Forensic Science Lesson 6 Forensic Biometrics
Currently, the number of IrisCodes being shared by law enforcement institutions with the FBI is?
12,000
A facial recognition scan can be tricked by a simple .
2-D picture.
The near-infrared wavelength band is located within the nm range of the electromagnetic spectrum.
700-900
The NGI system utilized complex matching algorithms that changed the fingerprint accuracy rating from to percent.
92, 99
biometric identification
A biometric system that can distinguish between subjects by analyzing a biometric trait of one person and compare it against an existing database of enrolled traits.
Computers and sensitive data networks are most sensitive to breaches due to the problems that exist with existing access-control systems. Passwords can be easily cracked by hacking software, and keycards can be shared amongst multiple people. Keys are about as obsolete as the locks that they are matched too. How can biometrics solve these problems?
Access-control systems can be replaced by new technologies that are based off of physiological metrics. Fingerprints can be an instant password, that can't be duplicated, shared, or spoofed. For access to confidential and sensitive areas (like a nuclear powerplant), a door-mounted iris scanner can let the correct people in and everyone else outside the premises.
biometric matching or verification
Biometric systems capable of identifying someone out of a crowd by scanning select biometric characteristics into a database. Law enforcement entities implement this form of biometrics to find wanted fugitives and individuals suspected of terrorism.
1. is a cutting-edge type of access control that accurately and efficiently identifies humans.
Biometrics
A significant advantage of automated facial recognition, as compared to the other different forms of biometrics, is that it does not require subjects to participate. Millions of people can be walking by a each day with-out realizing that they are being scanned and identified.
CCTV camera
True or False: The human iris will undergo significant changes during one's lifetime.
False
19. Which government agency created and maintains the NGI system?
Federal Bureau of Investigation
5. is the most commonly used type of physiological biometric.
Fingerprints
9. have been widely used to identify people for a century.
Fingerprints
7. Which biometric refers to an individual's different posture, step length, speed, and foot positioning in regards to the way they walk from one place to another?
Gait
8. is the most commonly used type of behavioral biometrics.
Handwriting
The NGI system has replaced the print system.
IAFIS
The__________ is the colored section in the eye around the pupil.
Iris
The program was developed by Dr. John Daugman for the analysis and verification of the human iris.
IrisCode
The first documented attempt to identify someone using the iris was performed in the 1950s by British ophthalmologist
J.H. Doggart
With incidents of global terror on the rise, it has become increasingly harder for law enforcement to manage apprehending suspects. Terror suspects take advantage of large crowds and chaotic situations to blend in and become anonymous. How can law enforcement and government agencies use biometrics to gather investigative leads and find suspects? How can biometrics prevent known terrorists from entering a heavily populated event?
Law enforcement can use technologies such as facial recognition at a crime scene to narrow down suspects who are already on a government watch list. CCTV cameras can gather thousands of faces silently to be scanned at a later date. Prescreening all attendants to sports events, gatherings, etc. can prevent known terrorists from attending. Iris scanners and palm print readers can predetermine if someone is a known threat before he or she enters a location.
18. Facial scans are (more or less) accurate than iris scans.
Less
A second process known as the module compares all collected files to the system's database.
Matching
The_____contains a NGI database of millions of palm prints to be used in criminal investigations and processes.
NPPS (National Palm Prints System)
The acronym NGI stands for
Next Generation Identification
The FBI has implemented the system to quickly search a fingerprint database containing terror-ists and other high-risk individuals.
Repository of Individuals of Special Concern
The________is a NGI database containing 30 million front-facing photos of individuals with tenprints on file.
The Interstate Photo System (IPS)
The_______system was implemented in 2014 to replace the existing fingerprint IAFIS database.
The Next Generation Identification
physiological biometrics
This form of biometrics focuses on identifying humans through their unique physiological traits. Physiological biometrics includes fingerprints, hand, iris, retina, and facial scans.
extraction process
This module is responsible for find-ing patterns in the traits extracted by the biometric sensor by using mathematical equations. Every system uses different equations and algorithms to judge unique characteristics.
10. True or False: A data preprocessing module is where extraction begins for a biometric system.
True
6. True or False: The manner in which an individual types on a keyboard is unique.
True
True or False: Due to the complicated nature of obtaining and analyzing retina scans, this technology is not easy to implement in the field.
True
True or False: Over 16 states are participating in the FBI's facial recognition program.
True
To combat the obstacles that conflict with facial recognition software, various techniques have been developed to create an accurate verification/matching and identification process. All of these techniques can be placed under two categories: and .
appearance-based and model-based facial recognition.
Behavioral biometrics
are less stable and center around actions rather than physical traits. Handwriting, voice pattern, and gait can all be categorized as behavioral biometrics
Appearance-based programs
deal with the differences and similarities in the basic features of the face.
Model-based facial recognition programs
develop a repetition computer-generated model of the participant's face and can map complex features such as eye socket depth.
Token-based identification system
driver's license, birth certificate
Matthew Turk and Alex Pentland used to automate facial recognition in attempts to identify and authenticate individuals from a series of faces.
eigenfaces
The first process that each biometric system must perform is
enrollment
template generation
esponsible for saving all of the raw data produced by feature extraction and putting it into a simple and easy to read format for the system
Hats, glasses, and facial hair can obstruct a biometrics scan
facial recognition
Biometric identifiers include, but aren't limited to:
fingerprints, retina and iris scans, vein patterns, facial recognition, gait, and voice.
Among the most common means of identification
human eye
With the method, an individual would be asked to stand a set distance from a normal digital cam-era and a high-definition photo is taken of the face.
identification
One of the main problems with retina biometrics
is that viable images can be affected by disease
Handwriting
is the most commonly used type of behavioral biometrics.
2. The two main functions of biometrics are
matching/ verification and Identification
Elastic Bunch Graph Matching is a facial recognition program.
model-based
Iris images are taken with normal visible wavelength pictures, as well as pictures in the band.
near infrared
3. One of the main causes of stolen accounts and information in computer systems is the use of weak
passwords
Knowledge-based identification system
passwords
The extraction module identifies
patterns through the application of mathematical equations, and a template of the pertinent information is generated.
A 2D Gabor wavelet filters the iris into multiple partitions know as.
phasors
The most common and cost- efficient types of biometrics
physiological
4. Many forms of biometric technology are available today, but the majority of them can be split into two different groups. The first group is biometrics, which contains fingerprints, hand, iris, retina, and facial scans. The second group is biometrics, which is much less stable and includes handwriting, voice, keystroke, and gait recognition.
physiological, behavioral
The United States Marines and Army use iris biometric system to identify friend or foe on the battlefield
portable
The iris begins to form at The stage of pregnancy, where muscle fibers start to take shape and construct tight patterns.
prenatal
17. The NGI's service sends notifications to agencies throughout the United States pertaining to criminal activity of individuals that have already been processed through the system at one point.
rap back
Biometrics
refers to a form of access control or identification based on human characteristics.
is composed of neural cells in the back of the eyeball that provide a "screen" for the cornea and lens to display an image on. The is responsible for obtaining a clear picture of what a person is actually seeing.
retina
Disadvantages of scanning the retina include
the close proximity of the camera to the eye and the susceptibility of the retina to be affected by disease.
Biometric systems serve two main functions
to match or verify the identity of someone in a crowd by comparing certain biometric characteristics in a database and to restrict or allow access to something through identification of an individual's previously stored biological data