Skip to main content
Log in

Database and Data Management Requirements for Equalization of Contactless Acquired Traces for Forensic Purposes—Provenance and Performance

  • Schwerpunktbeitrag
  • Published:
Datenbank-Spektrum Aims and scope Submit manuscript

Abstract

The importance of fingerprints and microtraces within the field of criminalistics and forensics is well-known. An upcoming field is the contactless acquisition of traces, because the integrity of traces is preserved Hildebrandt et al. (MM’Sec, pp. 1–8, 2011). A further issue from such an acquisition method is the potential presence of perspective distortions, which we already started to deal with in Kist et al. (SPIE 8546 Conf., pp. 0A/1–0A/12, 2012). Within the scope of a productive use of contactless acquisition methods, preprocessing steps like the equalization come along. In this paper, we give a perspective on requirements for an underlying database and database management system to support the methods of Kist et al. (SPIE 8546 Conf., pp. 0A/1–0A/12, 2012) as a potential real-case scenario. Thereby, we point out possible starting points for parallelization potential and evaluate the benefit. Finally, we integrate an approach to ensure the chain of custody by means of provenance, which is essential for any forensic investigation and evaluate the effect on the overall system performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Notes

  1. For all scans the confocal laser microscope “Keyence VK-X110” [11] was used; intensity and topography data were used for equalization.

  2. A partial human hair, see Fig. 2 and Table 1.

  3. Equalization of a fingerprint (20 degrees, area: 14.26 mm×9.49 mm): 10.30 minutes—using: Intel(R) Core(TM) i7-2670QM @ 3.1 GHz, 8 GB RAM; JavaVM @ 4 GB, WDC WD6400BPVT-60HXZ.

  4. The surface a trace is present on.

  5. E.g. curved, spherical or inhomogeneously shaped surfaces.

  6. E.g. ridgeline distance, relative position of minutiae.

  7. “NIST Biometric Image Software”—see [online]: http://www.nist.gov/itl/iad/ig/nbis.cfm; minutiae-based.

  8. A planar surface in different angles, two curved surfaces, a spherical surface—see [13].

  9. Significances are shown in curly brackets over each bar in the diagram.

  10. No standard deviation or significance could be calculated.

  11. Using the “Keyence VK-X110”, a scan of a fingerprint of the test set of Table 1 easily exceeds 20 hours.

  12. Two dimensional perspective distortions can not be projected into a distortion-free representation, since none of the surface’s principal curvatures is zero.

  13. On a system, using: Intel(R) Core(TM) i7-2670QM @ 3.1 GHz, 8 GB RAM; JavaVM @ 4 GB, WDC WD6400BPVT-60HXZ.

  14. Data size is given in total: sum of size of intensity- and topography data.

  15. Scan of a partial human hair at 70 degrees (area: 1.35 mm × 1.83 mm).

  16. Complete scan of a fingerprint at 20 degrees (area: 14.26 mm × 9.40 mm).

  17. Value refers to the equalization of a complete scan of a fingerprint at 20 degrees (area: 14.26 mm × 9.40 mm).

  18. The average CPU-time was calculated for 8 consecutive equalizations (based on scans of given test set, see Table 1).

References

  1. VisualVM version 1.3.5. http://visualvm.java.net last accessed: 12.11.2012 [online]

  2. Allen M, Chapman A, Blaustein B, Seligman L (2010) Provenance capture in the wild. In: IPAW. LNCS, vol 6378. Springer, Berlin, pp 98–101

    Google Scholar 

  3. Bishop M (2002) The art and science of computer security. Addison-Wesley, Reading

    Google Scholar 

  4. Cohen M, Schatz B (2010) Hash based disk imaging using AFF4. Digit Investig 7:121–128

    Article  Google Scholar 

  5. Coltuc D, Chassery J (2007) Very fast watermarking by reversible contrast mapping. IEEE Signal Process Lett 14(4):255–258

    Article  Google Scholar 

  6. Dittmann J, Wohlmacher P, Nahrstedt K (2001) Using cryptographic and watermarking algorithms. IEEE Multimed 8(4):54–65

    Article  Google Scholar 

  7. Feng J, Lin I, Tsai C, Chu Y (2006) Reversible watermarking: current status and key issues. Int J Netw Secur 2(3):161–171

    Google Scholar 

  8. Graefe G (1990) Encapsulation of parallelism in the Volcano query processing system. In: SIGMOD. ACM, New York, pp 102–111

    Google Scholar 

  9. Gundagin S (2007) Sex determination from fingerprint ridge density. J Med Update, 4–7

  10. Hildebrandt M, Kiltz S, Grossmann I, Vielhauer C (2011) Convergence of digital and traditional forensic disciplines: a first exemplary study for digital dactyloscopy. In: MM’Sec. ACM, New York, pp 1–8

    Google Scholar 

  11. Keyence. Keyence vk-x110. [online] http://www.keyence.de/, last accessed: 02.07.2012

  12. Kiltz S, Lang A, Dittmann J (2006) Klassifizierung der Eigenschaften von Trojanischen Pferden. In: D-A-CH security, pp 351–361

    Google Scholar 

  13. Kirst S, Clausing E, Dittmann J, Vielhauer C (2012) A first approach to the detection and equalization of distorted latent fingerprints and microtraces on non-planar surfaces with confocallaser microscopy. In: SPIE 8546 conf, pp 0A/1–0A/12

    Google Scholar 

  14. Kirst S, Schäler M (2013) Database and data management requirements for equalization of contactless acquired traces for forensic purpose. In: DBforBFS workshop, BTW-workshops, pp 89–98. Köllen-Verlag

  15. Kuivalainen K, Peiponen K, Myller K (2009) Application of a diffractive element-based sensor for detection of latent fingerprints from a curved smooth surface. Meas Sci Technol 20(7):1–3

    Article  Google Scholar 

  16. Merkel R, Kraetzer C, Dittmann J, Vielhauer C (2011) Reversible watermarking with digital signature chaining for privacy protection of optical contactless captured biometric fingerprints—a capacity study for forensic approaches. In: DSP. IEEE, New York, pp 1–6

    Google Scholar 

  17. Pocs M, Stach B, Hildebrandt M, Kiltz S, Dittmann J (2012) Digital dactyloscopy: a first design proposal for a privacy preserving fingerprint scanning system. In: CYBERLAWS, pp 13–18

    Google Scholar 

  18. Schäler M, Schulze S, Kiltz S (2011) Database-centric chain-of-custody in biometric forensic systems. In: BioID. LNCS, vol 6583. Springer, Berlin, pp 250–261

    Google Scholar 

  19. Schäler M, Schulze S, Merkel R, Saake G, Dittmann J (2011) Reliable provenance information for multimedia data using invertible fragile watermarks. In: BNCOD. Springer, Berlin, pp 3–17

    Google Scholar 

  20. Schäler M, Schulze S, Saake G (2012) Toward provenance capturing as cross-cutting concern. In: TaPP, pp 12/1–12/5. USENIX

  21. Watson C, Garris M, Tabassi E, Wilson C, Mccabe R, Janet S, Ko K User’s guide to NIST biometric image software (NBIS)

Download references

Acknowledgements

The work in this paper has been funded in part by the German Federal Ministry of Education and Science (BMBF) through the Research Program under Contract No. FKZ:13N10816 and FKZ:13N10817. In addition to that, parts of the data was acquired under FKZ:13N10818.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Stefan Kirst.

Additional information

This is an extended version of the paper “Database and Data Management Requirements for Equalization of Contactless Acquired Traces for Forensic Purposes” [14], selected for the special DASP issue Best Workshop Papers of BTW 2013.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Kirst, S., Schäler, M. Database and Data Management Requirements for Equalization of Contactless Acquired Traces for Forensic Purposes—Provenance and Performance. Datenbank Spektrum 13, 201–211 (2013). https://doi.org/10.1007/s13222-013-0141-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13222-013-0141-y

Keywords

Navigation