Intro to Forensics Chapter 7: Forensic Biometrics

¡Supera tus tareas y exámenes ahora con Quizwiz!

Interstate photo system

30 million front facing mugshots with ten prints criminal (80%) and civil mugshots(20%)

in 2014, NGI replaced

IAFIS

physiological biometrics

Identification of a person using physical traits such as fingerprints, hand scans, iris scans, retina scans, facial scans. Most commonly used

IrisCode

In 1994 in the U.S., Dr Jogn Daugman completed the technology that led to the code. The goal is to create a unique template of the iris to be compared against a database in the NGI system.

Eigenfaces

Matthew Turk and Alex Pentland (1990's) created the technique. Creates matrices of human faces and uses complex equations to create individual features.

Among facial recognition techniques, the most widely accepted are known today as

Principal Component Analysis Linear Discriminant Analysis (appearance base) Elastic Bunch Graph Matching (model base)

2 main functions of biometrics

The first function is biometric matching or verification

Biometrics

a cutting edge form of access control that accurately and efficiently identifies humans through the use of biological and behavioral traits

behavioral biometrics

a much less stable and includes: handwriting, voice, keystroke, and gait recognition.

facial recognition

a part of NGI as of April 2015 and is now fully active

templete module

allows the new template to be compared to all templates stored in a database or multiple database

facial recognition biometrics

appearance-based and model-based facial recognition

iris biometrics is replacing retina biometrics because it is an all around

better technology and more functional for both law enforcement and business security

the enrollment process

captures a persons biometrics data and stores it in a database for later use

FACE

civil photographs (drivers license photos, passport, job picture, visas)

(NPPS) Nation palm print system

created in 2013, depository of just palm prints

Rapback service

database of information of anyone who has already been in the system, include all criminal activity or criminal history

Every system uses different

equations and algorithms to judge unique characteristics

the extraction module is responsible for

finding patterns in the traits extracted by the sensor by using mathematical equations

contacts, glasses, eye disease, or eye injuries

hinder this capability

Mobile fingerprint scanners (2 tools)

if information is in system, they will show up in system

Tenprint system Part 1 of NGI

include latent print search algorithm

facial scans

least accurate, but improving

retina and iris scans

more secure, but expensive

handwriting

most common. gait is not very accurate

Fingerprints

most cost effective, widely used, and easy to install

the eye is

one of the most common means of identification

a template represents

one person

retina

red portion if the eye in the back

RISC (2 tools)

repository of individuals of special concerns (wanted people)

scars/ marks/ tattoos

scars marks tattoos on a defendant

enrollment process

the first process that each biometrics system must perform

2 main functions of biometrics

the second function of biometrics relates to access control through biometric identification

access control systems

will create and store database of biological traits and compare them to the individual attempting to gain entry into a device or facility Examples : facial recognition, retina scans, fingerprints

Iris

will go unchanged throughout life and is unique


Conjuntos de estudio relacionados

Chapter 10: Rizal in France and Germany

View Set

BioChem Final Review Photosynthesis/Calvin cycle

View Set

Ch1. Introduction to Diesel Engines

View Set

CIS3343-Chapter 7: DATA FLOW DIAGRAMS

View Set

ILRLR 2050 Prelim: Short Response Terms

View Set

Vocab wrkshp lvl e unit 14 sentences

View Set

Chapter 2 Quiz: Diversity in America

View Set