Abstract
The importance of fingerprints and microtraces within the field of criminalistics and forensics is well-known. An upcoming field is the contactless acquisition of traces, because the integrity of traces is preserved Hildebrandt et al. (MM’Sec, pp. 1–8, 2011). A further issue from such an acquisition method is the potential presence of perspective distortions, which we already started to deal with in Kist et al. (SPIE 8546 Conf., pp. 0A/1–0A/12, 2012). Within the scope of a productive use of contactless acquisition methods, preprocessing steps like the equalization come along. In this paper, we give a perspective on requirements for an underlying database and database management system to support the methods of Kist et al. (SPIE 8546 Conf., pp. 0A/1–0A/12, 2012) as a potential real-case scenario. Thereby, we point out possible starting points for parallelization potential and evaluate the benefit. Finally, we integrate an approach to ensure the chain of custody by means of provenance, which is essential for any forensic investigation and evaluate the effect on the overall system performance.








Similar content being viewed by others
Notes
For all scans the confocal laser microscope “Keyence VK-X110” [11] was used; intensity and topography data were used for equalization.
Equalization of a fingerprint (20 degrees, area: 14.26 mm×9.49 mm): 10.30 minutes—using: Intel(R) Core(TM) i7-2670QM @ 3.1 GHz, 8 GB RAM; JavaVM @ 4 GB, WDC WD6400BPVT-60HXZ.
The surface a trace is present on.
E.g. curved, spherical or inhomogeneously shaped surfaces.
E.g. ridgeline distance, relative position of minutiae.
“NIST Biometric Image Software”—see [online]: http://www.nist.gov/itl/iad/ig/nbis.cfm; minutiae-based.
A planar surface in different angles, two curved surfaces, a spherical surface—see [13].
Significances are shown in curly brackets over each bar in the diagram.
No standard deviation or significance could be calculated.
Using the “Keyence VK-X110”, a scan of a fingerprint of the test set of Table 1 easily exceeds 20 hours.
Two dimensional perspective distortions can not be projected into a distortion-free representation, since none of the surface’s principal curvatures is zero.
On a system, using: Intel(R) Core(TM) i7-2670QM @ 3.1 GHz, 8 GB RAM; JavaVM @ 4 GB, WDC WD6400BPVT-60HXZ.
Data size is given in total: sum of size of intensity- and topography data.
Scan of a partial human hair at 70 degrees (area: 1.35 mm × 1.83 mm).
Complete scan of a fingerprint at 20 degrees (area: 14.26 mm × 9.40 mm).
Value refers to the equalization of a complete scan of a fingerprint at 20 degrees (area: 14.26 mm × 9.40 mm).
The average CPU-time was calculated for 8 consecutive equalizations (based on scans of given test set, see Table 1).
References
VisualVM version 1.3.5. http://visualvm.java.net last accessed: 12.11.2012 [online]
Allen M, Chapman A, Blaustein B, Seligman L (2010) Provenance capture in the wild. In: IPAW. LNCS, vol 6378. Springer, Berlin, pp 98–101
Bishop M (2002) The art and science of computer security. Addison-Wesley, Reading
Cohen M, Schatz B (2010) Hash based disk imaging using AFF4. Digit Investig 7:121–128
Coltuc D, Chassery J (2007) Very fast watermarking by reversible contrast mapping. IEEE Signal Process Lett 14(4):255–258
Dittmann J, Wohlmacher P, Nahrstedt K (2001) Using cryptographic and watermarking algorithms. IEEE Multimed 8(4):54–65
Feng J, Lin I, Tsai C, Chu Y (2006) Reversible watermarking: current status and key issues. Int J Netw Secur 2(3):161–171
Graefe G (1990) Encapsulation of parallelism in the Volcano query processing system. In: SIGMOD. ACM, New York, pp 102–111
Gundagin S (2007) Sex determination from fingerprint ridge density. J Med Update, 4–7
Hildebrandt M, Kiltz S, Grossmann I, Vielhauer C (2011) Convergence of digital and traditional forensic disciplines: a first exemplary study for digital dactyloscopy. In: MM’Sec. ACM, New York, pp 1–8
Keyence. Keyence vk-x110. [online] http://www.keyence.de/, last accessed: 02.07.2012
Kiltz S, Lang A, Dittmann J (2006) Klassifizierung der Eigenschaften von Trojanischen Pferden. In: D-A-CH security, pp 351–361
Kirst S, Clausing E, Dittmann J, Vielhauer C (2012) A first approach to the detection and equalization of distorted latent fingerprints and microtraces on non-planar surfaces with confocallaser microscopy. In: SPIE 8546 conf, pp 0A/1–0A/12
Kirst S, Schäler M (2013) Database and data management requirements for equalization of contactless acquired traces for forensic purpose. In: DBforBFS workshop, BTW-workshops, pp 89–98. Köllen-Verlag
Kuivalainen K, Peiponen K, Myller K (2009) Application of a diffractive element-based sensor for detection of latent fingerprints from a curved smooth surface. Meas Sci Technol 20(7):1–3
Merkel R, Kraetzer C, Dittmann J, Vielhauer C (2011) Reversible watermarking with digital signature chaining for privacy protection of optical contactless captured biometric fingerprints—a capacity study for forensic approaches. In: DSP. IEEE, New York, pp 1–6
Pocs M, Stach B, Hildebrandt M, Kiltz S, Dittmann J (2012) Digital dactyloscopy: a first design proposal for a privacy preserving fingerprint scanning system. In: CYBERLAWS, pp 13–18
Schäler M, Schulze S, Kiltz S (2011) Database-centric chain-of-custody in biometric forensic systems. In: BioID. LNCS, vol 6583. Springer, Berlin, pp 250–261
Schäler M, Schulze S, Merkel R, Saake G, Dittmann J (2011) Reliable provenance information for multimedia data using invertible fragile watermarks. In: BNCOD. Springer, Berlin, pp 3–17
Schäler M, Schulze S, Saake G (2012) Toward provenance capturing as cross-cutting concern. In: TaPP, pp 12/1–12/5. USENIX
Watson C, Garris M, Tabassi E, Wilson C, Mccabe R, Janet S, Ko K User’s guide to NIST biometric image software (NBIS)
Acknowledgements
The work in this paper has been funded in part by the German Federal Ministry of Education and Science (BMBF) through the Research Program under Contract No. FKZ:13N10816 and FKZ:13N10817. In addition to that, parts of the data was acquired under FKZ:13N10818.
Author information
Authors and Affiliations
Corresponding author
Additional information
This is an extended version of the paper “Database and Data Management Requirements for Equalization of Contactless Acquired Traces for Forensic Purposes” [14], selected for the special DASP issue Best Workshop Papers of BTW 2013.
Rights and permissions
About this article
Cite this article
Kirst, S., Schäler, M. Database and Data Management Requirements for Equalization of Contactless Acquired Traces for Forensic Purposes—Provenance and Performance. Datenbank Spektrum 13, 201–211 (2013). https://doi.org/10.1007/s13222-013-0141-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13222-013-0141-y