A facial composite is a graphical representation of one or more eyewitnesses' memories of a face, as recorded by a composite artist. Facial composites are used mainly by police in their investigation of (usually serious) crimes. These images are used to reconstruct the suspect's face in hope of identifying them. Facial reconstruction can also be used in archeological studies to get a visualization of ancient mummies or human remains. [1]
Construction of the composite was originally only performed by a trained artist, through drawing, sketching, or painting, in consultation with a witness or crime victim. The FBI claims that hand-drawing is its preferred method for constructing a facial composite.[ citation needed ]
Feature-based systems essentially rely on the selection of individual features in isolation. Individual facial features (eyes, nose, mouth, eyebrows, etc.) are selected one at a time from a large database and then electronically 'overlaid' to make the composite image. This allows images to be created when suitable artistic talent is not available.
Such systems were originally mechanical, using drawings or photographs printed on transparent acetate sheets that could be superimposed on one another to produce the composite image. The first such system was the drawing-based "Identikit" which was introduced in the U.S. in 1959. [2] A photograph-based system, "Photofit", was introduced in the UK in 1970. [2] Modern systems are software-based; common systems include SketchCop FACETTE Face Design System Software, Identi-Kit 2000, FACES, E-FIT and PortraitPad.
Evolutionary systems may be broadly described as holistic or global in that they primarily attempt to create a likeness to the suspect through an evolutionary mechanism in which a witness's response to groups of complete faces (not just features) converges towards an increasingly accurate image. Introduced in the 2000s, such systems are finding increasing use by police forces. [3] [4] [5]
Several of these systems originate in academia: EFIT-V (University of Kent), [6] EvoFIT [7] (University of Stirling, University of Central Lancashire, and University of Winchester), [8] and ID (University of Cape Town).
A 2012 police field trial indicated that an EvoFIT directly led to the arrest of a suspect and then a conviction in 29% of cases. [9]
While the classic use of the facial composite is the citizen recognizing the face as an acquaintance, there are other ways where a facial composite can prove useful. The facial composite can contribute in law enforcement in a number of ways:
Facial composites of various types have been used extensively in those television programs which aim to reconstruct major unsolved crimes with a view to gaining information from the members of the public, such as America's Most Wanted in the US and Crimewatch in the UK.
This section needs additional citations for verification .(April 2021) |
These notable cases had facial composites assist in identifying the perpetrator:
Steganography is the practice of representing information within another message or physical object, in such a manner that the presence of the concealed information would not be evident to an unsuspecting person's examination. In computing/electronic contexts, a computer file, message, image, or video is concealed within another file, message, image, or video. The word steganography comes from Greek steganographia, which combines the words steganós, meaning "covered or concealed", and -graphia meaning "writing".
A disk image is a snapshot of a storage device's structure and data typically stored in one or more computer files on another storage device.
In the context of information security, and especially network security, a spoofing attack is a situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage.
Electronic Facial Identification Technique is a computer-based method of producing facial composites of wanted criminals, based on eyewitness descriptions.
A facial recognition system is a technology potentially capable of matching a human face from a digital image or a video frame against a database of faces. Such a system is typically employed to authenticate users through ID verification services, and works by pinpointing and measuring facial features from a given image.
Computer forensics is a branch of digital forensic science pertaining to evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing, and presenting facts and opinions about the digital information.
Interactive evolutionary computation (IEC) or aesthetic selection is a general term for methods of evolutionary computation that use human evaluation. Usually human evaluation is necessary when the form of fitness function is not known or the result of optimization should fit a particular user preference.
Software visualization or software visualisation refers to the visualization of information of and related to software systems—either the architecture of its source code or metrics of their runtime behavior—and their development process by means of static, interactive or animated 2-D or 3-D visual representations of their structure, execution, behavior, and evolution.
Digital forensics is a branch of forensic science encompassing the recovery, investigation, examination, and analysis of material found in digital devices, often in relation to mobile devices and computer crime. The term "digital forensics" was originally used as a synonym for computer forensics but has expanded to cover investigation of all devices capable of storing digital data. With roots in the personal computing revolution of the late 1970s and early 1980s, the discipline evolved in a haphazard manner during the 1990s, and it was not until the early 21st century that national policies emerged.
Forensic facial reconstruction is the process of recreating the face of an individual from their skeletal remains through an amalgamation of artistry, anthropology, osteology, and anatomy. It is easily the most subjective—as well as one of the most controversial—techniques in the field of forensic anthropology. Despite this controversy, facial reconstruction has proved successful frequently enough that research and methodological developments continue to be advanced.
Forensic photography may refer to the visual documentation of different aspects that can be found at a crime scene. It may include the documentation of the crime scene, or physical evidence that is either found at a crime scene or already processed in a laboratory. Forensic photography differs from other variations of photography because crime scene photographers usually have a very specific purpose for capturing each image. As a result, the quality of forensic documentation may determine the result of an investigation; in the absence of good documentation, investigators may find it impossible to conclude what did or did not happen.
The following outline is provided as an overview of and topical guide to forensic science:
Forensic art is any art used in law enforcement or legal proceedings. Forensic art is used to assist law enforcement with the visual aspects of a case, often using witness descriptions and video footage.
Computational criminology is an interdisciplinary field which uses computing science methods to formally define criminology concepts, improve our understanding of complex phenomena, and generate solutions for related problems.
Forensic profiling is the study of trace evidence in order to develop information which can be used by police authorities. This information can be used to identify suspects and convict them in a court of law.
Matti Kalevi Pietikäinen is a Finnish computer scientist. He is currently Professor (emer.) in the Center for Machine Vision and Signal Analysis, University of Oulu. His research interests are in texture-based computer vision, face analysis, affective computing, biometrics, and vision-based perceptual interfaces. He was Director of the Center for Machine Vision Research, and Scientific Director of Infotech Oulu.
DNA phenotyping is the process of predicting an organism's phenotype using only genetic information collected from genotyping or DNA sequencing. This term, also known as molecular photofitting, is primarily used to refer to the prediction of a person's physical appearance and/or biogeographic ancestry for forensic purposes.
DataWorks Plus LLC is a privately held biometrics systems integrator based in Greenville, South Carolina. The company started in 2000 and originally focused on mugshot management, adding facial recognition in 2005. Brad Bylenga is the CEO, and Todd Pastorini is the EVP and GM. Usage of the technology by police departments has resulted in wrongful arrests.
Identity replacement technology is any technology that is used to cover up all or parts of a person's identity, either in real life or virtually. This can include face masks, face authentication technology, and deepfakes on the Internet that spread fake editing of videos and images. Face replacement and identity masking are used by either criminals or law-abiding citizens. Identity replacement tech, when operated on by criminals, leads to heists or robbery activities. Law-abiding citizens utilize identity replacement technology to prevent government or various entities from tracking private information such as locations, social connections, and daily behaviors.
IoT Forensics or IoT Forensic Science, a branch of digital forensics, that deals with the use of any digital forensics processes and procedures relating to the recovery of digital evidence which originates from one or more IoT devices for the purpose of preservation, identification, extraction or documentation of digital evidence with the intention of reconstructing IoT-related events. These events may reside across one or more configurable computing resources that are within close proximity to the location where the event has taken place.