Facial composite

Last updated
Composite sketch of D. B. Cooper, who hijacked an airplane in 1971 CompositeB-FBI-1973.jpg
Composite sketch of D. B. Cooper, who hijacked an airplane in 1971

A facial composite is a graphical representation of one or more eyewitnesses' memories of a face, as recorded by a composite artist. Facial composites are used mainly by police in their investigation of (usually serious) crimes. These images are used to reconstruct the suspect's face in hope of identifying them. Facial reconstruction can also be used in archeological studies to get a visualization of ancient mummies or human remains. [1]

Contents

Methods

Hand-drawing

Construction of the composite was originally only performed by a trained artist, through drawing, sketching, or painting, in consultation with a witness or crime victim. The FBI claims that hand-drawing is its preferred method for constructing a facial composite.[ citation needed ]

Feature-based selection

Feature-based systems essentially rely on the selection of individual features in isolation. Individual facial features (eyes, nose, mouth, eyebrows, etc.) are selected one at a time from a large database and then electronically 'overlaid' to make the composite image. This allows images to be created when suitable artistic talent is not available.

Such systems were originally mechanical, using drawings or photographs printed on transparent acetate sheets that could be superimposed on one another to produce the composite image. The first such system was the drawing-based "Identikit" which was introduced in the U.S. in 1959. [2] A photograph-based system, "Photofit", was introduced in the UK in 1970. [2] Modern systems are software-based; common systems include SketchCop FACETTE Face Design System Software, Identi-Kit 2000, FACES, E-FIT and PortraitPad.

Welker Facial Reconstruction Technique

This technique was created in order to determine the depth of human face tissue. [3] Welker was able to measure the depth of human face tissue by inserting surgical blades throughout different areas of the face. [3] He was able to map out the areas of the face that had the most tissue depth. [3] In the 1880s to 1890s a man named Wilheim was able to further advance the Welker Facial Reconstruction Technique. [3] He used thinner needles to achieve a more targeted and precise measurement of depth, rather than using a bulky surgical blade that can distort the surrounding tissue. [3]

Evolutionary systems

Evolutionary systems may be broadly described as holistic or global in that they primarily attempt to create a likeness to the suspect through an evolutionary mechanism in which a witness's response to groups of complete faces (not just features) converges towards an increasingly accurate image. Introduced in the 2000s, such systems are finding increasing use by police forces. [4] [5] [6]

Several of these systems originate in academia: EFIT-V (University of Kent), [7] EvoFIT [8] (University of Stirling, University of Central Lancashire, and University of Winchester), [9] and ID (University of Cape Town).

A 2012 police field trial indicated that an EvoFIT directly led to the arrest of a suspect and then a conviction in 29% of cases. [10]

Usage

Facial composite of Aafia Siddiqui, created by the FBI for a wanted poster Aafia Siddiqui 2.png
Facial composite of Aafia Siddiqui, created by the FBI for a wanted poster

While the classic use of the facial composite is the citizen recognizing the face as an acquaintance, there are other ways where a facial composite can prove useful. The facial composite can contribute in law enforcement in a number of ways:

  1. Identifying the suspect in a wanted poster.
  2. Additional evidence against a suspect.[ citation needed ]
  3. Assisting investigation in checking leads.
  4. Warning vulnerable population against serial offenders.

Facial composites of various types have been used extensively in those television programs which aim to reconstruct major unsolved crimes with a view to gaining information from the members of the public, such as America's Most Wanted in the US and Crimewatch in the UK.

Notable cases

These notable cases had facial composites assist in identifying the perpetrator:

See also

Related Research Articles

Electronic Facial Identification Technique is a computer-based method of producing facial composites of wanted criminals, based on eyewitness descriptions.

<span class="mw-page-title-main">Facial recognition system</span> Technology capable of matching a face from an image against a database of faces

A facial recognition system is a technology potentially capable of matching a human face from a digital image or a video frame against a database of faces. Such a system is typically employed to authenticate users through ID verification services, and works by pinpointing and measuring facial features from a given image.

<span class="mw-page-title-main">Computer forensics</span> Branch of digital forensic science

Computer forensics is a branch of digital forensic science pertaining to evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing, and presenting facts and opinions about the digital information.

Interactive evolutionary computation (IEC) or aesthetic selection is a general term for methods of evolutionary computation that use human evaluation. Usually human evaluation is necessary when the form of fitness function is not known or the result of optimization should fit a particular user preference.

<span class="mw-page-title-main">3D scanning</span> Scanning of an object or environment to collect data on its shape

3D scanning is the process of analyzing a real-world object or environment to collect three dimensional data of its shape and possibly its appearance. The collected data can then be used to construct digital 3D models.

Software visualization or software visualisation refers to the visualization of information of and related to software systems—either the architecture of its source code or metrics of their runtime behavior—and their development process by means of static, interactive or animated 2-D or 3-D visual representations of their structure, execution, behavior, and evolution.

<span class="mw-page-title-main">Forensic facial reconstruction</span> Recreating faces from skeletal remains

Forensic facial reconstruction is the process of recreating the face of an individual from their skeletal remains through an amalgamation of artistry, anthropology, osteology, and anatomy. It is easily the most subjective—as well as one of the most controversial—techniques in the field of forensic anthropology. Despite this controversy, facial reconstruction has proved successful frequently enough that research and methodological developments continue to be advanced.

The following outline is provided as an overview of and topical guide to forensic science:

<span class="mw-page-title-main">Wilhelm His Sr.</span> Swiss anatomist (1831–1904)

Wilhelm His Sr. was a Swiss anatomist and professor who invented the microtome. By treating animal tissue with acids and salts to harden it and then slicing it very thinly with the microtome, scientists were able to further study the organization and function of tissues and cells under a microscope.

<span class="mw-page-title-main">Cephalometry</span> Study and measurement of the head

Cephalometry is the study and measurement of the head, usually the human head, especially by medical imaging such as radiography. Craniometry, the measurement of the cranium (skull), is a large subset of cephalometry. Cephalometry also has a history in phrenology, which is the study of personality and character as well as physiognomy, which is the study of facial features. Cephalometry as applied in a comparative anatomy context informs biological anthropology. In clinical contexts such as dentistry and oral and maxillofacial surgery, cephalometric analysis helps in treatment and research; cephalometric landmarks guide surgeons in planning and operating.

<span class="mw-page-title-main">Myrtis</span> Archaeological remains of a Greek girl

Myrtis is the name given by archaeologists to an 11-year-old girl from ancient Athens, whose remains were discovered in 1994–95 in a mass grave during work to build the metro station at Kerameikos, Greece. The name was chosen from common ancient Greek names. The analysis showed that Myrtis and two other bodies in the mass grave had died of typhoid fever during the Plague of Athens in 430 BC.

<span class="mw-page-title-main">Karen T. Taylor</span> American forensic and portrait artist (born 1952)

Karen T. Taylor is an American forensic and portrait artist who has worked to help resolve criminal cases for a variety of law enforcement agencies throughout the world. Her primary expertise includes composite imagery, child and adult age progression, postmortem drawing and forensic facial reconstruction. In the mid-1980s, Taylor pioneered the method of 2-dimensional facial reconstruction, by drawing facial features over frontal and lateral skull photographs based on anthropological data. Taylor is also well-established as a forensic art educator, fine art portrait sculptor, and specialist in the human face.

<span class="mw-page-title-main">Forensic arts</span> Art used in law enforcement or legal proceedings

Forensic art is any art used in law enforcement or legal proceedings. Forensic art is used to assist law enforcement with the visual aspects of a case, often using witness descriptions and video footage.

<span class="mw-page-title-main">Computational criminology</span> Use of computer science methods to formally define concepts in criminology

Computational criminology is an interdisciplinary field which uses computing science methods to formally define criminology concepts, improve our understanding of complex phenomena, and generate solutions for related problems.

Caroline M. Wilkinson is a British anthropologist and academic, who specialises in forensic facial reconstruction. She has been a professor at the Liverpool John Moores University's School of Art and Design since 2014. She is best known for her work in forensic facial reconstruction and has been a contributor to many television programmes on the subject, as well as the creator of reconstructed heads of kings Richard III of England in 2013 and Robert the Bruce of Scotland in 2016.

<span class="mw-page-title-main">Unidentified decedent</span> Term used to describe a corpse of a person whose identity cannot be established

Unidentified decedent, or unidentified person, is a corpse of a person whose identity cannot be established by police and medical examiners. In many cases, it is several years before the identities of some UIDs are found, while in some cases, they are never identified. A UID may remain unidentified due to lack of evidence as well as absence of personal identification such as a driver's license. Where the remains have deteriorated or been mutilated to the point that the body is not easily recognized, a UID's face may be reconstructed to show what they had looked like before death. UIDs are often referred to by the placeholder names "John Doe" or "Jane Doe". In a database maintained by the Ontario Provincial Police, 371 unidentified decedents were found between 1964 and 2015.

<span class="mw-page-title-main">DNA phenotyping</span> DNA profiling technique

DNA phenotyping is the process of predicting an organism's phenotype using only genetic information collected from genotyping or DNA sequencing. This term, also known as molecular photofitting, is primarily used to refer to the prediction of a person's physical appearance and/or biogeographic ancestry for forensic purposes.

<span class="mw-page-title-main">Betty Pat Gatliff</span> American forensic artist (1930–2020)

Betty Patricia Gatliff was an American pioneer in the field of forensic art and forensic facial reconstruction. Working closely with forensic anthropologist Dr. Clyde Snow, she sculpturally reconstructed faces of individuals including the Pharaoh Tutankhamun, President John F. Kennedy, and the unidentified victims of serial killer John Wayne Gacy.

Identity replacement technology is any technology that is used to cover up all or parts of a person's identity, either in real life or virtually. This can include face masks, face authentication technology, and deepfakes on the Internet that spread fake editing of videos and images. Face replacement and identity masking are used by either criminals or law-abiding citizens. Identity replacement tech, when operated on by criminals, leads to heists or robbery activities. Law-abiding citizens utilize identity replacement technology to prevent government or various entities from tracking private information such as locations, social connections, and daily behaviors.

Mary Huffman Manhein is an American forensic anthropologist. Nicknamed The Bone Lady, she was the founding director of the Forensic Anthropology and Computer Enhancement Services (FACES) laboratory at Louisiana State University (LSU) in 1990, and of the Louisiana Repository for Unidentified and Missing Persons Information Program in 2006. The repository is considered the "most comprehensive statewide database of its kind".

References

  1. Wilkinson, Caroline (February 2010). "Facial reconstruction – anatomical art or artistic anatomy?". Journal of Anatomy. 216 (2): 235–250. doi:10.1111/j.1469-7580.2009.01182.x. ISSN   0021-8782. PMC   2815945 . PMID   20447245.
  2. 1 2 Davies, Graham M.; Valentine, Tim (2006). "Facial Composites: Forensic Utility and Psychological Research". In Rod C. L. Lindsay; et al. (eds.). Handbook of Eyewitness Psychology. Vol. 2 Memory for People. Mahwah, NJ: Lawrence Erlbaum Associates. Section, "Mechanical Systems". doi:10.4324/9781315805535. ISBN   9780805851526 via Routledge Handbooks Online (2014).
  3. 1 2 3 4 5 Gupta, Sonia; Gupta, Vineeta; Vij, Hitesh; Vij, Ruchieka; Tyagi, Nutan (September 2015). "Forensic Facial Reconstruction: The Final Frontier". Journal of Clinical and Diagnostic Research. 9 (9): ZE26–ZE28. doi:10.7860/JCDR/2015/14621.6568. ISSN   2249-782X. PMC   4606364 . PMID   26501035.
  4. Frowd, C. D.; Hancock, P. J. B.; Bruce, V.; McIntyre, A.; Pitchford, M.; Atkins, R.; et al. (2010). "Giving crime the 'evo': catching criminals using EvoFIT facial composites". In Howells, G.; Sirlantzis, K.; Stoica, A.; Huntsberger, T.; Arslan, A. T. (eds.). 2010 IEEE International Conference on Emerging Security Technologies. pp. 36–43. ISBN   978-0-7695-4175-4.
  5. Gibson, S. J.; Solomon, C. J.; Maylin, M. I. S.; Clark, C. (2009). "New methodology in facial composite construction: from theory to practice". International Journal of Electronic Security and Digital Forensics. 2 (2): 156–168. doi:10.1504/ijesdf.2009.024900.
  6. Solomon, C.; Gibson, S.; Maylin, M. (2009). "A New Computational Methodology for the Construction of Forensic, Facial Composites". Computational Forensics. Springer-Verlag LNCS. pp. 67–77. ISBN   9783540853022.
  7. Craig Aaen Stockdale (June 1, 2008). "A (r)evolution in Crime-fighting". Forensic Magazine.
  8. "EvoFIT - Evolving Facial Composite Imaging". evofit.co.uk.
  9. Frowd, C. D.; Skelton, F.; Hepton, G.; Holden, L.; Minahil, S.; Pitchford, M.; McIntyre, A.; Hancock, P. J. B. (2013). "Whole-face procedures for recovering facial images from memory" (PDF). Science & Justice. 53 (2): 89–97. doi:10.1016/j.scijus.2012.12.004. PMID   23601715.
  10. Frowd, C. D.; Pitchford, M.; Skelton, F.; Petkovic, A.; Prosser, C.; Coates, B. (2012). "Catching Even More Offenders with EvoFIT Facial Composites". In Stoica, A.; Zarzhitsky, D.; Howells, G.; Frowd, C.; McDonald-Maier, K.; Erdogan, A.; Arslan, T. (eds.). IEEE Proceedings of 2012 Third International Conference on Emerging Security Technologies. pp. 20–26. doi:10.1109/EST.2012.26. ISBN   978-0-7695-4791-6. S2CID   4503932.
  11. Scroggins, Deborah (March 1, 2005). "The Most Wanted Woman in the World" . Vogue via Access My Library.
  12. Han, Hu; Jain, Anil K.; Klare, Brendan F.; Klum, Scott J. (2014). "The FaceSketchID System: Matching Facial Composites to Mugshots" (PDF). IEEE Transactions on Information Forensics and Security . 9 (12): 2248–2263. doi:10.1109/TIFS.2014.2360825. S2CID   14013839 . Retrieved 2023-01-13.