Você está na página 1de 14

Module 2: BIOMETRICS o That a silver box was taken from a room and was later

found in the Rockwells’ garden in the morning, and that


Module objectives: by the end of the class, the students —- the said box contained a fingerprint
1. Can identify common biometrics & behaviometrics and site o That Ruiz is a Constabulary agent and is a competent
their advantages and disadvantages fingerprint expert.
2. Can demonstrate the general process of identification & o That he had been convicted of theft three times
verification using biometric data and their applications already.
3. Can classify fingerprints according to configuration and - Medina, however, denies being the author of the crime and
match latent prints from fingerprints on file using Galton’s interposed a defense of alibi.
minutiae - RTC: Accused guilty.
4. Can express in a clear manner the evidentiary value of - Medina now questions the propriety of his identification as
fingerprints in the case of People v. Medina, G.R. No. L-38434, the robber and his subsequent conviction based on the
December 23, 1933 and form an opinion regarding the defense evidence used.
of Medina.
5. Can determine the approximate age of a person using ISSUE(S):
dentition 1. WON Medina was properly convicted on the basis
6. Can identify names of teeth as well as the positional of the fingerprint that was identified to be
descriptions in dentition and mouth matched with his (YES)
7. Can recite the salient features of PD 1575 - Dental Records
Law of 1978
8. Can explain the evidentiary value of the testimony of RATIO:
handwriting experts in the case of Lee v. People, G.R. No. 1. YES. The conviction was proper.
192274, February 8, 2012 as to the merit of the decision in light - SC: It is now well settled that evidence, showing
of the general advances in handwriting analysis correspondence of fingerprints, is admissible for proving
9. Can express basic knowledge on the subject of forgery. identity.
——————- - People v. Sallow: Science has declared that fingerprints are
reliable as a means of identification.
People v. Medina (1933) o Fingerprints were first used as a manual seal, which
Appellant: Marciano Medina would give personal authenticity to documents.
Appellee: People of the Phil. Islands o They were officially used for the first time to record the
Topic: Module 2 identity of individuals by Sir William Herschel, in Bengal,
in order to guard against forgeries by natives in India.
Doctrine: o They have been constantly used as a basis of
It is now well settled that evidence, showing correspondence information for the courts since Sir Francis Galton
of fingerprints, is admissible for proving identity. proved that the papillay ridges which cover the inner
surface of the hands and the soles of the feet form
patterns, the main details of which remain the same
FACTS: from the sixth month of the embryonic period until
- Feb. 1932: A robbery occurred in the house of James C. decomposition sets in after death
Rockwell. o The system has been in general use in the criminal
o A silver box was taken from the room of Mrs. Rockwell courts in England since 1891.
and found in the garden next morning. - Medina: The fingerprint found was blurred and hence
- Agripino Ruiz, a Constabulary agent and a fingerprint could not have been employed as evidence.
expert, was the one investigating the said robbery. o SC: Argument is untenable. Wentworth and Wilder,
o While investigating that said case, he went to visit authorities in fingerprints, has declared that “hese
Medina, who was already under arrest at the time for imprints at best will be poor; that one will never find an
breaking into the house of another. accidental imprint that is absolutely perfect; that it is
o Ruiz took Medina’s fingerprints and compared them seldom, indeed, that a very good one is found.”
with the print he found on the silver box. o “The only important question is whether or not the
o He found that the two prints (specifically, Medina’s right evidence identifies the accused beyond a reasonable
middle finger print, and the one on the box) coincided doubt as the person whose finger print appears on the
with each other on 10 diff. points. box.”
o He also found that Medina had already been convicted - These were the 10 points of correspondence between the
three times for the crime of theft. two fingerprints:
- Medina was arrested and tried under a plea of no guilty. He 1. Upward end of a ridge,
admitted to the ff. facts: 2. Core,
o That the Rockwells’ house was robbed 3. Both ends of a short ridge,
4. Both ends of a short ridge,
5. Downward end of a ridge, Petitioner: Norberto Lee
6. Upward end of a ridge, Respondents: People of the Philippines and Allied Bank
7. Bifurcation, Topic: Module 2
8. Upward end of a ridge,
9. Upward end of a ridge, Doctrine:
10. Bifurcation. It is hornbook rule that as a rule, forgery cannot be presumed
- SC: Ruiz, the expert, has stated that only eight and must be proved by clear, positive and convincing evidence
characteristics are need to sufficiently identify a person. and the burden of proof lies on the party alleging forgery.
And according to Frederick Kuhn of the Bureau of Criminal
Identification, Police Department of the City of New York, FACTS:
in the "Finger Print Instructor," these characteristics are: - May 1999: Lee, being the New Accounts Service
o the peculiarities of the ridges, such as abrupt endings, Representative of Managers Check and Gift Check
o bifurcations, Processor, at the Cash Department of Allied Bank, forged
o the formation of what is termed an island, and falsified the signatures of the approving officers of
o short ridge lines, Allied Bank for the release of a manager’s check in the
o ridge dots, amount of P200,500.00, in payable to Noli Baldonado, in
o some peculiarity as to the information of the delta or favor of Filway Marketing Inc.
core; - He subsequently misrepresented himself as the payee and
o in fact any peculiarity out of the ordinary may be collected the proceeds of the check.
considered a characteristic point, and serve as a - Lee was later arrested and charged with 8 counts of Estafa
positive means of identification. thru Falsification of Commercial Documents.
- SC: In explaining the 10 points of identity between the two - Feb. 2007: After the beginning of trial, Lee filed a “Motion
prints, Ruiz testified: or Document and Handwriting Examination by the NBI”
o That he found four endings of ascending ridges in wherein he claimed:
Exhibit B that corresponded exactly to those of Exhibit o The Crime Laboratory failed to examine the questioned
A; and standard signatures of the accused, in elation to
o That as to the number and location with respect to the the questioned and standard documents and signatures
core, which he marked 2 in both photographs, he found of the other signatories of the subject Allied Bank
that they agreed; checks, application forms and related documents.
o That he found in Exhibit B two bifurcations or forks that o That there is a suspicion on the credibility, neutrality,
corresponded exactly to those in Exhibit A as to and sincerity of the Crime Laboratory examiners, in that
number and location; they conducted the examination without the notice to
o That he found in Exhibit B a short ridge, the two ends of and participation of the accused.
which he marked 3 and 4, that was identical with the o Hence, he argues that there is a need for a new,
corresponding short ridge in Exhibit A, which he also confirmatory and independent document and
marked 3 and 4. handwriting examination
- Medina: There was another impression of a finger on the - RTC: Motion denied
box that was not identified. o The proper remedy would have for the defense to
o SC: While this is true, it was only a small part and question the NBI witness during the presentation of the
hence, the expert did not make an attempt to study it. defense’s evidence-in-chief.
“And in any event, it does not alter the fact that a o Also, the Court is not bound by the NBI’s findings, and
fingerprint identical with that of the defendant in ten is behooved to examine on its own the questioned
homologous points of comparison was found on the signature.
box.” - CA: RTC affirmed.
- “Although there is some differences of opinion among the o The motion only intended to dispute the examination
authorities as to what constitutes proof of identity, the by the Crime Laboratory, which may be properly done
older writers regarding twelve points as necessary to prove during the defense’s presentation of its evidence-in-
certain identity; and more than that for absolute chief.
identification, the more recent writers think that six or eight
homologous points of comparison leave no room for
reasonable doubt. "In the end it is the microscopic identity ISSUE(S):
of the ridge characteristics (Galton's minutiae) that settles WON the RTC and CA erred in denying the motion
the question." for a credible examination by the NBI (NO)

HELD: Appeal denied. Conviction affirmed.


RATIO:
The RTC correctly denied the motion and the CA
Lee v. People (2012) correctly affirmed the denial of Lee’s motion.
- SC: The RTC was correct in pointing out that Lee could The architecture of a fingerprint-based automatic identity
have just subjected the NBI to appear in court through a authentication system is shown in Figure 2. It consists of four
subpoena, when it was his turn to present evidence. components: user interface, system database, enrollment
- The Court has held the following in Marquez v. module, and authentication module.
Sandiganbayan: “It is hornbook rule that as a rule, forgery
cannot be presumed and must be proved by clear, positive 1. The user interface provides mechanisms for a user to
and convincing evidence and the burden of proof lies on indicate his/her identity and input his/her fingerprints into the
the party alleging forgery.” system.
o Thus, Marquez bears the burden of submitting evidence
to prove the fact that his signatures were indeed 2. The system database consists of a collection of records, each
forged. In order to be able to discharge his burden, he of which corresponds to an authorized person that has access
must be afforded reasonable opportunity to present to the system. Each record contains the following fields which
evidence to support his allegation. This opportunity is are used for authentication purpose:
the actual examination of the signatures he is i. user name of the person,
questioning by no less than the country’s premier ii. minutiae templates of the person’s fingerprint, and
investigative force – the NBI. If he is denied such iii. other information (e.g., specific user privileges).
opportunity, his only evidence on this matter is negative
testimonial evidence which is generally considered as 3. The task of enrollment module is to enroll persons and their
weak. And, he cannot submit any other examination fingerprints into the system database. When the fingerprint
result because the signatures are on the original images and the user name of a person to be enrolled are fed
documents which are in the control of either the to the enrollment module, a minutiae extraction algorithm is
prosecution or the graft court. first applied to the fingerprint images and the minutiae
- SC: The Marquez ruling is inapplicable, however. patterns are extracted. A quality checking algorithm is used to
o In Marquez, the accused had requested for the ensure that the records in the system database only consist of
examination of the disbursement vouchers, purchase fingerprints of good quality, in which a significant number
requests and authorization requests by the NBI from the (default value is 25) of genuine minutiae may be detected. If a
beginning. fingerprint image is of poor quality, it is enhanced to improve
o In the case at bench, the trial had already started and, the clarity of ridge/valley structures and mask out all the
worse, the accused’s motion for reconsideration was regions that cannot be reliably recovered. The enhanced
filed beyond the reglementary period. fingerprint image is fed to the minutiae extractor again.

HELD: Petition denied. RTC and CA affirmed. 4. The task of authentication module is to authenticate the
identity of the person who intends to access the system. The
person to be authenticated indicates his/her identity and
I. BIOMETRICS places his/her finger on the fingerprint scanner; a digital image
of his/her fingerprint is captured; minutiae pattern is extracted
A. GENERAL PROCESS of Identification from the captured fingerprint image and fed to a matching
The problem of resolving the identity of a person can be algorithm which matches it against the person’s minutiae
categorized into two fundamentally distinct types of problems templates stored in the system database to establish the
with different inherent complexities identity.
1. Verification (authentication) - refers to the problem of
confirming or denying a person’s claimed identity (Am I who I
claim I am?).
2. Recognition - (Who am I?) refers to the problem of
establishing a subject’s identity

A person can be identified in three ways:


1. Person’s possession – e.g. keys to access a building
2. Person’s knowledge of a piece of information - e.g. user ID
and password
3. BIOMETRICS - positive identification is based on identifying
physical characteristics of the person; since the biological
characteristics can not be forgotten (like passwords) and can
not be easily shared or misplaced (like keys), they are generally
considered to be a more reliable approach to solving the
personal identification problem.

System Architecture
b. ulnar/radial/double loops

c. plain whorl/central pocket loop


d. accidental whorl

Applications of biometrics
• Physical access
• Attendance & time control
2. Galton’s minutiae
• Products
a. dot & ridge endings/spur
• Professional services
b. short and long ridges
• Social services
c. island/lake
• Forensics
d. bifurcation/double bifurcation/trifurcation
• Immigration
e. opposed bifurcation/ridge crossing
• Personal documents

B. FINGERPRINTS

1. Classification

Arches vs Loops vs Whorl

a. plain/tented arches
C. ODONTOMETRICS Maxillary means “of or attached to a jaw or jawbone, especially
Odontometrics is the measurement and study of tooth size. It the upper jaw.” The maxillae are the two maxilla bones
is used in biological anthropology and bioarchaeology to study forming the upper jaw and palate of the mouth. The two halves
human phenotypic variation. The rationale for use is similar to are fused at the intermaxillary suture to form the upper jaw.
that of the study of dentition, the structure and arrangement of (Wiki)
teeth. There are a number of features that can be observed in The mandible lower jaw, or jawbone (from Latin mandibula,
human teeth through the use of odontometrics. (Wiki) "jawbone") in the human, is the largest, strongest and lowest
bone in the face. It forms the lower jaw and holds the lower
teeth in place. (Wiki)
a. Incisors
Incisors (from Latin incidere, "to cut") are the front teeth
present in most heterodont mammals. They are located in the
premaxilla above and on the mandible below. Humans have a
total of eight (two on each side, top and bottom).
Adult humans normally have eight incisors, two of each type.
The types of incisor are:
• maxillary central incisor (upper jaw, closest to the
center of the lips)
• maxillary lateral incisor (upper jaw, beside the
maxillary central incisor)
• mandibular central incisor (lower jaw, closest to the
center of the lips)
The teeth are the hardest substances in the human body. • mandibular lateral incisor (lower jaw, beside the
Besides being essential for chewing, the teeth play an mandibular central incisor)
important role in speech. Parts of the teeth include:
• Enamel: The hardest, white outer part of the tooth. Children with a full set of deciduous teeth (primary teeth) also
Enamel is mostly made of calcium phosphate, a rock- have eight incisors, named the same way as in permanent
hard mineral. teeth. Young children may have from zero to eight incisors
• Dentin: A layer underlying the enamel. Dentin is depending on the stage of their tooth eruption and tooth
made of living cells, which secrete a hard mineral development. Typically, the mandibular central incisors erupt
substance. first, followed by the maxillary central incisors, the mandibular
• Pulp: The softer, living inner structure of teeth. lateral incisors and finally the maxillary laterals. The rest of the
Blood vessels and nerves run through the pulp of the primary dentition erupts after the incisors.
teeth.
• Cementum: A layer of connective tissue that binds Apart from the first molars, the incisors are also the first
the roots of the teeth firmly to the gums and jawbone. permanent teeth to erupt, following the same order as the
• Periodontal ligament: Tissue that helps hold the primary teeth, among themselves. (Wiki)
teeth tightly against the jaw.
A normal adult mouth has 32 teeth, which (except for wisdom
teeth) have erupted by about age 13:
• Incisors (8 total): The middlemost four teeth on the
upper and lower jaws.
• Canines (4 total): The pointed teeth just outside the
incisors.
• Premolars (8 total): Teeth between the canines and
molars.
• Molars (8 total): Flat teeth in the rear of the mouth,
best at grinding food.
• Wisdom teeth or third molars (4 total): These teeth
erupt at around age 18, but are often surgically
removed to prevent displacement of other teeth.
The crown of each tooth projects into the mouth. The root of
each tooth descends below the gum line, into the jaw.
(WebMD)

1. Names of teeth (maxillary/mandibular)


c. Premolars/molars
The premolar teeth, or bicuspids, are transitional teeth located
between the canine and molar teeth. In humans, there are two
premolars per quadrant in the permanent set of teeth, making
eight premolars total in the mouth. They have at least two
cusps. Premolars can be considered as a 'transitional tooth'
during chewing, or mastication. It has properties of both the
anterior canines and posterior molars, and so food can be
transferred from the canines to the premolars and finally to the
b. Canine molars for grinding, instead of directly from the canines to the
In mammalian oral anatomy, the canine teeth, also called molars. The premolars in humans are the maxillary first
cuspids, dog teeth, fangs, or (in the case of those of the upper premolar, maxillary second premolar, mandibular first
jaw) eye teeth, are relatively long, pointed teeth. However, premolar, and the mandibular second premolar.
they can appear more flattened, causing them to resemble The molars or molar teeth are large, flat teeth at the back of
incisors and leading them to be called incisiform. They the mouth. They are more developed in mammals. They are
developed and are used primarily for firmly holding food in used primarily to grind food during chewing. The name molar
order to tear it apart, and occasionally as weapons. They are derives from Latin, molaris dens, meaning "millstone tooth",
often the largest teeth in a mammal's mouth. Most species that from "mola", millstone and dens, tooth. Molars show a great
develop them normally have four per mammal, two in the deal of diversity in size and shape across mammal groups.
upper jaw and two in the lower, separated within each jaw by (Wiki)
its incisors; humans and dogs are examples. In most species,
canines are the anterior-most teeth in the maxillary bone. The
four canines in humans are the two maxillary canines and the
two mandibular canines. (Wiki)
− Determined by the arrangement of the white fibers
radiating from the center of the iris (or pupil)
− Fibers are uniform and reasonably direct or parallel

B. Flower

− The fibers radiating from the center are distorted (in one
or more places) to produce the effect of petals
− May have only one significant petal with the remainder of
the iris looking like a stream
D. IRIS PATTERNS − The fibers form rounded openings in the iris - these vary in
size, density and intensity
A. Stream

C. Jewel
In iris recognition, the identification process is carried out by
gathering one or more detailed images of the eye with a
sophisticated, high-resolution digital camera at visible or
infrared (IR) wavelengths, and then using a specialized
computer program called a matching engine to compare the
subject's iris pattern with images stored in a database. The
matching engine can compare millions of images per second
with a level of precision comparable to conventional
fingerprinting or digital fingerscanning.

E. FACIAL RECOGNITION

Facial Recognition
• History
o First developed in the 1960s, the first semi-
− Can be recognized by the presence of pigmentation or automated system for face recognition required
colored dots on top of the fibers the administrator to (1) locate features [eyes, ears,
− These dots (or jewels) can vary in color from light orange nose, and mouth] on the photographs before it
to black (2) calculated distances and ratios to a common
− They can also vary in size reference point, which were then (3) compared to
− The pigmentation is superimposed above the fibers reference data.
o 1970’s: Goldstein, Harmon, and Lesk used 21
D. Shaker specific subjective markers (hair color, lip
thickness) to automate the recognition.
§ Problem up to this point: measurements and
locations were MANUALLY computed.
o 1988: Kirby and Sirovich applied PRINCIPLE
COMPONENT ANALYSIS.
§ This is a standard linear algebra technique.
§ Showed that less than 100 values were
required to accurately code a suitably aligned
and normalized face image.
o 1991: Turk and Pentland – using the eigenfaces
techniques – discovered that the residual error
could be used to detect faces in images.
§ Enabled real-time automated face recognition
systems.
§ 2001: Applied in Super Bowl – surveillance
images were compared to a database of
− Identified by the presence of both flower-like petals in digital mugshots.
the fiber arrangement and pigmented dots or jewels o PRESENT: used to combat passport fraud,
− The distribution and density of flowers and jewels can vary support law enforcement, identify missing
substantially between the two eyes children, and minimize benefit/identity fraud.
• Predominant Approaches
o Geometric (feature based) – looks at
IRIS PATTERN RECOGNITION distinguishing features
o Photometric (view based) – statistical approach
Iris recognition is a method of identifying people based on that distills an image into values and compares
unique patterns within the ring-shaped region surrounding the
the values with templates to eliminate variances
pupil of the eye. The iris usually has a brown, blue, gray, or
• Popular Algorithms
greenish color, with complex patterns that are visible upon
o Principal Components Analysis (use of
close inspection. Because it makes use of a biological
eigenfaces)
characteristic, iris recognition is considered a form of biometric
verification.
§ Statistical approach for classifying
samples of unknown classes based on
training samples with known classes.
• Aims to maximize between-class
(i.e. across users) variance and
minimize within-class (i.e. within
user) variance.
§ See figure 2: where each block represents a
class – there are large variances BETWEEN
classes, but little variance WITHIN classes.
§ Limitation: when dealing with high
dimensional face data, LDA faces the small
sample size problem that arises where there
are a small number of available training
samples compared to the dimensionality of
§ Probe and gallery images must be the SAME the sample space.
SIZE and must first be NORMALIZED to line o Elastic Bunch Graph Matching
up the eyes and mouth of the subjects within
the images.
§ PCA approach is then used to reduce the
dimension of the data by means of data
compression basics and reveals the most
effective low dimensional structure of facial
patterns.
• This reduction in dimension REMOVES
INFORMATION THAT IS NOT USEFUL § Relies on the concept that real face images
and precisely decomposes the face have many non-linear characteristics that are
structures into orthogonal components NOT addressed by the linear analysis
known as EIGENFACES. methods – such as variations in illumination,
• Each face image may be represented as a pose, and expression.
weighted sum of the eigenfaces, which are § A Gabor wavelet transform creates a
stored in a 1D array. dynamic link architecture that projects
§ Probe image is compared against a the face onto an elastic grid.
gallery image by measuring the • The Gabor jet is anode on the elastic grid,
distance between their respective notated by circles on the image, which
feature vectors. describes the image behavior around a
§ Limitation: typically requires the full frontal given pixel.
face to be presented each time – else, image o It is a result of a convolution of the
results in poor performance. image with a Gabor filter – which is
§ Advantage: can reduce the data needed to used to DETECT SHAPES and to
identify the individual to 1/1000th of the date EXTRACT FEATURES using image
presented. processing.
o Linear Discriminant Analysis • Recognition is based on the
similarity of the Gabor filter
response at each Gabor note.
§ Limitation: the difficulty with LDA is the
requirement of accurate landmark
localizations – which can sometimes be
achieved by combining PCA and LDA
methods.
• Where applied?
o Facebook (Do you wish to tag <friend>)
II. BEHAVIOMETRICS 1. Types of forgery1
a. Tracing and printing - A traced forgery is created by
A. HANDWRITING tracing over a genuine signature. A forgery of this type can be
tied to the original, or master, signatures if that original
1. Graphonomics/handwriting movement analysis signature can be located.
b. Simulated - A simulated forgery is produced by the writer
Graphonomics is the interdisciplinary field directed towards who learns to mimic a genuine signature. It may or may not be
the scientific analysis of the handwriting process, product, and possible to identify the forger, depending on the extent to
other graphic skills. Researchers in handwriting recognition, which the suspect’s normal handwriting characteristics.
forensic handwriting examination, kinesiology, psychology, c. Blind - A freehand forgery represents the suspect’s normal
computer science, artificial intelligence, paleography and handwriting, with no attempt to mimic the style of the genuine
neuroscience cooperate in order to achieve a better signature.
understanding of the human skill of handwriting. Research in
graphonomics generally involves handwriting movement 2. Basis for determining authenticity (form, line quality,
analysis in one form or another. formatting & content)
When a sufficient amount of writing from two different people
Handwriting movement analysis is the study and analysis of the is closely examined, there are always identifiable differences.
movements involved in handwriting and drawing. It forms an Comparisons of writing samples take into consideration a wide
important part of graphonomics, which became established variety of handwriting characteristics including word and letter
after the "International Workshop on Handwriting Movement spacing, slant or slope, speed, pen position, use of
Analysis" in 1982 in Nijmegen, The Netherlands capitalization, embellishments, legibility, use of punctuation,
and proportion of letters and other attributes.
2. Holographs/autographs The fluency or smooth flow of the writing line can also indicate
the authenticity of the writing. The lack of smooth line
A holograph is a document written entirely in the handwriting quality with tremor, pen stops and hesitations may indicate
of the person whose signature it bears. forgery.

An autograph (from the Greek: αὐτός, autós, "self" and γράφω, 3. Indicators of forgery2 (slowness of execution, touching up
gráphō, "write") is a document transcribed entirely in the change of hold (pressure), wavering (tremor), uncertain
handwriting of its author, as opposed to a typeset document interrupted strokes, marked variation of angles)
or one written by an amanuensis or a copyist; the meaning General indications of non-genuineness may include the
overlaps with that of the word holograph. following:
a. Blunt starts and stops - The forger places the pen
3. Handwriting automations point in contact with the paper, and then starts
writing. When he is finished with the name or some
During the last few years the pattern analysis and machine
portion thereof, he stops the pen and lifts it from the
intelligence community has developed automation tools for
surface. This may cause an emphasized blunt start or
forensic document examination (FDE), in particular for
determining whether a given handwriting specimen can be ending where the pen was placed in contact with the
attributed to known writing. As with other expert systems, such surface. At times this contact is held so long that if
as for medical diagnosis, current automation tools are useful the pen contains a fluid ink it will wet the paper and
only as part of a larger manually-intensive procedure. Defining migrate outward from the contact point.
a computational approach for the overall problem not only
places these tools in context but also helps validate and There may be unnecessary and extraneous marks
improve existing manual procedures. We consider the caused by pen starts and stops. The writer may
standard work flow in FDE of handwritten items and annotate decide after putting his pen in contact with the paper,
the steps where automation is available or possible. A well- that it is in the wrong spot, picks it up and moves it to
known ransom note case is considered as an example, where a position considered more correct. Normally a
there are multiple questioned documents, testing for multiple signature’s starts and stops are much more dynamic.
writers of the same document, determining whether the writing The pen is moving horizontally before it contacts the
is disguised, known writing is formal while questioned writing is paper and is lifted at the end while still in flight. This
informal, etc. The findings for the particular ransom note case leaves a tapered appearance at the beginnings and
using the tools are given. Observations are made for
developing a more fully automated approach to FDE.                                                                                                                
1

http://highered.mheducation.com/sites/0072564938/student_view0/chapter3/cha
pter_outline.html
B. FORGERY
2
http://www.questioneddocuments.com/services-offered-by-ndl/signatures-
forgery/
endings of names or letters. There are, of course, mere presence of these indicators does not mean that the
exceptions to this. signature under scrutiny is non-genuine, but should contribute
b. Pen lifts and hesitation - This is occasioned when to the overall determination as to genuineness. Alternately, the
the pen stops at an unusual point in the writing; signature devoid of these indications may not be assumed to
perhaps where a radical change in direction is about be genuine. The signature of an elderly individual may, for
instance, be expected to contain tremor and hesitation. If,
to take place or a new letter formation is about to be
however, the questioned signature appears to be written in a
started. This may take on the appearance of a small
fluid manner and/or on a higher skill level than what is
gap in the written line where one is not expected, or expected, the red warning flag should be waving. This
an overlapping of two ink lines where there should be occurrence may itself be indicative of non-genuineness. Often,
only one continuous line. a forger, because of an inherent high skill level in his writing,
c. Tremor - Because the creation of most forms of non- may produce a product that contains fewer indications of
genuine signatures are little more than drawings, the forgery than a counterpart with a lower skill-level.

pen is moving so slowly that small, sometimes


4. Points of Comparison (uniformity, irregularities, size &
microscopic changes in direction take place in what
proportion, connecting letters, continuity, alignment (line
should be a fluid-looking line. The resultant line is not habits), spacing, degree of slant, weight of strokes (pen
smooth, but reflects the “shaking” pen. pressure) t-bars and i-dots, loops, circle formation, the needle,
d. Speed and pressure - Because the pen is moving the wedge, the round, the flat, the initial and final strokes)
slowly rather than with the dynamic movement
a. Line Quality - Do the letters flow or are they erratic and
associated with most genuine writings, the ink line
shaky?
remains constant in thickness, resulting from the same
b. Spacing - Are the letters equally spaced or crowded?
constant pressure exerted on a slowly moving pen. c. Size consistency - Is the ratio of height to width
There will be little, if any, tapering of internal lines. consistent?
e. Patching - Infrequently, but at one time or another, d. Continuous - Is the writing continuous or does the writer
most of us have made an error while writing our own lift the pen
signature. Some individuals may leave the signature e. Connecting Letters - Are capitals and lowercase letters
connected and continuous?
alone, caring little about the mistake or imperfection,
f. Letters Complete - Are letters completely formed? Or,
while others will simply “fix” the signature by
is a part of the letter missing?
correcting the offending portion. This may be done g. Cursive and printed letters - Are there printed letters,
in order to make the signature more readable, or cursive letters, or both?
because a defect in the pen or paper has affected h. Pen Pressure - Is pressure equal when applied to
what we perceive to be our “normal” signature, or for upward and downward strokes?
some other reason that may even be subconscious. i. Slant - Left, right, or variable?
j. Line Habits - Is the text on the line, above the line, or
These “fixes” are usually patent, with no attempt
below the line?
made on the part of the writer to mask or otherwise
k. Fancy curls or loops - Are there fancy curls?
hide the correction. l. Placement of crosses on t’s and dots on i’s -
Correct or misplaced? Are t’s crossed, crossed in the
These signature corrections are quite different than middle, toward top, or toward the bottom? Are the i’s
the patching that is frequently found in non-genuine dotted, dotted toward the right, left, or centered?
signatures. On these occasions, the writer is not
attempting to make the signature more readable, but 5. Forgery Detection Tools (magnifying glasses, microscopes,
to make its appearance passable. He is fixing an electron microscopy, digital imaging, 3-D imaging softwares,
obvious defect that he perceives as detectable, and infrared, ultraviolet, visible filter, infrared luminescence and
might uncover his fraudulent product and foil his ultraviolet fluorescence, side or oblique lighting or electrostatic
scheme. These usually take the form of a correction to detection apparatus (EDSA))
a flaw in the writing line rather than in the form of a
letter. Extensions to entry or terminal strokes, or to a. Infrared Viewing - can detect chemical erasures and
lower descending portions of letters, along with changes in the writing instrument
corrections to embellishments, are typical of non- b. Visible Filter- detects ink or other absorptions or
genuine patching. reflections
c. Infrared luminescence and ultraviolet
NOTE: There are times when some of these same forgery fluorescence viewing - electromagnetic techniques
indicators will be displayed in genuine signatures. Aged or that detect non-visible reflections and absorptions  
infirmed writers will frequently display similar patterns. The
d. Electron Microscopy - stereo-binocular microscopes
capable of enlarging images up to 120X, which is useful in
the detection of traced and simulated forgeries and the
detection of slight differences in the color of inks
e. Electrostatic detection apparatus (EDSA) – is a
specialized piece of equipment commonly used in
questioned document examination to reveal indentations
or impressions in paper which may otherwise go
unnoticed. It is a non-destructive technique (will not
damage the evidence in question) thus allowing further
tests to be carried out. It is a sensitive technique capable
of detecting indentations on pages several layers below
the top sheet, and many years after the indentations were
created. Documents that may contain indented
impressions not visible to the naked eye can be visualized
through the use of an Electrostatic Detection Device
(EDD) such as the Electrostatic Detection Apparatus
(ESDA). An EDD uses applied charges and toner to
Larynx
visualize areas of indented writing, making them visible to
Highly specialized structure atop the windpipe responsible for
the eye. The ESDA uses the principle that indented areas
sound production, air passage during breathing and
of the document carry less negative charge than
protecting the airway during swallowing
surrounding areas. This causes the toner used in the EDD
to be attracted to these areas, revealing indentations that
Vocal Folds (also called Vocal Cords)
are present.
“Fold-like” soft tissue that is the main vibratory component of
the voice box; comprised of a cover (epithelium and superficial
6. Research Advances in Forgery Detection (wavelets &
lamina propria), vocal ligament (intermediate and deep
statistics, fractal number, 3D Microprofilometry)
laminae propria), and body (thyroarytenoid muscle)

a. Wavelets & Statistics – first used in detection of forged


Glottis (also called Rima Glottides)
art pieces, this technique describes how line quality,
Opening between the two vocal folds; the glottis opens during
arrangement, and form can be aggregated into a set of
breathing and closes during swallowing and sound production
numbers by first applying a wavelet transform to create
wavelet coefficients, then creating what is called a linear
Three parts of speech
predictor for the wavelet coefficients, and final applying
descriptive statistics
Taking responsibility for your vocal health starts with
b. Fractal Number – this technique presumes that
understanding how the system works. To do that, you must
forgeries are wrinklier (less smooth) than genuine
appreciate the three production steps: respiration, phonation
handwriting because forgeries are usually written more
and articulation.
slowly than authentic handwriting. Given this, it uses
statistics to use such date to detect forgeries.
Simply, respiration is air. You need it to produce the pressure
c. 3D Microprofilometry- creates 3D holograms of the
and vibration necessary for sound. Phonation means making
path of a piece of writing, generating an image on a
sounds. As air passes through your larynx (voice box), tissues
computer that looks like a ditch or furrow. This makes it
vibrate to produce sound waves. Articulation is the shaping of
easy to analyze variations or "bumps" generated by the
raw sound into recognizable speech. Quite cleverly, you move
writer's pressure on the paper at cross over points, for
the tongue, palate and other structures in just the right way at
example the mid-point of the figure eight.
just the time time to form words. For simplicity, we will leave
out the mastermind of this whole system: the brain. As you
C. VOICE
explore speech production, though, you will undoubtedly
appreciate how masterfully many tasks are be coordinated --
1. Anatomical basis of voice production (larynx, vocal chords,
within fractions of seconds.
respiratory system, brain areas for speech production)

Respiration: air fuels the system: Respiration is the body's cyclic


intake and exhalation of air. When you prepare to breathe, the
diaphragm (the large, flat muscle located below the lungs)
drops. This causes the volume within the lungs to expand, and
air swoops in the nose or mouth, down through the larynx, and
into the trachea, bronchi and, finally, lungs.
Is there is a right or wrong way to breathe? For professional For a long time, it was assumed that the role of Broca's area
voice users (such as teachers), a beneficial tip is to keep the was more devoted to language production than language
abdominal muscles supple and relaxed. This allows the lungs comprehension. However, recent evidence demonstrates that
to inflate fully for ample air to support your speech. Broca's area also plays a significant role in language
comprehension. Patients with lesions in Broca's area who
Phonation: larynx sound makers: Most of the time, air swishes exhibit agrammatical speech production also show inability to
by the vocal folds, which remain open (abducted, or apart). To use syntactic information to determine the meaning of
make voice, however, the vocal folds are brought together. sentences. Also, a number of neuroimaging studies have
When we do speak, it is always on the exhalation of air. As air implicated an involvement of Broca's area, particularly of the
whooshes by them, vocal folds ripple, snap and hum, not pars opercularis of the left inferior frontal gyrus, during the
unlike flags blowing in the wind. The faster your vocal folds processing of complex sentences. Further, it has recently been
vibrate, the higher the pitch of your voice. That is not due to found in functional magnetic resonance imaging (fMRI)
the speed of the respiration, but rather to the voluntary experiments involving highly ambiguous sentences result in a
shaping of your vocal folds. more activated inferior frontal gyrus. Therefore, the activity
level in the inferior frontal gyrus and the level of lexical
Long, thin folds ripple quickly (high pitch). Shorter, bulkier ambiguity are directly proportional to each other, because of
vocal folds, then, produce lower pitches. Air pressure is also the increased retrieval demands associated with highly
related to voice loudness. To produce a loud voice, your vocal ambiguous content.
folds must be closed tightly together. That requires more air
pressure from the lungs. Speaking without Broca's area
Damage to Broca's area is commonly associated with
Speech does not emerge until these waves are shaped into telegraphic like speech made up of functional vocabulary. For
specific sounds through the magic of articulation. If you could example, a person with Broca's aphasia may say something
hear voice at the level of the vocal folds (before the articulators like, "Drive, store. Mom." meaning to say, "My mom drove me
shape the raw sound into speech), the sound would be a to the store today". Therefore, the content of the information
buzzing noise. is correct, but the grammar and fluidity of the sentence is
missing.
Articulation: we have speech! In all, 19 points between the
vocal folds and the lips allow us to produce speech. Some are: The essential role of the Broca's area in speech production has
the lips, teeth, palates, tongue, vocal folds, nasal cavity, uvula been questioned since it can be destroyed while leaving
and jaw. Each part plays a special part in creating specific language nearly intact. In one case of a computer engineer, a
sounds. slow-growing glioma tumor was removed. The tumor and the
For example, we begin with a forceful puff of air and use the surgery destroyed the left inferior and middle frontal gyrus, the
upper and lower lips to make the sounds [p], [b] and [m]. Upper head of the caudate nucleus, the anterior limb of the internal
teeth and lower lip produce [f] and [v]. The backs of our capsule, and the anterior insula. However, there were minimal
tongues and the soft palates work together to produce [k] and language problems three months after removal and the
[g]. For some sounds [h], all we do is open everything up and individual returned to his professional work. These minor
allow the sound to travel out the mouth. problems include the inability to create syntactically complex
sentences including more than two subjects, multiple causal
Broca’s Area conjunctions, orreported speech. These were explained by
researchers as due to working memory problems. They also
attributed his lack of problems to extensive compensatory
mechanisms enabled by neural plasticity in the nearby cerebral
cortex and a shift of some functions to the homologous area in
the right hemisphere.

Language comprehension
2. Speech Recognition is called verification or authentication. On the other hand,
Speech recognition (SR) is the inter-disciplinary sub-field of identification is the task of determining an unknown speaker's
computational linguistics which incorporates knowledge and identity. In a sense speaker verification is a 1:1 match where
research in the linguistics, computer science, and electrical one speaker's voice is matched to one template (also called a
engineering fields to develop methodologies and "voice print" or "voice model") whereas speaker identification
technologies that enables the recognition and translation of is a 1:N match where the voice is compared against N
spoken language into text by computers and computerized templates.
devices such as those categorized as Smart Technologies and
robotics. It is also known as "automatic speech recognition" From a security perspective, identification is different from
(ASR), "computer speech recognition", or just "speech to text" verification. For example, presenting your passport at border
(STT). control is a verification process: the agent compares your face
to the picture in the document. Conversely, a police officer
Some SR systems use "training" (also called "enrollment") comparing a sketch of an assailant against a database of
where an individual speaker reads text or isolated vocabulary previously documented criminals to find the closest match(es)
into the system. The system analyzes the person's specific is an identification process.
voice and uses it to fine-tune the recognition of that person's
speech, resulting in increased accuracy. Systems that do not Speaker verification is usually employed as a "gatekeeper" in
use training are called "speaker independent" systems. order to provide access to a secure system (e.g. telephone
Systems that use training are called "speaker dependent". banking). These systems operate with the users' knowledge
and typically require their cooperation. Speaker identification
Speech recognition applications include voice user interfaces systems can also be implemented covertly without the user's
such as voice dialing (e.g. "Call home"), call routing (e.g. "I knowledge to identify talkers in a discussion, alert automated
would like to make a collect call"), domotic appliance control, systems of speaker changes, check if a user is already enrolled
search (e.g. find a podcast where particular words were in a system, etc.
spoken), simple data entry (e.g., entering a credit card
number), preparation of structured documents (e.g. a In forensic applications, it is common to first perform a speaker
radiology report), speech-to-text processing (e.g., word identification process to create a list of "best matches" and
processors or emails), and aircraft (usually termed Direct Voice then perform a series of verification processes to determine a
Input). conclusive match
The term voice recognition or speaker identification refers to
identifying the speaker, rather than what they are saying. Speaker diarisation (or diarization) is the process of partitioning
Recognizing the speaker can simplify the task of translating an input audio stream into homogeneous segments according
speech in systems that have been trained on a specific to the speaker identity. It can enhance the readability of an
person's voice or it can be used to authenticate or verify the automatic speech transcription by structuring the audio stream
identity of a speaker as part of a security process. into speaker turns and, when used together with speaker
recognition systems, by providing the speaker’s true identity. It
3. Speaker recognition (speaker identification; speaker is used to answer the question "who spoke when?" Speaker
verification; diarization) diarisation is a combination of speaker segmentation and
speaker clustering. The first aims at finding speaker change
Speaker recognition is the identification of a person from points in an audio stream. The second aims at grouping
characteristics of voices (voice biometrics). It is also called together speech segments on the basis of speaker
voice recognition.There is a difference between speaker characteristics.
recognition (recognizing who is speaking) and speech
recognition (recognizing what is being said). These two terms With the increasing number of broadcasts, meeting recordings
are frequently confused, and "voice recognition" can be used and voice mail collected every year, speaker diarisation has
for both. In addition, there is a difference between the act of received much attention by the speech community, as is
authentication (commonly referred to as speaker verification or manifested by the specific evaluations devoted to it under the
speaker authentication) and identification. Finally, there is a auspices of the National Institute of Standards and Technology
difference between speaker recognition (recognizing who is for telephone speech, broadcast news and meetings
speaking) and speaker diarisation (recognizing when the same
speaker is speaking). Recognizing the speaker can simplify the
task of translating speech in systems that have been trained on
specific person's voices or it can be used to authenticate or
verify the identity of a speaker as part of a security process.  
There are two major applications of speaker recognition
technologies and methodologies. If the speaker claims to be of
a certain identity and the voice is used to verify this claim, this

Você também pode gostar