Forensics Ch. 7
Currently, the number of IrisCodes being shared by law enforcement institutions with the FBI is ______?
12,000
A facial recognition scan be tricked by a simple
2D picture
The near infrared wavelength band is located within the _____ nm range of the electromagnetic spectrum
700-900
The NGI system utilized complex mathing algorithms that changed the fingerprint accuracy rating from ___ to ____ percent.
90-92%
A significant advantage of automated facial recognition, as compared to the other different forms of biometrics, is that it does not require subjects to participate. Millions of people can be walking by a ____ each day without realizing that they are being scanned and identified.
CCTV camera
Matthew Turk and Alex Pentland used _____ to automate facial recognition in attempts to ID and authenticate individuals from a series of faces
Eigenfaces
Which government agency created and maintains the NGI system?
FBI
True or False: A data preprocessing module is where extraction begins for a biometric system
False
the NGI system has replaced the _____ fingerprint system
IAFIS
The _____ is a NGI database containing 30 million front-facing photos of individuals with tenprints on file
Interstate Photo System (IPS)
The _____ program was developed by Dr. John Daugman for the analysis and verification of the human iris.
IrisCode
The first documented attempt to identify someone using the iris was performed in the 1950s by British ophthalmologist _____
J.H. Doggart
The ____ system was implemented in 2014 to replace the existing fingerprint IAFIS database
NGI
Iris images are taken with normal visible wavelength pictures, as well as pictures in the ____ band.
NIR
The _____ contains a NGI database of millions of palm prints to be used in criminal investigations and processes
National Palm Print System (NPPS)
the acronym NGI stands for
Next generation identification
The FBI has implemented the _______ system to quickly search a fingerprint database containing terrorists and other high-risk individuals
RISC (Repository of Individuals of Special Concern)
The NGI's _______ service sends notifications to agencies throughout the United States pertaining to criminal activity of individuals that have already been processed through the system at one point.
RapBack
True or False: Over 16 states are participating in the FBI's facial recognition program
True
To combat the obstacles that conflict with facial recognition software, various techniques have been developed to create an accurate verification/matching and ID process. All of these techniques can be placed under two categories: _______ and ______
appearance-based; model-based
____ is a cutting edge type of access control that accurately and efficiently identifies humans.
biometrics
The first process that each biometric system must perform is _____
enrollment
Hats, glasses, and facial hair can obstruct a _____ biometrics scan
facial recognition
With the _______ method, an individual would be asked to stand a set distance from a normal digital camera and a high-definition photo is taken of the face
facial recognition
True or False: the human iris will undergo significant changes during one's lifetime
false
_____ have been widely used to ID people for a century
fingerprints
_____ is the most commonly used type of physiological biometric
fingerprints
Which biometric refers to an individual's different posture, step length, speed and foot positioning in regards to the way they walk from one place to another?
gait recognition
______ is the most commonly used type of behavioral biometrics.
handwriting
The _____ is the colored section in the eye around the pupil
iris
Facial scans are (more, less) accurate than iris scans
less
A second process known as the ____ module compares all collected files to the system's database
matching
The two main functions of biometrics are _____ and _____
matching; identification
Elastic Bunch Graph Matching is a _____ facial recognition program
model-based
One of the main causes of stolen accounts and information in computer systems is the use of weak ____
passwords
A 2D Gabor wavelet filters the iris into multiple partitions known as _____
phasors
Many forms of biometric technology are avaialble today, but the majority of them can be split into two different groups. The first group is ______ biometrics, which contains fingerprints, hand, iris, retina and facial scans. The second group is _____ biometrics, which is much less stable and includes handwriting, voice, keystroke and gait recognition.
physiological; behavioral
The United States Marine and Army use _____ iris biometric system to ID friend or foe on the battlefield
portable
The iris begins to form at the ____ stage of pregnancy, where muscle fibers start to take shape and construct tight patterns.
prenatal
The ____ is composed of neural cells in the back of the eyeball that provide a "screen" for the cornea and lens to display an image on. The ___ is responsible for obtaining a clear picture of what a person is actually seeing.
retina
True or False: due to the complicated nature of obtaining and analyzing retina scans, this technology is not easy to implement in the field.
true
True or False: the manner in which an individual types on a keyboard is unique.
true