Forensics Ch. 7

¡Supera tus tareas y exámenes ahora con Quizwiz!

Currently, the number of IrisCodes being shared by law enforcement institutions with the FBI is ______?

12,000

A facial recognition scan be tricked by a simple

2D picture

The near infrared wavelength band is located within the _____ nm range of the electromagnetic spectrum

700-900

The NGI system utilized complex mathing algorithms that changed the fingerprint accuracy rating from ___ to ____ percent.

90-92%

A significant advantage of automated facial recognition, as compared to the other different forms of biometrics, is that it does not require subjects to participate. Millions of people can be walking by a ____ each day without realizing that they are being scanned and identified.

CCTV camera

Matthew Turk and Alex Pentland used _____ to automate facial recognition in attempts to ID and authenticate individuals from a series of faces

Eigenfaces

Which government agency created and maintains the NGI system?

FBI

True or False: A data preprocessing module is where extraction begins for a biometric system

False

the NGI system has replaced the _____ fingerprint system

IAFIS

The _____ is a NGI database containing 30 million front-facing photos of individuals with tenprints on file

Interstate Photo System (IPS)

The _____ program was developed by Dr. John Daugman for the analysis and verification of the human iris.

IrisCode

The first documented attempt to identify someone using the iris was performed in the 1950s by British ophthalmologist _____

J.H. Doggart

The ____ system was implemented in 2014 to replace the existing fingerprint IAFIS database

NGI

Iris images are taken with normal visible wavelength pictures, as well as pictures in the ____ band.

NIR

The _____ contains a NGI database of millions of palm prints to be used in criminal investigations and processes

National Palm Print System (NPPS)

the acronym NGI stands for

Next generation identification

The FBI has implemented the _______ system to quickly search a fingerprint database containing terrorists and other high-risk individuals

RISC (Repository of Individuals of Special Concern)

The NGI's _______ service sends notifications to agencies throughout the United States pertaining to criminal activity of individuals that have already been processed through the system at one point.

RapBack

True or False: Over 16 states are participating in the FBI's facial recognition program

True

To combat the obstacles that conflict with facial recognition software, various techniques have been developed to create an accurate verification/matching and ID process. All of these techniques can be placed under two categories: _______ and ______

appearance-based; model-based

____ is a cutting edge type of access control that accurately and efficiently identifies humans.

biometrics

The first process that each biometric system must perform is _____

enrollment

Hats, glasses, and facial hair can obstruct a _____ biometrics scan

facial recognition

With the _______ method, an individual would be asked to stand a set distance from a normal digital camera and a high-definition photo is taken of the face

facial recognition

True or False: the human iris will undergo significant changes during one's lifetime

false

_____ have been widely used to ID people for a century

fingerprints

_____ is the most commonly used type of physiological biometric

fingerprints

Which biometric refers to an individual's different posture, step length, speed and foot positioning in regards to the way they walk from one place to another?

gait recognition

______ is the most commonly used type of behavioral biometrics.

handwriting

The _____ is the colored section in the eye around the pupil

iris

Facial scans are (more, less) accurate than iris scans

less

A second process known as the ____ module compares all collected files to the system's database

matching

The two main functions of biometrics are _____ and _____

matching; identification

Elastic Bunch Graph Matching is a _____ facial recognition program

model-based

One of the main causes of stolen accounts and information in computer systems is the use of weak ____

passwords

A 2D Gabor wavelet filters the iris into multiple partitions known as _____

phasors

Many forms of biometric technology are avaialble today, but the majority of them can be split into two different groups. The first group is ______ biometrics, which contains fingerprints, hand, iris, retina and facial scans. The second group is _____ biometrics, which is much less stable and includes handwriting, voice, keystroke and gait recognition.

physiological; behavioral

The United States Marine and Army use _____ iris biometric system to ID friend or foe on the battlefield

portable

The iris begins to form at the ____ stage of pregnancy, where muscle fibers start to take shape and construct tight patterns.

prenatal

The ____ is composed of neural cells in the back of the eyeball that provide a "screen" for the cornea and lens to display an image on. The ___ is responsible for obtaining a clear picture of what a person is actually seeing.

retina

True or False: due to the complicated nature of obtaining and analyzing retina scans, this technology is not easy to implement in the field.

true

True or False: the manner in which an individual types on a keyboard is unique.

true


Conjuntos de estudio relacionados

Chapter 4- The Market Forces of Supply and Demand

View Set

Lab: Population Growth and Resource Consumption

View Set

Service and Production Operations Test 2

View Set

Residential Market Analysis and Highest & Best Use

View Set

Complex 2 Practice Questions (Saunders & ATI)

View Set