Biometric Recognition Challenges in Forensics

Similar documents
To appear IEEE Multimedia. Image Retrieval in Forensics: Application to Tattoo Image Database

SURF and MU-SURF descriptor comparison with application in soft-biometric tattoo matching applications

Pre-print of article that will appear at BTAS 2012.!!!

Representative results (with slides extracted from presentations given at conferences and talks)

Analysis for Iris and Periocular Recognition in Unconstraint Biometrics

Unsupervised Ensemble Ranking: Application to Large-Scale Image Retrieval

Tattoo Detection Based on CNN and Remarks on the NIST Database

An Experimental Tattoo De-identification System for Privacy Protection in Still Images

Identifying Useful Features for Recognition in Near-Infrared Periocular Images

A Multimedia Application for Location-Based Semantic Retrieval of Tattoos

Large-Scale Tattoo Image Retrieval

96 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 6, NO. 1, MARCH 2011

FIJIT. Frankston International Junior Investigation Team. Agent s Handbook

TRAINING LAB HAIR AS EVIDENCE: PART 1 HUMAN HAIR NAME

Tattoo Image Search at Scale: Joint Detection and Compact Representation Learning

WARNING THIS SET CONTAINS CHEMICALS THAT MAY BE HARMFUL

Yuh: Ethnicity Classification

Unit 3 Hair as Evidence

midterm124 January 24, 2014

Research Article Optimized Periocular Template Selection for Human Recognition

Postprint.

ACTIVITY 3-1 TRACE EVIDENCE: HAIR

CONCEALING TATTOOS. Darijan Marčetić. Faculty of EE and Computing.

HEDS Campus Climate Sexual Assault Survey. Occidental College and Other Schools

Tattoo Recognition Technology - Evaluation (Tatt-E) Performance of Tattoo Identification Algorithms

found identity rule out corroborate

2013/2/12 HEADACHED QUESTIONS FOR FEMALE. Hi, Magic Closet, Tell me what to wear MAGIC CLOSET: CLOTHING SUGGESTION

Visual Search for Fashion. Divyansh Agarwal Prateek Goel

SAFETY DATA SHEET Creation Date: SECTION: 1.1 PRODUCT IDENTIFICATION

The Identification of a Lipstick Brand: A Comparison of the Red Pigment R f Values using Thin Layer Chromatography

Wallet Technology. Information Presentation

Fingerprinting 2005, 2004, 2002, 1993 by David A. Katz. All rights reserved.

Hair. Name Period. Fill in the blanks and answer the following questions based on the powerpoint and your textbook.

The High Temperature-Moisturizing Method for Obtaining Quality Postmortem Fingerprints from Decomposed Fingers

#7. Animal hair can be distinguished from human hair because animal hair

Trace Evidence: Hair. Forensic Science

Trace Evidence: Hair. Forensic Science

CIEH Training 19 September Newport Pseudomonas Outbreak 2015

Bonnytoun is a place of safety and secure care centre for male juvenile offenders.

Non-SAC Member Facility Higg Index Guide: Overview

Braid Hairstyle Recognition based on CNNs

Trace Evidence: Hair. Forensic Science

Add to Apple Wallet. Guidelines March 2017

FORENSIC FUN (CSI CHALLENGE)

INDIAN APPAREL MARKET OUTLOOK

Rule-Based Facial Makeup Recommendation System

(12) Patent Application Publication (10) Pub. No.: US 2005/ A1

For- Credit Courses and Certificate Programs in Apparel Merchandising & Management for Industry Professionals

About the Report. Booming Women Apparel Market in India

Rudyard Kipling s India: Literature, History, and Empire (TR, GS164)

Uniform Tops. The policy for uniform tops differs by age:

If you look very closely at the palms of your hands and been committed). When police go to a crime scene, they look

MICHELE RENAE BARRIENTOS

Lecture 6: Modern Object Detection. Gang Yu Face++ Researcher

Using the Stilwell Multimedia Virtual Community to Enhance Nurse Practitioner Education. Dr Mike Walsh & Ms Kathy Haigh University of Cumbria

MARINO MARINEL PEREZ MARTINEZ

Creating the Right Customer Experience And Driving Value to the Shopping Centre

SAFETY DATA SHEET. Eucalyptus globulus labile, Eucalyptus globulus L. (myrtaceae) INCI Name:

Authors Jeanette Jolley and John Powrie

Gunshot Wounds and Violent Assaults Forensic Aspects for the Trauma Specialist

Clinical studies with patients have been carried out on this subject of graft survival and out of body time. They are:

Body Art Technician License Application

Fraud and Embezzlement

Trace Evidence: Hair. Forensic Science

The Use of Fingerprints in Identification

Hair Microscopy The comparison microscope is integral to trace evidence examinations. Two matching hairs identified with the comparison microscope

Frequential and color analysis for hair mask segmentation

Fibres Retention Time on Different Type of Recipient Garments

Student Performance Guide. Student Performance Guide. Student Performance Guide. Student Performance Guide. LESSON 3-3 Bleeding Time

Consumer and Market Insights: Skincare Market in France. CT0027IS Sample Pages November 2014

User Manual Banknotes

A Guide to Crime Prevention through Property Marking.

Higher National Unit Specification. General information for centres. Fashion: Commercial Design. Unit code: F18W 34

Richard Kuklinski The Iceman. By:Jacob Gifford and Brandon Ramiscal

Version 1.4 Getting Started Guide

Last Supper, Bjoern Thomas, 200x100cm (framed 220x120), Diasec, Edition 6+2, Price: 15'000 CHF

John Lewis Fashion on the Front Row

Record Value: O - Operational F - Fiscal L - Legal H - Historical V - Vital O F L H V

Global Underwear Market 2014

MarketsandMarkets. Publisher Sample

Understanding California Corrections. Joan Petersilia

A Study on the Public Aesthetic Perception of Silk Fabrics of Garment -Based on Research Data from Hangzhou, China

1 of 5 11/3/14 2:03 PM

SAFETY DATA SHEET (SDS) Version 2.0 Revision Date : July 20, 2016 Print Date : July 20, 2016

She Will Be Loved. This song was written and performed by Maroon 5. This song is a love song. It is about a girl and the boy who loved her.

ALDI STORES MATERIAL SAFETY DATA SHEET

NYPD (LONG FORMAT) NYPD OGILVY & MATHER

H Fashion Storyboard

SCALP ALLURE SPEC BOOK Motor City Drive Suite 600, Bethesda, MD 20817

Anwendungen 2 - SoSe 2009 Computational Furniture. Oliver Dreschke

Every Contact Leaves a Trace. A History of Fingerprinting

The AVQI with extended representativity:

AN INDEPENDENT ASSESSMENT OF INK AGE DETERMINATION BY A PRIVATE EXAMINER Erich J. Speckin

IN THE UNITED STATES DISTRICT COURT FOR THE CENTRAL DISTRICT OF CALIFORNIA SOUTHERN DIVISION. Plaintiffs,

Palo Pinto County 4-H Fashion Storyboard Guidelines

An Introduction to Modern Object Detection. Gang Yu

As Engrossed: S2/1/01. By: Representatives Bledsoe, Borhauer, Bond, Rodgers, Green. For An Act To Be Entitled

Body Art Temporary Technician License

How to Create Your Cryptocurrency Wallet and Add PumaPay Tokens

Transcription:

Biometric Recognition Challenges in Forensics Anil K. Jain Michigan State University http://biometrics.cse.msu.edu January 22, 2014

Biometric Technology Takes Off By THE EDITORIAL BOARD, NY Times, September 20, 2013 The use of biological markers like fingerprints, faces and irises to identify people is rapidly moving from science fiction to reality.

Outline Biometric recognition Traits, uniqueness, persistence Applications Deduplication, border crossing, access control Challenges in forensics Non-cooperative, unconstrained scenarios Sketch to photo matching, latent fingerprints, fingerprint alteration, scars, marks & tattoos

Aadhar Issue a unique identification number (UID) to Indian residents that can be used to eliminate duplicate and fake identities. Name Parents Gender DoB PoB Address 1568 3647 4958 Basic demographic data and biometrics stored centrally UID = 1568 3647 4958 10 fingerprints, 2 iris & face image Central UID database UIDAI has issued ~560 million Aadhaar numbers as of Jan 2014

Mobile Phone Security Joseph Van Os / Getty Images By 2014, more cell phone accounts than people; $1 Trillion in mobile payments http://www.siliconindia.com/magazine_articles/world_to_have_more_cell_phone_accounts_than_people_by_2014- http://blog.unibulmerchantservices.com/mobile-payments-volume-to-total-nearly-1-trillion-by-2014/ http://www.cbsnews.com/8301-205_162-57602236/apple-announces-new-iphone-5s-iphone-5c-ios-7-release-date

Why Biometrics? People cannot be trusted based on credentials About 300K British passports were lost or stolen in 2006 Most common pw: 123456, Stolen credit card numbers can go for as little as a quarter or as much as $45 each http://www.nytimes.com/2013/12/20/technology/target-stolen-shopper-data.html?pagewanted=all&_r=0

iphone 5S Fingerprint Sensor Hacked by Germany's Chaos Computer Club http://www.theguardian.com/technology/2013/sep/22/apple-iphone-fingerprintscanner-hacked?goback=%2egde_68333_member_275746787#%21 Biometrics are not safe, says famous hacker team who provide video showing how they could use a fake fingerprint to bypass phone's security lockscreen

Multifactor Authentication A combination of at least two of three components Something you have (token) Something you know (password) Something you are (biometrics)

Friction Ridge Pattern Ridged (friction) skin on fingers, palms & soles Cumins and Midlo, Finger Prints, Palms and Soles, Dover, 1961 Perhaps the most beautiful and characteristic of all superficial marks (on human body) are the small furrows with the intervening ridges and their pores that are disposed in a singularly complex yet even order on the under surfaces of the hands and feet. Francis Galton, Nature, June 28, 1888

Fingerprints in Forensics Repeat Offenders: Compare rolled or slap tenprints Crime Scene evidence: Compare latents to tenprints 10 print

Biometric Traits

Uniqueness Identical twins

Persistence 1881, age 7 1890, age 17 1913, age 40 Herschel s fingerprints Match scores: Age 7 vs. Age 17 = 6,217; Age 7 vs. Age 40 = 5,032; Age 17 vs. Age 40 = 5,997 (Maximum score between fingerprints from two different fingers = 3,300) W. J. Herschel, The Origin of Finger-printing, Oxford University Press, 1916 13

Persistence Human body (and biometric traits) will age over time Can we devise an age-invariant template? COTS-A COTS-B Score=0.84 Score=0.76 Score=0.71 Score=0.58 14

Applications De-duplication (driver license, passport,..) Border crossing (U.S.- Visit) Access control (physical, logical) US-VISIT Disney Parks Coalmine in China 15

Biometric Recognition System Enrolment vs. Recognition; False Accept vs. False Reject

Constrained Imaging Conditions Unconstrained State of the Art 54% TAR @ FAR=0.1% 72% Rank-1 accuracy 66.8% TAR @ FAR=10% MBGC FVC2004 CASIA.v4-distance LFW NIST SD27 UBIRIS.v2 100% TAR @ FAR=0.1% 99.4% TAR @ FAR=0.01% 97.8% TAR @ FAR=0.01% FRGC, Exp. 1 FpVTE 2003 IREX III FERET User distorted image IIITD alcoholic iris FVC2006 Cooperative Users Uncooperative 17

Biometrics in Forensics Database (IDs are known) Top N candidates Automatic match Probe Manual 1:N match Manual 1:1 match Gallery (ID is known) Manual inspection A. K. Jain, B. Klare, and U. Park, "Face Matching and Retrieval in Forensics Applications", IEEE Multimedia, 2012 J. C. Klontz and A. K. Jain, "A Case Study on Unconstrained Facial Recognition Using the Boston Marathon Bombings Suspects", MSU Technical Report, MSU-CSE-13-4, 2013

Top Retrieval Ranks for Tsarnaev Brothers (100K gallery with demographic filtering) http://www.cse.msu.edu/rgroups/biometrics/publications/face/klontzjain_casestudyunconstrainedfacialrecognition_bostonmarathonbombimgsuspects.pdf 19

Challenges in Forensics Unconstrained face recognition Sketch (Composite) to mugshot matching Latent fingerprint matching Detecting Altered Fingerprints Matching Scars, Marks & Tattoos Recognition systems with human in the loop

Unconstrained Face Recognition Face detection Alignment free matching S. Liao, A. K. Jain, and S. Z. Li, "Partial Face Recognition: Alignment-Free Approach", IEEE Trans. PAMI, 2013

Fighting Crime With Pencil and Paper Juan Perez, NYPD, creates sketches based on victims descriptions NYPD produced 273 sketches in 2012 Pleaded Guilty: Rene Otero arrested in the sexual abuse case of a 9-year-old girl Charged With Murder: Erika Menendez arrested for shoving a man in front of a subway train Now in Prison: Steven Pappa serving time for kidnapping and sexual assault http://www.nytimes.com/2013/08/19/nyregion/still-finding-value-in-the-vanishing-art-of-police-sketches.html?pagewanted=all&_r=1&

Sketch From Video Composite drawings of four of the suspects have been made based upon video images IDENTIFIED IDENTIFIED http://www.nytimes.com/2011/01/08/us/08disabled.html UNIDENTIFIED UNIDENTIFIED http://www.lacrimestoppers.org/wanteds.aspx

Sketch and Mugshot Mates Challenges: Witness description, expertise of artist, time gap, modality gap

Holistic Representation & Matching Sketch CSDN-MLBP Sketch Feature Vector SIFT CSDN-MLBP Similarity Mugshot Feature Vector Mugshot Eye detection Normalization based on two eyes SIFT Patch based feature extraction Patch based PCA+LDA Patch feature concatenation and holistic PCA Similarity

Component Based Representation (rotation, scaling) (Extract component, 2D shape) (Multi-scale LBP) (Cosine, Sum)

FaceSketchID System

Retrievals by FaceSketchID and COTS Matchers Rank 1 Rank 2 Rank 3 Rank 4 Rank 5 Forensic sketch FaceSketchID COTS-1 COTS-2 COTS-3

Fingerprint Matching Rolled-to-Rolled matching TAR of 99.4% @ FAR = 0.01% Latent-to-Rolled matching Rank-1 identification rate = 68% C. Wilson et al., Fingerprint Vendor Technology Evaluation 2003: Summary of Results and Analysis Report, NIST IR-7123, 2004 M. Indovina, R. A. Hicklin, and G. I. Kiebuzinski. Evaluation of latent fingerprint technologies: Extended feature sets. NIST IR-7775, 2011

Challenges in Latent Matching Reliable feature extraction Unclear ridges Partial fingerprint Robust feature matching Complex background Large distortion

Fingerprint Features Fingerprint image (ridges, valleys) Level 1 (OF, core, delta) Level 2 (minutiae) Level 3 (pores, dots)

Segmentation & Enhancement Latent fingerprint Orientation field Gabor filter Texture part Segmented fingerprint Segmented & enhanced fingerprint Frequency field Cao, Liu and Jain, Segmentation and Enhancement of Latent Fingerprints: A Coarse to Fine Ridge Structure Dictionary, PAMI, 2014

Ridge Structure Dictionary Dictionary used to learn ridge orientation & ridge frequency fields Coarse-level dictionary (patch size: 64 64). Total number of dictionary element is 1,024 16 orientation specific fine-level dictionaries (patch size: 32 32). Total no. of elements in each orientation specific dictionary is 64.

Image Decomposition Features: Local total variation Method: Nonlinear decomposition = + Gray image (768 x 800) Texture part Cartoon part Buades et al, Fast cartoon+texture image filters, IEEE TIP, 2010

Ridge Structure Dictionary Patch 64 64 Coarse-level dictionary x d 1 d 2 d 3 d 4 d 5 1,024 dictionary elements (64 64) Texture part

Coarse quality map (Similarity between image patch and the most similar dictionary element) Coarse orientation and frequency fields Texture part

Coarse quality map Coarse orientation and frequency fields Fine-level dictionary selection Texture part Patch 32 32 Specific fine-level dictionary x d 1 d 2 d 3 d 4 d 5 64 dictionary elements for each of 16 orientations

Coarse quality map Coarse orientation and frequency fields Texture part Segmentation result (Threshold on the average of two quality maps) Enhancement result Fine quality map Fine orientation and frequency fields

Results on NIST SD27 (a) Gray image (b) Texture image (c) Segmentation (d) Segmentation and enhancement Good latent Bad latent Ugly latent

Fingerprint Alteration: Gus Winkler (1933) Double-loop changed to left loop

Fingerprint Alteration Transplanted from foot 1 Bitten 2 http://www.clpex.com/images/feetmutilation/l4.jpg K. Singh, Altered Fingerprints, 2008. Criminals go to extremes to hide identities, USA TODAY, Nov. 6, 2007. Criminals cutting off fingertips to hide IDs, TheBostonChannel.com, Mar. 3, 2008.

Altered Fingerprint Detection Large orientation field discontinuity Non-uniform minutiae distribution ), ( y x f x ), ( y x y g ), ( ), ( tan 2 1 tan 2 1 ), ( 1 1 y x f y x g x y y x n k k l l l k kl y x a y x f 0 0 ), ( n k k l l l k kl y x b y x g 0 0 ), ( Orientation Field Representation Polynomial Model

Natural Fingerprint Extracted Orientation Orientation Field Discontinuity Field from Image Modeled Map Orientation Field Core Delta

Altered Fingerprint Extracted Orientation Orientation Field Discontinuity Field from Modeled Image Map Orientation Field

Minutiae Density Map Natural Fingerprint Minutiae Minutiae Density Map Altered Fingerprint

Successful Detections S. Yoon, J. Feng, and A. K. Jain, "Altered Fingerprints: Analysis and Detection", IEEE Trans.PAMI Vol. 34, No. 3, pp. 451-464, March 2012.

Tattoos 20% of adults have a tattoo (Harris Poll of 2,016 adults, Jan, 2012) Adults aged 30-39 are most likely to have a tattoo (38%) (a) (b) (c) (d) (a) Tattoo used by sailors in the British navy, (b) 18th street gang tattoo, (c) religious tattoo, (d) tattoo related to 9/11 terrorist attack http://www.harrisinteractive.com/newsroom/harrispolls/tabid/447/mid/1508/articleid/970/ctl/readcustom%20default/default.aspx

Victim & Suspect Identification (a) Asian tsunami (2004) victim, (b) victim of 9/11 terrorist attack, (c) body of an unidentified murdered woman, and (d) body part found in a Florida state park (a) (b) (c) (d) Gang tattoos of (a) Latin kings and (b) Family stones; (c) teardrop criminal tattoo (person has killed someone or had a friend killed in prison); (d) spider within a web tattoo (drug addict or a thief)

Feature Extraction & Matching Extract and match keypoints Similarity based on no. of matched keypoints Lee, Tong, Jin, and Jain, "Image Retrieval in Forensics: Tattoo Image Database Application", IEEE Multimedia, Vol. 19, No. 1, pp. 40-49, 2012.

Successful Retrievals

Summary Biometrics Recognition is becoming a necessary component of any identification technology Biometrics is the only way to ensure that the same person does not have multiple documents (e.g., driver license, passport) System requirements (application dependent): error rate, template size, usability, resistance to attacks, exception handling, throughput, seamless integration, return on investment, 53

Dan Wasserman The Bostom Globe, Jan 22, 2014