Kumar 2017
Kumar 2017
Kumar 2017
,(((
2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS)
2048-bit public key encryption and legally equivalent to a III.USE OF BIOMETRIC DATABASE FOR CRIME INVESTIGATION
manual signature. Today a massive computing power and well written pattern
D. France matching algorithms have made it possible to automatically
search and detect the patterns of similarity in many different
The biometric ID card was to include a compulsory chip
kind of digital database of patterns which may include
containing personal information, such as fingerprints, a
fingerprints, faces, and irises. Effectiveness and accuracy of
photograph, home address, eye colour etc. A second, optional
such system are very promising even for a very large
chip was to be implemented for online authentication and
databases. These kind of technologies are continuously
electronic signatures, to be used for e-government services and
evolving and offering a potential edge to the law-enforcement
e-commerce. The law was passed with the purpose of
agencies. Many countries has developed a separate biometric
combating “identity fraud”.
database for this purpose, where as many of them have linked it
E. Argentina with their National Identity database for effective analysis
Documento Nacional de Identidad or DNI (which means [2][13].
National Identity Document) is the main identity document for The Federal Bureau of Investigation, United States
Argentine citizens, as well as temporary or permanent resident. maintains the largest database of faces. The FBI has 548
The basic objective of DNIe is to digitally certify the million pictures catalog of searchable “face photos” which
identity of the person, allow the electronic signature of includes criminal mug shots, photos of terrorists taken by
documents and gives the possibility to use the electronic soldiers in Afghanistan and, more recently, state driver’s
identity in digital services. license and ID photos of ordinary citizens who have committed
The card is issued to the citizens at birth and updated at the no crime at all.
age of 8 and 14. The DNI is a valid travel document for Nearly a decade ago, feared by another 9/11- style attack,
entering Argentina, Bolivia, Brazil, Chile, Colombia, Ecuador, FBI signed a $1 billion contract with Lockheed Martin to
Paraguay, Peru, Uruguay, and Venezuela. develop a Next Generation Identification (NGI) system.
Initially a pilot program was launched by FBI in 2011. In late
F. India 2014, the facial recognition program finally became fully
The Unique Identification Authority of India (UIDAI) was operational. The technology essentially measures minute
constituted in 2009 with the objective to issue Unique distances in a person’s face and logs the information. While
Identification numbers (UID), named as “Aadhaar” to Indian these methods and techniques are still in their infancy, it could
Citizens. It’s a 12-digit unique identity number. With the help help law enforcement agencies to locate and identify a suspect
of 10 fingerprint scan and iris scan of the individuals, system using surveillance videos, mug shots or even photos taken from
ensures no duplication in generating UID. It is considered as social network sites like Facebook and Twitter.
one of the world largest national ID project. The whole system Similar to FBI, Fingerprint Analysis and Criminal Tracing
is designed in such a way that it can be easily verified by System (FACTS) is an advanced Automated Fingerprint
Government and Non-Government services. The system has Identification System used in India. The system supports
been promoted as a tool for reducing fraud in many private and storing of fingerprints of convicted, arrested, absconding
public distribution system and enabling the government to criminals in the database and supports performing automatic
better deliver public benefits. fingerprint searches against the existing criminal database. The
In this section we discussed about the National Identity system is designed with the objectives to provide efficient and
project in few countries. Some of these projects could not be effective tool to the investigative agency for faster and
implemented because of some legal complexity or lack of effective way of identifying the criminals.
support from citizens and law makers. However in many The National Crime Records Bureau (NCRB), Ministry of
countries citizen identity card system is implemented Home Affairs, Government of India has planned to develop a
successfully and it has given fruitful results to government as comprehensive online database of fingerprints of criminals and
well as citizens both. convicts from every state by 2017, a project that will help
Implementation of National Level Citizens Identity system improve investigation and prosecution all over the country. The
is huge task. It requires enormous effort and financial support. data will be connected to the Criminal and Criminal Tracking
Many times such national level identity systems are used for Network & Systems (CCTNS), a nationwide integrated online
multiple purposes and it’s quite obvious that such system system conceived after the 2008 Mumbai terrorist attacks to
cannot be developed for individual and specific purposes. track crimes and offenders.
These systems generally stores citizen’s basic information as
well as their biometric information and normally its built in IV.UNIQUE IDENTIFICATION AUTHORITY OF INDIA
such a way that it can be used for multiple purposes. In many The Unique Identification Authority of India (UIDAI) is a
countries such systems are used for identifying the forgery, tax statutory authority established under the provisions of
evasion and crime investigation. Our objective is to explore, the Aadhaar Act, 2016 by the Government of India. Prior to its
how such system can be used for law enforcement and crime establishment as a statutory authority, UIDAI was functioning
investigation. Next section discuss about the use of biometric as an attached office of the then Planning Commission.
system for crime investigation.
2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS)
UIDAI was created with the objective to issue Unique V.PERFORMANCE MEASUREMENT OF BIOMETRIC
Identification numbers (UID), named as "Aadhaar", to all IDENTIFICATION SYSTEM
residents of India. The main aspect to evaluate a biometric system is its
Aadhaar system is built purely as an “Identity Platform”. accuracy. From the user’s point of view, an error of accuracy
The main purpose of Aadhaar is to provide a biometric occurs when the system fails to authenticate the identity of a
attached identity that is verifiable online. The whole system is registered person or when the system erroneously authenticates
designed in such a way that it can be easily verified by the identity of an intruder[8][9][11].
Government and Non-Government services. The system has A biometric matching system’s response is typically a
been promoted as a tool for reducing fraud in many private and matching score ‘s’ that quantifies the similarity between the
public distribution system and enabling the government to input and the database template representations. The higher the
better deliver public benefits. score, the more certain the system is that the two biometric
A. Biometrics Database in Aadhaar measurements come from the same person. A threshold t
regulates the system decision. The system infers that pairs of
The Aadhaar biometric system design has followed global
biometric samples generating scores higher than or equal to t
best practices and currently considered to be the state-of-the-
are mate pairs (that is, they belong to the same person)[10].
art. Aadhaar system has used the iris biometric in addition to
Consequently, pairs of biometric samples generating scores
fingerprint and face biometrics to achieve de-duplication
lower than t are nonmate pairs (that is, they belong to different
accuracy in excess of 99% and also ensure total inclusion.
persons)[4][5]. The distribution of scores generated from pairs
UIDAI capture the following, biometrics for the enrollment:
of samples from different persons is called an impostor
distribution; the score distribution generated from pairs of
• 10 finger prints samples from the same person is called a genuine distribution
• 2 iris scans (see Figure 1).
• Photograph of face
capture device, i.e, the FER is computed only for biometric TABLE I. FEASIBILITY OF IRIS BASED ON-LINE AUTHENTICATION
record properly read.
% of Residents
In the case of matching algorithm we have two important
Findings Single-Eye Dual-Eye
error rates: The False Matching Error Rate (FMR) measures
Cameras Cameras
the rate of actual impostor comparisons that are erroneously
Authenticated in 95.89 99.29
considered genuines. On the contrary the False Non matching
Error Rate (FNMR) measures the rate of actual genuine first try
comparisons that are erroneously considered impostors. Authenticated in 99.21 99.40
In the case of ranking algorithm the main ranking error rate multiple tries
is the Rank (n) that measures the rate of genuine comparisons Failed 0.79 0.60
be included among the n most similar comparisons from a authentication
database[1][3][7]. (FRR+FTC)
An operational biometric system makes a trade-off VII.CRIMINAL TRACING SYSTEM USING AADHAAR
between false match rate (FMR) and false nonmatch rate
(FNMR). In fact, both FMR and FNMR are functions of the First of all it’s very important to discuss, why we proposed
system threshold t: If the system’s designers decrease t to make the use of Aadhaar biometric database for criminal tracing?
the system more tolerant to input variations and noise, FMR One of the reasons behind use of Aadhaar biometric database
increases [6]. On the other hand, if they raise t to make the is, it has highest number of citizen enrollment with a great
system more secure, then FNMR increases accordingly. accuracy. Building a similar system for law and order will
System performance can be depicted at all operating points require a huge effort, time and money which are already
(thresholds t) in the form of a receiver operating characteristic invested to build the system like Aadhaar and it’s a great
(ROC) curve. An ROC curve plots FMR against (1 – FNMR) success.
or FNMR for various values of threshold t (see Figure 2). In India all most all the state government police department
do have some kind of their own local database of convicted
criminals and history sheeter.
The National Crime Records Bureau (NCRB) has planned
to develop a comprehensive online database of fingerprints of
criminals and convicts from every state by 2017, a project that
will help improve investigation and prosecution all over the
country. The data will be connected to the Criminal and
Criminal Tracking Network & Systems (CCTNS), a
nationwide integrated online system conceived after the 2008
Mumbai terrorist attacks to track crimes and offenders.
Normally whenever any crime occurs, police department
take the help of forensics experts to scan and preserve the
fingerprints founds at the crime scene. These fingerprints play
a vital role for the conviction of criminal as it is one of crucial
evidence. State police department normally maintain a local
Figure 2:- Receiver operating characteristic curve database of these fingerprints collected during the investigation
VI.PERFORMANCE OF AADHAAR BIOMETRIC SYSTEM of various cases. Sometime this database helps the police to
crack many other cases, if the same criminal is involved in
As fingerprints alone will not be sufficient for achieving multiple cases. However this biometric database maintained by
higher accuracy in biometric identification, Aadhaar has used police department is useful for investigating those cases where
multi-model biometric fusion techniques. UIDAI has achieved the criminals are repeated offender. However, if the people
accuracy as high as 99% de-duplication due to the fusion of involved in the crime are first time offender or a migrated
fingerprint and iris scores. offender, who has moved from some other state or place, the
A Proof of Concept (PoC) study was carried out by UIDAI local police biometrics database may be of no use for
to assess the feasibility of using iris for on-line biometric investigation. In such case, where the criminals are first time
authentication in the Indian context (Table 1). The findings of offender or a migrated criminals, centralize biometric database
this study are presented in the report. This report covers the can be a great resource for investigation.
design framework, field implementation, data collection and Building a separate biometric database only for such
analysis. It interprets empirical results to assess effectiveness of purpose and enrolling such a huge population in this system
iris technology, authentication processes and devices [12]. will be a very costly affair and tedious process and may not be
a feasible solution. As an alternate Aadhaar biometric database
can be the best suited option for this purpose. The proposed
system architecture (Figure 3) show the overall process flow of
the system.
2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS)
In normal process, whenever any criminal incidents are IX.USE OF AADHAAR BIOMETRIC DATABASE- OPPORTUNITY
reported, police department with the help of forensic experts AND CHALLENGES
collect fingerprints from the crime scene. Police department No doubt such kind of huge centralize biometric database like
analyses these fingerprints and if it is matches with any Aadhaar gives lot more opportunity in application point of
fingerprints in the existing local biometric database of police view but it also raises some challenges and its worth
department, then it’s easy for the police to identify the mentioning here. It looks very simple to use Aadhaar for
criminals as most likely the records of such criminal may be criminal tracing purpose but it has some technical and legal
available with the police. If the fingerprints do not match with hurdles.
the local database then it can be forwarded to central finger
print database, which is a repository database of all the states A. Opportunity and Advantages
fingerprint database. The central biometric database can be Aadhaar has highest number of citizen enrollment till
useful, if the criminals are repeated offenders and migrated. today. It’s one of the largest systems in the world storing such
However, if the criminals are first time offenders then central a huge number of Biometric information. The system is very
database may be of no use and hence it can be analyzed with reliable and scalable. Building similar type of system only for
the help of Aadhaar database. forensic and criminal investigation purpose may not be feasible
and viable solution. Since Aadhaar is already well established
VIII.ERROR TOLERANCE AND CASE OF MISTAKEN IDENTITY system, its uses for the other purposes can be explored.
What happens when the match turns out to be wrong?
Though, the Aadhaar biometric performance is more than 99%. B. Legal Hurdle
In Indian context error rate between 0.25% - 1% is a huge Aadhaar was never intended for Forensic purpose and thus
number. It will falsely identify 10-11 Million people as a it was not designed in that way. The citizens who enrolled for
suspect. Aadhaar never gave his consent of using his information for
One of the advantage of Aadhaar database is, it also store such investigations.
the demographic information of the enrolled citizens. In the C. Technical Challenge
case of false identification, demographic information can be
used as a filter to reduce the false identification. If we study the UIDAI’s own technical report, the system
has approximately a chance of 0.5 per cent occurrence of false
identification. In Indian context this fractional values could
possibly make Lakhs of people as Suspect. We can narrow
down this number but still chances are there that innocent may [13]V. Nagaraju and L. Fiondella, "A survey of homeland security
suffer, if the investigative agency solely depends on the system biometrics and forensics research," 2016 IEEE Symposium on
identification process. Technologies for Homeland Security (HST), Waltham, MA,
Now though the system has some legal hurdles and 2016, pp. 1-7.
technical challenges, it seems there is no other alternatives [14]Z. u. H. Usmani, S. Irum, H. Afzal and S. Mahmud, "How to
better than the Aadhaar. Build an Automated Fingerprint Identification System," 2013
International Symposium on Biometrics and Security
ACKNOWLEDGMENT Technologies, Chengdu, 2013, pp. 40-47.