Introduction: –
Biometric is the procedural learning of measurement and investigative biological information for the determination of verification or identification Biometric refers to certain physiological or behavioral characteristics that are uniquely associated to a person. The study of human metrics called Biometrics
The term biometric is invented from the Greek word bios (life) and metric or Metrikos (measure) in a straight line translate into life measurement. This is the expertise of examining individual person based on physiological, behavioral or morphological characters such as face, retina, fingerprint, voice and signature etc.
Currently variety of requests depends upon the verification or identification purpose to conform the individual. Old-style passwords, PINs, ID Card have been used for personal identification.
Biometric is one of the most attractive way to solve crime so this is a way to establish the identity of a person on the basis of his or her behavioral characteristics.
Characteristics of Biometrics:-
1). Universality:- Every individual has biometric characteristics.
2). Uniqueness:- Rach person has the feature but distinct from others.
3). Performance:-The biometric traits are constant for a certain period of time.
4). Collectability:- Rase of data capturing, measuring, and processing.
5). Performance:- Security, speed, accuracy, and robustness.
6). Acceptability:- Accepted by the user population without any objection.
How it works:-
The general biometric system constitutes of four modules sensor feature extraction, matches, Decision making. The effectiveness of a biometric system depends upon the consistency of the sensor used and the feature extracted from the sensed signal.
1). Image Acquisition:- capture the person’s fresh biometric data in form of video, audio and an image or some other signal.
2). Feature extraction:- Automated process of extracting distinctive biometric feature of generate template and can be done using machine learning, computer vision and pattern recognition techniques.
3). Database module:- compare the currently extracted feature against the stored templates to generate a matching value or score. Which is computed to find the similarity between true samples.
4). Decision -Making module:- It gives the decision as accepted or rejected by there comparing the matching score with gives threshold values.
Identification and verification:-
Biometric the system can be classified into types on the basis of mode of application verification &identification .
In the identification made, This biometric system classifies a person by searching and arranging the templates of all the person whose identification info stored in the database. In this biometric process, This system completes one too many comparisons to prove the identity of a person. This is the mechanism of comparing the presented biometric of a person to all other biometric patterns already available in the database
In the verification mode, the information of an individual stored on biometric who claims identity compare with the template which is already stored in the database. This is also performed one to one comparison. It is also known as authentication. This is used to confirm an individual identity.
Biometrics traits in forensic science:-
Fingerprint :-
fingerprint have been used in forensic science as a means of identification, fingerprint are unique in every individual fingerprint is a pattern of friction ridges and valleys on the surface of the fingerprint. For the matching of fingerprint scan the print found in a crime scene and locate all the unique ridge print and minutia this unique characteristic is matched with stored database. So whenever we found a fingerprint from the scene of the crime, matched the fingerprint with the fingerprint of criminal or that print which is already stored in the database, fingerprint are distinguished and immovable for each individual and the characteristics or identification point not ever change with time.
Face recognition:-
Face recognition is a popular and non-intrusive method of face recognition based on the size, location, and shape of the facial traits such as the nose, lips .eyes, chin, jaw, and their spatial relationship. This biometric process of face recognition plays a vital role in law enforcement & other investigation agencies. In this process biometric system identifies a person on the basis or video which is then matched to the facial image stored in a facial biometric database, generally, the face recognition procedure is separated into three steps. Face recognition, feature extraction, and face recognition.
Palm prints :-
Palm region of the hand defined as palm prints. The palm of the human hands also contains a unique pattern of valleys and ridges. The part of the palm is much bigger than the part of a finger and as a result. palm prints are expected to be even more distinctive than fingerprints palm prints deliver valid evidence to the crime investigators. The palm consists of the line patterns such as principle lines, wrinkles, and ridges. The line of heart, the lifeline, and the headline are known as the principal line. This line patterns area distinct and unique for every individual and it is a physiological biometric.
Iris recognition;-
This recognition practices the iris of the eye which is the colored area that surrounds the pupil. Iris patterns are believed exclusive. The iris pattern is obtained through a video-based image acquisition system. Iris scanning devices have been used in personal identification or authentication for several years. Iris are highly accurate (iris pattern matches 1 in 10 billion people ). Iris are highly protected and have a high mark of chance. In iris recognition encoding and conclusion making are manageable.
Ear Recognition:-
The shape of the ear is used to accomplish identification by Ear geometry recognition. It is suggested that the characteristics and the shape of the human ear are usually diverse. In law enforcement agencies applications of people are determined by the ear with the help of ear patterns are found at crime places. It is yet to be seen that how distant this knowledge will be valuable in access control applications.
Voice biometrics:-
voice biometrics deals with the identification of a talker from the features of his / her voice. It is frequently used when voice is the only available feature for identification .e.g. phoned bomb hazard, request of money in kidnapping cases, etc. It has two approaches Text-dependent ( recognition based on the secure predetermined phrases ) and Text independent (recognition is dependent on what a person is speaking.
Keystroke biometrics:-
It is believed that each individual types on a keyboard in a unique way. This biometric is also not a very distinguishing and unique technique. This biometric is also not very distinguishing and unique in identification but supports in recognition of an individual by offering enough discriminatory information. Key stoke pattern is also influenced by the emotional state, keyboards position, type of keyboard, etc. The benefit of using keystroke performance for recognition is that it can be simply detected unremarkably as that person is keying the data.
Advantages:-
1). This system expands security.
2). It can not be forgotten or lost information.
3). It improves the individual understanding.
4). Most widely used technique.
5).ability to enroll multiple figures in the database.
6). Having high accuracy.
7). This process is faster in identification.
8). Most reliable because no true people have the same biometric feature.
9). Accuracy is not affected by the wearing of glass.
10). It is easy to use, and small template size.
Disadvantages:-
1). Cut scars or absence of figure can produce obstacle for the process of recognition
2). Exposed to noise and distortion due to dirt and twist.
3). It Will not work when using a mask or other face-covering veils.
4). Expensive technology high equipment cost.
5). Voice of language change over time.
6). Can be manipulated by surgery.
7). Not distinguishes twins.
8). Enrollment and scanning are low.
9). Not every user friendly.
10). The subject should close to the camera.
Conclusion:-
Biometric analysis is becoming a useful technology in the field of forensic science. Accurate and efficient identification has become a vital requirement for forensic applications with an urge to solve more and more cases in less time. The biometric analysis is developing as a second scientific admissible tool investigative procedure. It holds the possibility to solve criminal activities. This article throws light on the techniques used in biometric analysis so it will become more reliable and efficient to solve crime in the field of forensic science in the future.
Reference:-
1. Jain AK, Patrick Flynn, Arun AR (2007) Handbook of biometrics. Springer.
2. Saini M, Kapoor AK (2016) Biometrics in Forensic Identification: Applications and Challenges. J Forensic Med 1: 108. DOI: 10.4172/2472-1026 .1000108
3. Mahroosh Bandey(2018)A study on the application of biometrics in forensic science, International journal of applied science and engineering volume 07.
4. Sanjay Kumar et al, / (IJCSIT) Analysis of various biometric techniques; International Journal of Computer Science and Information Technologies, Vol. 2 (4) , 2011, 1595-1597.
5. George Chillin Chandran. J, Dr. Rajesh. R. S., “Performance Analysis of Multimodal Biometric System Authentication”. IJCSNS
6. International Journal of Computer Science and Network Security, VOL.9 No.3, March 2009
7. Phillips et al., “An Introduction to Evaluating Biometric Systems, Guide to Biometrics”, IEEE Computer, February 2000, pp 56-63.