Developing an Integrated Cyber Forensic System Based On the Face Biometric Recognition
Laiba Rahman
Vol. 7, Issue 1, Jan-Dec 2021
Page Number: 77 - 90
Abstract:
A dormant finger impression on the counter. A floor covered with bloods. Law implementation has effectively utilised these criminological signs to get criminals for quite a long time. In any case, consider a face picture caught by a camera that should coordinate against many mug shots the nation over. With the quick extension in the quantity of perception cameras and mobile phones with worked in cameras, the wrongdoing scene is changing, and the headway in face acknowledgment helps with driving the way. To be sure, in 2009, a normal 30 million reconnaissance cameras were passed on in the US, shooting 4 billion hours of film seven days. [1] However, albeit late exploration propels have helped establish the frameworks for recognising face-coordinating with situations for using this information, face recognition in the criminology field represents a few difficulties. This article features the difficulties in applying face-recognition innovation to legal sciences applications. We explain why assessable face acknowledgment shifts from typical picture face acknowledgment and why a human investigator is as often as possible expected to painstakingly translate and affirm the planning with results. Moreover, we address three explicit exploration issues that posture difficulties to business off-the-rack face identification systems.
References
- Denning, Dorothy, 'An Intrusion-Detection Model', IEEE Transactions on Software Engineering, vol.13, no.2, 1987.
- Fox, Kevin L., Henning, Rhonda R., and Reed, Jonathan H. 'A Neural Network. Approach Towards Intrusion Detection', 13th National Computer Security Conference, 1990.
- Helman, P. and Liepins, G., 'Statistical foundations of audit trail analysis for the detection of computer misuse', IEEE Trans. on Software Engineering, 1993.
- Cannady J. and Mahaffey J, 'The application of Artificial Neural Networks to Misuse detection: initial results', Georgia Tech Research Institute, 1998.
- Girardin L. and Brodbeck D. 'A Visual Approach for Monitoring Logs', 12th System Administration Conference (LISA '98)', pages 299-308, 1998.
- Girardin L., 'An eye on network intruderadministrator shootouts - UBS UBILAB', 1st Workshop on Intrusion Detection and Network Monitoring (ID '99)', 1999.
- K. S. Anil Kumar and V. Nandamohan, 'Novel Anomaly Intrusion Detection using Neuro-Fuzzy Inference System', IJCSNS, pp.6-11, 2008.
- Elike Hodo, Xavier Bellekens, Andrew Hamilton, Pierre-Louis Dubouilh, 'Threat analysis of IoT networks Using Artificial Neural Network Intrusion Detection System', International Symposium on Networks, Computers and Communications (ISNCC), 2016.
- Ala Al-Fuqaha, Mohsen Guizani, Mehdi Mohammadi, Mohammed Aledhari and Moussa Ayyash, 'Internet of Things: A Survey on Enabling Technologies, Protocols and Applications',IEEE Communications Surveys & Tutorials, 2015.
- Luigi Atzori, Antonio Iera and Giacomo Morabito, 'The Internet of Things: A survey', Computer Networks, vol. 54, pp. 2787-2805, 2010.
- V. Jyothsna and V. V. Rama Prasad, 'A Review of Anomly Based Intrusion Detection System', IJCA, Vol. 28, no. 7, pp. 26-35, 2011.
- Nilesh B. Nanda and Ajay Parikh, 'Classification and Technical Analysis of Network Intrusion Detection System', International Journal of Advanced Research in Computer Science, vol. 8, pp. 657-661, 2017.
- E. Kesavulu Reddy, 'Neural Networks for Intrusion Detection and Its Applications', World Congress in Engineering, vol. 2, 2013.
- Tariqahmad Sherasiya and Hardik Upadhyay, 'Intrusion Detection System for Internet of Things', IJARIIE, vol. 2, issue.3, pp. 2244-2248, 2016.
- Pavan Pongle and Gurunath Chavan, 'Real Time Intrusion and Wormhole Attack Detection in Internet of Things', IJCA, vol.121, no.9, pp. 1-9, 2015.
- Rupinder Singhm Jatinder Singh and Ravinder Singh, 'Fuzzy Based Advanced Hybrid Intrusion Detection System to Detect Malicious Nodes in Wireless Sensor Networks', Wireless Communication and Mobile Computing, pp. 1- 14, 2017.
- J. Vlahos, 'Surveillance Society: New HighTech Cameras Are Watching You,' Popular Mechanics, 1 Oct. 2009; www.popularmechanics.com/technology/militar y/4236865.
- S.Z. Li and A.K. Jain, eds., Handbook of Face Recognition, 2nd ed., Springer, 2011.
- P. Grother, G. Quinn, and P.J. Phillips, 'Report on the Evaluation of 2D Still-Image Face Recognition Algorithms,' Nat’l Inst. of Standards and Technology interagency/internal report (NISTIR) 7709, 2010; www.nist.gov/customcf/get_pdf.cfm?pub_id=9 05968.
- R. Charette, 'Here’s Looking at You, and You, and You. . .,' blog, IEEE Spectrum, 25 July 2011; http://spectrum.ieee.org/riskfactor/computing/it/ heres-looking-a
- [5]. L. Ding et al., 'Computers Do Better than Experts Matching Faces in a Large Population,' Proc. IEEE Int’l Conf. Cognitive Informatics, IEEE Press, 2010, pp. 280-284.
- V. Blanz and T. Vetter, 'Face Recognition Based on Fitting a 3D Morphable Model,' IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 25, no. 9, 2003, pp. 1063-1074.
- U. Park and A.K. Jain, '3D Model-Based Face Recognition in Video,' Proc. 2nd Int’l Conf. Biometrics (ICB), LNCS 4642, Springer, 2007, pp. 1085-1094.
- U. Park, Y. Tong, and A.K. Jain, 'Age Invariant Face Recognition,' IEEE Trans. Pattern
- Analysis and Machine Intelligence, vol. 32, no. 5, 2010, pp. 947-954.
- T. Bourlai, A. Ross, and A.K. Jain, 'Restoring Degraded Face Images: A Case Study in Matching Faxed, Printed and Scanned Photos,' IEEE Trans. Information Forensics and Security, vol. 6, no. 2, 2011, pp. 371-384.
- B. Klare, Z. Li, and A.K. Jain, 'Matching Forensic Sketches to Mugshot Photos,' IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 33, no. 3, 2011, pp. 639-646.
- U. Park and A.K. Jain, 'Face Matching and Retrieval Using Soft Biometrics,' IEEE Trans. Information Forensics and Security, vol. 5, no. 3, 2010, pp. 406-415.
- Z. Li, U. Park, and A.K. Jain, 'A Discriminative Model for Age Invariant Face Recognition,' IEEE Trans. Information Forensics and Security, vol. 6, no. 3, 2011, pp. 1028-1037.
- 'Los Angeles Officials Identify Video Assault Suspects,' New York Times, 7 Jan. 2011; www. nytimes.com/2011/01/08/us/08disabled.html.
- B. Klare and A. K. Jain, 'Heterogeneous Face Recognition using Kernel Prototype Similarities,' tech. report MSU-CSE-11-18, Michigan State Univ., Nov. 2011.
- H. Ling et al., 'Face Verification Across Age Progression Using Discriminative Methods,' IEEE Trans. Information Forensic and Security, vol. 5, no. 1, 2010, pp. 82-91.
- X. Wang and X. Tang, 'Face Photo-Sketch Synthesis and Recognition,' IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 31, no. 11, 2009, pp. 1955-1967.
- H. Tuthill and G. George, Individualization: Principles and Procedures in Criminalistics, Lightning Powder Company, 2002.
- B. Klare and A.K. Jain, 'On a Taxonomy of Facial Features,' Proc. 4ith IEEE Int’l Conf. Biometrics: Theory, Applications, and Systems (BTAS), IEEE Press, 2010, pp. 1-8.
Back Download