2018
DOI: 10.20944/preprints201804.0072.v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Cyber Forensic Review of Human Footprint and Gait-based System for Personal Identification in Crime Scene Investigation

Abstract: Human footprint is having a unique set of ridges unmatched by any other human being, and therefore it can be used in different identity documents for example birth certificate, Indian biometric identification system AADHAR card, driving license, PAN card, and passport. There are many instances of the crime scene where an accused must walk around and left the footwear impressions as well as barefoot prints and therefore it is very crucial to recovering the footprints to identify the criminals. Footprint-based b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 66 publications
0
3
0
Order By: Relevance
“…From Table 4, a required image named QTmplt1 was entered into the system, the occurrence image is (1) and its Cluster is (1) within the database. QTmplt2 was entered into the system, the occurrence image is (10) and its Cluster is (1) within the database and so on. But the shaded rows show the error result from its clusters should be five and six.…”
Section: Recognition Evaluation Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…From Table 4, a required image named QTmplt1 was entered into the system, the occurrence image is (1) and its Cluster is (1) within the database. QTmplt2 was entered into the system, the occurrence image is (10) and its Cluster is (1) within the database and so on. But the shaded rows show the error result from its clusters should be five and six.…”
Section: Recognition Evaluation Resultsmentioning
confidence: 99%
“…The human brain acknowledges and orders objects, individuals, or places in an effective, rapid, and easy manner. Since the recognition method takes place so flexible and fast, it is hard to translate this behavior into a laptop algorithm as best as the human being [1]. The computerized system is required and reproduces improved security values even with the practical limits, but a waste of individuality theft by the criminals' hints at risks in the society [1,2].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation