Forensic Science Lesson 6 Forensic Biometrics

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Currently, the number of IrisCodes being shared by law enforcement institutions with the FBI is?

12,000

A facial recognition scan can be tricked by a simple .

2-D picture.

The near-infrared wavelength band is located within the nm range of the electromagnetic spectrum.

700-900

The NGI system utilized complex matching algorithms that changed the fingerprint accuracy rating from to percent.

92, 99

biometric identification

A biometric system that can distinguish between subjects by analyzing a biometric trait of one person and compare it against an existing database of enrolled traits.

Computers and sensitive data networks are most sensitive to breaches due to the problems that exist with existing access-control systems. Passwords can be easily cracked by hacking software, and keycards can be shared amongst multiple people. Keys are about as obsolete as the locks that they are matched too. How can biometrics solve these problems?

Access-control systems can be replaced by new technologies that are based off of physiological metrics. Fingerprints can be an instant password, that can't be duplicated, shared, or spoofed. For access to confidential and sensitive areas (like a nuclear powerplant), a door-mounted iris scanner can let the correct people in and everyone else outside the premises.

biometric matching or verification

Biometric systems capable of identifying someone out of a crowd by scanning select biometric characteristics into a database. Law enforcement entities implement this form of biometrics to find wanted fugitives and individuals suspected of terrorism.

1. is a cutting-edge type of access control that accurately and efficiently identifies humans.

Biometrics

A significant advantage of automated facial recognition, as compared to the other different forms of biometrics, is that it does not require subjects to participate. Millions of people can be walking by a each day with-out realizing that they are being scanned and identified.

CCTV camera

True or False: The human iris will undergo significant changes during one's lifetime.

False

19. Which government agency created and maintains the NGI system?

Federal Bureau of Investigation

5. is the most commonly used type of physiological biometric.

Fingerprints

9. have been widely used to identify people for a century.

Fingerprints

7. Which biometric refers to an individual's different posture, step length, speed, and foot positioning in regards to the way they walk from one place to another?

Gait

8. is the most commonly used type of behavioral biometrics.

Handwriting

The NGI system has replaced the print system.

IAFIS

The__________ is the colored section in the eye around the pupil.

Iris

The program was developed by Dr. John Daugman for the analysis and verification of the human iris.

IrisCode

The first documented attempt to identify someone using the iris was performed in the 1950s by British ophthalmologist

J.H. Doggart

With incidents of global terror on the rise, it has become increasingly harder for law enforcement to manage apprehending suspects. Terror suspects take advantage of large crowds and chaotic situations to blend in and become anonymous. How can law enforcement and government agencies use biometrics to gather investigative leads and find suspects? How can biometrics prevent known terrorists from entering a heavily populated event?

Law enforcement can use technologies such as facial recognition at a crime scene to narrow down suspects who are already on a government watch list. CCTV cameras can gather thousands of faces silently to be scanned at a later date. Prescreening all attendants to sports events, gatherings, etc. can prevent known terrorists from attending. Iris scanners and palm print readers can predetermine if someone is a known threat before he or she enters a location.

18. Facial scans are (more or less) accurate than iris scans.

Less

A second process known as the module compares all collected files to the system's database.

Matching

The_____contains a NGI database of millions of palm prints to be used in criminal investigations and processes.

NPPS (National Palm Prints System)

The acronym NGI stands for

Next Generation Identification

The FBI has implemented the system to quickly search a fingerprint database containing terror-ists and other high-risk individuals.

Repository of Individuals of Special Concern

The________is a NGI database containing 30 million front-facing photos of individuals with tenprints on file.

The Interstate Photo System (IPS)

The_______system was implemented in 2014 to replace the existing fingerprint IAFIS database.

The Next Generation Identification

physiological biometrics

This form of biometrics focuses on identifying humans through their unique physiological traits. Physiological biometrics includes fingerprints, hand, iris, retina, and facial scans.

extraction process

This module is responsible for find-ing patterns in the traits extracted by the biometric sensor by using mathematical equations. Every system uses different equations and algorithms to judge unique characteristics.

10. True or False: A data preprocessing module is where extraction begins for a biometric system.

True

6. True or False: The manner in which an individual types on a keyboard is unique.

True

True or False: Due to the complicated nature of obtaining and analyzing retina scans, this technology is not easy to implement in the field.

True

True or False: Over 16 states are participating in the FBI's facial recognition program.

True

To combat the obstacles that conflict with facial recognition software, various techniques have been developed to create an accurate verification/matching and identification process. All of these techniques can be placed under two categories: and .

appearance-based and model-based facial recognition.

Behavioral biometrics

are less stable and center around actions rather than physical traits. Handwriting, voice pattern, and gait can all be categorized as behavioral biometrics

Appearance-based programs

deal with the differences and similarities in the basic features of the face.

Model-based facial recognition programs

develop a repetition computer-generated model of the participant's face and can map complex features such as eye socket depth.

Token-based identification system

driver's license, birth certificate

Matthew Turk and Alex Pentland used to automate facial recognition in attempts to identify and authenticate individuals from a series of faces.

eigenfaces

The first process that each biometric system must perform is

enrollment

template generation

esponsible for saving all of the raw data produced by feature extraction and putting it into a simple and easy to read format for the system

Hats, glasses, and facial hair can obstruct a biometrics scan

facial recognition

Biometric identifiers include, but aren't limited to:

fingerprints, retina and iris scans, vein patterns, facial recognition, gait, and voice.

Among the most common means of identification

human eye

With the method, an individual would be asked to stand a set distance from a normal digital cam-era and a high-definition photo is taken of the face.

identification

One of the main problems with retina biometrics

is that viable images can be affected by disease

Handwriting

is the most commonly used type of behavioral biometrics.

2. The two main functions of biometrics are

matching/ verification and Identification

Elastic Bunch Graph Matching is a facial recognition program.

model-based

Iris images are taken with normal visible wavelength pictures, as well as pictures in the band.

near infrared

3. One of the main causes of stolen accounts and information in computer systems is the use of weak

passwords

Knowledge-based identification system

passwords

The extraction module identifies

patterns through the application of mathematical equations, and a template of the pertinent information is generated.

A 2D Gabor wavelet filters the iris into multiple partitions know as.

phasors

The most common and cost- efficient types of biometrics

physiological

4. Many forms of biometric technology are available today, but the majority of them can be split into two different groups. The first group is biometrics, which contains fingerprints, hand, iris, retina, and facial scans. The second group is biometrics, which is much less stable and includes handwriting, voice, keystroke, and gait recognition.

physiological, behavioral

The United States Marines and Army use iris biometric system to identify friend or foe on the battlefield

portable

The iris begins to form at The stage of pregnancy, where muscle fibers start to take shape and construct tight patterns.

prenatal

17. The NGI's service sends notifications to agencies throughout the United States pertaining to criminal activity of individuals that have already been processed through the system at one point.

rap back

Biometrics

refers to a form of access control or identification based on human characteristics.

is composed of neural cells in the back of the eyeball that provide a "screen" for the cornea and lens to display an image on. The is responsible for obtaining a clear picture of what a person is actually seeing.

retina

Disadvantages of scanning the retina include

the close proximity of the camera to the eye and the susceptibility of the retina to be affected by disease.

Biometric systems serve two main functions

to match or verify the identity of someone in a crowd by comparing certain biometric characteristics in a database and to restrict or allow access to something through identification of an individual's previously stored biological data


Set pelajaran terkait

Ch. 19: : Male Genital Tract Quiz

View Set

Entschuldigung, wo ist...? Wegbeschreibung

View Set

Chapter 20: Nursing Management of the Pregnancy at Risk: Selected Health Conditions and Vulnerable Populations

View Set

Government and Economics Unit 5 Lesson 4 The Christian and Public Opinion

View Set