Computational Forensics: An Overview

  • Katrin Franke
  • Sargur N. Srihari
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5158)

Abstract

Cognitive abilities of human expertise modeled using computational methods offer several new possibilities for the forensic sciences. They include three areas: providing tools for use by the forensic examiner, establishing a scientific basis for the expertise, and providing an alternate opinion on a case. This paper gives a brief overview of computational forensics with a focus on those disciplines that involve pattern evidence.

Keywords

Computational science Forensic science Computer science Artificial intelligence Law enforcement Investigation services 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    van der Steen, M., Blom, M.: A roadmap for future forensic research. Technical report, Netherlands Forensic Institute (NFI), The Hague, The Netherlands (2007)Google Scholar
  2. 2.
    Saks, M., Koehler, J.: The coming paradigm shift in forensic identification science. Science 309, 892–895 (2005)CrossRefGoogle Scholar
  3. 3.
    Mena, J.: Investigative Data Mining for Security and Criminal Detection. Butterworth-Heinemann (2003)Google Scholar
  4. 4.
    Starzecpyzel: United states vs. Starzecpyzel. 880 F. Supp. 1027 (S.D.N.Y) (1995)Google Scholar
  5. 5.
    Marr, D.: Vision. Freeman, New York (1982)Google Scholar
  6. 6.
    Foster, K., Huber, P.: Judging Science. MIT Press, Cambridge (1999)Google Scholar
  7. 7.
    Aitken, C., Taroni, F.: Statistics and the Evaluation of Evidence for Forensic Scientists, 2nd edn. Wiley, Chichester (2005)Google Scholar
  8. 8.
    Franke, K.: The Influence of Physical and Biomechanical Processes on the Ink Trace - Methodological foundations for the forensic analysis of signatures. PhD thesis, Art. Intell. Institute, Uni. Groningen, The Netherlands (2005)Google Scholar
  9. 9.
    Srihari, S., Cha, S., Arora, H., Lee, S.: Individuality of handwriting. J. Forensic Sciences 47(4), 1–17 (2002)Google Scholar
  10. 10.
    Bulacu, M., Schomaker, L.: Text-independent writer identification and verification using textural and allographic features. IEEE Trans. Pattern Analysis and Machine Intelligence (PAMI) 29(4), 701–717 (2007)CrossRefGoogle Scholar
  11. 11.
    Franke, K., Schomaker, L.: Robotic writing trace synthesis and its application in the study of signature line quality. J. Forensic Doc. Examination 16(3) (2004)Google Scholar
  12. 12.
    Heizmann, M., León, F.: Model-based analysis of striation patterns in forensic science. In: Bramble, S., Carapezza, E., Rudin, L. (eds.) Enabling Technologies for Law Enforcement and Security, Proceedings of SPIE, vol. 4232, pp. 533–544 (2001)Google Scholar
  13. 13.
    Maltoni, D., Maio, D., Jain, A., Prabhakar, S.: Handbook of Fingerprint Recognition. Springer, Heidelberg (2003)MATHGoogle Scholar
  14. 14.
    Veenman, C., Worring, M.: Forensic intelligence. Informatie, 60–65 (April 2007)Google Scholar
  15. 15.
    Franke, K., Guyon, I., Schomaker, L., Vuurpijl, L.: WandaML - A markup language for digital document annotation. In: Proc. 9th International Workshop on Frontiers in Handwriting Recognition (IWFHR), Tokyo, Japan (2004)Google Scholar
  16. 16.
    Schönherr, K.: Konzeption und Prototyp eines Ausgabe- und Reportgenerators für XML-Daten aus dem Handschriftenerkennungssystem WANDA. Master’s thesis, Berlin College of Technology and Business Studies, Berlin, Germany (2004)Google Scholar
  17. 17.
    Verheij, B.: Virtual Arguments. On the Design of Argument Assistants for Lawyers and Other Arguers. T.M.C. Asser Press, The Hague, The Netherlands (2005)Google Scholar
  18. 18.
    Su, H.: Shoeprint image retrieval based on local image features. In: Int. Symposium on Information Assurance and Security/ Int. Workshop on Computational Forensics (IWCF), Manchester, UK. IEEE-CS Press, Los Alamitos (2007)Google Scholar
  19. 19.
    Bache, R., Crestani, F., Canter, D., Youngs, D.: Application of language models to suspect prioritisation and suspect likelihood in serial crimes. In: Int. Symposium on Information Assurance and Security/ IWCF. IEEE-CS Press, Los Alamitos (2007)Google Scholar
  20. 20.
    Veenman, C.: Statistical disk cluster classification for file carving. In: Int. Symposium on Information Assurance and Security/ IWCF. IEEE-CS Press, Los Alamitos (2007)Google Scholar
  21. 21.
    Karresand, M.: Completing the picture, fragments and back again (licentiate thesis) (May 2008)Google Scholar
  22. 22.
    Khanna, N., Mikkilineni, A., Chiu, G., Allebach, J., Delp, E.: Survey of scanner and printer forensics at purdue university. In: Srihari, S.N., Franke, K. (eds.) IWCF 2008. LNCS, vol. 5158, pp. 22–34. Springer, Heidelberg (2008)Google Scholar
  23. 23.
    Srihari, S., Srinivasan, H., Fang, G.: Discriminability of the fingerprints of twins. Journal of Forensic Identification 58(1), 109–127 (2008)Google Scholar
  24. 24.
    Weiand, K., Bouten, J., Veenman, C.: Similarity visualisation for the grouping of forensic speech recordings. In: Srihari, S.N., Franke, K. (eds.) IWCF 2008. LNCS, vol. 5158, pp. 169–180. Springer, Heidelberg (2008)Google Scholar
  25. 25.
    Ballerini, L., Cordon, O., Damas, S., Santamaria, J., Aleman, I., Botella, M.: Craniofacial superimposition in forensic identification using genetic algorithms. In: Int. Symposium on Information Assurance and Security/ IWCF. IEEE-CS Press, Los Alamitos (2007)Google Scholar
  26. 26.
    Ehlert, A., Bartz, D.: 3d processing and visualization of scanned forensic data. In: Srihari, S., Franke, K. (eds.) 2nd International Workshop on Computational Forensics (IWCF). LNCS, p. 70. Springer, Heidelberg (2008)Google Scholar
  27. 27.
    Hughes, D., Rayson, P., Walkerdine, J., Lee, K., Greenwood, P., Rashid, A., May-Chahal, C., Brennan, M.: Supporting law enforcement in digital communities through natural language analysis. In: Srihari, S.N., Franke, K. (eds.) IWCF 2008. LNCS, vol. 5158, pp. 122–134. Springer, Heidelberg (2008)Google Scholar
  28. 28.
    Booker, L.: Finding identity group “fingerprints” in documents. In: Srihari, S.N., Franke, K. (eds.) IWCF 2008. LNCS, vol. 5158, pp. 113–121. Springer, Heidelberg (2008)Google Scholar
  29. 29.
    van Beusekom, J., Shafait, F., Breuel, T.: Document signatures using intrinsic features for counterfeit detection. In: Srihari, S.N., Franke, K. (eds.) IWCF 2008. LNCS, vol. 5158, pp. 47–57. Springer, Heidelberg (2008)Google Scholar
  30. 30.
    Ramos, D., Gonzalez-Rodriguez, J., Zadora, G., Zieba-Palus, J., Aitken, C.: Information-theoretical comparison of likelihood-ratio methods of forensic evidence evaluation. In: Int. Symposium on Information Assurance and Security/ IWCF, Manchester, UK. IEEE-CS Press, Los Alamitos (2007)Google Scholar
  31. 31.
    Yanushkevich, S., Boulanov, O., Stoica, A., Shmerko, V.: Support of interviewing techniques in physical access control systems. In: Srihari, S.N., Franke, K. (eds.) IWCF 2008. LNCS, vol. 5158, pp. 147–158. Springer, Heidelberg (2008)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Katrin Franke
    • 1
  • Sargur N. Srihari
    • 2
  1. 1.Norwegian Information Security LaboratoryGjøvik University CollegeNorway
  2. 2.CEDARUniversity at Buffalo, State University of New YorkUSA

Personalised recommendations