Académique Documents
Professionnel Documents
Culture Documents
Abstract. The contemporary reality poses serious challenges toforensics. Despite the development oftactics and techniques inthat
field, weare often helplessly confronted with the problem ofidentifying aliving person authoritatively with whom there isnocontact
and who has undergone changes tosuch anextent that itisimpossible toidentify the person oranunknown body, the remains
ofthe latter having changed after death orhaving been degenerated otherwise asaresult ofthe incident. Throughout the past centuries
the human biometric features have been used for diverse purposes, and they are now used successfully i.a.inthe forensic identification
ofindividuals. Such anecessity emerged atthe moment ofthe accumulation ofterrorist attacks and disasters (related tohuman acts
and forces ofnature), inthe 1980s and 90s. Then, the numerous international treaties were concluded, e.g.inregard tothe Interpol,
which led tothe systematising ofthe human identification methods including biometric ones. Inthat venture the Interpol was
obliged tocreate identification databases, monitor them continuously, record reported results ofresearch, communicate and share
collected information among lower-ranked organisations, have the responsibility for the quality offunctioning ofdatabases asput
into service, etc. Onthat basis the principles offunctioning ofmodern biometric identification systems were determined and put into
practice. Digital systems for identification and verification ofindividual identity have been upgraded onanongoing basis and are
based onhuman physical characteristics such as: fingerprints, facial geometry, iris orretina ofthe eye, temperature distribution
over the face, hand geometry, vein patterns, scent, shape and size ofthe lips, ears and nails, aswell asonbiometric behavioural
features. The author described each of the physical biometric characteristics, which enable a forensic human identification.
Keywords: biometrics, identification, database
Introduction
Biometrics asascience isthe study ofvariability ofapopulation oforganisms,
yet toobserve this variability measurements o
fliving creatures are first tobemade.
Hence the name isderived from Greek words: bio- life, metrics- tomeasure.
Today, the methods used for testing biometrics are automated, digital systems
for identification and verification ofindividual identity. Ofcourse, they are constantly
being updated and are based onphysical characteristics, such asfingerprints, facial
geometry, iris orretina ofthe eye, the temperature distribution over the face, hand
geometry, vein patterns, shape and size ofmouth, ears and nails (the structure
ofchannels under the nail), smell, DNA, aswell asbehavioural biometric characteristics. Among the relevant behavioural features there are: the nature ofwriting,
the way ofputting the signature, the way oftyping, onesgait, voice, accent and pronunciation. Here the author only vaguely refers tothe tests used inthe biometric
techniques tofocus onthe presentation ofselected features, allowing the direct
forensic identification ofaperson1. Inthis respect the latest use ofbiometrics
Hanausek T, Znaczenie rozwoju techniki kryminalistycznej, [in:] Ksiga Pamitkowa
ku czci Profesora Andrzeja Szwarca, T. Hanausek, Z. Kegel, K. Sawik (Eds). Wroclaw, 2001,
pp6977.
1
125
Renata Wlodarczyk
126
Renata Wlodarczyk
127
Renata Wlodarczyk
128
Renata Wlodarczyk
knowledge not only of DNA genetic profiles comparison (in order to:
identify, eliminate, verify), but in addition to update it with the latest
developments inpersonal identification biometric tests. Itcan beassumed
that since the findings atthe conference inLyon were put into practice,
that issince the mid-nineties, there has been the most intense development ofmethods for genetic identification and identification with the use
ofbiometric features.
Because ofthe breadth ofmaterial and alarge number ofearlier publications
onthe identification ofindividuals byDNA, the author ofthis article shall only
present anoverview ofthe subject, and focus more onthe description ofselected
biometric features. Asitwere, each ofthese techniques can besuccessfully applied
toforensic human identification. They give very good results because ofthe individuality ofpersonal biometric features and their uniqueness, asaresult ofwhich
they cannot be"borrowed" orstolen from another person. Inaddition, because
ofthe airtight security ofbiometric analysis systems, such features cannot be"left"
inthe reader orberemoved from adatabase.
Fingerprints image
Historically, the oldest direct person identification system was based onfingerprint recognition. Sofar, ithas been the most important, effective and cheapest
method toidentify anindividual human being. Thanks tocapabilities ofbiometric recording offingerprints (using ink and digitally), law enforcement agencies
and the judiciary obtain indisputable evidence ofthe presence ofaparticular
person inagiven place, while the disclosed and secured fingerprint traces are
used for various investigations: identification ofpersons and bodies, registration
marks and fingerprints inthe AFIS Automated Fingerprint Identification System,
and application ofreasoning and investigative theories6.
InPoland, aspart ofthe dactyloscopic interview, fingerprints from unknown
persons and bodies are taken byanelectronic device, i.e.through the solutions
developed bythe Fortech Company, and then sent tothe Central Dactyloscopic
Registry (CDR) ofthe Central Forensic Laboratory ofthe Polish Police. Inthis way,
the features are checked and compared tothe collection offingerprint cards stored
inthe AFIS database. These cards, stored inanelectronic file, are the original fingerprint cards created using ICT equipment. The essence ofthe system isthe ability
toautomatically encode asingle image ofafingerprint, secured during the examination ofthe incident scene, person orbody ofunknown identity and comparing
itwith the image offingerprints and hands ofpeople suspected bythe Police.
Onthe basis ofrecorded data collection the so-called "Card Card" search can
beused, which isanattempt toidentify inthe following manner:
a) fingerprint card with fingerprint representations ofpeople (living, corpse)
+ card with representations offingerprint identification from database =
identification ofanunidentified person orcorpse;
129
Renata Wlodarczyk
b) fingerprint card with fingerprint representations ofaperson + traces ofunidentified perpetrators from database = identification ofthe offender, who
was the unidentified person orunidentified corpse.
Individual features include: a general fingerprint pattern, irregular shape
oftheir edges, shape and pore distribution, patterns ofridges, wrinkles, minutiae
asthe beginning ofthe line, mesh, bifurcations, dots, etc. The information isthen
processed byaspecial software orsaved asanimage orcoded data for future
comparison with other fingerprints. This involves database search tofind asimilar
set ofbiometric features, the quality ofprocessing, with increasing capabilities
ofmodern computers, leads tothe recognition ofidentity within ashort time
and isbased onasmall number offeatures ofthe arms orhands.
Overall, asystem for biometric fingerprint identification isused todetermine
and confirm the identity of persons detained by the police, border guards
and toidentify unknown persons orcorpses7, while additional security features
ofscanning devices allow for continuous monitoring ofreal finger tissue ofidentified persons. Moreover, the proposals ofgenerated outcomes for the verification
ofbiometric data make itpossible tomatch crimes toperpetrators, and thus prove
the guilt ofidentified perpetrators after many months oreven years.
DNA inbiometrics
Genetic techniques have only recently emerged and entered into the study
ofbiometric features used toidentify people. However, methods for genomic
analysis are considered avery reliable source ofinformation, because human
genes are represented byarelatively unique and complex DNA helix. Itisformed
bytwo chains spirally twisted together, each ofwhich iscomposed ofnucleotides
located inaspecific, individual sequences. Probability ofarepetition ofthe human
DNA helix isestimated atapproximately 1:30billion, which shows that there
isnopossibility ofitoccurring inasecond individual (except the monogamous
twins). While the error inthe face ofthe latest developments inanalysis ispractically impossible, and identification isatthe highest possible degree acertainty
of around 99.9999...%. Currently, about 9597% of non-coding nuclear DNA
is used for genetic testing, but this tendency is slowly moving towards ever
greater penetration into the meanders ofthe human body. Scientists are slowly
entering with their research into the micromolecules ofcoding nuclear DNA,
which raises many concerns associated with far-reaching intervention into the personality ofhomo sapiens. Some are ofthe opinion that the biometric database
ofthe human genome may contain additional (relevant) information through
the use ofoutside non-coding and coding features ofthe nuclear DNA. Currently,
compared tothe existing international rules, this isasignificant problem connected with the need toprotect personal data and the right torespect for human
dignity. Inorder tohedge against possible, yet fraudulent manipulation, the Polish
database ofDNA islocated atthe Central Forensic Laboratory ofPolish Police,
Zubaski S, Rejestracja biometryczna osoby, [in:] Kryminalistyka. Wybrane zagadnienia
techniki, Kdzierska G, Kdzierski W(Eds). Szczytno, 2011, pp145157.
7
130
Renata Wlodarczyk
where human DNA profiles are sent from all the laboratories ofpolice and nonpolice (civil) organizations. Recognition ofDNA requires the tangible sample
tobeexamined, and not, asinother biometric analyses, anoptical, ultraviolet,
infrared image, orinnon-invasive methods the recording. Inorder toidentify
orverify anindividual, asample oftheir tissue needs tobecollected. Usually, toget
the most reliable result, experts recommend that tissue should betaken from
several sources such as: blood, bones, hair and mouth swabs from living persons.
Comparative material for the genetic findings will provide samples obtained from
family members ofmissing persons (parents, children, siblings and relatives), that
isswab from the mucous membrane ofthe inside ofthe cheek", aswell as"blood,
hair follicles orsecretions" onaspecial protocol ofthe comparative material.
Moreover, comparative studies can also use near-life material taken from the stuff
left over bythe missing person inthe place ofresidence, i.e.tissues and secretions
ofthe person are secured from the clothing orvarious items ofeveryday use. For
that person, there isalso used blood, taken from agiven person inblood centres,
orasemen sample, deposited inasperm bank, ororgan, from intended recipients,
orthe results ofprevious DNA testing, etc.8.
131
Renata Wlodarczyk
132
Renata Wlodarczyk
133
Renata Wlodarczyk
134
Renata Wlodarczyk
toremove gloves, masks and eye protection tobeidentified, which greatly increases
the speed ofthe authentication and reduces the risk ofexposing people toharmful
factors.
135
Renata Wlodarczyk
and answer enquires about, for example: handwriting authenticity, the way
ofapproving foreign exchange transactions, other documents production
and approval, aswell asforgeries involving counterfeiting oralterations
ofdocuments, orthe signature ofperson responsible for the produced
document.
b. typing (called Keystroke dynamics) a method that studies human
interaction with the computer keyboard. Here, the experts evaluates
the following: time pressure onthe key, frequency range, speed and power
hitting the keys bythe user ofthe tested equipment. The analyses show that
the greatest identification accuracy isachieved inexaminations ofregular
keyboard users and professional typists, asother people usually donot
develop the characteristic "keyboard" habits. This technology isdependent
onthe regularity ofpressing the keys (the abovementioned parameters:
time, frequency, speed, strength), which contributes touser customization
ofcomputer hardware.
c. way of walking scientists, along with experts on traceology as one
of the areas of forensic science, confirm that the recognition of a walking gait isabiometric method ofidentifying ahuman. Gait recognition
method has anadvantage over other biometric methods, since inthis case
the identified person does not need tobeinformed ofthe examination.
Moreover, the analysis can beperformed atadistance, there isnoneed
touse the reader, asincase ofoptical analytical methods. Recent behavioural
research and traceology focus oncompleting the database-oriented method
ofgait recognition, which inthe analysis ofimage sequences take account
of: silhouette, the upper parts ofthe body, clothing, shoes and worn items
which affect the process ofwalking and body movements.
d. voice recognition technology based onwording, accent and pronunciation the identification involves analysis ofthe information contained
in sound waves, some phrase spoken by an examined person to voice
recording equipment, yet a previously collected sample of the voice
isneeded inthis method. Forensic identification ofsuch recordings isdealt
with byphonoscopy, through which the identity ofthe person isestablished atadistance (such asvoice recognition that uses different versions
of the phone, computer Skype, recorded on electromagnetic media
ordigital carriers). Avery advantageous feature ofthese analyses isthe possibility ofconclusive identification ofanindividual, because each person
has adifferent voice, which depends, for example, on: gender, age, physical structure, the length ofthe vocal cords, the shape ofthe mouth, nasal
structure, illnesses. For these reasons, voice ofanindividual isdetermined
by: frequency, amplitude, rhythm and harmony. Just asinthe case offace
recognition techniques, the voice isanalysed indetail byaspecial software
toyield its digital pattern. Identification ismade bycomparing the living
speech of the resulting pattern, but sometimes experts are struggling
with technical problems, which first ofall are connected with the impact
ofbackground noise, and human factors (voice change due tosickness, age,
stress, mood, etc.). Voice verification involves recording ofaanexamined
personsvoice sample, singling out ofits characteristics and their comparison
136
Renata Wlodarczyk
Conclusions
1) Biometric identification systems, which are largely used inforensics are
technologically advanced, using individual human characteristics, the uniqueness
ofwhich enables both arapid, unequivocal, and most unbiased identification
ofthe examined person, often inanon-contact way, atadistance.
2) Currently, forensic identification uses computer-controlled biometric systems
which combine several modules recognizing human features, such asfingerprints,
facial geometry taking mug shots and pictures ofdistinguishing marks (individual
characteristics such asscars, tattoos, warts, growths, skin discoloration), and even
voice and accent ofspeech. Aspecial version ofthe software records the abovementioned biometric features inpolice databases that are used for legal proceedings
and bythe Border Guards toprotect state borders. Control software can beoperated manually orautomatically based onimage analysis. The degree oflikelihood
ofrepetition ofthe biometric characteristics between individuals isgiven inpercentage, during the database search. Currently, the high quality ofrecorded data allows
tocreate aprecise pattern ofbiometric profile. The outcome ofthe entire system
operation, software included, isanentry inthe database, aswell asaprintout from
the current database inany form, like the so-called album cards.
3) Continuous modernization of equipment designed to record biometric
features, not only bythe latest technology, but also bythe use ofarchival mug
shots, isdone toensure the integrity ofall databases functioning inagiven area.
With the implementation ofnew systems tobiometric analysis, the functionality
ofthe calculation ofthe degree oflikelihood ofrecurrence isextended, and the definition ofbiometric features (search, comparison) from multiple images, i.e.taken
bydifferent cameras orcarriers, such ascassettes, CCTV, becomes more efficient.
4) From the forensic point ofview, aspecial place among methods ofbehavioural biometrics has voice identification and verification, aswell asthe play back
ofconversations from any form ofrecordings, including black boxes. Onaccount
ofincreasing terrorist attacks, organized crime, random events (such asthe collapse
ofanaircraft, ashipwreck, explosions ofdrilling and production platforms and tanks
inroad and water traffic) and disasters, there isaneed not only toestablish the identity ofthe registered speakers, but also togather any information about the event.
This iscrucial especially for the reconstruction ofthe incident, investigation ofits
causes, and identification ofperpetrator(s).
5) Biometrics cannot disregard the consequences and the problems posed
byany new, even the most effective method ofdetermining the identity ofvictims
10
Swarcewicz R, Identyfikacja biometryczna blaski icienie. Logistyka, Magazynowanie,
Transport, Automatyczna Identyfikacja, 2002, No4, pp4447; Niedziejko P, Krysowaty I, Biometria. Charakterystyka danych czowieka cz 3.Zabezpieczenia, 2006, No6. Electronic
source: http://www.zabezpieczenia.com.pl/biometria/biometria-charakterystyka-danych-czlowieka-czesc-3, accessed: 30June 2012; Hanausek T, op.cit., pp6977.
137
Renata Wlodarczyk
orperpetrators ofcriminal acts, ortheir elimination from suspects. Practical implementation and ultimate success ofeach method isinfact dependent, toalarge
extent, onawareness ofthe existence ofits weaknesses (like the statistical error
rate) and their estimates with the creation ofamechanism for the proper use
ofthe method inthe realities ofthe legal system.
6) One should beaware ofthe fact that each ofthese biometric features ischaracterized byacertain group ofspecific limitations and certain conditions, and so,
for example, while analysing the geometry ofthe face and other parts ofthe body:
a) identification ofunidentified victim (living person, corpses) from aphoto
ofacredit card, driving license orpassport input images are ofgood
quality, but aperson does not exist inthe database, orpotentially exists,
but due tothe enormity ofthe database checking ofthe personsdata
requires along time and the identification isvery limited. Consequently,
criminal prosecution authorities decide toestablish the residence: family, relatives or friends of the unidentified people and use the images
orrecordings supplied bythem, from the last period before the person
went missing,
b) identification ofthe face asevidence injudicial proceedings (e.g.caught
byaspeed trap) requirement for ahigh percentage ofcertainty ofidentification, but very often the recorded image isofpoor quality, sothere isaneed
for high magnification recordings (photos, camera) and more time isneeded
toanalyse and recognize the face ofthe person,
c) Preventive and for the investigative purposes security offacilities (bank,
shop, train) entered images from cameras located at the entrances
into the site and pivotal areas low quality, often incorrect installation
ofcameras, the need toidentify inreal time, the availability ofvideo images
(recording which can bemodified toasrequired, for instance, rewound,
freeze-framed), the probability ofidentification afairly high,
d) Preventive and for the purposes ofinvestigations surveillance ofthe crowd
(stadiums, sports halls), low quality ofrecorded video, the need toidentify
alarge number offaces and elements from the environment included inone
image, the availability ofavideo image, but usually many people need
tobeidentified inreal time.
7) Itmust beinferred from the above that biometric methods used for forensic
identification and inother fields utilising personal characteristics (physical, behavioural), onone hand are very useful, but onthe other hand, one should always take
into account the possibility oferroneous findings orcertain restrictions.
References
1. Czajka A, Pacut A, Biometria podpisu odrcznego, [in:] Automatyczna identyfikacja wsystemach logistycznych, Zajc P, Kwaniowski S(Eds). Wroclaw, 2004.
2. Hanausek T, Znaczenie rozwoju techniki kryminalistycznej, [in:] Ksiga
Pamitkowa kuczci Profesora Andrzeja Szwarca, T.Hanausek, Z.Kegel, K.Sawik
(Eds). Wroclaw, 2001.
3. Lombroso C, Geniusz iObkanie. Warsaw, 1987.
138
Renata Wlodarczyk
4. Lorkiewicz-Muszyska D, Przybylski Z, Znaczenie porwnawczych bada odontologicznych wcaoksztacie postpowania identyfikacyjnego napodstawie
czaszki. Archiwum Medycyny Sdowej iKryminologii, 2002, No1.
5. achacz M, Odorologia kryminalistyczna, [in:] Technika kryminalistyczna,
Kdzierski W(Ed.). Szczytno, 2002.
6. achacz M, Odorologia kryminalistyczna jako wyzwanie XXI wieku dla techniki
kryminalistycznej, [in:] Problemy wspczesnej kryminalistyki, Gruza E, Tomaszewski T, Goc M(Eds.). Warsaw, 2002.
7. Olejowski W, Jackiewicz K, Interfejs do akwizycji danych biometrycznych.
Biometric data acquisition interface, 2005. Electronic source: http://home.elka.
pw.edu.pl/~wolejows/fingerprint/ch_2.html, accessed: 16February 2012.
8. Wodarczyk R, Dziaania kryminalistyczne, medyczne iorganizacyjne wsytuacjach zdarze masowych ze szczeglnym uwzgldnieniem identyfikacji
genetycznej zwok ludzkich zpogorzeliska. Szczytno, 2010.
9. Zubaski S, Rejestracja biometryczna osoby, [in:] Kryminalistyka. Wybrane
zagadnienia techniki, Kdzierska G, Kdzierski W(Eds). Szczytno, 2011.
10. achacz M, Odorologia kryminalistyczna, [in:] Technika kryminalistyczna,
Kdzierski W(Ed.). Szczytno, 2002.
11. Swarcewicz R, Identyfikacja biometryczna blaski icienie. Logistyka, Magazynowanie, Transport, Automatyczna Identyfikacja, 2002, No4.
12. Niedziejko P, Krysowaty I, Biometria. Charakterystyka danych czowieka
cz3.Zabezpieczenia, 2006, No6.
About the author
Renata Wodarczyk, DEng, is an assistant professor at the Internal Security Faculty of the Police
Academy in Szczytno. Her main research interests are criminalistics, forensic medicine and DNA
forensic technology. Correspondence: Renata Wodarczyk, Police Academy in Szczytno, ul.
Pilsudskiego 111, 12-100 Szczytno, Poland. E-mail: r.wlodarczyk@wspol.edu.pl
Streszczenie. Wspczesna rzeczywisto stawia przed kryminalistyk due wyzwania. Mimo rozwoju taktyki itechniki wtej
dziedzinie, czsto stajemy bezradnie wobec problemu autorytatywnego zidentyfikowania ywego czowieka, zktrym brak jest
kontaktu iuleg zmianom uniemoliwiajcym ustalenie jego tosamoci albo N.N.zwok, ktrych szcztki szmienione pomiertnie
iwinny sposb zdegenerowane wwyniku zdarzenia. Wczasie minionych wiekw wykorzystywano cechy biometryczne czowieka
wrnych celach, wtym obecnie itozduym powodzeniem, uywa si ich m.in.dokryminalistycznej identyfikacji osobniczej.
Taka konieczno wystpia wmomencie skumulowania si zamachw terrorystycznych ikatastrof (zwizanych zdziaaniem
ludzi lub zprzyczyn naturalnych), wlatach osiemdziesitych idziewidziesitych ubiegego wieku. Wtedy zawarto liczne umowy
midzynarodowe, np.wramach dziaa Interpolu, ktre doprowadziy dousystematyzowania metod identyfikacyjnych czowieka
zuwzgldnieniem metod biometrycznych. Wtym przedsiwziciu Interpol zosta zobligowany doutworzenia identyfikacyjnych
baz danych, cigego ich nadzorowania, rejestrowania zgaszanych wynikw badawczych, przekazywania iwzajemnej wymiany
zgromadzonych informacji midzy podlegymi jednostkami, ponoszenia odpowiedzialnoci zajako funkcjonowania uruchomionych
baz itp. Natej podstawie okrelono iwprowadzono dopraktyki zasady funkcjonowania nowoczesnych systemw identyfikacji
biometrycznej. Cyfrowe systemy rozpoznawania iweryfikacji tosamoci osobniczej scigle unowoczeniane ibazuj nacechach
fizycznych czowieka, takich jak: linie papilarne, geometria twarzy, tczwka lub siatkwka oka, rozkad temperatury twarzy,
geometria doni, wzorcw y, zapach, ksztat iwielko ust, uszu oraz paznokci, jak rwnie biometrycznych cechach behawio
ralnych. Autorka opisaa kad zfizycznych cech biometrycznych, dziki ktrym moliwa jest kryminalistyczna identyfikacja czowieka.
139
Renata Wlodarczyk
. .
,
, , ,
; , ,
. ,
. 8090- -
( ).
, , , .
, ,
, ,
, ..
. : , ,
, , , ,
, , , .
,
.
140
Reproduced with permission of the copyright owner. Further reproduction prohibited without
permission.