Intro to Forensics Chapter 7: Forensic Biometrics
Interstate photo system
30 million front facing mugshots with ten prints criminal (80%) and civil mugshots(20%)
in 2014, NGI replaced
IAFIS
physiological biometrics
Identification of a person using physical traits such as fingerprints, hand scans, iris scans, retina scans, facial scans. Most commonly used
IrisCode
In 1994 in the U.S., Dr Jogn Daugman completed the technology that led to the code. The goal is to create a unique template of the iris to be compared against a database in the NGI system.
Eigenfaces
Matthew Turk and Alex Pentland (1990's) created the technique. Creates matrices of human faces and uses complex equations to create individual features.
Among facial recognition techniques, the most widely accepted are known today as
Principal Component Analysis Linear Discriminant Analysis (appearance base) Elastic Bunch Graph Matching (model base)
2 main functions of biometrics
The first function is biometric matching or verification
Biometrics
a cutting edge form of access control that accurately and efficiently identifies humans through the use of biological and behavioral traits
behavioral biometrics
a much less stable and includes: handwriting, voice, keystroke, and gait recognition.
facial recognition
a part of NGI as of April 2015 and is now fully active
templete module
allows the new template to be compared to all templates stored in a database or multiple database
facial recognition biometrics
appearance-based and model-based facial recognition
iris biometrics is replacing retina biometrics because it is an all around
better technology and more functional for both law enforcement and business security
the enrollment process
captures a persons biometrics data and stores it in a database for later use
FACE
civil photographs (drivers license photos, passport, job picture, visas)
(NPPS) Nation palm print system
created in 2013, depository of just palm prints
Rapback service
database of information of anyone who has already been in the system, include all criminal activity or criminal history
Every system uses different
equations and algorithms to judge unique characteristics
the extraction module is responsible for
finding patterns in the traits extracted by the sensor by using mathematical equations
contacts, glasses, eye disease, or eye injuries
hinder this capability
Mobile fingerprint scanners (2 tools)
if information is in system, they will show up in system
Tenprint system Part 1 of NGI
include latent print search algorithm
facial scans
least accurate, but improving
retina and iris scans
more secure, but expensive
handwriting
most common. gait is not very accurate
Fingerprints
most cost effective, widely used, and easy to install
the eye is
one of the most common means of identification
a template represents
one person
retina
red portion if the eye in the back
RISC (2 tools)
repository of individuals of special concerns (wanted people)
scars/ marks/ tattoos
scars marks tattoos on a defendant
enrollment process
the first process that each biometrics system must perform
2 main functions of biometrics
the second function of biometrics relates to access control through biometric identification
access control systems
will create and store database of biological traits and compare them to the individual attempting to gain entry into a device or facility Examples : facial recognition, retina scans, fingerprints
Iris
will go unchanged throughout life and is unique