Fingerprint

A fingerprint is an impression left by the friction ridges of a human finger. The recovery of partial fingerprints from a crime scene is an important method of forensic science. Moisture and grease on a finger result in fingerprints on surfaces such as glass or metal. Deliberate impressions of entire fingerprints can be obtained by ink or other substances transferred from the peaks of friction ridges on the skin to a smooth surface such as paper. Fingerprint records normally contain impressions from the pad on the last joint of fingers and thumbs, though fingerprint cards also typically record portions of lower joint areas of the fingers.

Human fingerprints are detailed, nearly unique, difficult to alter, and durable over the life of an individual, making them suitable as long-term markers of human identity. They may be employed by police or other authorities to identify individuals who wish to conceal their identity, or to identify people who are incapacitated or deceased and thus unable to identify themselves, as in the aftermath of a natural disaster.

Biology

The friction ridges on a finger

A fingerprint is formed on any opaque surface and is the impression of the friction ridges on the finger of a human.[1] The matching of two fingerprints is among the most widely used and most reliable biometric techniques. Fingerprint matching only considers the obvious features of a fingerprint.[2]

A friction ridge is a raised portion of the epidermis on the digits (fingers and toes), the palm of the hand or the sole of the foot, consisting of one or more connected ridge units of friction ridge skin. These are sometimes known as "epidermal ridges" which are caused by the underlying interface between the dermal papillae of the dermis and the interpapillary (rete) pegs of the epidermis. These epidermal ridges serve to amplify vibrations triggered, for example, when fingertips brush across an uneven surface, better transmitting the signals to sensory nerves involved in fine texture perception.[3] These ridges may also assist in gripping rough surfaces and may improve surface contact in wet conditions.[4]

Classification systems

A fingerprint arch.
A fingerprint loop.
A fingerprint whorl.
A fingerprint arch.

Before computerization, manual filing systems were used in large fingerprint repositories.[5] A fingerprint classification system groups fingerprints according to their characteristics and therefore helps in the matching of a fingerprint against a large database of fingerprints. A query fingerprint that needs to be matched can therefore be compared with a subset of fingerprints in an existing database.[2] Early classification systems were based on the general ridge patterns, including the presence or absence of circular patterns, of several or all fingers. This allowed the filing and retrieval of paper records in large collections based on friction ridge patterns alone. The most popular systems used the pattern class of each finger to form a numeric key to assist lookup in a filing system. Fingerprint classification systems included the Roscher System, the Juan Vucetich System and the Henry Classification System. The Roscher System was developed in Germany and implemented in both Germany and Japan. The Vucetich System was developed in Argentina and implemented throughout South America. The Henry Classification System was developed in India and implemented in most English-speaking countries.[5]

In the Henry Classification System there are three basic fingerprint patterns: loop, whorl, and arch,[6] which constitute 60–65 percent, 30–35 percent, and 5 percent of all fingerprints respectively. There are also more complex classification systems that break down patterns even further, into plain arches or tented arches,[5] and into loops that may be radial or ulnar, depending on the side of the hand toward which the tail points. Ulnar loops start on the pinky-side of the finger, the side closer to the ulna, the lower arm bone. Radial loops start on the thumb-side of the finger, the side closer to the radius. Whorls may also have sub-group classifications including plain whorls, accidental whorls, double loop whorls, peacock's eye, composite, and central pocket loop whorls.[5]

The system used by most experts, although complex, is similar to the Henry Classification System. It consists of five fractions, in which R stands for right, L for left, i for index finger, m for middle finger, t for thumb, r for ring finger and p(pinky) for little finger. The fractions are as follows:

Ri/Rt + Rr/Rm + Lt/Rp + Lm/Li + Lp/Lr

The numbers assigned to each print are based on whether or not they are whorls. A whorl in the first fraction is given a 16, the second an 8, the third a 4, the fourth a 2, and 0 to the last fraction. Arches and loops are assigned values of 0. Lastly, the numbers in the numerator and denominator are added up, using the scheme:

(Ri + Rr + Lt + Lm + Lp)/(Rt + Rm + Rp + Li + Lr)

A 1 is added to both top and bottom, to exclude any possibility of division by zero. For example, if the right ring finger and the left index finger have whorls, the fraction used is:

0/0 + 8/0 + 0/0 + 0/2 + 0/0 + 1/1

The resulting calculation is:

(0 + 8 + 0 + 0 + 0 + 1)/(0 + 0 + 0 + 2 + 0 + 1) = 9/3 = 3

Dactyloscopy

A fingerprint created by the friction ridge structure.

Fingerprint identification, known as dactyloscopy,[7] or hand print identification, is the process of comparing two instances of friction ridge skin impressions (see Minutiae), from human fingers or toes, or even the palm of the hand or sole of the foot, to determine whether these impressions could have come from the same individual. The flexibility of friction ridge skin means that no two finger or palm prints are ever exactly alike in every detail; even two impressions recorded immediately after each other from the same hand may be slightly different. Fingerprint identification, also referred to as individualization, involves an expert, or an expert computer system operating under threshold scoring rules, determining whether two friction ridge impressions are likely to have originated from the same finger or palm (or toe or sole).

An intentional recording of friction ridges is usually made with black printer's ink rolled across a contrasting white background, typically a white card. Friction ridges can also be recorded digitally, usually on a glass plate, using a technique called Live Scan. A "latent print" is the chance recording of friction ridges deposited on the surface of an object or a wall. Latent prints are invisible to the naked eye, whereas "patent prints" or "plastic prints" are viewable with the unaided eye. Latent prints are often fragmentary and require the use of chemical methods, powder, or alternative light sources in order to be made clear. Sometimes an ordinary bright flashlight will make a latent print visible.

When friction ridges come into contact with a surface that will take a print, material that is on the friction ridges such as perspiration, oil, grease, ink, or blood, will be transferred to the surface. Factors which affect the quality of friction ridge impressions are numerous. Pliability of the skin, deposition pressure, slippage, the material from which the surface is made, the roughness of the surface, and the substance deposited are just some of the various factors which can cause a latent print to appear differently from any known recording of the same friction ridges. Indeed, the conditions surrounding every instance of friction ridge deposition are unique and never duplicated. For these reasons, fingerprint examiners are required to undergo extensive training. The scientific study of fingerprints is called dermatoglyphics.

Fingerprinting techniques

Exemplar prints on paper using ink
Barely visible latent prints on a knife

Exemplar

Exemplar prints, or known prints, is the name given to fingerprints deliberately collected from a subject, whether for purposes of enrollment in a system or when under arrest for a suspected criminal offense. During criminal arrests, a set of exemplar prints will normally include one print taken from each finger that has been rolled from one edge of the nail to the other, plain (or slap) impressions of each of the four fingers of each hand, and plain impressions of each thumb. Exemplar prints can be collected using live scan or by using ink on paper cards.

Latent

In forensic science a partial fingerprint lifted from a surface, is called a latent fringerprint. Moisture and grease on fingers result in latent fingerprints on surfaces such as glass. But because they are not clearly visible their detection may require chemical development through powder dusting, the spraying of ninhydrin, iodine fuming, or soaking in silver nitrate.[8] Depending on the surface or the material on which a latent fingerprint has been found, different methods of chemical development must be used. Forensic scientists use different techniques for porous surfaces, such as paper, and nonporous surfaces, such as glass, metal or plastic.[9] Nonporous surfaces require the dusting process, where fine powder and a brush are used, followed by the application of transparent tape to lift the latent fingerprint off the surface.[10]

While the police often describe all partial fingerprints found at a crime scene as latent prints, forensic scientists call partial fingerprints that are readily visible patent prints. Chocolate, toner, paint or ink on fingers will result in patent fingerprints. Latent fingerprints impressions that are found on soft material, such as soap, cement or plaster, are called plastic prints by forensic scientists.[11]

Capture and detection

Live scan devices

Fingerprint being scanned
3D fingerprint[12]

Fingerprint image acquisition is considered to be the most critical step in an automated fingerprint authentication system, as it determines the final fingerprint image quality, which has a drastic effect on the overall system performance. There are different types of fingerprint readers on the market, but the basic idea behind each is to measure the physical difference between ridges and valleys.

All the proposed methods can be grouped into two major families: solid-state fingerprint readers and optical fingerprint readers. The procedure for capturing a fingerprint using a sensor consists of rolling or touching with the finger onto a sensing area, which according to the physical principle in use (optical, ultrasonic, capacitive, or thermal) captures the difference between valleys and ridges. When a finger touches or rolls onto a surface, the elastic skin deforms. The quantity and direction of the pressure applied by the user, the skin conditions and the projection of an irregular 3D object (the finger) onto a 2D flat plane introduce distortions, noise, and inconsistencies in the captured fingerprint image. These problems result in inconsistent and non-uniform irregularities in the image.[13] During each acquisition, therefore, the results of the imaging are different and uncontrollable. The representation of the same fingerprint changes every time the finger is placed on the sensor plate, increasing the complexity of any attempt to match fingerprints, impairing the system performance and consequently, limiting the widespread use of this biometric technology.

In order to overcome these problems, as of 2010, non-contact or touchless 3D fingerprint scanners have been developed. Acquiring detailed 3D information, 3D fingerprint scanners take a digital approach to the analog process of pressing or rolling the finger. By modelling the distance between neighboring points, the fingerprint can be imaged at a resolution high enough to record all the necessary detail.[14]

Fingerprinting dead humans

The human skin itself, which is a regenerating organ until death, and environmental factors such as lotions and cosmetics, pose challenges when fingerprinting a human. Following the death of a human the skin dries and cools. Obtaining fingerprints from a dead human, to aid identification, is hindered by the fact that only the coroner or medical examiner is allowed to examine the dead body. Fingerprints of dead humans may be obtained during an autopsy.[15]

Latent fingerprint detection

Use of fine powder and brush to reveal latent fingerprints
Fingerprint dusting of a burglary scene

In the 1930s criminal investigators in the United States first discovered the existence of latent fingerprints on the surfaces of fabrics, most notably on the insides of gloves discarded by perpetrators.[16]

Since the late nineteenth century, fingerprint identification methods have been used by police agencies around the world to identify suspected criminals as well as the victims of crime. The basis of the traditional fingerprinting technique is simple. The skin on the palmar surface of the hands and feet forms ridges, so-called papillary ridges, in patterns that are unique to each individual and which do not change over time. Even identical twins (who share their DNA) do not have identical fingerprints. The best way to render latent fingerprints visible, so that they can be photographed, can be complex and may depend, for example, on the type of surfaces on which they have been left. It is generally necessary to use a ‘developer’, usually a powder or chemical reagent, to produce a high degree of visual contrast between the ridge patterns and the surface on which a fingerprint has been deposited.

Developing agents depend on the presence of organic materials or inorganic salts for their effectiveness, although the water deposited may also take a key role. Fingerprints are typically formed from the aqueous-based secretions of the eccrine glands of the fingers and palms with additional material from sebaceous glands primarily from the forehead. This latter contamination results from the common human behaviors of touching the face and hair. The resulting latent fingerprints consist usually of a substantial proportion of water with small traces of amino acids and chlorides mixed with a fatty, sebaceous component which contains a number of fatty acids and triglycerides. Detection of a small proportion of reactive organic substances such as urea and amino acids is far from easy.

Fingerprints at a crime scene may be detected by simple powders, or by chemicals applied in situ. More complex techniques, usually involving chemicals, can be applied in specialist laboratories to appropriate articles removed from a crime scene. With advances in these more sophisticated techniques, some of the more advanced crime scene investigation services from around the world were, as of 2010, reporting that 50% or more of the fingerprints recovered from a crime scene had been identified as a result of laboratory-based techniques.

A city fingerprint identification room.

Forensic laboratories

Although there are hundreds of reported techniques for fingerprint detection, many of these are only of academic interest and there are only around 20 really effective methods which are currently in use in the more advanced fingerprint laboratories around the world.

Some of these techniques, such as ninhydrin, diazafluorenone and vacuum metal deposition, show great sensitivity and are used operationally. Some fingerprint reagents are specific, for example ninhydrin or diazafluorenone reacting with amino acids. Others such as ethyl cyanoacrylate polymerisation, work apparently by water-based catalysis and polymer growth. Vacuum metal deposition using gold and zinc has been shown to be non-specific, but can detect fat layers as thin as one molecule.

More mundane methods, such as the application of fine powders, work by adhesion to sebaceous deposits and possibly aqueous deposits in the case of fresh fingerprints. The aqueous component of a fingerprint, whilst initially sometimes making up over 90% of the weight of the fingerprint, can evaporate quite quickly and may have mostly gone after 24 hours. Following work on the use of argon ion lasers for fingerprint detection,[17] a wide range of fluorescence techniques have been introduced, primarily for the enhancement of chemically developed fingerprints; the inherent fluorescence of some latent fingerprints may also be detected. Fingerprints can for example be visualized in 3D and without chemicals by the use of infrared lasers.[18]

A comprehensive manual of the operational methods of fingerprint enhancement was last published by the UK Home Office Scientific Development Branch in 2013 and is used widely around the world.[19]

A technique proposed in 2007 aims to identify an individual's ethnicity, sex, and dietary patterns.[20]

Crime scene investigations

A fingerprint on a cartridge case.
A Kelvin probe scan of the same cartridge case with the fingerprint detected. The Kelvin probe can easily cope with the round surface of the cartridge case.

Another problem for the early twenty-first century is that during crime scene investigations, a decision has to be made at an early stage whether to attempt to retrieve fingerprints through the use of developers or whether to swab surfaces in an attempt to salvage material for DNA profiling. The two processes are mutually incompatible, as fingerprint developers destroy material that could potentially be used for DNA analysis, and swabbing is likely to make fingerprint identification impossible.

The application of the new scanning Kelvin probe (SKP) fingerprinting technique, which makes no physical contact with the fingerprint and does not require the use of developers, has the potential to allow fingerprints to be recorded whilst still leaving intact material that could subsequently be subjected to DNA analysis. A forensically usable prototype was under development at Swansea University during 2010, in research that was generating significant interest from the British Home Office and a number of different police forces across the UK, as well as internationally. The hope is that this instrument could eventually be manufactured in sufficiently large numbers to be widely used by forensic teams worldwide.[21][22]

Detection of drug use

The secretions, skin oils and dead cells in a human fingerprint contain residues of various chemicals and their metabolites present in the body. These can be detected and used for forensic purposes. For example, the fingerprints of tobacco smokers contain traces of cotinine, a nicotine metabolite; they also contain traces of nicotine itself. Caution should be used, as its presence may be caused by mere contact of the finger with a tobacco product. By treating the fingerprint with gold nanoparticles with attached cotinine antibodies, and then subsequently with a fluorescent agent attached to cotinine antibodies, the fingerprint of a smoker becomes fluorescent; non-smokers' fingerprints stay dark. The same approach, as of 2010, is being tested for use in identifying heavy coffee drinkers, cannabis smokers, and users of various other drugs.[23][24]

Police force databases

A city fingerprint identification office

Most American law enforcement agencies use Wavelet Scalar Quantization (WSQ), a wavelet-based system for efficient storage of compressed fingerprint images at 500 pixels per inch (ppi). WSQ was developed by the FBI, the Los Alamos National Lab, and the National Institute for Standards and Technology (NIST). For fingerprints recorded at 1000 ppi spatial resolution, law enforcement (including the FBI) uses JPEG 2000 instead of WSQ.

Validity

Fingerprints collected at a crime scene, or on items of evidence from a crime, have been used in forensic science to identify suspects, victims and other persons who touched a surface. Fingerprint identification emerged as an important system within police agencies in the late 19th century, when it replaced anthropometric measurements as a more reliable method for identifying persons having a prior record, often under a false name, in a criminal record repository.[7] Fingerprinting has served all governments worldwide during the past 100 years or so to provide identification of criminals. Fingerprints are the fundamental tool in every police agency for the identification of people with a criminal history.[7]

The validity of forensic fingerprint evidence has been challenged by academics, judges and the media. In the United States fingerprint examiners have not developed uniform standards for the identification of an individual based on matching fingerprints. In some countries where fingerprints are also used in criminal investigations, fingerprint examiners are required to match a number of identification points before a match is accepted. In England 16 identification points are required and in France 12, to match two fingerprints and identify an individual. Point-counting methods have been challenged by some fingerprint examiners because they focus solely on the location of particular characteristics in fingerprints that are to be matched. Fingerprint examiners may also uphold the one dissimilarity doctrine, which holds that if there is one dissimilarity between two fingerprints, the fingerprints are not from the same finger. Furthermore academics have argued that the error rate in matching fingerprints has not been adequately studied. And it has been argued that fingerprint evidence has no secure statistical foundation.[25] Research has been conducted into whether experts can objectively focus on feature information in fingerprints without being misled by extraneous information, such as context.[26]

Criticism

A recent study found that the improving cameras with increasing resolution of smartphones might have a high impact on users’ security: The back-facing camera of a device can be used to capture an image of the user's index finger, which on smartphones using biometric means of authentication is often used to authenticate a user against the smartphone.[27] At a Chaos Communication Congress a hardware hacker demonstrated how DSLRs with high resolution and equipped with a long focus lens can be used to capture images of hands, or more specifically, fingers in order to use them for spoofing.[28]

Professional certification

Fingerprinting was the basis upon which the first forensic professional organization was formed, the International Association for Identification (IAI), in 1915.[29] The first professional certification program for forensic scientists was established in 1977, the IAI's Certified Latent Print Examiner program, which issued certificates to those meeting stringent criteria and had the power to revoke certification where an individual's performance warranted it.[30] Other forensic disciplines have followed suit and established their own certification programs.[30]

History

Antiquity and the medieval period

Fingerprints have been found on ancient Babylonian clay tablets, seals, and pottery.[31] They have also been found on the walls of Egyptian tombs and on Minoan, Greek, and Chinese[32] In ancient China officials authenticated government documents with their fingerprints. In about 200 BC fingerprints were used to sign written contracts in Babylon.[33]

In Ancient India some texts called Naadi were written by a Rishi called Agastya where the text is said to predict the past, present, and future lives of all humans from just their thumb prints. The predictions are based on Naadi palm leaves, which are located in thumb impressions (right for men, left for women).[34] This ancient Indian system of astrology was called Nadi astrology.

With the advent of silk and paper in China, parties to a legal contract impressed their handprints on the document. Sometime before 851 CE, an Arab merchant in China, Abu Zayd Hasan, witnessed Chinese merchants using fingerprints to authenticate loans.[35]

Although ancient peoples probably did not realize that fingerprints could uniquely identify individuals,[36] references from the age of the Babylonian king Hammurabi (reigned 1792–1750 BCE) indicate that law officials would take the fingerprints of people who had been arrested.[37] During China's Qin Dynasty, records have shown that officials took hand prints, foot prints as well as finger prints as evidence from a crime scene.[38] In 650 the Chinese historian Kia Kung-Yen remarked that fingerprints could be used as a means of authentication. In his Jami al-Tawarikh (Universal History), the Iranian physician Rashid-al-Din Hamadani (1247–1318) refers to the Chinese practice of identifying people via their fingerprints, commenting: "Experience shows that no two individuals have fingers exactly alike."[39]

Europe in the 17th and 18th centuries

From the late 16th century onwards European academics attempted to include fingerprints in scientific studies. But plausible conclusions could only be established from the mid 17th century onwards. In 1686 the professor of anatomy at the University of Bologna Marcello Malpighi identified ridges, spirals and loops in fingerprints left on surfaces. In 1788 a German anatomist Johann Christoph Andreas Mayer was the first European to recognize that fingerprints were unique to each individual.[40] In 1880 Henry Faulds suggested, based on his studies, that fingerprints are unique to a human.[41]

19th century

Nine fingerprint patterns identified by Jan Evangelista Purkyně.
Fingerprints taken by William Herschel 1859/60
Fingerprints used instead of signatures on an Indian legal document of 1952.

In 1823 Jan Evangelista Purkyně identified nine fingerprint patterns. The nine patterns include the tented arch, the loop, and the whorl, which in modern day forensics are considered ridge details.[42] In 1840, following the murder of Lord William Russell, a provincial doctor, Robert Blake Overton, wrote to Scotland Yard suggesting checking for fingerprints.[43] In 1853 the German anatomist Georg von Meissner (1829–1905) studied friction ridges,[44] and in 1858 Sir William James Herschel initiated fingerprinting in India. In 1877 he first instituted the use of fingerprints on contracts and deeds to prevent the repudiation of signatures in Hooghly near Kolkata[45] and he registered government pensioners' fingerprints to prevent the collection of money by relatives after a pensioner's death.[46]

In 1880 Henry Faulds, a Scottish surgeon in a Tokyo hospital, published his first paper on the usefulness of fingerprints for identification and proposed a method to record them with printing ink.[47] Returning to Great Britain in 1886, he offered the concept to the Metropolitan Police in London but it was dismissed at that time.[48] Up until the early 1890s police forces in the United States and on the European continent could not reliably identify criminals to track their criminal record.[49] Francis Galton published a detailed statistical model of fingerprint analysis and identification in his 1892 book Finger Prints. He had calculated that the chance of a "false positive" (two different individuals having the same fingerprints) was about 1 in 64 billion.[50] In 1892 Juan Vucetich, an Argentine chief police officer, created the first method of recording the fingerprints of individuals on file. In that same year, Francisca Rojas was found in a house with neck injuries, whilst her two sons were found dead with their throats cut. Rojas accused a neighbour, but despite brutal interrogation, this neighbour would not confess to the crimes. Inspector Alvarez, a colleague of Vucetich, went to the scene and found a bloody thumb mark on a door. When it was compared with Rojas' prints, it was found to be identical with her right thumb. She then confessed to the murder of her sons.

In Kolkata a fingerprint Bureau was established in 1897, after the Council of the Governor General approved a committee report that fingerprints should be used for the classification of criminal records. The bureau employees Azizul Haque and Hem Chandra Bose have been credited with the primary development of a fingerprint classification system eventually named after their supervisor, Sir Edward Richard Henry.[51]

20th century

The French scientist Paul-Jean Coulier developed a method to transfer latent fingerprints on surfaces to paper using iodine fuming. It allowed the London Scotland Yard to start fingerprinting individuals and identify criminals using fingerprints in 1901. Soon after, American police departments adopted the same method and fingerprint identification became a standard practice in the United States.[49] The Scheffer case of 1902 is the first case of the identification, arrest, and conviction of a murderer based upon fingerprint evidence. Alphonse Bertillon identified the thief and murderer Scheffer, who had previously been arrested and his fingerprints filed some months before, from the fingerprints found on a fractured glass showcase, after a theft in a dentist's apartment where the dentist's employee was found dead. It was able to be proved in court that the fingerprints had been made after the showcase was broken.[52]

The identification of individuals through fingerprints for law enforcement has been considered essential in the United States since the beginning of the 20th century. Body identification using fingerprints has also been valuable in the aftermath of natural disasters and anthropogenic hazards.[53] In the United States, the FBI manages a fingerprint identification system and database called the Integrated Automated Fingerprint Identification System (IAFIS), which currently holds the fingerprints and criminal records of over 51 million criminal record subjects and over 1.5 million civil (non-criminal) fingerprint records. US Visit currently holds a repository of the fingerprints of over 50 million non-US citizens, primarily in the form of two-finger records.

Women clerical employees of the Los Angeles Police Department being fingerprinted and photographed in 1928.

In 1910 Edmond Locard established the first forensic lab in France.[49] Criminals may wear gloves to avoid leaving fingerprints. However, the gloves themselves can leave prints that are as unique as human fingerprints. After collecting glove prints, law enforcement can match them to gloves that they have collected as evidence or to prints collected at other crime scenes.[54] In many jurisdictions the act of wearing gloves itself while committing a crime can be prosecuted as an inchoate offense.[55]

Use of fingerprints in schools

The non-governmental organization (NGO) Privacy International in 2002 made the cautionary announcement that tens of thousands of UK school children were being fingerprinted by schools, often without the knowledge or consent of their parents.[56] That same year, the supplier Micro Librarian Systems, which uses a technology similar to that used in US prisons and the German military, estimated that 350 schools throughout Britain were using such systems to replace library cards.[56] By 2007, it was estimated that 3,500 schools were using such systems.[57] Under the United Kingdom Data Protection Act, schools in the UK do not have to ask parental consent to allow such practices to take place. Parents opposed to fingerprinting may only bring individual complaints against schools.[58] In response to a complaint which they are continuing to pursue, in 2010 the European Commission expressed 'significant concerns' over the proportionality and necessity of the practice and the lack of judicial redress, indicating that the practice may break the European Union data protection directive.[59]

In March 2007, the UK government was considering fingerprinting all children aged 11 to 15 and adding the prints to a government database as part of a new passport and ID card scheme and disallowing opposition for privacy concerns. All fingerprints taken would be cross-checked against prints from 900,000 unsolved crimes. Shadow Home secretary David Davis called the plan "sinister". The Liberal Democrat home affairs spokesman Nick Clegg criticised "the determination to build a surveillance state behind the backs of the British people".[57] The UK's junior education minister Lord Adonis defended the use of fingerprints by schools to track school attendance as well as access to school meals and libraries. Lord Adonis reassured the House of Lords that the children's fingerprints had been taken with the consent of the parents and would be destroyed once children left the school.[60] An Early Day Motion which called on the UK Government to conduct a full and open consultation with stakeholders about the use of biometrics in schools, secured the support of 85 Members of Parliament (Early Day Motion 686).[61] Following the establishment in the United Kingdom of a Conservative and Liberal Democratic coalition government in May 2010, the UK ID card scheme was scrapped.[62]

Serious concerns about the security implications of using conventional biometric templates in schools have been raised by a number of leading IT security experts,[63] one of whom has voiced the opinion that "it is absolutely premature to begin using 'conventional biometrics' in schools".[64] The vendors of biometric systems claim that their products bring benefits to schools such as improved reading skills, decreased wait times in lunch lines and increased revenues.[65] They do not cite independent research to support this view. One education specialist wrote in 2007: "I have not been able to find a single piece of published research which suggests that the use of biometrics in schools promotes healthy eating or improves reading skills amongst children... There is absolutely no evidence for such claims".[66] The Ottawa Police in Canada have advised parents who fear their children may be kidnapped, to fingerprint their children.[67]

Consumer electronics login authentication

The fingerprint sensor of a Lenovo ThinkPad T440p, released in 2013.

Since 2000 electronic fingerprint readers have been introduced as consumer electronics security applications. Fingerprint sensors could be used for login authentication and the identification of computer users. However, some less sophisticated sensors have been discovered to be vulnerable to quite simple methods of deception, such as fake fingerprints cast in gels. In 2006, fingerprint sensors gained popularity in the laptop market. Built-in sensors in laptops, such as ThinkPads, VAIO, HP Pavilion and EliteBook laptops, and others also double as motion detectors for document scrolling, like the scroll wheel.

Two of the first smartphone manufacturers to integrate fingerprint recognition into their phones were Motorola with the Atrix 4G in 2011 and Apple with the iPhone 5S on September 10, 2013. One month after, HTC launched the One Max, which also included fingerprint recognition. In April 2014, Samsung released the Galaxy S5, which integrated a fingerprint sensor on the home button.[68]

Following the release of the iPhone 5S model, a group of German hackers announced on September 21, 2013, that they had bypassed Apple's new Touch ID fingerprint sensor by photographing a fingerprint from a glass surface and using that captured image as verification. The spokesman for the group stated: "We hope that this finally puts to rest the illusions people have about fingerprint biometrics. It is plain stupid to use something that you can't change and that you leave everywhere every day as a security token."[69] In September 2015, Apple included a fingerprint scanner in the iPhone home button with the iPhone 6s. The use of the Touch ID fingerprint scanner was optional and could be configured to unlock the screen or pay for mobile apps purchases.[70] Since December 2015, cheaper smartphones with fingerprint recognition have been released, such as the $100 UMI Fair.[68] Samsung also recently introduced fingerprint sensors to its mid-range A-series smartphones.

By 2017 Hewlett Packard, Asus, Huawei, Lenovo and Apple were using fingerprint readers in their laptops.[71][72][73] Synaptics says the SecurePad sensor is now available for OEMs to start building into their laptops.[74] In the newest smartphones, the fingerprint reader is being integrated into the whole touchscreen display instead of as a separate sensor.

Other uses

Welfare claimants

It has been alleged that taking the fingerprints of welfare recipients as identification serves as a social stigma that evokes cultural images associated with the processing of criminals.[75]

Absence or mutilation of fingerprints

A very rare medical condition, adermatoglyphia, is characterized by the absence of fingerprints. Affected persons have completely smooth fingertips, palms, toes and soles, but no other medical signs or symptoms.[76] A 2011 study indicated that adermatoglyphia is caused by the improper expression of the protein SMARCAD1.[77] The condition has been called immigration delay disease by the researchers describing it, because the congenital lack of fingerprints causes delays when affected persons attempt to prove their identity while traveling.[76] Only five families with this condition have been described as of 2011.[78]

People with Naegeli–Franceschetti–Jadassohn syndrome and dermatopathia pigmentosa reticularis, which are both forms of ectodermal dysplasia, also have no fingerprints. Both of these rare genetic syndromes produce other signs and symptoms as well, such as thin, brittle hair.

Criminal Alvin Karpis had his fingerprints surgically removed in 1933

The anti-cancer medication capecitabine may cause the loss of fingerprints.[79] Swelling of the fingers, such as that caused by bee stings, will in some cases cause the temporary disappearance of fingerprints, though they will return when the swelling recedes.

Since the elasticity of skin decreases with age, many senior citizens have fingerprints that are difficult to capture. The ridges get thicker; the height between the top of the ridge and the bottom of the furrow gets narrow, so there is less prominence.[80]

Fingerprints can be erased permanently and this can potentially be used by criminals to reduce their chance of conviction. Erasure can be achieved in a variety of ways including simply burning the fingertips, using acids and advanced techniques such as plastic surgery.[81][82][83][84][85] John Dillinger burned his fingers with acid, but prints taken during a previous arrest and upon death still exhibited almost complete relation to one another.[86]

Fingerprint verification

Ridge ending
Bifurcation
Short ridge (dot)

Fingerprints can be captured as graphical ridge and valley patterns. Because of their uniqueness and permanence, fingerprints emerged as the most widely used biometric identifier in the 2000s. Automated fingerprint verification systems were developed to meet the needs of law enforcement and their use became more widespread in civilian applications. Despite being deployed more widely, reliable automated fingerprint verification remained a challenge and was extensively researched in the context of pattern recognition and image processing. The uniqueness of a fingerprint can be established by the overall pattern of ridges and valleys, or the logical ridge dicontinuities known as minutiae. In the 2000s minutiae features were considered the most discriminating and reliable feature of a fingerprint. Therefore the recognition of minutiae features became the most common basis for automated fingerprint verification. The most widely used minutiae features used for automated fingerprint verification were the ridge ending and the ridge bifurcation.[87]

Patterns

The three basic patterns of fingerprint ridges are the arch, loop, and whorl:

  • arch: The ridges enter from one side of the finger, rise in the center forming an arc, and then exit the other side of the finger.
  • loop: The ridges enter from one side of a finger, form a curve, and then exit on that same side.
  • whorl: Ridges form circularly around a central point on the finger.

Scientists have found that family members often share the same general fingerprint patterns, leading to the belief that these patterns are inherited.

Minutiae features

Features of fingerprint ridges, called minutiae, include:[88]

  • ridge ending: The abrupt end of a ridge
  • bifurcation: A single ridge dividing in two
  • short or independent ridge: A ridge that commences, travels a short distance and then ends
  • island or dot: A single small ridge inside a short ridge or ridge ending that is not connected to all other ridges
  • lake or ridge enclosure: A single ridge that bifurcates and reunites shortly afterward to continue as a single ridge
  • spur: A bifurcation with a short ridge branching off a longer ridge
  • bridge or crossover: A short ridge that runs between two parallel ridges
  • delta: A Y-shaped ridge meeting
  • core: A circle in the ridge pattern

Fingerprint sensors

A fingerprint sensor is an electronic device used to capture a digital image of the fingerprint pattern. The captured image is called a live scan. This live scan is digitally processed to create a biometric template (a collection of extracted features) which is stored and used for matching. Many technologies have been used including optical, capacitive, RF, thermal, piezoresistive, ultrasonic, piezoelectric, MEMS.[89]

  • Optical scanners take a visual image of the fingerprint using a digital camera.
  • Capacitive or CMOS scanners use capacitors and thus electrical current to form an image of the fingerprint.
  • Ultrasound fingerprint scanners use high frequency sound waves to penetrate the epidermal (outer) layer of the skin.
  • Thermal scanners sense the temperature differences on the contact surface, in between fingerprint ridges and valleys.

Video

Videos have become a pronounced way of identifying information. There are features in videos that look at how intense certain parts of a frame are compared to others which help with identification.[90]

Algorithms

Matching algorithms are used to compare previously stored templates of fingerprints against candidate fingerprints for authentication purposes. In order to do this either the original image must be directly compared with the candidate image or certain features must be compared.

Pre-processing

Pre-processing helped enhancing the quality of an image by filtering and removing unnecessary noises. The minutiae based algorithm only worked effectively in 8-bit gray scale fingerprint image. A reason was that an 8-bit gray fingerprint image was a fundamental base to convert the image to 1-bit image with value 0 for ridges and value 1 for furrows. As a result, the ridges were highlighted with black color while the furrows were highlighted with white color. This process partly removed some noises in an image and helped enhance the edge detection. Furthermore, there are two more steps to improve the best quality for the input image: minutiae extraction and false minutiae removal. The minutiae extraction was carried out by applying ridge thinning algorithm which was to remove redundant pixels of ridges. As a result, the thinned ridges of the fingerprint image are marked with a unique ID so that further operation can be conducted. After the minutiae extraction step, the false minutiae removal was also necessary. The lack of the amount of ink and the cross link among the ridges could cause false minutiae that led to inaccuracy in fingerprint recognition process.

Pattern-based (or image-based) algorithms

Pattern based algorithms compare the basic fingerprint patterns (arch, whorl, and loop) between a previously stored template and a candidate fingerprint. This requires that the images can be aligned in the same orientation. To do this, the algorithm finds a central point in the fingerprint image and centers on that. In a pattern-based algorithm, the template contains the type, size, and orientation of patterns within the aligned fingerprint image. The candidate fingerprint image is graphically compared with the template to determine the degree to which they match.

In other species

Some other animals have evolved their own unique prints, especially those whose lifestyle involves climbing or grasping wet objects; these include many primates, such as gorillas and chimpanzees, Australian koalas, and aquatic mammal species such as the North American fisher.[91] According to one study, even with an electron microscope, it can be quite difficult to distinguish between the fingerprints of a koala and a human.[92]

In fiction

Mark Twain

Mark Twain's memoir Life on the Mississippi (1883), notable mainly for its account of the author's time on the river, also recounts parts of his later life, and includes tall tales and stories allegedly told to him. Among them is an involved, melodramatic account of a murder in which the killer is identified by a thumbprint.[93] Twain's novel Pudd'nhead Wilson, published in 1893, includes a courtroom drama that turns on fingerprint identification.

Crime fiction

The use of fingerprints in crime fiction has, of course, kept pace with its use in real-life detection. Sir Arthur Conan Doyle wrote a short story about his celebrated sleuth Sherlock Holmes which features a fingerprint: "The Norwood Builder" is a 1903 short story set in 1894 and involves the discovery of a bloody fingerprint which helps Holmes to expose the real criminal and free his client.

The British detective writer R. Austin Freeman's first Thorndyke novel The Red Thumb-Mark was published in 1907 and features a bloody fingerprint left on a piece of paper together with a parcel of diamonds inside a safe-box. These become the center of a medico-legal investigation led by Dr. Thorndyke, who defends the accused whose fingerprint matches that on the paper, after the diamonds are stolen.

Film and television

In the television series Bonanza (1959–1973) the Chinese character Hop Sing uses his knowledge of fingerprints to free Little Joe from a murder charge.

The 1997 movie Men in Black required Agent J to remove his ten fingerprints by putting his hands on a metal ball, an action deemed necessary by the MIB agency to remove the identity of its agents.

In the 2009 science fiction movie Cold Souls, a mule who smuggles souls wears latex fingerprints to frustrate airport security terminals. She can change her identity by simply changing her wig and latex fingerprints.

See also

  • Authentication
  • Biometrics
  • Biometric technology in access control
  • Eye vein verification
  • Feature extraction
  • Fingerprint Verification Competition
  • Finger Vein recognition
  • Footprint
  • Heredity
  • Iris recognition
  • Medical ultrasonography
  • Minutiae
  • Piezoelectricity
  • Touch ID
  • Shirley McKie, misidentified fingerprint

References

  1. Jude Hemanth & Valentina Emilia Balas, ed. (2018). Biologically Rationalized Computing Techniques For Image Processing Applications. Springer. p. 116. ISBN 9783319613161.
  2. Stan Z. Li (2009). Encyclopedia of Biometrics: I - Z Volume 2. Springer Science & Business Media. p. 439. ISBN 9780387730028.
  3. Roberta Kwok (January 29, 2009). "Fake finger reveals the secrets of touch". Nature.
  4. "Fingerprint grip theory rejected". BBC. June 12, 2009.
  5. Engert, Gerald J. (1964). "International Corner". Identification News. 14 (1).
  6. Henry, Edward R., Sir (1900). "Classification and Uses of Finger Prints" (PDF). London: George Rutledge & Sons, Ltd. Archived from the original (PDF) on October 13, 2006.
  7. Ashbaugh, David R. "Ridgeology" (PDF). Royal Canadian Mounted Police. Archived (PDF) from the original on May 23, 2013. Retrieved October 26, 2013.
  8. Davide Maltoni, Dario Maio, Anil K. Jain & Salil Prabhakar (2009). Handbook of Fingerprint Recognition. Springer Science & Business Media. p. 62. ISBN 9781848822542.CS1 maint: uses authors parameter (link)
  9. Stephen P. Kasper (2015). Latent Print Processing Guide. Academic Press. p. 4. ISBN 9780128035436.
  10. Stephen P. Kasper (2015). Latent Print Processing Guide. Academic Press. p. 5. ISBN 9780128035436.
  11. Ronald F. Becker & Aric W. Dutelle (2018). Criminal Investigation. Jones & Bartlett Learning. p. 133. ISBN 9781284082852.CS1 maint: uses authors parameter (link)
  12. Kremen, Rachel (September 2009). "Touchless 3-D Fingerprinting: A new system offers better speed and accuracy". Technology Review. Retrieved March 17, 2010.
  13. Ross A. Jain (2004). Estimating fingerprint deformation. Proceedings of the International Conference on Biometric Authentication (ICBA).
  14. Wang, Yongchang; Q. Hao; A. Fatehpuria; D. L. Lau; L. G. Hassebrook (2009). "Data Acquisition and Quality Analysis of 3-Dimensional Fingerprints". Florida: IEEE conference on Biometrics, Identity and Security.
  15. Hillary Moses Daluz (2014). Fundamentals of Fingerprint Analysis. CRC Press. p. 186. ISBN 9781466597983.
  16. "O'Dougherty Urges All Be Fingerprinted: U.S. Attorney Describes Sciences of Crime Detection to Democrats". The Brooklyn Daily Eagle. March 8, 1938. Archived from the original on July 14, 2014. Retrieved July 1, 2014.
  17. Dalrymple, BE; Duff, JM; Menzel, ER. (1977). "Inherent fingerprint luminescence – detection by laser". Journal of Forensic Sciences. 22 (1): 106–15. Bibcode:1977SPIE..108..118D. doi:10.1117/12.955491.
  18. „Spectroscopic IR laser scanner revealed“ in Microscopy & Analysis, July 6, 2018, Google Patent for Patent DE102014203918B4 Archived February 11, 2017, at the Wayback Machine concerning Methode and apparatus for detecting the surface structure and texture of a sample, "Fingerabdruck-Scanner" in pvt. Polizei Verkehr Technik. Fachzeitschrift für Polizei- und Verkehrsmanagement, Technik und Ausstattung 2017, 43, "Digitaler Pinsel macht Forensik schneller" in Rhein-Zeitung vom 20. Dezember 2016 Archived January 30, 2017, at the Wayback Machine
  19. Fingerprint Source Book: manual of development techniques, published 26 March 2013 Archived February 11, 2017, at the Wayback Machine retrieved on February 9, 2017; see also Max M. Houck (Ed.): Forensic Fingerprints, London 2016, p. 21, 50 er seq. Archived December 28, 2017, at the Wayback Machine.
  20. Fleming, Nic (August 3, 2007). "Fingerprints can reveal race and sex". The Telegraph, AKA The Daily Telegraph, London. Telegraph Media Group Limited. Archived from the original on March 30, 2015. Retrieved October 27, 2018.
  21. Ward, Mark (April 2006). "Fingerprints hide lifestyle clues". BBC. Archived from the original on September 9, 2007. Retrieved March 17, 2010.
  22. "Bombers Tracked By New Technique". SkyNews. April 2006. Archived from the original on October 14, 2007. Retrieved March 17, 2010.
  23. Paul Marks (May 18, 2007) "New fingerprint analysis identifies smokers" Archived June 10, 2015, at the Wayback Machine, New Scientist (on-line version).
  24. Tom Simonite (April 3, 2006) "Fingerprints reveal clues to suspects' habits" Archived June 10, 2015, at the Wayback Machine, New Scientist (on-line version).
  25. Paul Roberts (2017). Expert Evidence and Scientific Proof in Criminal Trials. Routledge. ISBN 9781351567398.
  26. Dror, I.E., Charlton, D. and Péron, A.E. (2006) "Contextual information renders experts vulnerable to making erroneous identifications", Forensic Science International, Vol. 156, Iss. 1, pp. 74–78.
  27. Tobias Fiebig, Jan Krissler & Ronny Hänsch (August 19, 2014). "Security Impact of High Resolution Smartphone Cameras". Usenix Association.CS1 maint: uses authors parameter (link)
  28. starbug. "Ich sehe, also bin ich ... Du: Gefahren von Kameras für (biometrische) Authentifizierungsverfahren".
  29. "International Association for Identification History, retrieved August 2006". Theiai.org. Archived from the original on September 17, 2012. Retrieved September 14, 2012.
  30. Bonebrake, George J (1978). "Report on the Latent Print Certification Program". Identification News. 28 (3).
  31. "History of the finger-print system".
  32. "Finger prints found on pottery".
  33. Houbing Song, Glenn A. Fink & Sabina Jeschke (2017). Security and Privacy in Cyber-Physical Systems: Foundations, Principles, and Applications. John Wiley & Sons. p. 189. ISBN 9781119226048.CS1 maint: uses authors parameter (link)
  34. Kris Dhingra (October 12, 2007). "Nadi Astrology – Opening The Leaf To Your Future". Delhi Planet, India. Retrieved June 28, 2012.
  35. Reinaud, Joseph Toussaint (1845). "Relation des voyages faits par les Arabes et les Persans dans l'Inde et a la Chine dans le IX Siecle". I. Paris: Imprimerie royale: 42. Cite journal requires |journal= (help)
  36. Cummins, Harold (1941). "Ancient finger prints in clay". The Scientific Monthly. 52 (5): 389–402. Bibcode:1941SciMo..52..389C. Reprinted in Journal of Criminal Law and Criminology, volume 34, 4, pp. 468–81, November–December 1941
  37. Ashbaugh (1999), p. 15.
  38. 千余學者摸清我國民族膚紋 "家底" 南北是一家 (in Chinese). Archived from the original on February 13, 2010.
  39. Cole, Simon (2001). Suspect Identities: A history of fingerprinting and criminal identification. Cambridge, Massachusetts: Harvard University Press. pp. 60–61. ISBN 978-0-674-00455-9.
  40. Mayer, Johann Christoph Andreas (1788). Anatomische Kupfertafeln nebst dazu gehörigen Erklärungen [Anatomical Illustrations (etchings) with Accompanying Explanations, volume 4]. Berlin, Prussia: Georg Jacob Decker und Sohn. p. 5.
  41. Stan Z. Li (2009). Encyclopedia of Biometrics: I - Z Volume 2. Springer Science & Business Media. p. 510. ISBN 9780387730028.
  42. Andy Williams (2014). Forensic Criminology. Routledge. p. 155. ISBN 9781136233982.
  43. Dalya Alberge (December 9, 2012). "Vital clue ignored for 50 years". Independent. London. Retrieved December 28, 2015.
  44. Georg von Meissner (1853). Beiträge zur Anatomie und Physiologie der Haut [Contributions to the Anatomy and Physiology of the Skin]. Leipzig, Saxony: Leopold Voss.
  45. William J Herschel (1916). The Origin of Finger-Printing. Oxford University Press. ISBN 978-1-104-66225-7.
  46. William James Herschel (November 25, 1880). "Skin furrows of the hand". Nature. 23 (578): 76. Bibcode:1880Natur..23...76H. doi:10.1038/023076b0.
  47. Henry Faulds (October 28, 1880). "On the skin-furrows of the hand" (PDF). Nature. 22 (574): 605. Bibcode:1880Natur..22..605F. doi:10.1038/022605a0.
  48. Donald L. Reid (2003). "Dr. Henry Faulds – Beith Commemorative Society". Journal of Forensic Identification. 53 (2).
  49. Wilbur R. Miller (2012). The Social History of Crime and Punishment in America: An Encyclopedia. SAGE Publications. ISBN 9781483305936.
  50. Galton, Francis (1892). "Finger Prints" (PDF). London: MacMillan and Co.
  51. Tewari, RK; Ravikumar, KV (2000). "History and development of forensic science in India". J Postgrad Med (46): 303–08.
  52. Berlière, Jean-Marc (October 16, 1902). "Arrestation du premier assassin confondu par ses empreintes digitales". Célébrations Nationales.
  53. Ashraf Mozayani & Carla Noziglia (2010). The Forensic Laboratory Handbook Procedures and Practice. Springer Science & Business Media. p. 146. ISBN 9781607618720.CS1 maint: uses authors parameter (link)
  54. Sawer, Patrick (December 13, 2008). "Police use glove prints to catch criminals". Telegraph.co.uk. Archived from the original on January 13, 2012. Retrieved September 14, 2012.
  55. James W.H. McCord and Sandra L. McCord, Criminal Law and Procedure for the paralegal: a systems approach, supra, p. 127.
  56. Fingerprinting of UK school kids causes outcry Archived August 10, 2017, at the Wayback Machine, The Register, July 22, 2002 (in English)
  57. Child fingerprint plan considered Archived March 15, 2007, at the Wayback Machine, BBC, March 4, 2007 (in English)
  58. Schools can fingerprint children without parental consent Archived August 10, 2017, at the Wayback Machine, The Register, September 7, 2006 (in English)
  59. Europe tells Britain to justify itself over fingerprinting children in schools Archived January 20, 2011, at the Wayback Machine Telegraph, published 2010-12-14, accessed January 13, 2011
  60. "Peers slam school fingerprinting". BBC News. March 19, 2007. Archived from the original on March 29, 2007. Retrieved September 2, 2010.
  61. "EDM 686 – Biometric Data Collection In Schools". UK Parliament. January 19, 2007. Archived from the original on August 29, 2007. Retrieved November 28, 2009.
  62. BBC News Channel, May 27, 2010.
  63. Cavoukian, A and Stoianov, A. 2007. Biometric Encrypton: A Positive-Sum Technology that Achieves Strong Authentication, Security and Privacy Archived June 14, 2007, at the Wayback Machine.
  64. Kim Cameron, architect of identity and access in the Connected Systems Division at Microsoft. blog Archived September 27, 2007, at the Wayback Machine
  65. "Fingerprint Software Eliminates Privacy Concerns and Establishes Success". FindBiometrics. Archived from the original on March 14, 2009. Retrieved September 14, 2012.
  66. 2007. Dr. Sandra Leaton Gray of Homerton College, Cambridge: professional opinion Archived June 20, 2007, at the Wayback Machine.
  67. Child Print Archived May 2, 2007, at the Wayback Machine (Ottawa Police Service) (in English)/(in French)
  68. "List of All Fingerprint Scanner Enabled Smartphones". Webcusp. April 24, 2018.
  69. Stephen Musil (September 22, 2013). "Hackers claim to have defeated Apple's Touch ID print sensor". Cnet. CBS Interactive Inc. Retrieved September 23, 2013.
  70. Ian Lamont (2015). iPhone 6 & iPhone 6S In 30 Minutes: The unofficial guide to the iPhone 6 and iPhone 6S, including basic setup, easy iOS tweaks, and time-saving tips. i30 Media. ISBN 9781939924506.
  71. "HP Spectre x360 (2017) review: The best just keeps getting better". PCWorld. Archived from the original on July 10, 2017. Retrieved August 16, 2017.
  72. "Asus Transformer Pro T304 is a Surface Pro clone that kills it on price". Digital Trends. July 28, 2017. Archived from the original on August 15, 2017. Retrieved August 16, 2017.
  73. "Lenovo ThinkPad T570 Review". Archived from the original on August 16, 2017. Retrieved August 16, 2017.
  74. "Coming soon: laptops with fingerprint sensors built into the touchpad". Engadget. Archived from the original on August 16, 2017. Retrieved August 16, 2017.
  75. Murray, Harry (March 2000). "Deniable Degradation: The Finger-Imaging of Welfare Recipients". Sociological Forum. 15 (1): 39–63. doi:10.1023/A:1007594003722. ISSN 0884-8971.
  76. Burger, B.; Fuchs, D.; Sprecher, E.; Itin, P. (May 2011). "The immigration delay disease: adermatoglyphia-inherited absence of epidermal ridges". J Am Acad Dermatol. 64 (5): 974–80. doi:10.1016/j.jaad.2009.11.013. PMID 20619487.
  77. "The Mystery of the Missing Fingerprints". Archived from the original on February 16, 2016.
  78. Nousbeck, J; Burger, B; Fuchs-Telem, D; et al. (August 2011). "A Mutation in a Skin-Specific Isoform of SMARCAD1 Causes Autosomal-Dominant Adermatoglyphia". American Journal of Human Genetics. 89 (2): 302–07. doi:10.1016/j.ajhg.2011.07.004. PMC 3155166. PMID 21820097.
  79. Wong M, Choo SP, Tan EH (July 2009). "Travel warning with capecitabine". Annals of Oncology. 20 (7): 1281. doi:10.1093/annonc/mdp278. PMID 19470576.
  80. Harmon, Katherine (March 29, 2009). "Can You Lose Your Fingerprints?". Scientific American. Archived from the original on April 18, 2012.
  81. Fingerprint Alteration Archived June 2, 2012, at the Wayback Machine Biometrics research group, Michigan State University.
  82. "Fingerprint alteration" (PDF). Archived (PDF) from the original on July 11, 2012. Retrieved September 14, 2012.
  83. "Fingerprint alteration" (PDF). Archived from the original (PDF) on July 18, 2012. Retrieved September 14, 2012.
  84. "Changing of fingerprints". Scafo.org. Archived from the original on July 18, 2012. Retrieved September 14, 2012.
  85. "Fingerprints, detailed information". Forensic-medecine.info. Archived from the original on September 10, 2012. Retrieved September 14, 2012.
  86. Abel, David (July 21, 2010). "To avoid ID, more [Americans] are mutilating fingerprints". Boston Globe. Archived from the original on July 23, 2010.
  87. Seong-Whan Lee & Stan Z. Li, eds. (2007). Advances in Biometrics: International Conference, ICB 2007, Seoul, Korea, August 27-29, 2007, Proceedings. Springer Science & Business Media. p. 484. ISBN 9783540745488.CS1 maint: uses editors parameter (link)
  88. Davide Maltoni; Dario Maio; Anil K. Jain; Salil Prabhakar (April 21, 2009). Handbook of Fingerprint Recognition. Springer Science & Business Media. p. 216. ISBN 978-1-84882-254-2.
  89. Wasserman, Philip (December 26, 2005). "Solid-State Fingerprint Scanners – A Survey of Technologies" (PDF). Archived from the original (PDF) on January 17, 2016. Retrieved October 18, 2015.
  90. Jiang, DaYou; Kim, Jongweon; Jiang, DaYou; Kim, Jongweon (September 26, 2018). "Video Searching and Fingerprint Detection by Using the Image Query and PlaceNet-Based Shot Boundary Detection Method". Applied Sciences. 8 (10): 1735. doi:10.3390/app8101735.
  91. "Animal fingerprints". Archived from the original on January 10, 2009. Retrieved September 2, 2010.
  92. Henneberg, Maciej; Lambert, Kosette M.; Leigh, Chris M. (1997). "Fingerprint homoplasy: koalas and humans". NaturalSCIENCE.com. 1 (4). Archived from the original on November 14, 2006.
  93. Mark Twain (Samuel Clemens). "The Project Gutenberg EBook of Life On The Mississippi". Archived from the original on October 13, 2011. Retrieved November 24, 2011.
General
Errors and concerns
Science and statistics
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.