Ch. 7: Forensic Biometrics, FORENSICS

Ace your homework & exams now with Quizwiz!

Alphonse Bertillon

French police officer who realized law enforcement was consistently misidentifying people - proposed a system in which we measure human beings by things that are 'unique' when used in conjunction with one another - 18 different measurements: wingspan, height, width, shape of ear, etc. - early use of the product rule: however, these measurements are NOT unique to one person

[blank] is the most commonly used type of behavioral biometrics.

Handwriting

The NGI system has replaced the _______ fingerprint system.

IAFIS

the NGI system has replaced the _____ fingerprint system

IAFIS

The [blank] is a NGI database containing 30 million front-facing photos of individuals with tenprints on file.

Interstate Phote System

The _____ is a NGI database containing 30 million front-facing photos of individuals with tenprints on file

Interstate Photo System (IPS)

The [blank] program was developed by Dr. John Daugman for the analysis and verification of the human iris.

IrisCode

The _____ program was developed by Dr. John Daugman for the analysis and verification of the human iris.

IrisCode

The first documented attempt to identify someone using the iris was performed in the 1950s by British ophthalmologist [blank].

J. H. Doggart

The first documented attempt to identify someone using the iris was performed in the 1950s by British ophthalmologist _____

J.H. Doggart

The ____ system was implemented in 2014 to replace the existing fingerprint IAFIS database

NGI

in 2014, the IAFIS was replaced by the

NGI

Iris images are taken with normal visible wavelength pictures, as well as pictures in the [blank] band.

NIR

Iris images are taken with normal visible wavelength pictures, as well as pictures in the ____ band.

NIR

The United States Marines and Army use [blank] iris biometric system to identify friend or foe on the battlefield.

NIR

The [blank] contains a NGI database of millions of palm prints to be used in criminal investigations and processes.

NPPS

The _____ contains a NGI database of millions of palm prints to be used in criminal investigations and processes

National Palm Print System (NPPS)

Next Generation identification System (NGIS)

New FBI system that was updated to AFIS in 2013 -new latent print search algorithm, which can solve cold cases/ unknown deceased -RapBack -Facial recognition probability searches -Interstate Photo System (IPS) -palm prints -Repository of Individuals of Special Concern (RISC) -Iris (pilot program)

The [blank] system was implemented in 2014 to replace the existing fingerprint IAFIS database.

Next Generation Identification

The acronym NGI stands for [blank].

Next Generation Identification

the acronym NGI stands for

Next generation identification

The acronym NGI stands for____.

Next generation identification system

Iris Codis

Process to analyze and store information on a human iris. Uses the extracted data from the human iris and processes it through a quantization stage that produces a binary iris code for later comparison.

The FBI has implemented the _______ system to quickly search a fingerprint database containing terrorists and other high-risk individuals

RISC (Repository of Individuals of Special Concern)

The NGI's______service sends notifications to agencies throughout the United States pertaining to criminal activity of individuals that have already been processed through the system at one point.

Rap Back

The NGI's _______ service sends notifications to agencies throughout the United States pertaining to criminal activity of individuals that have already been processed through the system at one point.

RapBack

Extraction process

Responsible for finding patterns in the traits extracted by the biometric sensor by using mathematical equations.

Extraction

Responsible for finding patterns in the traits extracted by the sensor by using mathematical equations.

Template Generation Module

Responsible for saving all of the raw data produced by feature extraction and putting it into a simple and easy to read format for the system.

Template generation

Saves all of the raw data produced by feature extraction and putting it into a simple and easy to read format for the system.

Iris Scanning

Scanning of the colorful part of the eye, similar to retinal scanning -contains intricate muscle patterns -iris construction is unique to every person

Extraction Process

Second part of the biometric process -Responsible for finding patterns in the traits extracted by the biometric sensor by using mathematical equations -every system uses different equations and algorithms to judge unique characteristics

IrisCode

The goal is to create a unique template of the iris to be compared against a database in the NGI system. Dr. John Daugman

Physiological Biometrics

This form of biometrics focuses on identifying humans through their unique physiological traits. Includes fingerprints, hand, iris, retina, and facial scans

True or False: Due to the complicated nature of obtaining and analyzing retina scans, this technology is not easy to implement in the field.

True

True or False: Over 16 states are participating in the FBI's facial recognition program

True

True or False: Over 16 states are participating in the FBI's facial recognition program.

True

True or False: The manner in which an individual types on a keyboard is unique.

True

Physiological Biometrics

Type of biometrics which contains fingerprints, hand, iris,retina and facial scans; most cost-efficient

Biological Biometrics

Type of biometrics which includes writing, voice, and keystrokes

Repository for Individuals of Special Concern

active warrants for dangerous/ suspected terrorists

Eigenfaces

an approach to facial recognition that seeks to capture the variation in face images to identify a person

To combat the obstacles that conflict with facial recognition software, various techniques have been developed to create an accurate verification/matching and identification process. All of these techniques can be placed under two categories: [blank] and [blank].

appearance- based, model-based facial recognition

To combat the obstacles that conflict with facial recognition software, various techniques have been developed to create an accurate verification/matching and ID process. All of these techniques can be placed under two categories: _______ and ______

appearance-based; model-based

Which biometric refers to an individual's different posture, step length, speed, and foot positioning in regards to the way they walk from one place to another?

behavioral (gait recognition)

system of handwriting, voice, keystroke, gait recognition

behavioral biometrics

Access-control systems will create and store databases of biological traits and compare them to the individual attempting to gain entry into a device or facility

biometric identification

this system is capable of identifying someone out of a crowd by scanning select biometric characteristics into a database

biometric matching

The two main functions of biometrics are______ and ______.

biometric matching or verification biometric identification

two functions of biometrics

biometric matching or verification biometric identification

The two main functions of biometrics are [blank] and [blank].

biometric matching, identication

____ is a cutting edge type of access control that accurately and efficiently identifies humans.

biometrics

Biometric System

can distinguish between subjects by analyzing a biometric trait of one person and compare it against an existing database of enrolled traits

Biometric Systems

capable of identifying someone out of a crowd by scanning select biometric characteristics into a database - perfectly tailored for law enforcement/ gov't institutions that are seeking a person of interest - makes it harder for wanted individuals to elude the law and hide amongst the public

Enrollment

capture and stores the biometric - rolling fingerprints and putting them into the system

The first process that each biometric system must perform is _____

enrollment

the first process that the biometrics system must perform is known as the

enrollment process

what process captures a person's biometric data and stores it into a database for later use

enrollment process

what process is responsible for finding patterns int he traits extracted by the sensor by using math equations

extraction

A second process known as the______module compares all collected files to the system's database.

extraction?

Hats, glasses, and facial hair can obstruct a _____ biometrics scan

facial recognition

With the _______ method, an individual would be asked to stand a set distance from a normal digital camera and a high-definition photo is taken of the face

facial recognition

principle component analysis, linear discriminant analysis, elastic bunch graph matching are all what techniques

facial recongnition techniques

True or False: A data processing module is where extraction begins for a biometric system.

false

True or False: The human iris will undergo significant changes during one's lifetime.

false

True or False: the human iris will undergo significant changes during one's lifetime

false

The first process that each biometric system must perform is [blank].

feature extraction

facial recognition works in tandem with the FBI's ___ system

fingerprint

_____ have been widely used to ID people for a century

fingerprints

_____ is the most commonly used type of physiological biometric

fingerprints

________have been widely used to identify people for a century.

fingerprints

________is the most commonly used type of physiological biometric.

fingerprints

Types of Forensic Biometrics - Behavioral Biometrics

focuses on identifying humans through unique behavioral or mental patterns they exhibit - includes: handwriting, voice, keystroke, and gait recognition

Hats, glasses, and facial hair can obstruct a [blank] biometrics scan.

forensic

Which biometric refers to an individual's different posture, step length, speed and foot positioning in regards to the way they walk from one place to another?

gait recognition

Impermanent Features

glasses, facial hair, etc.

what is the goal to create a unique template of the iris to be compared

goal of iris biometrics

______ is the most commonly used type of behavioral biometrics.

handwriting

_________is the most commonly used type of behavioral biometrics.

handwriting

With the [blank] method, an individual would be asked to stand a set distance from a normal digital camera and a high-definition photo is taken of the face.

identification

The [blank] is the colored section in the eye around the pupil.

iris

The _____ is the colored section in the eye around the pupil

iris

The ______ is the colored section in the eye around the pupil.

iris

what is replacing retina biometrics because it is an all around better technology and more functional

iris biometrics

Facial scans are (more or less) accurate than iris scans.

less

Facial scans are (more, less) accurate than iris scans

less

Facial scans are [blank] accurate than iris scans.

less

A second process known as the ____ module compares all collected files to the system's database

matching

The two main functions of biometrics are _____ and _____

matching; identification

Behavioral Biometrics - Keyboarding

measure the pressure placed on each key as you type

national palm print system (NPPS)

millions of palm prints to be used in criminal investigations

Permanent Features

missing finger

Elastic Bunch Graph Matching is a [blank] facial recognition program.

model-based

Elastic Bunch Graph Matching is a _____ facial recognition program

model-based

Behavioral Biometrics - Handwriting

most commonly used behavioral biometric - sensor can analyze different stroke patterns, curves, and arches of a signature while comparing it to an original document; can also sense the amount of pressure

Advanced Fingerprint Identification Technology (AFIT)

multiple copies of each fingerprint

A facial recognition scan can be tricked by a simple [blank].

obstruction

One of the main causes of stolen accounts and information in computer systems is the use of weak [blank].

passwords

One of the main causes of stolen accounts and information in computer systems is the use of weak ____

passwords

One of the main causes of stolen accounts and information in computer systems is the use of weak_______.

passwords

29. A 2D Gabor wavelet filters the iris into multiple partitions know as [blank].

phasors

A 2D Gabor wavelet filters the iris into multiple partitions known as _____

phasors

system of fingerprints, hand, iris, retina, facial scans

physiological biometrics

biometric systems can be split into two groups

physiological biometrics behavioral biometrics

Many forms of biometric technology are available today, but the majority of them can be split into two different groups. The first group is _____biometrics, which contains fingerprints, hand, iris, retina, and facial scans. The second group is ______ biometrics, which is much less stable and includes handwriting, voice, keystroke, and gait recognition.

physiological, beavioral

Many forms of biometric technology are available today, but the majority of them can be split into two different groups. The first group is [blank] biometrics, which contains fingerprints, hand, iris, retina, and facial scans. The second group is [blank] biometrics, which is much less stable and includes handwriting, voice, keystroke, and gait recognition.

physiological, behavioral

Many forms of biometric technology are avaialble today, but the majority of them can be split into two different groups. The first group is ______ biometrics, which contains fingerprints, hand, iris, retina and facial scans. The second group is _____ biometrics, which is much less stable and includes handwriting, voice, keystroke and gait recognition.

physiological; behavioral

The United States Marine and Army use _____ iris biometric system to ID friend or foe on the battlefield

portable

The iris begins to form at the [blank] stage of pregnancy, where muscle fibers start to take shape and construct tight patterns.

prenatal

The iris begins to form at the ____ stage of pregnancy, where muscle fibers start to take shape and construct tight patterns.

prenatal

The iris begins to form at the _______ stage of pregnancy, where muscle fibers start to take shape and construct tight patterns.

prenatal

Template Generation Model

responsible for saving all of the raw data produced by feature extraction and putting it into a simple and easy to read format for the system

The ____ is composed of neural cells in the back of the eyeball that provide a "screen" for the cornea and lens to display an image on. The ___ is responsible for obtaining a clear picture of what a person is actually seeing.

retina

The_______is composed of neural cells in the back of the eyeball that provide a "screen" for the cornea and lens to display an image on. The_____is responsible for obtaining a clear picture of what a person is actually seeing.

retina

The [blank] is composed of neural cells in the back of the eyeball that provide a "screen" for the cornea and lens to display an image on. The [bank] is responsible for obtaining a clear picture of what a person is actually seeing.

retina, retina

A second process known as the [blank] module compares all collected files to the system's database.

template generation

what module determines whether a match exists

template module

what module is responsible for saving the raw data produced by the extraction and pitting it into a easy to read format

template module

this database contains 30 million front facing mugshot photos of individuals to be used for facial recognition analysis

the Interstate photo system (IPS)

The first process that each biometric system must perform is_____.

the enrollment process

Behavioral Biometrics - Gait

the manner in which your body moves while you're in motion

Enrollment Process

the process of capturing a person's biometric data and storing them in a database for later use

Iris Scanning - Muscle Defintion

the way the muscles come together: when your pupils dilate, that's the muscles in the iris controlling it

iris code

to create a unique template of the iris to be compared in the NGI system

Behavioral Biometrics - Voice Recognition

tone of voice, inflection, etc. - concept: you can walk up somewhere and use your individual voice

True or False: Due to the complicated nature of obtaining and analyzing retina scans, this technology is not easy to implement the field.

true

True or False: due to the complicated nature of obtaining and analyzing retina scans, this technology is not easy to implement in the field.

true

True or False: the manner in which an individual types on a keyboard is unique.

true

Next Generation Identification System (NGI)

update to AFIS - only had one set of prints: best rolls from each print taken - problem: only one good side

Near Infrared Capture

(700-900 Wavelength) - type of photo done at a distance (6in.-10ft.) - safe, acceptable distance exam - retinal exam more intrusive

NIR Capture

(Near-Infra-Red) wavelengths of 700-900 nm used in high quality digital cameras to capture the iris -can stand a good distance away from camera

Physiological Biometrics - Eyes

- Iris: colored lens surrounding the pupil -contains more characteristics/ muscles than there are in fingerprints (more unique) -only change when you have cataract surgery - Retina: series of muscles/ veins inside of the pupil

Extraction

- equations and algorithms - classification of prints - henry classification system: making it usable to find again

Types of Forensic Biometrics - Physiological Biometrics

- focuses on: identifying humans through their unique physiological traits -includes: fingerprints, hand, iris, retina, and facial scans

Physiological Biometrics - Fingerprints

- palm: has ridges like our fingers - hands: combination of fingerprints with palm print (use a curled reader to obtain entire print) - vein: patterns that run through our hands are unique

History of Forensic Biometrics

-Anthropology (study of humans) -Individual identifiers used in conjunction -Alphonse Bertillion (Bertillion System)

Purposes of Forensic Biometrics

-Biometric matching or verification -Biometric Identification

Main functions

-Biometric matching: capable of identifying someone by scanning select biometric characteristics into a database. -Biometric identification: create and store databases of biological traits and compare them to the individual attempting to gain entry into a device or facility.

Facial Recognition

-PCA: appearance based method. A full frontal face image is needed. -Linear Discriminant Analysis -EBGM: model- based facial recognition program. This method identifies landmark features on the face, does not require a full facial image.

Types of Forensic Biometrics

-Physiological Biometrics -Behavioral Biometrics

Currently, the number of Iris Codes being shared by law enforcement institutions with the FBI is [blank].

1.2 million

Currently, the number of IrisCodes being shared by law enforcement institutions with the FBI is ______?

12,000

A facial recognition scan be tricked by a simple

2D picture

2D v. 3D

3D facial recognition has higher accuracy than 2D, and can map complex features like eye socket depth

The near infrared wavelength band is located within the [blank]-[blank] nm range of the electromagnetic spectrum.

700-900

The near infrared wavelength band is located within the _____ nm range of the electromagnetic spectrum

700-900

how many of the photos in the iPS are criminal

80 percent

The NGI system utilized complex mathing algorithms that changed the fingerprint accuracy rating from ___ to ____ percent.

90-92%

The NGI system utilized complex matching algorithms that changed the fingerprint accuracy rating from [blank] to [blank] percent.

92, 99

Biometric Identification

A biometric system that can distinguish between subjects by analyzing a biometric trait of 1 person and compare it against an existing database of enrolled traits -Face ID/Fingerprint ID on iPhones

biometric identification

A biometric system that can distinguish between subjects by analyzing a biometric trait of one person and compare it against an existing database of enrolled traits

Facial Recognition

A biometric technology that looks for unique measurements in an individual's face. -subjects do not have to participate -process is relatively quick

Physiological Biometrics

A type of forensic biometrics that focuses on identifying humans through their unique physiological traits -fingerprints, hand, iris, veins, retina, face, palm -cost efficient -easy to install -iris scans are more secure than face scans

Behavioral Biometrics

A type of forensic biometrics that focuses on identifying humans through unique behavioral or mental patterns -handwriting, voice, keystroke, gait recognition -used infrequently, mostly for experimental purposes

The FBI has implemented the [blank] system to quickly search a fingerprint database containing terrorists and other high-risk individuals.

AFIT

Which biometric refers to an individual's different posture, step length, speed, and foot positioning in regards to the way they walk from one place to another?

Behavioral Biometrics

Biometric Matching or Verification

Biometric systems capable of identifying someone out of a crowd by scanning select biometric characteristics into a database -law enforcement uses this to find fugitives or suspected terrorists

biometric matching or verification

Biometric systems capable of identifying someone out of a crowd by scanning select biometric characteristics into a database. Law enforcement entities implement this form of biometrics to find wanted fugitives and suspects of terrorism.

[blank] is a cutting-edge type of access control that accurately and efficiently identifies humans

Biometrics

_____is a cutting edge type of access control that accurately and efficiently identifies humans.

Biometrics

A significant advantage of automated facial recognition, as compared to the other different forms of biometrics, is that it does not require subjects to participate. Millions of people can be walking by a [blank] each day without realizing that they are being scanned and identified.

CCTV camera

A significant advantage of automated facial recognition, as compared to the other different forms of biometrics, is that it does not require subjects to participate. Millions of people can be walking by a ____ each day without realizing that they are being scanned and identified.

CCTV camera

Enrollment process

Capturing a person's biometric data and storing them in a database for future use. It work by collecting data through a sensor and sending it to a data acquisition model.

Forensic Biometrics

Cutting edge form of access control that accurately and efficiently identifies humans

Permanent v. Impermanent Features

Due to the ever-changing nature and variety of features in the human face, researchers must create facial recognition software that analyzed multiple variables -cheekbones, mouth edges, chin, widow's peak, etc.

Iris Scanning - Eye Color

Egyptians recorded this: different shape of eyes - brown most common color

31. Matthew Turk and Alex Pentland used [blank] to automate facial recognition in attempts to identify and authenticate individuals from a series of faces.

Eigenface

Matthew Turk and Alex Pentland used _____ to automate facial recognition in attempts to ID and authenticate individuals from a series of faces

Eigenfaces

Biometric Processes

Enrollment-->Extraction-->Template Generation

what database contains civil photos such as visa applicant photos, etc.

FACE

Which government agency created and maintains the NGI system?

FBI

Which government agency created and maintains the NGI?

FBI

Repository for Individuals of Special Concern (RISC)

FBI program featured in NGIS that allows officials to fingerprint anyone they come into contact with to quickly detect whether or not they are a threat

Interstate Photo System (IPS)

FBI program featured in NGIS that is a database containing 30 million mugshots with tenprints on file

RapBack

FBI program featured in NGIS that will notify agencies across U.S. if an individual has been subsequently arrested or prosecuted of a crime

RAPBack

FBI program that will notify airport if a badge holder (individual who holds a position of trust) has been subsequently arrested or prosecuted of a crime

[blank] have been widely used to identify people for a century.

Facial characteristics

True or False: A data preprocessing module is where extraction begins for a biometric system

False

True or False: A data preprocessing module is where extraction begins for a biometric system.

False

True or False: The human iris will undergo significant changes during one's lifetime.

False

T/F: Facial Recognition is easy to use

False - cameras are easy to use - capturing the photo is extremely complex: different points on the brow, high points on the forehead, nose, smile, etc. (all can change over time)

Template Generation

Final part of the biometric process -Responsible for saving all of the raw data produced by feature extraction and putting it into a simple and easy to read format for the system -recollection and access

[blank] is the most commonly used type of physiological biometric.

Fingerprints

Enrollment Process

First part of the biometric process -Capturing a person's biometric data and storing them in a database for later use -works by collecting data through a sensor and sending it to a data acquisition module

Enrollment process

First process of biometric system. Captures a person's biometric data and stores in a database for later use.

behavioral biometrics

Focuses on identifying humans through unique behavioral or mental patterns they exhibit. Includes handwriting, voice, keystroke, and gait recognition.

Biometrics

Form of access control that accurately identifies humans


Related study sets

Mechanics and Materials Quiz 4 Concepts

View Set

Chapter 09: Teaching and Counseling FUNDA

View Set

Introduction to the Internet and World Wide Web Ch.1

View Set

Macroeconomics Chapters 3, 4, & 5

View Set

AP Environmental Science - 10&11

View Set

Mid term part 4 compression/ACPI

View Set