0% found this document useful (0 votes)
4 views

Erick's Assignment ( Forensic methods)

The document discusses various biometric methods used in criminal identification and profiling, including fingerprint recognition, facial recognition, and DNA profiling. It highlights the significance of these methods in enhancing law enforcement capabilities in Kenya, providing practical examples of their applications in crime scene investigations and security measures. The document emphasizes the importance of these techniques in linking suspects to crimes, preventing future offenses, and improving public safety.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

Erick's Assignment ( Forensic methods)

The document discusses various biometric methods used in criminal identification and profiling, including fingerprint recognition, facial recognition, and DNA profiling. It highlights the significance of these methods in enhancing law enforcement capabilities in Kenya, providing practical examples of their applications in crime scene investigations and security measures. The document emphasizes the importance of these techniques in linking suspects to crimes, preventing future offenses, and improving public safety.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 17

KENYA INSTITUTE OF SECURITY AND CRIMINAL JUSTICE

COURSE : DIPLOMA IN FORENSICS AND CRIMINAL INVESTIGATIONS

MODE OF LEARNING: DISTANCE LEARNING MODE.

MODULE : FORENSIC METHODS AND TECHNIQUES.

TASK : USING RELEVANT,PRACTICAL EXAMPLES, DISCUSS THE


MAIN BIOMETRIC METHODS USED IN CRIMINAL IDENTIFICATION
AND PROFILING. (40mks)

STUDENT NAME ; ERICK MUHIA.

ADMISSION NUMBER; 15097.

TRAINER: MR. ODIYO.

DATE OF SUBMISSION: APRIL 2025.

CAMPUS : NAIROBI CAMPUS


TABLE OF CONTENT

Content ………………………………………………………….………… Page No.

Introduction to Criminal identification and it's methods............................................. 1

Fingerprint Recognition…………………………………………………………………….…………………..5

Facial Recognition …………………………………………………………………………………………………..8

DNA Profiling …………………………………………………………….………….………………………………11

Iris Recognition ……………………………..………………………...…..….……………………………….…14

Voice Recognition…………………………………………………………………………………………………15

Conclusions ………………………………………………………………………………………………..……16

REFERENCES………………………………………………..………………………………………………….…. 17
INTRODUCTION

Criminal identification and profiling are critical forensic methods and techniques that support
law enforcement agencies in narrowing down suspects and understanding criminal behavior.

. Criminal Identification
Criminal identification refers to various techniques used to establish or confirm the identity of a
person involved in criminal activity. It involves several methods, such as:

 Biometric Analysis: Techniques like fingerprinting, facial recognition, and DNA


profiling are used to identify individuals based on their unique biological characteristics.
Fingerprinting, for instance, is one of the oldest and most reliable methods, as no two
people have identical fingerprints.

 Physical Evidence Examination: Forensic investigators analyze physical evidence left


at crime scenes, such as blood, hair, fibers, or footprints, to identify possible suspects or
confirm their presence.

 Digital Forensics: With the rise of cybercrime, digital footprints like email addresses, IP
logs, or phone records also help in identifying individuals associated with criminal
activities.

. Criminal Profiling
Criminal profiling, or offender profiling, is the psychological and behavioral analysis used to
infer the characteristics of an unknown offender. It relies on identifying patterns in criminal
behavior to predict aspects of the suspect's personality, background, and potential future actions.
The major approaches include:

 Deductive Profiling: Analyzing crime scene evidence to draw conclusions about the
offender's personality traits and behavior. This approach is often rooted in forensic
psychology.
 Inductive Profiling: Comparing the current case with historical cases that have similar
characteristics to generalize or predict offender traits.
 Geographic Profiling: Mapping out locations of crimes to predict where the offender
may reside or target next, which helps to optimize search efforts.

Both criminal identification and profiling are essential forensic techniques. Identification focuses
on the "who" by linking suspects to specific evidence, while profiling aids in understanding the
"why" and "how" by offering insight into behavior patterns and motivations. Together, these
methods help in the apprehension of criminals, prevention of future offenses, and ultimately, in
delivering justice.

Biometric methods play a significant role in criminal identification by using unique biological
traits to confirm an individual’s identity. Here are some practical examples of biometric methods
commonly used:

1)Fingerprints Recognition.
Fingerprint recognition is one of the most reliable and widely used biometric methods in criminal
identification due to the uniqueness of fingerprints—no two people have the same fingerprint
pattern. In Kenya, fingerprint recognition plays a crucial role in law enforcement, helping to
identify suspects, confirm identities, and solve criminal cases. Here’s how fingerprint recognition
is used, with specific examples relevant to Kenya:

Crime Scene Investigation


 When a crime occurs, forensic investigators often collect latent fingerprints left behind on
various surfaces, such as weapons, doors, or personal belongings. These fingerprints are
then analyzed and compared with known fingerprints stored in national databases.

 Example: In Kenya, the Directorate of Criminal Investigations (DCI) uses fingerprint


analysis in cases ranging from burglaries to more serious offenses, like robbery with
violence. Crime scene investigators gather fingerprints from scenes, which can link
suspects to specific crimes if matched with prior records.
Kenya’s Integrated Population Registration System (IPRS)
 Kenya’s Integrated Population Registration System (IPRS) integrates biometric data,
including fingerprints, for every citizen and resident. This system enables police to
quickly identify individuals based on fingerprints collected from crime scenes.

 Example: When an individual is arrested, their fingerprints can be cross-referenced with


the IPRS database to confirm their identity and check for any criminal records. This
system has been instrumental in cases where suspects provide false identities to avoid
detection.

AFIS (Automated Fingerprint Identification System)


 Kenya has implemented an Automated Fingerprint Identification System (AFIS), which
allows rapid searching and matching of fingerprints within the national database. The
system can automatically compare crime scene fingerprints with thousands of records to
find potential matches.

 Example: In high-profile cases, like armed robbery and homicide, AFIS helps identify
suspects even if they have fled across county or national borders. For instance, if
fingerprints from a crime scene in Nairobi match with a suspect previously apprehended
in Mombasa, law enforcement can easily track and apprehend them.

. Mobile Fingerprint Scanners for Police Patrols

 Kenya’s law enforcement has also adopted mobile fingerprint scanners, allowing police
officers to perform instant checks in the field. These handheld devices can scan
fingerprints and instantly match them with the national database.

 Example: In Nairobi and other urban areas, police use mobile scanners during patrols
and stop-checks. If they apprehend a suspicious individual, they can quickly verify if the
person is linked to any criminal records or outstanding warrants.

. Identification of Unidentified Bodies


 Fingerprints are also crucial in identifying unknown or missing persons. In cases of
accidents or homicides where identification documents are unavailable, fingerprints help
to establish identities, bringing closure to families.
 Example: In a 2018 incident, several unidentified bodies in Nairobi were identified
through fingerprint matching. The fingerprints collected from the deceased were matched
against records in the IPRS database, allowing families to be notified and proceed with
burial.

. Counter-Terrorism Efforts
 The fight against terrorism in Kenya has significantly benefited from fingerprint
recognition. Law enforcement agencies can identify and track suspects associated with
terrorist groups, especially in high-risk areas.

 Example: In cases where terrorism suspects are detained or eliminated, fingerprints are
taken and checked against criminal databases to link them to previous terrorist activities
or to identify other suspects involved in related operations.

Fingerprint recognition in Kenya is a powerful tool, enabling law enforcement to solve crimes
efficiently, track down suspects, and identify individuals swiftly. The integration of fingerprint
data across various national databases, like IPRS and AFIS, has modernized criminal
investigations in Kenya, making it easier to handle cases with more accuracy and reduce the risk
of mistaken identity. This approach has not only enhanced security but also instilled public
confidence in the criminal justice system.

Fingerprint collection and analysis are key stages in fingerprint recognition, helping to link
suspects to crime scenes and confirm identities. This process involves the systematic collection
of fingerprint evidence from crime scenes or suspects, followed by a detailed analysis that
compares the prints with existing records to identify individuals. Here’s an overview of each
step:

Fingerprint Collection
Fingerprint collection involves locating, lifting, and preserving fingerprint evidence. This
process requires meticulous attention to detail to avoid contamination or degradation.

 Locating Fingerprints: Investigators identify surfaces at a crime scene where


fingerprints are likely to be found, such as door handles, weapons, or glass surfaces.
Fingerprints can be visible (e.g., those left in ink or dirt) or latent (invisible to the naked
eye), depending on the surface and conditions.

 Methods of Lifting Fingerprints:


 Powder Dusting: For smooth, non-porous surfaces, dusting with powder helps
reveal latent fingerprints. A fine powder (often black or magnetic) is applied to
the surface, adhering to the oils left by the fingerprint. The print is then lifted
using adhesive tape.

 Chemical Methods: For porous surfaces like paper, chemicals such as ninhydrin,
iodine fuming, or cyanoacrylate (superglue) fuming are used. These chemicals
react with components in fingerprint residues, revealing the pattern.

 Alternate Light Sources (ALS): Ultraviolet or laser light is sometimes used to


illuminate latent prints without damaging the surface, especially on materials
where powders and chemicals may not be effective.

 Preservation of Fingerprints: Collected fingerprints are carefully preserved by lifting


them onto a transparent tape or photographing them for further analysis. Preserving the
prints helps maintain integrity for later comparison.

. Fingerprint Analysis
Once fingerprints are collected, forensic experts analyze them using several techniques to
compare and identify matches. This stage involves detailed examination and automated matching
systems.

 Classification and Pattern Analysis:


 Ridge Patterns: Fingerprint experts analyze the basic ridge patterns (loops,
whorls, and arches) to classify prints into broad categories. This classification
narrows down the potential matches in a database.

 Minutiae Points: Minutiae are unique features in fingerprints, like ridge endings,
bifurcations, and dots. Analysts focus on these details, as they create the unique
fingerprint structure that distinguishes one person’s print from another's.
 Automated Comparison Using AFIS:
 Automated Fingerprint Identification System (AFIS): AFIS is a computerized
system that scans and compares fingerprints to find potential matches within a
large database. It uses complex algorithms to detect ridge patterns and minutiae
points, matching them with stored prints. AFIS can quickly narrow down suspects
by finding matches with high accuracy.

 Manual Verification: Though AFIS provides potential matches, fingerprint


experts perform manual verification to ensure accuracy. They compare prints
under magnification to validate the automated results, confirming or ruling out
matches.
Practical Example in Kenya
In Kenya, fingerprint collection and analysis are employed widely in criminal investigations. For
example, the Directorate of Criminal Investigations (DCI) uses fingerprint collection at crime
scenes, such as burglary and homicide cases, to find latent prints.

These fingerprints are then analyzed and compared against the national database using AFIS. If
a match is found, the system provides law enforcement with a suspect’s identity, enabling further
investigation or arrest.

In summary, fingerprint collection and analysis are integral to modern forensic investigations.
Collection methods ensure that usable prints are obtained from crime scenes, while analysis and
comparison through AFIS and manual verification help accurately identify suspects, providing a
strong foundation for criminal identification.

2) Facial Recognition as a Biometric Method of Identification

How Facial Recognition Works


Facial recognition technology uses algorithms to analyze facial features from images or video
footage. The process involves several steps:

Detection: A camera captures an image or video of a person’s face. This can be from
CCTV footage, a suspect’s photo, or a database of known individuals.

Alignment: The software identifies the face within the image, aligning it for analysis. It
adjusts for angles, lighting, and facial expressions to ensure accuracy.

Feature Extraction: The system extracts unique facial features, like the distance
between the eyes, nose shape, jawline, and cheekbone structure. These measurements
create a "faceprint," a digital signature unique to each individual.

Matching: The system compares this faceprint against a database of known images. In
criminal investigations, this often means comparing with a database of criminals, missing
persons, or individuals of interest.

Identification or Verification: If there’s a match, the system identifies or verifies the


person, potentially linking them to previous records or ongoing investigations.

Applications of Facial Recognition in Kenya


In Kenya, facial recognition technology is deployed in several ways to enhance security and
support law enforcement:

Surveillance in Public Spaces

 Example: In Nairobi, facial recognition-enabled CCTV cameras have been installed in


busy public spaces, including CBD areas, transportation hubs, and government buildings.
This system allows real-time monitoring, helping police to spot and track individuals
with criminal backgrounds or known gang members.

 Impact: This technology has helped prevent crimes in crowded areas and identify
suspects who may be planning or engaging in illegal activities. For instance, in the wake
of the Westgate Mall attack and other security threats, such technology has played a role
in securing public areas against potential threats.

. Border Security and Immigration Control

 Example: At Kenyan border points, facial recognition technology assists immigration


officers in identifying travelers who might pose a threat or are involved in transnational
crimes. The facial recognition systems at border checkpoints help authorities cross-check
individuals against databases of wanted persons, ensuring better control over who enters
or exits the country.

 Impact: This approach has improved border security, assisting in the arrest of suspects
involved in cross-border crimes such as smuggling, drug trafficking, or terrorism.

. Fighting Terrorism and Tracking Known Offenders

 Example: Kenya has faced challenges with terrorism, especially from groups like Al-
Shabaab. Facial recognition technology assists law enforcement in identifying suspected
terrorists by matching their images against a database of known extremists and terror
suspects. Surveillance at malls, hotels, and other high-risk areas has been crucial in
preventing potential attacks.

 Impact: By tracking known extremists or identifying suspects in high-risk areas, facial


recognition has contributed to Kenya’s anti-terrorism efforts. This proactive approach has
been instrumental in neutralizing potential threats before they materialize.

Crime Investigation and Suspect Identification


 Example: In criminal investigations, law enforcement agencies can analyze footage from
crime scenes to identify suspects. For instance, if a robbery is caught on camera, police
can use facial recognition to match the suspect's face against a criminal database.

 Impact: This has been particularly helpful in Nairobi, where crimes such as robbery and
mugging are often caught on CCTV. In such cases, facial recognition aids in the quick
identification and arrest of suspects, contributing to an overall reduction in crime rates in
some areas.

Benefits and Challenges of Facial Recognition in Kenya


 Benefits: Facial recognition enhances law enforcement’s capacity to monitor high-risk
areas, track suspects, and improve overall security. It reduces reliance on physical
documentation and speeds up identification processes, allowing for faster responses to
threats.

 Challenges: Facial recognition in Kenya faces concerns related to privacy, potential


misuse, and false positives (where innocent individuals are mistakenly identified as
suspects). Ensuring accuracy and addressing privacy concerns remains essential for the
technology's sustainable use in law enforcement.

Facial recognition in Kenya is becoming a key tool for preventing, investigating, and solving
crimes, as well as enhancing public safety. From high-traffic public spaces to border control, it
supports law enforcement in tracking down suspects more efficiently. As Kenya continues to
adopt and refine this technology, it has the potential to transform security and criminal
investigations across the country.
3) DNA Profiling as a Biometric Method of Identification

How DNA Profiling Works


DNA profiling involves analyzing specific regions of an individual’s DNA that vary greatly
among people. These unique DNA sequences can be extracted from biological samples such as
blood, saliva, hair, or skin cells. Here’s a brief overview of the process:

Sample Collection: Biological samples are collected from crime scenes, victims, or
suspects. Samples might include blood stains, saliva on cigarette butts, hair strands, or
skin cells left on personal items.

Extraction and Amplification: The DNA is extracted from the collected samples and
then amplified using Polymerase Chain Reaction (PCR), which makes millions of copies
of the DNA, allowing forensic scientists to analyze even trace amounts.
Analysis of Short Tandem Repeats (STRs): Forensic scientists examine specific
regions of the DNA called Short Tandem Repeats (STRs), which are highly variable
among individuals. STR analysis produces a unique genetic profile, or "DNA
fingerprint," for each person.

Matching and Comparison: The DNA profile from the crime scene is compared to the
profiles of known suspects or those in DNA databases. A match confirms that the DNA
samples are from the same person, while a non-match excludes a suspect from suspicion.

Applications of DNA Profiling in Criminal Identification in Kenya


In Kenya, DNA profiling is used in various criminal investigations and has helped solve several
high-profile cases. Below are some of the main applications:

Homicide and Violent Crime Investigations

 Example: In cases of murder or sexual assault, DNA evidence can be crucial in


identifying perpetrators. For instance, DNA profiling was used in the investigation of the
murder of Sharon Otieno, a university student whose body was discovered in Homa Bay
County in 2018. DNA from the crime scene was analyzed and matched to the primary
suspect, which helped strengthen the case against those involved.
 Impact: DNA profiling in such cases provides conclusive evidence that can link suspects
to the crime scene, often leading to convictions. It also helps to exonerate individuals
who may have been falsely accused.

Sexual Assault Cases

 Example: In cases of sexual assault, DNA profiling can identify the perpetrator by
comparing the DNA from bodily fluids left at the crime scene with a suspect's DNA. The
Kenyan government has used DNA profiling in sexual assault cases to bring justice to
victims and convict offenders. In many instances, it has provided irrefutable evidence in
court, increasing the chances of conviction.

 Impact: The use of DNA profiling in sexual assault cases has not only improved
conviction rates but also deters potential offenders, knowing that DNA evidence can
easily implicate them.

Paternity Testing and Parental Disputes

 Example: In Kenya, DNA profiling is widely used in paternity disputes and inheritance
cases. For example, in cases where family members dispute inheritance rights, DNA
testing can confirm blood relations. This is common in cases involving inheritance
disputes or proving the identity of children born out of wedlock.

 Impact: In these cases, DNA profiling establishes clear biological connections, which
can resolve legal disputes and ensure that justice is served in cases involving family
rights and inheritance.

Identification of Unidentified Bodies

 Example: DNA profiling has been essential in identifying bodies after disasters or in
cases where individuals go missing. In 2019, when several people were killed in floods
and landslides in West Pokot County, DNA profiling was used to identify victims and
return remains to their families. Similarly, in the wake of the 2013 Westgate Mall attack,
DNA profiling helped identify both victims and perpetrators.

 Impact: DNA profiling brings closure to families by identifying lost loved ones. It also
aids forensic investigations by identifying potential suspects or victims of crime or
disaster, helping law enforcement close missing person cases more effectively.

. Establishing Links in Wildlife Crime


 Example: DNA profiling is also used to combat wildlife poaching in Kenya. For
instance, DNA from seized ivory or animal body parts is matched with national databases
to trace the origins and trafficking routes. Kenya’s government has used DNA profiling
to identify poachers and illegal wildlife traders, as well as to trace ivory back to specific
animals, making it easier to prosecute poachers.

 Impact: By linking seized items to poachers or specific areas, DNA profiling has
strengthened Kenya’s efforts against wildlife crime, contributing to conservation and the
protection of endangered species.

Benefits and Challenges of DNA Profiling in Kenya


 Benefits: DNA profiling provides a high level of accuracy and reliability in criminal
identification, making it a powerful tool for the justice system. It can link suspects to
crimes conclusively, solve cold cases, and bring justice to victims. Additionally, DNA
databases aid in future investigations, as suspects’ profiles can be stored and cross-
referenced with new evidence.

 Challenges: DNA profiling in Kenya faces challenges, including limited access to


technology, high costs, and potential privacy concerns. Developing and maintaining
comprehensive DNA databases requires resources, and there are ethical concerns about
the storage and use of individuals’ genetic information.

DNA profiling in Kenya is a vital tool in criminal investigations, used across a range of cases
from homicide and sexual assault to wildlife crime and disaster victim identification. By
providing conclusive evidence, DNA profiling has improved conviction rates, brought justice to
victims, and helped protect Kenya’s wildlife. While challenges remain, the continued adoption
and advancement of DNA technology will further enhance Kenya's forensic capabilities,
benefiting the criminal justice system and society at large.
4) Iris Recognition as a Method of Identification

How Iris Recognition Works


Iris recognition technology uses specialized cameras and software to capture and analyze the
unique features of the iris:

Image Capture: A high-resolution infrared camera takes a detailed image of the eye,
focusing on the iris. Infrared light is used to reduce glare and enhance visibility of the
intricate patterns.
Pattern Analysis: The system analyzes unique characteristics in the iris, such as furrows,
rings, freckles, and crypts (tiny gaps), to create a detailed iris "template" or digital
signature.

Template Storage: This template is stored in a secure database. When an individual


needs to be identified, a new scan is compared to the stored template.

Matching and Identification: The system quickly compares the new iris scan to stored
records. Because of the highly unique structure of each iris, matches are accurate, making
it highly suitable for identification and verification.

Applications of Iris Recognition in Criminal Identification in Kenya


In Kenya, iris recognition is being used and explored in several areas related to security and
criminal identification. Here are some relevant applications:

Border Security and Immigration Control

 Example: Kenya uses iris recognition at certain immigration checkpoints to prevent


unauthorized entry and to verify the identities of travelers. By matching travelers' iris
scans with records in immigration databases, border control can quickly detect
individuals with criminal histories or those on watchlists.

 Impact: This enhances border security, particularly in areas vulnerable to cross-border


crime, such as smuggling and human trafficking, by allowing immigration officials to
swiftly identify high-risk individuals.

. Inmate Identification and Tracking in Prisons

 Example: In Kenyan correctional facilities, iris recognition could be implemented to


ensure accurate tracking and identification of inmates. Although not widely adopted yet,
it has potential to replace traditional fingerprinting methods, reducing errors in inmate
identification and simplifying daily check-ins.

 Impact: This technology would help prevent mistaken identities within prisons and
ensure that inmates are properly accounted for, lowering the risk of unauthorized releases
or escapes.

. Identification of Suspects in Criminal Cases

 Example: Law enforcement agencies can use iris recognition to confirm the identities of
suspects arrested for criminal activities. If a suspect is apprehended but lacks
identification, law enforcement can cross-reference an iris scan with national or criminal
databases to confirm their identity.

 Impact: This is especially helpful in regions with high crime rates, like Nairobi, where
accurate identification is crucial to linking suspects to previous records or outstanding
warrants. Iris recognition can enhance the accuracy of criminal databases and prevent
identity fraud among suspects.

. Anti-Terrorism and High-Security Installations

 Example: Iris recognition is suitable for secure facilities, such as military bases,
government buildings, and research facilities where access must be strictly controlled. In
Kenya, this technology could secure access to critical infrastructure, allowing only
authorized individuals to enter and deterring potential threats.

 Impact: By implementing iris recognition in high-security facilities, Kenya can improve


protection against terrorism and espionage, ensuring that critical areas remain secure.

. Combating Identity Fraud and Enhancing eCitizen Services

 Example: The Kenyan government’s eCitizen portal, which handles services like ID
registration, passport issuance, and other legal documents, has the potential to adopt iris
recognition to prevent identity fraud. For instance, individuals applying for ID or passport
renewals could have their irises scanned, providing an additional layer of verification.

 Impact: By adding iris recognition to eCitizen, the government would enhance the
security of citizen identification processes, making it difficult for criminals to forge
identities or obtain fraudulent documents.
Benefits and Challenges of Iris Recognition in Kenya
 Benefits: Iris recognition is non-invasive, highly accurate, and provides fast
identification, especially useful for high-security areas and border control. Since iris
patterns are unique to each person and stable over time, the technology ensures reliability
in criminal identification and identity verification.

 Challenges: Implementing iris recognition in Kenya faces challenges such as high costs,
technical infrastructure requirements, and privacy concerns. Additionally, the
technology’s effectiveness relies on high-quality imaging, which may not work well with
individuals who have certain eye conditions or in areas with limited resources.

In Kenya, iris recognition holds great potential for improving criminal identification, border
security, and fraud prevention. From managing secure facilities and verifying inmates to
enhancing eCitizen services, iris recognition could greatly benefit Kenya’s security infrastructure

. While it is not yet widespread, the technology’s reliability and accuracy make it a promising
addition to Kenya’s evolving approach to security and criminal justice.

CONCLUSIONS
: Voice recognition is convenient, as it doesn’t require physical contact or specialized equipment
beyond a microphone. It provides quick and reliable identification, making it suitable for remote
authentication, especially in financial services and security. It’s also useful for identifying
individuals when physical biometrics like fingerprints are unavailable.

Voice recognition faces technical challenges in environments with poor audio quality or
background noise, which can affect accuracy. Voice variations due to illness, stress, or emotions
can also lead to inconsistencies. Moreover, privacy concerns arise with storing voiceprints, as
individuals may worry about unauthorized access or misuse of their data.

Voice recognition in Kenya is gaining traction as a valuable tool in criminal investigations,


banking security, and public safety. By identifying suspects through voice analysis, Kenyan
authorities can prevent terrorist threats, track criminal networks, and secure financial
transactions. As the technology matures and addresses current challenges, voice recognition will
likely play a larger role in Kenya's national security and public service frameworks, enhancing
efficiency and security across various sectors.
REFERENCES

ARULALAN.V, BALAMURUGAN.G A Survey on Biometric Recognition Techniques International Journal of


Advanced Research in Computer and Communication Engineering Vol. 3, Issue 2, February 2014.

Anil K. Jain, An Introduction to Biometric Recognition IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS
FOR VIDEO TECHNOLOGY, VOL. 14, NO. 1, JANUARY 2004.

Ajay Kumar1, David C. M. Wong1 Personal Verification using Palmprint and Hand Geometry Biometric
Pattern Recognition and Image Processing Lab, 2006.

ARULALAN.V1, BALAMURUGAN A Survey on Biometric Recognition Techniques International Journal of


Advanced Research in Computer and Communication Engineering Vol. 3, Issue 2, February 2014.

Damien Dessimoz Multimodal Biometrics for Identity Documents Research Report PFS 341-08.05
(Version 2.0) June 2006.

Anil K. Jain, Ajay Kumar Biometrics of Next Generation: An Overview ‗SECOND GENERATION
BIOMETRICS‘ SPRINGER, 2010.

ARULALAN.V1, BALAMURUGAN A Survey on Biometric Recognition Techniques International Journal of


Advanced Research in Computer and Communication Engineering Vol. 3, Issue 2, February 2014.

Jitendra Choudhary, Survey of Different Biometrics Techniques, International Journal of Modern


Engineering Research (IJMER) www.ijmer.com Vol. 2, Issue. 5, Sep.-Oct. 2012 pp 3150 -155

Saurabh Zadikar1 et al. Criminal Investigatio & Identification System (CI2S) IJCSMC, Vol. 4, Issue. 2,
February 2015, pg.402 – 407

Cyrus Shahabi et al. Multi Source Event Detection and Collection System for Effective Surveillance of
Criminal Activity. J Inf Process Syst, Vol.10, No.1, pp.1~22, March 2014.

C. S. Chua and R. Jarvis, ―Point signatures: A new representation for 3D object recognition,‖
International Journal of Computer Vision, vol. 271,pp. 63–85, 1997

Barua K., Bhattacharya S., ―Fingerprint Identification‖, Global Journal of Computer Science &
Technology, Vol. 11 (Issue 1), (Apr 2011).

Shritosh Kumar, Vishal Shrivastav, Performance of Gabor Mean Feature Extraction Techniques for Ear
Biometric Recognition. International Journal of Informative & Futuristic Research Vol 2, Issue 2, 2015.

Amandeep Singh Dhillon, Ashok Kumar Bathla, Approaches for Finding Correlation Between Fingerprints
and Footprints of a Person, Journal of Information Sciences and Computing Technologies. Vol 1, Issue 1,
December 2014.

Anil K. Jain* and Arun Ross, Bridging the Gap: From Biometrics to Forensics, Philosophical Transactions of
The Royal Society B, 2015.

M.Loganathan, Dr.E.Kirubakaran, A Study on Cyber Crimes and protection, IJCSI International Journal of
Computer Science Issues, Vol. 8, Issue 5, No 1, September 2011 ISSN (Online): 1694-0814.

You might also like