Criminal Identification
Criminal Identification
Criminal Identification
2977
ISSN: 2278 – 1323 All Rights Reserved © 2015 IJARCET
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 4 Issue 6, June 2015
employed for matching two fingerprints. Since all are obtained, generally requiring a set and simple
government agencies and institution used automatic background or special enlightenment [4].
fingerprint identification system. Materialization of low cost
and compact fingerprint readers has made fingerprint
modality a preferred choice in many civil and commercial
applications [2].
2978
ISSN: 2278 – 1323 All Rights Reserved © 2015 IJARCET
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 4 Issue 6, June 2015
the put away limit ascertain for the keep up client or general even sequent impressions of their signature appearance
edge esteem [7]. totally different. Further professional falsifier might ready to
reproduce signature that freaks the system [9].
DNA Recognition Voice
The DNA is an acronym for deoxyribonucleic corrosive Voice may be a combination of physiological and activity
which is available in core of each cell in human body and in biometrics. The options of associate individual‘s voice are
this manner an exceedingly stable biometric identifier that based on the form and size of the appendages (e.g., vocal
speaks to physiological trademark. The DNA structure of tracts, mouth, nasal cavities, and lips) that are utilized in the
each human is one of a kind, with the exception of from synthesis of the sound. These physiological attributes of
indistinguishable twins, and is made out of qualities that human discourse are invariant for a private, however the
focus physical attributes (like eye or hair shading). Human movement piece of the discourse of an individual changes
DNA tests can be gained from a wide mixture of sources; after some time because of age, therapeutic conditions, (for
from hair, finger nails, salivation and blood tests. example, a normal chilly), and soul, and so on. Voice is
Recognizable proof in light of DNA obliges first moreover not horrendously unmistakable and may not be
segregating from source/tests, intensifying it to make worthy for huge scale ID. A content region voice
numerous duplicates of target succession, trailed by acknowledgment framework depends on the announcement
sequencing that creates an exceptional DNA profile. The of a set preset expression. A content autonomous voice
DNA coordinating is truly famous for measurable and law acknowledgment framework recognizes the speaker
authorization applications. In any case, it obliges solid independent of what she talks. A content free framework is
specimens and isn't possible progressively. At present, not harder to style than a content region framework yet offers
every one of the progressions in DNA coordinating are extra security against extortion. A problem of voice-based
computerized and hence results can be skewed if the acknowledgment is that discourse choices are touchy to
procedure is not directed appropriately or the DNA tests mixed bag of things like foundation sign [4].
themselves get defiled. In outline, the DNA coordinating
procedure is costly, tedious and along these lines not yet Gait
suitable for expansive scale biometrics applications for non Gait recognition could be a specific mode of biometric
military personnel utilization [8]. remaining to its capability to mark someone at distance.
Gait is explained to the approach of the person walking. The
step recognition framework use standard camera in any
conditions and create calculations to extract the outline of
the individual just in the event that he is moving.
Accordingly the framework will track the individual after
some time. Be that as it may, the algorithmic principle isn't
terribly careful for this attribute is stricken by a few
conditions like the kind of materials or shoes the singular's
porting, the strolling surface or the wellbeing. of these
measurements are adequate in distinctive surroundings and
none of them is great. However the principal right ones are
Figure 3: DNA identification using Finger iris and unique mark strategies. Because of the genuine
Palm Print Recognition actuality iris response is unreasonable and it needs boost
The picture of a singular's palm comprises of volar grating interest, unique mark is one amongst the most develop
edges and flexion fold. Inert palmprint distinguishing proof insights and suitable for a few applications [10].
is of developing significance in logical applications since
around half-hour of the inactive prints upraised from Keystroke
wrongdoing scenes (from knifes, firearms, guiding wheels) Keystroke dynamics may be a methodology of
square measure of palms rather than fingers. Verging on like corroboratory the identity of associate degree individual by
fingerprints, inert palmprint frameworks use insignificance their writing rhythm which might address trained typists
and wrinkles for coordinating. While authorization and legal moreover because the amateur two-finger employee.
sciences offices have always gathered fingerprints, its Systems will verify the user at the log-on stage or they will
singularly as of late that colossal palmprint databases are regularly monitor the Biometric Systems thirty two
getting realistic [8]. employee. These systems ought to be low cost to put in as
all that is needed may be a software system package.
Signature
Signature verification methodology in varied fields like III. Literature Review
government, legal and industrial transactions. Signature is Criminal Investigation & Identification System
an activity biometric that alteration over an amount of your Now a day‘s utmost people‘s android operating system
time. Signature of some individuals varies substantially: phones to keep with this, author projected the android
2979
ISSN: 2278 – 1323 All Rights Reserved © 2015 IJARCET
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 4 Issue 6, June 2015
application for police furthermore as for peoples. If just in which will fix both maximum size and orientation of the
case somebody has not good phones author develop net signature. Features are extracted with the Gaussian filtration
portal for them. By synchronizing police aspect and public algorithm method. Euclidean distance measure online
aspect android application they get simple thanks to scale signature verification [13].
back the crime in society and this method positively
facilitates them to form a criminal offense free society. The Fingerprint Identification
foremost unimaginable risk for the department of local Barua et al. (2010) defines the Fingerprint identification is
government is investigation crimes with the present one of the most popular and reliable personal biometric
technologies, as a result of they still use standard manual identification methods. This paper describes an on-line
processes to handle crimes that do with the utilization of fingerprint identification system consisting of image
advanced technologies. acquisition, edge detection, thinning, feature extractor and
This system facilitates police to spot the criminal by classifier. The pre-processing part includes steps to acquire
accessing the info of criminal from anywhere; by binaries and skeleton zed ridges, which are needed for
recognizing his/her thumb impression. Additionally police feature point extraction. Feature points (minutia) such as
broadcast the news if one thing happened wrong within the endpoints, bifurcations, and core point are then extracted,
explicit space and that they wish people‘s cooperation to followed by false minutia elimination. Human fingerprints
handle true. The CI2S additionally facilitate public to are rich in details called minutiae, which can be used as
register their complaints by victimization app running on identification marks for fingerprint verification. The goal of
their phones. They additionally post there suggestion. Get this project is to develop a complete system for fingerprint
updated with crime news denote by the police. Not with identification [14].
standing they're not glad with investigation standing of case
they're filed they directly contact to the pinnacle officer Ear Biometric Recognition
[11]. According to Shritosh Kumar (2015), he proposed an Ear
Based Biometric Recognition using Gabor Mean Feature
Extraction. He suggests Ear Biometric used in Criminal
cases, investigation, and security purpose. Gabor filter have
a problem of high dimension and high redundancy.
Sampling filter is a problem of not reducing features
optimum way. In the proposed Gabor feature extraction
technique the Gabor features are filtered using proposed
mean filter and obtained optimum features for ear biometric
dataset. He suggests Ear biometric recognition is one of
most biometric identification in which the criminal and
terrorist identified [15].
2980
ISSN: 2278 – 1323 All Rights Reserved © 2015 IJARCET
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 4 Issue 6, June 2015
2981
ISSN: 2278 – 1323 All Rights Reserved © 2015 IJARCET
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 4 Issue 6, June 2015
Biometric ID Card
Finger is scan through biometric identification system and it
is based on person to person this is old trend of biometric
identification, modern biometric identification in which
IRIS, RETINA, Face is used for biometric Id card
identification. Information is fetched and stored in National
database of the federal government organization. Every
person has their own record and it is verified with their own
biometric system.
2982
ISSN: 2278 – 1323 All Rights Reserved © 2015 IJARCET
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 4 Issue 6, June 2015
O. Shoewu(2012) proposed biometric university attendance recognition systems is the continuous aging of its users.
system in which the system detect fingerprint of the student Noise in an environment where voice recognition is used to
and stores in a database. The fingerprints matches with the identify its users can also make it hard for users to be
recorded database and the biometric system respond with identified. For iris or retinal scanning applications, users
the recorded feature. Almost 94% accuracy is happened may find it very intrusive. Users may also have the concern
with biometric authentication attendance system [29]. for the safety of their eyes during the iris or retinal scan.
Furthermore, databases used to store user identification data
IV . Purpose & Objective will be very large which might form a potential threat. For
Identification and Verification scanning retinal/iris characteristics and storing large amount
Occasionally confirmation and identification are infer as of database, biometrics system requires new and modern
similar terms but they have two separate meanings. technology. Therefore, the cost for equipment is also
Identification occurs when an individual‘s characteristic is expensive. Finally, lots of people are still concerned about
being selected from a group of stored images. Identification biometrics technology in different aspects such as: security,
is the way the human brain performs most day to day adaptability to rate of change in life, scalability, accuracy,
identifications. For example, if a person encounters a privacy and others [24].
familiar individual, the brain processes the information by
comparing what the person is seeing to what is stored in Comparison between Face Recognition & Finger
memory. Recognition
Face recognition is such a challenging task for researcher
Advantages of Biometric system and yet to be designed. Researcher have different
The first advantage of using this new technology is the background e.g. psychology, pattern recognition, neural
uniqueness and it is also the main characteristic which networks , computer vision and computer graphics. In face
allows biometrics technology to become more and more recognition technique, Holistic matching methods, feature-
important in our lives. With uniqueness of biometrics based matching, and hybrid method used and tool are used
technology, each individual's identification will be single for describe picture modules e.g. principal component
most effective identification for that user. A chance of two analysis, eigen faces. Zhao et al. (1998) which use
users having the same identification in the biometrics linear/Fisher discriminate analysis, De Carlo and Metaxas
security technology system is nearly zero. the highly secure [2000], a system called PersonSpotter was described. This
way of identifying users makes this technology less prone system is able to capture, track, and recognize a person
for users to share access to highly sensitive data. For walking toward or passing a stereo CCD camera [25].
example, users can share their fingerprints, iris and so forth Face recognition are the most common biometric technique
allowing other users access to secure information. Each trait used by humans to make a personal identification. Its most
used during identification is a single property of that user. In commonly used in person identification. Identification is
other words, it is extremely hard or impossible to make based on face is one of the most active areas of research,
duplicate or share biometrics accessing data with other with applications ranging from the stationary, controlled
users. This makes it ever more secure allowing user mug-shot verification to a dynamic unrestrained face
information and data to be kept highly secure from recognition in a messy environment. Approaches to face
unauthorized users. recognition are typically based on location and shape of
This identification of users though biometrics cannot be facial attributes, such as the eyes, eyebrows, nose, lips and
lost, stolen or forgotten. This aspect of biometrics chin shape and their spatial relationships. While in
technology allows it to become more popular in its use. This fingerprint re recognition human have used fingerprints for
method of identifying and giving access to user makes user personal identification for centuries and the validity of
identification a lot easier. Finally, most biometrics security fingerprint identification has been well-established. A
systems are easy to install and it requires small amount of fingerprint is the pattern of ridges and furrows on the
funding for equipment (except modern biometrics surface of a fingertip, the formation of which is determined
technology such as: DNA/retinal/iris recognition [23]. during the fetal period. They are so distinct that even
fingerprints of identical twins are different as are the prints
Disadvantages of Biometric system on each finger of the same person. The overall analysis of
Jain (2006) it still has many fault in its system. Each the face image and its break down into a number of
biometrics application method has disadvantage which can canonical faces or a combination. Consequently,
cause problems for its users. For example, if the biometrics fingerprints are expected to lead the biometric applications
security system uses fingerprints to identify its users and an in the near future, with multiple fingerprints providing
accident causes a user to lose his/her finger then it can be a sufficient information to allow for large-scale recognition
problem during the verification process. For voice involving millions of identities. One problem with
recognition methods, illnesses such as strep throat can make fingerprint technology is its lack of acceptability by a
it hard for authorized users to get access to their typical user, because fingerprints have traditionally been
information. Another factor that can influence voice associated with criminal investigations and police work.
2983
ISSN: 2278 – 1323 All Rights Reserved © 2015 IJARCET
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 4 Issue 6, June 2015
For the investigation, the data was carried out from different
researches, case study, analysis report and interviews was
conducted from different author and professor. The primary
data has been collected based on qualitative approach e.g.
research paper , case studies and human observation. . The
purpose of this research to highlight the causes of biometric
identification using different techniques. There is a need in
Table 2: Result of Face Replay Attack DB
Pakistan to implements because in some sensitive area e.g.
sensitive location where there is chance of crime.
The requirement of the research to highlight the problem in
Pakistan city e.g. Peshawar, Swat, Quetta, and in FATA
Pakistan, in some certain situation when terrorist attacked at
public places and how is it possible to identify criminal and
terrorist. Video surveillance technique and face recognition
and finger recognition technology is the best choice to
detect crime and criminal. The extensive research question
has been collected from literature. The variable of interest
has been collected from literature. The main finding of this
research to implement biometric system to detect crime and
arrest terrorist in Pakistan.
2984
ISSN: 2278 – 1323 All Rights Reserved © 2015 IJARCET
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 4 Issue 6, June 2015
drawn to look at the camera, you have difficulties in using [3] ARULALAN.V, BALAMURUGAN.G A Survey
facial recognition,‖ [28]. on Biometric Recognition Techniques International Journal of
Advanced Research in Computer and Communication Engineering
Dr. Brian Martin, MorphoTrust USA‘s Director of Vol. 3, Issue 2, February 2014.
Research, who specializes in facial recognition, says [4] Anil K. Jain, An Introduction to Biometric Recognition IEEE
TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO
the algorithms developed over the last 15 years have TECHNOLOGY, VOL. 14, NO. 1, JANUARY 2004.
been trained to match faces looking at the camera, and [5] Ajay Kumar1, David C. M. Wong1 Personal Verification using
at times, require digital compensation. ―When you Palmprint and Hand Geometry Biometric Pattern Recognition and
Image Processing Lab, 2006.
have poor quality data, face recognition is better used
[6] ARULALAN.V1, BALAMURUGAN A Survey on Biometric
as a tool to generate leads,‖ Martin said. According to Recognition Techniques International Journal of Advanced Research
Paul Schuepp, CEO and President of Animetrics, a in Computer and Communication Engineering Vol. 3, Issue 2,
February 2014.
firm which specializes in face recognition and 2D-to-
[7] Damien Dessimoz Multimodal Biometrics for Identity Documents
3D visualizations, Smartphone‘s have increasingly Research Report PFS 341-08.05 (Version 2.0) June 2006.
powerful on-board cameras and can often produce [8] Anil K. Jain, Ajay Kumar Biometrics of Next Generation: An
valuable images for facial analysis. ―Cell phones are Overview ‗SECOND GENERATION BIOMETRICS‘ SPRINGER,
2010.
great because the cameras have very high resolution,‖
[9] ARULALAN.V1, BALAMURUGAN A Survey on Biometric
Schuepp said. ―The problem does get into the wide Recognition Techniques International Journal of Advanced Research
angle aspect ratio [of smartphone cameras] which can in Computer and Communication Engineering Vol. 3, Issue 2,
February 2014.
distort faces a little bit. If they are too close to the face,
[10] Jitendra Choudhary, Survey of Different Biometrics
you see the wide angle effect.‖ Techniques, International Journal of Modern Engineering
Research (IJMER) www.ijmer.com Vol. 2, Issue. 5, Sep.-Oct.
―Pose is one thing and because of our technology, we 2012 pp 3150 -155
can mitigate the pose, but to make the three- [11] Saurabh Zadikar1 et al. Criminal Investigatio & Identification
System (CI2S) IJCSMC, Vol. 4, Issue. 2, February 2015, pg.402 –
dimensional model of the face for accurate 407
comparison, you need the information of the face that [12] Cyrus Shahabi et al. Multi Source Event Detection and Collection
is useful,‖ Schuepp said. ―You really need to get System for Effective Surveillance of Criminal Activity. J Inf Process
Syst, Vol.10, No.1, pp.1~22, March 2014.
upwards of 65 pixels between the eye centers, for [13] C. S. Chua and R. Jarvis, ―Point signatures: A new representation for
enough resolution to give you a good statistical 3D object recognition,‖ International Journal of Computer Vision,
comparison.‖ The biometric expert state that while vol. 271,pp. 63–85, 1997
there have been major successes in terms of biometrics [14] Barua K., Bhattacharya S., ―Fingerprint Identification‖, Global
Journal of Computer Science & Technology, Vol. 11 (Issue 1), (Apr
solving major crimes such as facial recognition 2011).
helping identify one of the 2013 Boston bombers that [15] Shritosh Kumar, Vishal Shrivastav, Performance of Gabor Mean
the two fields need to come closer to meet the Feature Extraction Techniques for Ear Biometric Recognition.
International Journal of Informative & Futuristic Research Vol 2,
challenge of solving crimes. Issue 2, 2015.
[16] Amandeep Singh Dhillon, Ashok Kumar Bathla, Approaches
Conclusion for Finding Correlation Between Fingerprints and
Footprints of a Person, Journal of Information Sciences and
This research paper concludes with the most advanced Computing Technologies. Vol 1, Issue 1, December 2014.
biometric technology e.g. face recognition and finger [17] Anil K. Jain* and Arun Ross, Bridging the Gap: From Biometrics to
identification. The biometric technology helps the police Forensics, Philosophical Transactions of The Royal Society B, 2015.
crime branch to identify criminal and terrorist. Iris [18] M.Loganathan, Dr.E.Kirubakaran, A Study on Cyber Crimes and
protection, IJCSI International Journal of Computer Science Issues,
recognition is very complicated because there is a chance to Vol. 8, Issue 5, No 1, September 2011 ISSN (Online): 1694-0814.
effect badly. DNA recognition play a significant role in [19] N.K. Ratha, J.H. Connell, and R.M. Bolle, ―Enhancing Security and
these days. Crimes and criminal activities increased day by Privacy in Biometrics-based Authentication Systems, IBM Systems
day and in Pakistan there are largest cities e.g. Karachi, Journal, vol. 40, no. 3, pp. 614-634, 2001.
Peshawar and Quetta where there is crime occurred, there is [20] Debnath Bhattacharyya, Rahul Ranjan, Biometric Authentication: A
Review , InternationalJournal of U-E Services Science &Technology
a need to implement biometric scanner to scan criminal at Vol 2, No 3 Sep 2009.
the gateway of these cities. [21] Qinghan Xiao Defense Research, Biometrics—Technology,
Application, Challenge, and Computational Intelligence Solutions,
REFERENCES Technology Review, Defense Research and Dev Canada.
[22] Qian, T., Raymond, V.: Biometric authentication system on mobile
[1] Reham Amin et al. Biometric and Traditional Mobile Authentication personal devices. Instrumentation And Measurement, IEEE
Techniques: Overviews and Open Issues Tarek Gabor July 2015. Transactions on 59(4) (2010)763{773
[2] Anil K. Jain, Ajay Kumar Biometrics of Next Generation : An [23] Tistarelli, 2009 Massimo Tistarelli and Marks Nixon, "Advances In
Overview ‗SECOND GENERATION BIOMETRICS‘ SPRINGER, Biometrics", Springer-Verlag Berlin Heidelberg 2009, ISBN
2010. 03029743
2985
ISSN: 2278 – 1323 All Rights Reserved © 2015 IJARCET
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 4 Issue 6, June 2015
[24] Jain, A.K.; Ross, A.; Pankanti, S., "Biometrics: a tool for information [27] http://www.planetbiometrics.com/article
security" Volume: 1 Issue: 2, Issue Date: June 2006, page(s): 125 - details/i/3235/desc/pakistan-police-handed-50-mobile-
143 biometric-scanners/#sthash.YXJyB2kQ.dpuf]
[25] W. ZHAO, R. CHELLAPPA, Face Recognition: A Literature Survey, [28] Joshua C. Klontz, Anil K. Jain, A Case Study on Unconstrained
ACM Computing Surveys, Vol. 35, No. 4, December 2003, pp. 399– Facial Recognition Using the Boston Marathon Bombings Suspects
458. Technical Report MSU-CSE-13-4 May 22, 2013
[26] Anil Jain, Lin Hong, and Sharath Pankanti,BIOMETRIC [29] O. Shoewu, Ph.D. and O.A. Idowu, B.Sc. Development of
IDENTIFICATION,COMMUNICATIONS OF THE ACM February Attendance Management System using Biometrics, The Pacific
2000/Vol. 43, No. 2 Journal of Science and Technology – Volume 13. Number 1. May
2012 (Spring)
2986
ISSN: 2278 – 1323 All Rights Reserved © 2015 IJARCET