-facing photos of individuals with tenprints on file
Interstate Photo System (IPS)
The [blank] program was developed by Dr. John Daugman for the analysis and verification of the human iris.
IrisCode
The _____ program was developed by Dr. John Daugman for the analysis and verification of the human iris.
IrisCode
The first documented attempt to identify someone using the iris was performed in the 1950s by British ophthalmologist [blank].
J. H. Doggart
The first documented attempt to identify someone using the iris was performed in the 1950s by British ophthalmologist _____
J.H. Doggart
The ____ system was implemented in 2014 to replace the existing fingerprint IAFIS database
NGI
in 2014, the IAFIS was replaced by the
NGI
Iris images are taken with normal visible wavelength pictures, as well as pictures in the [blank] band.
NIR
Iris images are taken with normal visible wavelength pictures, as well as pictures in the ____ band.
NIR
The United States Marines and Army use [blank] iris biometric system to identify friend or foe on the battlefield.
NIR
The [blank] contains a NGI database of millions of palm prints to be used in criminal investigations and processes.
NPPS
The _____ contains a NGI database of millions of palm prints to be used in criminal investigations and processes
National Palm Print System (NPPS)
Next Generation identification System (NGIS)
New FBI system that was updated to AFIS in 2013 -new latent print search algorithm, which can solve cold cases/ unknown deceased -RapBack -Facial recognition probability searches -Interstate Photo System (IPS) -palm prints -Repository of Individuals of Special Concern (RISC) -Iris (pilot program)
The [blank] system was implemented in 2014 to replace the existing fingerprint IAFIS database.
Next Generation Identification
The acronym NGI stands for [blank].
Next Generation Identification
the acronym NGI stands for
Next generation identification
The acronym NGI stands for____.
Next generation identification system
Iris Codis
Process to analyze and store information on a human iris. Uses the extracted data from the human iris and processes it through a quantization stage that produces a binary iris code for later comparison.
The FBI has implemented the _______ system to quickly search a fingerprint database containing terrorists and other high-risk individuals
RISC (Repository of Individuals of Special Concern)
The NGI's______service sends notifications to agencies throughout the United States pertaining to criminal activity of individuals that have already been processed through the system at one point.
Rap Back
The NGI's _______ service sends notifications to agencies throughout the United States pertaining to criminal activity of individuals that have already been processed through the system at one point.
RapBack
Extraction process
Responsible for finding patterns in the traits extracted by the biometric sensor by using mathematical equations.
Extraction
Responsible for finding patterns in the traits extracted by the sensor by using mathematical equations.
Template Generation Module
Responsible for saving all of the raw data produced by feature extraction and putting it into a simple and easy to read format for the system.
Template generation
Saves all of the raw data produced by feature extraction and putting it into a simple and easy to read format for the system.
Iris Scanning
Scanning of the colorful part of the eye, similar to retinal scanning -contains intricate muscle patterns -iris construction is unique to every person
Extraction Process
Second part of the biometric process -Responsible for finding patterns in the traits extracted by the biometric sensor by using mathematical equations -every system uses different equations and algorithms to judge unique characteristics
IrisCode
The goal is to create a unique template of the iris to be compared against a database in the NGI system. Dr. John Daugman
Physiological Biometrics
This form of biometrics focuses on identifying humans through their unique physiological traits. Includes fingerprints, hand, iris, retina, and facial scans
True or False: Due to the complicated nature of obtaining and analyzing retina scans, this technology is not easy to implement in the field.
True
True or False: Over 16 states are participating in the FBI's facial recognition program
True
True or False: Over 16 states are participating in the FBI's facial recognition program.
True
True or False: The manner in which an individual types on a keyboard is unique.
True
Physiological Biometrics
Type of biometrics which contains fingerprints, hand, iris,retina and facial scans; most cost-efficient
Biological Biometrics
Type of biometrics which includes writing, voice, and keystrokes
Repository for Individuals of Special Concern
active warrants for dangerous/ suspected terrorists
Eigenfaces
an approach to facial recognition that seeks to capture the variation in face images to identify a person
To combat the obstacles that conflict with facial recognition software, various techniques have been developed to create an accurate verification/matching and identification process. All of these techniques can be placed under two categories: [blank] and [blank].
appearance- based, model-based facial recognition
To combat the obstacles that conflict with facial recognition software, various techniques have been developed to create an accurate verification/matching and ID process. All of these techniques can be placed under two categories: _______ and ______
appearance-based; model-based
Which biometric refers to an individual's different posture, step length, speed, and foot positioning in regards to the way they walk from one place to another?
behavioral (gait recognition)
system of handwriting, voice, keystroke, gait recognition
behavioral biometrics
Access-control systems will create and store databases of biological traits and compare them to the individual attempting to gain entry into a device or facility
biometric identification
this system is capable of identifying someone out of a crowd by scanning select biometric characteristics into a database
biometric matching
The two main functions of biometrics are______ and ______.
biometric matching or verification biometric identification
two functions of biometrics
biometric matching or verification biometric identification
The two main functions of biometrics are [blank] and [blank].
biometric matching, identication
____ is a cutting edge type of access control that accurately and efficiently identifies humans.
biometrics
Biometric System
can distinguish between subjects by analyzing a biometric trait of one person and compare it against an existing database of enrolled traits
Biometric Systems
capable of identifying someone out of a crowd by scanning select biometric characteristics into a database - perfectly tailored for law enforcement/ gov't institutions that are seeking a person of interest - makes it harder for wanted individuals to elude the law and hide amongst the public
Enrollment
capture and stores the biometric - rolling fingerprints and putting them into the system
The first process that each biometric system must perform is _____
enrollment
the first process that the biometrics system must perform is known as the
enrollment process
what process captures a person's biometric data and stores it into a database for later use
enrollment process
what process is responsible for finding patterns int he traits extracted by the sensor by using math equations
extraction
A second process known as the______module compares all collected files to the system's database.
extraction?
Hats, glasses, and facial hair can obstruct a _____ biometrics scan
facial recognition
With the _______ method, an individual would be asked to stand a set distance from a normal digital camera and a high-definition photo is taken of the face
facial recognition
principle component analysis, linear discriminant analysis, elastic bunch graph matching are all what techniques
facial recongnition techniques
True or False: A data processing module is where extraction begins for a biometric system.
false
True or False: The human iris will undergo significant changes during one's lifetime.
false
True or False: the human iris will undergo significant changes during one's lifetime
false
The first process that each biometric system must perform is [blank].
feature extraction
facial recognition works in tandem with the FBI's ___ system
fingerprint
_____ have been widely used to ID people for a century
fingerprints
_____ is the most commonly used type of physiological biometric
fingerprints
________have been widely used to identify people for a century.
fingerprints
________is the most commonly used type of physiological biometric.
fingerprints
Types of Forensic Biometrics - Behavioral Biometrics
focuses on identifying humans through unique behavioral or mental patterns they exhibit - includes: handwriting, voice, keystroke, and gait recognition
Hats, glasses, and facial hair can obstruct a [blank] biometrics scan.
forensic
Which biometric refers to an individual's different posture, step length, speed and foot positioning in regards to the way they walk from one place to another?
gait recognition
Impermanent Features
glasses, facial hair, etc.
what is the goal to create a unique template of the iris to be compared
goal of iris biometrics
______ is the most commonly used type of behavioral biometrics.
handwriting
_________is the most commonly used type of behavioral biometrics.
handwriting
With the [blank] method, an individual would be asked to stand a set distance from a normal digital camera and a high-definition photo is taken of the face.
identification
The [blank] is the colored section in the eye around the pupil.
iris
The _____ is the colored section in the eye around the pupil
iris
The ______ is the colored section in the eye around the pupil.
iris
what is replacing retina biometrics because it is an all around better technology and more functional
iris biometrics
Facial scans are (more or less) accurate than iris scans.
less
Facial scans are (more, less) accurate than iris scans
less
Facial scans are [blank] accurate than iris scans.
less
A second process known as the ____ module compares all collected files to the system's database
matching
The two main functions of biometrics are _____ and _____
matching; identification
Behavioral Biometrics - Keyboarding
measure the pressure placed on each key as you type
national palm print system (NPPS)
millions of palm prints to be used in criminal investigations
Permanent Features
missing finger
Elastic Bunch Graph Matching is a [blank] facial recognition program.
model-based
Elastic Bunch Graph Matching is a _____ facial recognition program
model-based
Behavioral Biometrics - Handwriting
most commonly used behavioral biometric - sensor can analyze different stroke patterns, curves, and arches of a signature while comparing it to an original document; can also sense the amount of pressure
Advanced Fingerprint Identification Technology (AFIT)
multiple copies of each fingerprint
A facial recognition scan can be tricked by a simple [blank].
obstruction
One of the main causes of stolen accounts and information in computer systems is the use of weak [blank].
passwords
One of the main causes of stolen accounts and information in computer systems is the use of weak ____
passwords
One of the main causes of stolen accounts and information in computer systems is the use of weak_______.
passwords
29. A 2D Gabor wavelet filters the iris into multiple partitions know as [blank].
phasors
A 2D Gabor wavelet filters the iris into multiple partitions known as _____
phasors
system of fingerprints, hand, iris, retina, facial scans
physiological biometrics
biometric systems can be split into two groups
physiological biometrics behavioral biometrics
Many forms of biometric technology are available today, but the majority of them can be split into two different groups. The first group is _____biometrics, which contains fingerprints, hand, iris, retina, and facial scans. The second group is ______ biometrics, which is much less stable and includes handwriting, voice, keystroke, and gait recognition.
physiological, beavioral
Many forms of biometric technology are available today, but the majority of them can be split into two different groups. The first group is [blank] biometrics, which contains fingerprints, hand, iris, retina, and facial scans. The second group is [blank] biometrics, which is much less stable and includes handwriting, voice, keystroke, and gait recognition.
physiological, behavioral
Many forms of biometric technology are avaialble today, but the majority of them can be split into two different groups. The first group is ______ biometrics, which contains fingerprints, hand, iris, retina and facial scans. The second group is _____ biometrics, which is much less stable and includes handwriting, voice, keystroke and gait recognition.
physiological; behavioral
The United States Marine and Army use _____ iris biometric system to ID friend or foe on the battlefield
portable
The iris begins to form at the [blank] stage of pregnancy, where muscle fibers start to take shape and construct tight patterns.
prenatal
The iris begins to form at the ____ stage of pregnancy, where muscle fibers start to take shape and construct tight patterns.
prenatal
The iris begins to form at the _______ stage of pregnancy, where muscle fibers start to take shape and construct tight patterns.
prenatal
Template Generation Model
responsible for saving all of the raw data produced by feature extraction and putting it into a simple and easy to read format for the system
The ____ is composed of neural cells in the back of the eyeball that provide a "screen" for the cornea and lens to display an image on. The ___ is responsible for obtaining a clear picture of what a person is actually seeing.
retina
The_______is composed of neural cells in the back of the eyeball that provide a "screen" for the cornea and lens to display an image on. The_____is responsible for obtaining a clear picture of what a person is actually seeing.
retina
The [blank] is composed of neural cells in the back of the eyeball that provide a "screen" for the cornea and lens to display an image on. The [bank] is responsible for obtaining a clear picture of what a person is actually seeing.
retina, retina
A second process known as the [blank] module compares all collected files to the system's database.
template generation
what module determines whether a match exists
template module
what module is responsible for saving the raw data produced by the extraction and pitting it into a easy to read format
template module
this database contains 30 million front facing mugshot photos of individuals to be used for facial recognition analysis
the Interstate photo system (IPS)
The first process that each biometric system must perform is_____.
the enrollment process
Behavioral Biometrics - Gait
the manner in which your body moves while you're in motion
Enrollment Process
the process of capturing a person's biometric data and storing them in a database for later use
Iris Scanning - Muscle Defintion
the way the muscles come together: when your pupils dilate, that's the muscles in the iris controlling it
iris code
to create a unique template of the iris to be compared in the NGI system
Behavioral Biometrics - Voice Recognition
tone of voice, inflection, etc. - concept: you can walk up somewhere and use your individual voice
True or False: Due to the complicated nature of obtaining and analyzing retina scans, this technology is not easy to implement the field.
true
True or False: due to the complicated nature of obtaining and analyzing retina scans, this technology is not easy to implement in the field.
true
True or False: the manner in which an individual types on a keyboard is unique.
true
Next Generation Identification System (NGI)
update to AFIS - only had one set of prints: best rolls from each print taken - problem: only one good side
Near Infrared Capture
(700-900 Wavelength) - type of photo done at a distance (6in.-10ft.) - safe, acceptable distance exam - retinal exam more intrusive
NIR Capture
(Near-Infra-Red) wavelengths of 700-900 nm used in high quality digital cameras to capture the iris -can stand a good distance away from camera
Physiological Biometrics - Eyes
- Iris: colored lens surrounding the pupil -contains more characteristics/ muscles than there are in fingerprints (more unique) -only change when you have cataract surgery - Retina: series of muscles/ veins inside of the pupil
Extraction
- equations and algorithms - classification of prints - henry classification system: making it usable to find again
Types of Forensic Biometrics - Physiological Biometrics
- focuses on: identifying humans through their unique physiological traits -includes: fingerprints, hand, iris, retina, and facial scans
Physiological Biometrics - Fingerprints
- palm: has ridges like our fingers - hands: combination of fingerprints with palm print (use a curled reader to obtain entire print) - vein: patterns that run through our hands are unique
History of Forensic Biometrics
-Anthropology (study of humans) -Individual identifiers used in conjunction -Alphonse Bertillion (Bertillion System)
Purposes of Forensic Biometrics
-Biometric matching or verification -Biometric Identification
Main functions
-Biometric matching: capable of identifying someone by scanning select biometric characteristics into a database. -Biometric identification: create and store databases of biological traits and compare them to the individual attempting to gain entry into a device or facility.
Facial Recognition
-PCA: appearance based method. A full frontal face image is needed. -Linear Discriminant Analysis -EBGM: model- based facial recognition program. This method identifies landmark features on the face, does not require a full facial image.
Types of Forensic Biometrics
-Physiological Biometrics -Behavioral Biometrics
Currently, the number of Iris Codes being shared by law enforcement institutions with the FBI is [blank].
1.2 million
Currently, the number of IrisCodes being shared by law enforcement institutions with the FBI is ______?
12,000
A facial recognition scan be tricked by a simple
2D picture
2D v. 3D
3D facial recognition has higher accuracy than 2D, and can map complex features like eye socket depth
The near infrared wavelength band is located within the [blank]-[blank] nm range of the electromagnetic spectrum.
700-900
The near infrared wavelength band is located within the _____ nm range of the electromagnetic spectrum
700-900
how many of the photos in the iPS are criminal
80 percent
The NGI system utilized complex mathing algorithms that changed the fingerprint accuracy rating from ___ to ____ percent.
90-92%
The NGI system utilized complex matching algorithms that changed the fingerprint accuracy rating from [blank] to [blank] percent.
92, 99
Biometric Identification
A biometric system that can distinguish between subjects by analyzing a biometric trait of 1 person and compare it against an existing database of enrolled traits -Face ID/Fingerprint ID on iPhones
biometric identification
A biometric system that can distinguish between subjects by analyzing a biometric trait of one person and compare it against an existing database of enrolled traits
Facial Recognition
A biometric technology that looks for unique measurements in an individual's face. -subjects do not have to participate -process is relatively quick
Physiological Biometrics
A type of forensic biometrics that focuses on identifying humans through their unique physiological traits -fingerprints, hand, iris, veins, retina, face, palm -cost efficient -easy to install -iris scans are more secure than face scans
Behavioral Biometrics
A type of forensic biometrics that focuses on identifying humans through unique behavioral or mental patterns -handwriting, voice, keystroke, gait recognition -used infrequently, mostly for experimental purposes
The FBI has implemented the [blank] system to quickly search a fingerprint database containing terrorists and other high-risk individuals.
AFIT
Which biometric refers to an individual's different posture, step length, speed, and foot positioning in regards to the way they walk from one place to another?
Behavioral Biometrics
Biometric Matching or Verification
Biometric systems capable of identifying someone out of a crowd by scanning select biometric characteristics into a database -law enforcement uses this to find fugitives or suspected terrorists
biometric matching or verification
Biometric systems capable of identifying someone out of a crowd by scanning select biometric characteristics into a database. Law enforcement entities implement this form of biometrics to find wanted fugitives and suspects of terrorism.
[blank] is a cutting-edge type of access control that accurately and efficiently identifies humans
Biometrics
_____is a cutting edge type of access control that accurately and efficiently identifies humans.
Biometrics
A significant advantage of automated facial recognition, as compared to the other different forms of biometrics, is that it does not require subjects to participate. Millions of people can be walking by a [blank] each day without realizing that they are being scanned and identified.
CCTV camera
A significant advantage of automated facial recognition, as compared to the other different forms of biometrics, is that it does not require subjects to participate. Millions of people can be walking by a ____ each day without realizing that they are being scanned and identified.
CCTV camera
Enrollment process
Capturing a person's biometric data and storing them in a database for future use. It work by collecting data through a sensor and sending it to a data acquisition model.
Forensic Biometrics
Cutting edge form of access control that accurately and efficiently identifies humans
Permanent v. Impermanent Features
Due to the ever-changing nature and variety of features in the human face, researchers must create facial recognition software that analyzed multiple variables -cheekbones, mouth edges, chin, widow's peak, etc.
Iris Scanning - Eye Color
Egyptians recorded this: different shape of eyes - brown most common color
31. Matthew Turk and Alex Pentland used [blank] to automate facial recognition in attempts to identify and authenticate individuals from a series of faces.
Eigenface
Matthew Turk and Alex Pentland used _____ to automate facial recognition in attempts to ID and authenticate individuals from a series of faces
Eigenfaces
Biometric Processes
Enrollment-->Extraction-->Template Generation
what database contains civil photos such as visa applicant photos, etc.
FACE
Which government agency created and maintains the NGI system?
FBI
Which government agency created and maintains the NGI?
FBI
Repository for Individuals of Special Concern (RISC)
FBI program featured in NGIS that allows officials to fingerprint anyone they come into contact with to quickly detect whether or not they are a threat
Interstate Photo System (IPS)
FBI program featured in NGIS that is a database containing 30 million mugshots with tenprints on file
RapBack
FBI program featured in NGIS that will notify agencies across U.S. if an individual has been subsequently arrested or prosecuted of a crime
RAPBack
FBI program that will notify airport if a badge holder (individual who holds a position of trust) has been subsequently arrested or prosecuted of a crime
[blank] have been widely used to identify people for a century.
Facial characteristics
True or False: A data preprocessing module is where extraction begins for a biometric system
False
True or False: A data preprocessing module is where extraction begins for a biometric system.
False
True or False: The human iris will undergo significant changes during one's lifetime.
False
T/F: Facial Recognition is easy to use
False - cameras are easy to use - capturing the photo is extremely complex: different points on the brow, high points on the forehead, nose, smile, etc. (all can change over time)
Template Generation
Final part of the biometric process -Responsible for saving all of the raw data produced by feature extraction and putting it into a simple and easy to read format for the system -recollection and access
[blank] is the most commonly used type of physiological biometric.
Fingerprints
Enrollment Process
First part of the biometric process -Capturing a person's biometric data and storing them in a database for later use -works by collecting data through a sensor and sending it to a data acquisition module
Enrollment process
First process of biometric system. Captures a person's biometric data and stores in a database for later use.
behavioral biometrics
Focuses on identifying humans through unique behavioral or mental patterns they exhibit. Includes handwriting, voice, keystroke, and gait recognition.
Biometrics
Form of access control that accurately identifies humans