Facial composite

Last updated
Composite sketch of D. B. Cooper, who hijacked an airplane in 1971 CompositeB-FBI-1973.jpg
Composite sketch of D. B. Cooper, who hijacked an airplane in 1971

A facial composite is a graphical representation of one or more eyewitnesses' memories of a face, as recorded by a composite artist. Facial composites are used mainly by police in their investigation of (usually serious) crimes. These images are used to reconstruct the suspect's face in hope of identifying them. Facial reconstruction can also be used in archeological studies to get a visualization of ancient mummies or human remains. [1]

Contents

Methods

Hand-drawing

Construction of the composite was originally only performed by a trained artist, through drawing, sketching, or painting, in consultation with a witness or crime victim. The FBI claims that hand-drawing is its preferred method for constructing a facial composite.[ citation needed ]

Feature-based selection

Feature-based systems essentially rely on the selection of individual features in isolation. Individual facial features (eyes, nose, mouth, eyebrows, etc.) are selected one at a time from a large database and then electronically 'overlaid' to make the composite image. This allows images to be created when suitable artistic talent is not available.

Such systems were originally mechanical, using drawings or photographs printed on transparent acetate sheets that could be superimposed on one another to produce the composite image. The first such system was the drawing-based "Identikit" which was introduced in the U.S. in 1959. [2] A photograph-based system, "Photofit", was introduced in the UK in 1970. [2] Modern systems are software-based; common systems include SketchCop FACETTE Face Design System Software, Identi-Kit 2000, FACES, E-FIT and PortraitPad.

Evolutionary systems

Evolutionary systems may be broadly described as holistic or global in that they primarily attempt to create a likeness to the suspect through an evolutionary mechanism in which a witness's response to groups of complete faces (not just features) converges towards an increasingly accurate image. Introduced in the 2000s, such systems are finding increasing use by police forces. [3] [4] [5]

Several of these systems originate in academia: EFIT-V (University of Kent), [6] EvoFIT [7] (University of Stirling, University of Central Lancashire, and University of Winchester), [8] and ID (University of Cape Town).

A 2012 police field trial indicated that an EvoFIT directly led to the arrest of a suspect and then a conviction in 29% of cases. [9]

Usage

Facial composite of Aafia Siddiqui, created by the FBI for a wanted poster Aafia Siddiqui 2.png
Facial composite of Aafia Siddiqui, created by the FBI for a wanted poster

While the classic use of the facial composite is the citizen recognizing the face as an acquaintance, there are other ways where a facial composite can prove useful. The facial composite can contribute in law enforcement in a number of ways:

  1. Identifying the suspect in a wanted poster.
  2. Additional evidence against a suspect.[ citation needed ]
  3. Assisting investigation in checking leads.
  4. Warning vulnerable population against serial offenders.

Facial composites of various types have been used extensively in those television programs which aim to reconstruct major unsolved crimes with a view to gaining information from the members of the public, such as America's Most Wanted in the US and Crimewatch in the UK.

Notable cases

These notable cases had facial composites assist in identifying the perpetrator:

See also

Related Research Articles

Steganography is the practice of representing information within another message or physical object, in such a manner that the presence of the concealed information would not be evident to an unsuspecting person's examination. In computing/electronic contexts, a computer file, message, image, or video is concealed within another file, message, image, or video. The word steganography comes from Greek steganographia, which combines the words steganós, meaning "covered or concealed", and -graphia meaning "writing".

A disk image is a snapshot of a storage device's structure and data typically stored in one or more computer files on another storage device.

In the context of information security, and especially network security, a spoofing attack is a situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage.

Electronic Facial Identification Technique is a computer-based method of producing facial composites of wanted criminals, based on eyewitness descriptions.

<span class="mw-page-title-main">Facial recognition system</span> Technology capable of matching a face from an image against a database of faces

A facial recognition system is a technology potentially capable of matching a human face from a digital image or a video frame against a database of faces. Such a system is typically employed to authenticate users through ID verification services, and works by pinpointing and measuring facial features from a given image.

<span class="mw-page-title-main">Computer forensics</span> Branch of digital forensic science

Computer forensics is a branch of digital forensic science pertaining to evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing, and presenting facts and opinions about the digital information.

Interactive evolutionary computation (IEC) or aesthetic selection is a general term for methods of evolutionary computation that use human evaluation. Usually human evaluation is necessary when the form of fitness function is not known or the result of optimization should fit a particular user preference.

Software visualization or software visualisation refers to the visualization of information of and related to software systems—either the architecture of its source code or metrics of their runtime behavior—and their development process by means of static, interactive or animated 2-D or 3-D visual representations of their structure, execution, behavior, and evolution.

<span class="mw-page-title-main">Digital forensics</span> Branch of forensic science

Digital forensics is a branch of forensic science encompassing the recovery, investigation, examination, and analysis of material found in digital devices, often in relation to mobile devices and computer crime. The term "digital forensics" was originally used as a synonym for computer forensics but has expanded to cover investigation of all devices capable of storing digital data. With roots in the personal computing revolution of the late 1970s and early 1980s, the discipline evolved in a haphazard manner during the 1990s, and it was not until the early 21st century that national policies emerged.

<span class="mw-page-title-main">Forensic facial reconstruction</span> Recreating faces from skeletal remains

Forensic facial reconstruction is the process of recreating the face of an individual from their skeletal remains through an amalgamation of artistry, anthropology, osteology, and anatomy. It is easily the most subjective—as well as one of the most controversial—techniques in the field of forensic anthropology. Despite this controversy, facial reconstruction has proved successful frequently enough that research and methodological developments continue to be advanced.

<span class="mw-page-title-main">Forensic photography</span> Art of producing an accurate reproduction of a crime scene

Forensic photography may refer to the visual documentation of different aspects that can be found at a crime scene. It may include the documentation of the crime scene, or physical evidence that is either found at a crime scene or already processed in a laboratory. Forensic photography differs from other variations of photography because crime scene photographers usually have a very specific purpose for capturing each image. As a result, the quality of forensic documentation may determine the result of an investigation; in the absence of good documentation, investigators may find it impossible to conclude what did or did not happen.

The following outline is provided as an overview of and topical guide to forensic science:

<span class="mw-page-title-main">Forensic arts</span> Art used in law enforcement or legal proceedings

Forensic art is any art used in law enforcement or legal proceedings. Forensic art is used to assist law enforcement with the visual aspects of a case, often using witness descriptions and video footage.

<span class="mw-page-title-main">Computational criminology</span> Use of computer science methods to formally define concepts in criminology

Computational criminology is an interdisciplinary field which uses computing science methods to formally define criminology concepts, improve our understanding of complex phenomena, and generate solutions for related problems.

<span class="mw-page-title-main">Forensic profiling</span> Study of trace evidence in criminal investigations

Forensic profiling is the study of trace evidence in order to develop information which can be used by police authorities. This information can be used to identify suspects and convict them in a court of law.

Matti Kalevi Pietikäinen is a Finnish computer scientist. He is currently Professor (emer.) in the Center for Machine Vision and Signal Analysis, University of Oulu. His research interests are in texture-based computer vision, face analysis, affective computing, biometrics, and vision-based perceptual interfaces. He was Director of the Center for Machine Vision Research, and Scientific Director of Infotech Oulu.

<span class="mw-page-title-main">DNA phenotyping</span> DNA profiling technique

DNA phenotyping is the process of predicting an organism's phenotype using only genetic information collected from genotyping or DNA sequencing. This term, also known as molecular photofitting, is primarily used to refer to the prediction of a person's physical appearance and/or biogeographic ancestry for forensic purposes.

DataWorks Plus LLC is a privately held biometrics systems integrator based in Greenville, South Carolina. The company started in 2000 and originally focused on mugshot management, adding facial recognition in 2005. Brad Bylenga is the CEO, and Todd Pastorini is the EVP and GM. Usage of the technology by police departments has resulted in wrongful arrests.

Identity replacement technology is any technology that is used to cover up all or parts of a person's identity, either in real life or virtually. This can include face masks, face authentication technology, and deepfakes on the Internet that spread fake editing of videos and images. Face replacement and identity masking are used by either criminals or law-abiding citizens. Identity replacement tech, when operated on by criminals, leads to heists or robbery activities. Law-abiding citizens utilize identity replacement technology to prevent government or various entities from tracking private information such as locations, social connections, and daily behaviors.

<span class="mw-page-title-main">IoT forensics</span> Branch of digital forensics

IoT Forensics or IoT Forensic Science, a branch of digital forensics, that deals with the use of any digital forensics processes and procedures relating to the recovery of digital evidence which originates from one or more IoT devices for the purpose of preservation, identification, extraction or documentation of digital evidence with the intention of reconstructing IoT-related events. These events may reside across one or more configurable computing resources that are within close proximity to the location where the event has taken place.

References

  1. Wilkinson, Caroline (February 2010). "Facial reconstruction – anatomical art or artistic anatomy?". Journal of Anatomy. 216 (2): 235–250. doi:10.1111/j.1469-7580.2009.01182.x. ISSN   0021-8782. PMC   2815945 . PMID   20447245.
  2. 1 2 Davies, Graham M.; Valentine, Tim (2006). "Facial Composites: Forensic Utility and Psychological Research". In Rod C. L. Lindsay; et al. (eds.). Handbook of Eyewitness Psychology. Vol. 2 Memory for People. Mahwah, NJ: Lawrence Erlbaum Associates. Section, "Mechanical Systems". doi:10.4324/9781315805535. ISBN   9780805851526 via Routledge Handbooks Online (2014).
  3. Frowd, C. D.; Hancock, P. J. B.; Bruce, V.; McIntyre, A.; Pitchford, M.; Atkins, R.; et al. (2010). "Giving crime the 'evo': catching criminals using EvoFIT facial composites". In Howells, G.; Sirlantzis, K.; Stoica, A.; Huntsberger, T.; Arslan, A. T. (eds.). 2010 IEEE International Conference on Emerging Security Technologies. pp. 36–43. ISBN   978-0-7695-4175-4.
  4. Gibson, S. J.; Solomon, C. J.; Maylin, M. I. S.; Clark, C. (2009). "New methodology in facial composite construction: from theory to practice". International Journal of Electronic Security and Digital Forensics. 2 (2): 156–168. doi:10.1504/ijesdf.2009.024900.
  5. Solomon, C.; Gibson, S.; Maylin, M. (2009). "A New Computational Methodology for the Construction of Forensic, Facial Composites". Computational Forensics. Springer-Verlag LNCS. pp. 67–77. ISBN   9783540853022.
  6. Craig Aaen Stockdale (June 1, 2008). "A (r)evolution in Crime-fighting". Forensic Magazine.
  7. "EvoFIT - Evolving Facial Composite Imaging". evofit.co.uk.
  8. Frowd, C. D.; Skelton, F.; Hepton, G.; Holden, L.; Minahil, S.; Pitchford, M.; McIntyre, A.; Hancock, P. J. B. (2013). "Whole-face procedures for recovering facial images from memory" (PDF). Science & Justice. 53 (2): 89–97. doi:10.1016/j.scijus.2012.12.004. PMID   23601715.
  9. Frowd, C. D.; Pitchford, M.; Skelton, F.; Petkovic, A.; Prosser, C.; Coates, B. (2012). "Catching Even More Offenders with EvoFIT Facial Composites". In Stoica, A.; Zarzhitsky, D.; Howells, G.; Frowd, C.; McDonald-Maier, K.; Erdogan, A.; Arslan, T. (eds.). IEEE Proceedings of 2012 Third International Conference on Emerging Security Technologies. pp. 20–26. doi:10.1109/EST.2012.26. ISBN   978-0-7695-4791-6. S2CID   4503932.
  10. Scroggins, Deborah (March 1, 2005). "The Most Wanted Woman in the World" . Vogue via Access My Library.
  11. Han, Hu; Jain, Anil K.; Klare, Brendan F.; Klum, Scott J. (2014). "The FaceSketchID System: Matching Facial Composites to Mugshots" (PDF). IEEE Transactions on Information Forensics and Security . 9 (12): 2248–2263. doi:10.1109/TIFS.2014.2360825. S2CID   14013839 . Retrieved 2023-01-13.