Facial composite

(Redirected from Police sketch)

A facial composite is a graphical representation of one or more eyewitnesses' memories of a face, as recorded by a composite artist. Facial composites are used mainly by police in their investigation of (usually serious) crimes. These images are used to reconstruct the suspect's face in hope of identifying them. Facial reconstruction can also be used in archeological studies to get a visualization of ancient mummies or human remains.[1]

Composite sketch of D. B. Cooper, who hijacked an airplane in 1971

Methods

edit

Hand-drawing

edit

Construction of the composite was originally only performed by a trained artist, through drawing, sketching, or painting, in consultation with a witness or crime victim. The FBI claims that hand-drawing is its preferred method for constructing a facial composite.[citation needed]

Feature-based selection

edit

Feature-based systems essentially rely on the selection of individual features in isolation. Individual facial features (eyes, nose, mouth, eyebrows, etc.) are selected one at a time from a large database and then electronically 'overlaid' to make the composite image. This allows images to be created when suitable artistic talent is not available.

Such systems were originally mechanical, using drawings or photographs printed on transparent acetate sheets that could be superimposed on one another to produce the composite image. The first such system was the drawing-based "Identikit" which was introduced in the U.S. in 1959.[2] A photograph-based system, "Photofit", was introduced in the UK in 1970.[2] Modern systems are software-based; common systems include SketchCop FACETTE Face Design System Software, Identi-Kit 2000, FACES, E-FIT and PortraitPad.

Evolutionary systems

edit

Evolutionary systems may be broadly described as holistic or global in that they primarily attempt to create a likeness to the suspect through an evolutionary mechanism in which a witness's response to groups of complete faces (not just features) converges towards an increasingly accurate image. Introduced in the 2000s, such systems are finding increasing use by police forces.[3][4][5]

Several of these systems originate in academia: EFIT-V (University of Kent),[6] EvoFIT[7] (University of Stirling, University of Central Lancashire, and University of Winchester),[8] and ID (University of Cape Town).

A 2012 police field trial indicated that an EvoFIT directly led to the arrest of a suspect and then a conviction in 29% of cases.[9]

Usage

edit
 
Facial composite of Aafia Siddiqui, created by the FBI for a wanted poster[10]

While the classic use of the facial composite is the citizen recognizing the face as an acquaintance, there are other ways where a facial composite can prove useful. The facial composite can contribute in law enforcement in a number of ways:

  1. Identifying the suspect in a wanted poster.
  2. Additional evidence against a suspect.[citation needed]
  3. Assisting investigation in checking leads.
  4. Warning vulnerable population against serial offenders.

Facial composites of various types have been used extensively in those television programs which aim to reconstruct major unsolved crimes with a view to gaining information from the members of the public, such as America's Most Wanted in the US and Crimewatch in the UK.

Notable cases

edit

These notable cases had facial composites assist in identifying the perpetrator:

See also

edit

References

edit
  1. ^ Wilkinson, Caroline (February 2010). "Facial reconstruction – anatomical art or artistic anatomy?". Journal of Anatomy. 216 (2): 235–250. doi:10.1111/j.1469-7580.2009.01182.x. ISSN 0021-8782. PMC 2815945. PMID 20447245.
  2. ^ a b Davies, Graham M.; Valentine, Tim (2006). "Facial Composites: Forensic Utility and Psychological Research". In Rod C. L. Lindsay; et al. (eds.). Handbook of Eyewitness Psychology. Vol. 2 Memory for People. Mahwah, NJ: Lawrence Erlbaum Associates. Section, "Mechanical Systems". doi:10.4324/9781315805535. ISBN 9780805851526 – via Routledge Handbooks Online (2014).
  3. ^ Frowd, C. D.; Hancock, P. J. B.; Bruce, V.; McIntyre, A.; Pitchford, M.; Atkins, R.; et al. (2010). "Giving crime the 'evo': catching criminals using EvoFIT facial composites". In Howells, G.; Sirlantzis, K.; Stoica, A.; Huntsberger, T.; Arslan, A. T. (eds.). 2010 IEEE International Conference on Emerging Security Technologies. pp. 36–43. ISBN 978-0-7695-4175-4.
  4. ^ Gibson, S. J.; Solomon, C. J.; Maylin, M. I. S.; Clark, C. (2009). "New methodology in facial composite construction: from theory to practice". International Journal of Electronic Security and Digital Forensics. 2 (2): 156–168. doi:10.1504/ijesdf.2009.024900.
  5. ^ Solomon, C.; Gibson, S.; Maylin, M. (2009). "A New Computational Methodology for the Construction of Forensic, Facial Composites". Computational Forensics. Springer-Verlag LNCS. pp. 67–77. ISBN 9783540853022.
  6. ^ Craig Aaen Stockdale (June 1, 2008). "A (r)evolution in Crime-fighting". Forensic Magazine.
  7. ^ "EvoFIT - Evolving Facial Composite Imaging". evofit.co.uk.
  8. ^ Frowd, C. D.; Skelton, F.; Hepton, G.; Holden, L.; Minahil, S.; Pitchford, M.; McIntyre, A.; Hancock, P. J. B. (2013). "Whole-face procedures for recovering facial images from memory" (PDF). Science & Justice. 53 (2): 89–97. doi:10.1016/j.scijus.2012.12.004. PMID 23601715.
  9. ^ Frowd, C. D.; Pitchford, M.; Skelton, F.; Petkovic, A.; Prosser, C.; Coates, B. (2012). "Catching Even More Offenders with EvoFIT Facial Composites". In Stoica, A.; Zarzhitsky, D.; Howells, G.; Frowd, C.; McDonald-Maier, K.; Erdogan, A.; Arslan, T. (eds.). IEEE Proceedings of 2012 Third International Conference on Emerging Security Technologies. pp. 20–26. doi:10.1109/EST.2012.26. ISBN 978-0-7695-4791-6. S2CID 4503932.
  10. ^ Scroggins, Deborah (March 1, 2005). "The Most Wanted Woman in the World". Vogue – via Access My Library.
  11. ^ Han, Hu; Jain, Anil K.; Klare, Brendan F.; Klum, Scott J. (2014). "The FaceSketchID System: Matching Facial Composites to Mugshots" (PDF). IEEE Transactions on Information Forensics and Security. 9 (12): 2248–2263. doi:10.1109/TIFS.2014.2360825. S2CID 14013839. Retrieved 2023-01-13.