Skip to main content
Top
Published in: Annals of Data Science 3/2023

22-06-2022

A Comprehensive Review on Computer Vision and Fuzzy Logic in Forensic Science Application

Authors: Prarthi Thakkar, Darshil Patel, Isha Hirpara, Jinesh Jagani, Smit Patel, Manan Shah, Ameya Kshirsagar

Published in: Annals of Data Science | Issue 3/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Criminalistics is another name for forensic science. It uses science in a criminal investigation as governed by judicial criteria of acceptable, relevant, and admissible evidence and criminal procedure. Forensic science has been around for a long time and has seen considerable changes, from fingerprint identification to DNA analysis and digital forensics. The study focuses on the most critical technologies in forensic science, then deconstructs numerous computer vision, image processing, and fuzzy logic methodologies in the large subject of forensic research. It also addresses the prospects for using the technology in approaches ranging from biometric identification to a 3D reconstruction of a crime scene. To some extent, adopting the numerous methodologies outlined in the paper helps overcome the disadvantages and challenges of traditional forensics procedures. Furthermore, some constraints are taken into account. For example, in various ways, the primary evidence is pre-processed and translated to an intermediate or more lucid form before the crux algorithms are applied. As a result, there is still plenty of room for research in this subject, such as developing solid algorithms, making the technology accept raw data, etc. If utilized correctly, forensic science technology has the potential to affect a paradigm shift in the criminal justice system.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
3.
go back to reference Gahlaut A, Dhull V, Dahiya M, Dabur R (2016) Analytical techniques in forensic science: MS & bio-sensor based diagnostics. Inter J Chem Anal Sci 6–10 Gahlaut A, Dhull V, Dahiya M, Dabur R (2016) Analytical techniques in forensic science: MS & bio-sensor based diagnostics. Inter J Chem Anal Sci 6–10
9.
go back to reference Zoppi U, Skopec Z, Skopec J, Jones G, Fink D, Hua Q, Jacobsen G, Tuniz C, Williams A (2004) Forensic applications of 14C bomb-pulse dating. Nuclear Instruments and Methods in Physics Research, Section B: Beam Interactions with Materials and Atoms, 223–224(SPEC. ISS.), 770–775. https://doi.org/10.1016/j.nimb.2004.04.143 Zoppi U, Skopec Z, Skopec J, Jones G, Fink D, Hua Q, Jacobsen G, Tuniz C, Williams A (2004) Forensic applications of 14C bomb-pulse dating. Nuclear Instruments and Methods in Physics Research, Section B: Beam Interactions with Materials and Atoms, 223–224(SPEC. ISS.), 770–775. https://​doi.​org/​10.​1016/​j.​nimb.​2004.​04.​143
19.
go back to reference Andaló FA, Goldenstein S (2016) Computer vision methods applicable to forensic science. February. Andaló FA, Goldenstein S (2016) Computer vision methods applicable to forensic science. February.
22.
go back to reference Stoffel K, Cotofrei P, Han D (2012) Fuzzy clustering based methodology for multidimensional data analysis in computational forensic domain. Int J Comput Inform Syst Ind Manag Appl 4:400–410 Stoffel K, Cotofrei P, Han D (2012) Fuzzy clustering based methodology for multidimensional data analysis in computational forensic domain. Int J Comput Inform Syst Ind Manag Appl 4:400–410
23.
go back to reference Shalaginov A, Franke K (2016) Automated generation of fuzzy rules from large-scale network traffic analysis in digital forensics investigations. In: Proceedings of the 2015 7th international conference of soft computing and pattern recognition, SoCPaR 2015, 0(1):31–36.https://doi.org/10.1109/SOCPAR.2015.7492778 Shalaginov A, Franke K (2016) Automated generation of fuzzy rules from large-scale network traffic analysis in digital forensics investigations. In: Proceedings of the 2015 7th international conference of soft computing and pattern recognition, SoCPaR 2015, 0(1):31–36.https://​doi.​org/​10.​1109/​SOCPAR.​2015.​7492778
29.
go back to reference Conti M, Dehghantanha A, Franke K, Watson S (2018) Internet of things security and forensics: challenges and opportunities. ArXiv, 10–13 Conti M, Dehghantanha A, Franke K, Watson S (2018) Internet of things security and forensics: challenges and opportunities. ArXiv, 10–13
38.
go back to reference James H, Gupta O, Raviv D (2020) Printing and scanning attack for image counter forensics. ArXiv James H, Gupta O, Raviv D (2020) Printing and scanning attack for image counter forensics. ArXiv
41.
42.
go back to reference Farenzena M, Bazzani L, Perina A, Murino V, Cristani M (2010) Person re-identification by symmetry-driven accumulation of local features. In: Proceedings of the IEEE computer society conference on computer vision and pattern recognition, pp 2360–2367. https://doi.org/10.1109/CVPR.2010.5539926 Farenzena M, Bazzani L, Perina A, Murino V, Cristani M (2010) Person re-identification by symmetry-driven accumulation of local features. In: Proceedings of the IEEE computer society conference on computer vision and pattern recognition, pp 2360–2367. https://​doi.​org/​10.​1109/​CVPR.​2010.​5539926
46.
go back to reference Chaajer P, Kshirsagar A, Shah M (2021) A comprehensive study of artificial neural network (ANN) and support vector machines (SVM) and long short-term memory (LSTM) on stock forecasting. decision analytics Chaajer P, Kshirsagar A, Shah M (2021) A comprehensive study of artificial neural network (ANN) and support vector machines (SVM) and long short-term memory (LSTM) on stock forecasting. decision analytics
50.
go back to reference Boonkhong K, Karnjanadecha M, Aiyarak P (2010) Impact angle analysis of bloodstains using a simple image processing technique. Songklanakarin J Sci Technol 32(2):169–173 Boonkhong K, Karnjanadecha M, Aiyarak P (2010) Impact angle analysis of bloodstains using a simple image processing technique. Songklanakarin J Sci Technol 32(2):169–173
52.
go back to reference Janardanan RP (2018) Recent image processing techniques in forensic odontology - a systematic review. Biomed J Sci Tech Res 2(5):1–6 Janardanan RP (2018) Recent image processing techniques in forensic odontology - a systematic review. Biomed J Sci Tech Res 2(5):1–6
59.
go back to reference Gietzen T, Brylka R, Achenbach J, Hebel K, Schömer E, Botsch M, Schwanecke U, Schulze R (2018) A method for automatic forensic facial reconstruction based on dense statistics of soft tissue thickness. ArXiv, 1–19 Gietzen T, Brylka R, Achenbach J, Hebel K, Schömer E, Botsch M, Schwanecke U, Schulze R (2018) A method for automatic forensic facial reconstruction based on dense statistics of soft tissue thickness. ArXiv, 1–19
69.
go back to reference Selvarani P, Malarvizhi N (2018) Multibiometric authentication with MATLAB simulation. Int J Eng Technol (UAE) 7(1):47–50CrossRef Selvarani P, Malarvizhi N (2018) Multibiometric authentication with MATLAB simulation. Int J Eng Technol (UAE) 7(1):47–50CrossRef
73.
go back to reference Khan MJ, Yousaf A, Khurshid K, Abbas A, Shafait F (2018) Automated forgery detection in multispectral document images using fuzzy clustering. In: Proceedings - 13th IAPR international workshop on document analysis systems, DAS 2018, 393–398. https://doi.org/10.1109/DAS.2018.26 Khan MJ, Yousaf A, Khurshid K, Abbas A, Shafait F (2018) Automated forgery detection in multispectral document images using fuzzy clustering. In: Proceedings - 13th IAPR international workshop on document analysis systems, DAS 2018, 393–398. https://​doi.​org/​10.​1109/​DAS.​2018.​26
76.
go back to reference Singh N, Gupta A, Jain RC (2018) Adaptive histogram equalization based image forensics using statistics of DC DCT coefficients. Adv Electr Electron Eng 16(1):125–134 Singh N, Gupta A, Jain RC (2018) Adaptive histogram equalization based image forensics using statistics of DC DCT coefficients. Adv Electr Electron Eng 16(1):125–134
77.
go back to reference Dardi F, Cervelli F, Carrato S (2009) A texture based shoe retrieval system for shoe marks of real crime scenes. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5716 LNCS, 384–393. https://doi.org/10.1007/978-3-642-04146-4_42 Dardi F, Cervelli F, Carrato S (2009) A texture based shoe retrieval system for shoe marks of real crime scenes. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5716 LNCS, 384–393. https://​doi.​org/​10.​1007/​978-3-642-04146-4_​42
78.
go back to reference Kong B, Supancic J, Ramanan D, Fowlkes C (2017) Cross-domain forensic shoeprint matching. British Machine Vision Conference 2017, BMVC 2017 Kong B, Supancic J, Ramanan D, Fowlkes C (2017) Cross-domain forensic shoeprint matching. British Machine Vision Conference 2017, BMVC 2017
79.
go back to reference Liu Z, Feng D (2005) Incremental fuzzy decision tree-based network forensic system. Lecture notes in computer science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3802 LNAI, 995–1002. https://doi.org/10.1007/11596981_148 Liu Z, Feng D (2005) Incremental fuzzy decision tree-based network forensic system. Lecture notes in computer science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3802 LNAI, 995–1002. https://​doi.​org/​10.​1007/​11596981_​148
80.
go back to reference Mukkamala S, Sung AH (2003) Identifying significant features for network forensic analysis using artificial intelligent techniques. Int J Digit Evid 1(4):1–17 Mukkamala S, Sung AH (2003) Identifying significant features for network forensic analysis using artificial intelligent techniques. Int J Digit Evid 1(4):1–17
81.
go back to reference Chen Q, Huang J, Feris R, Brown LM, Dong J, Yan S (2015) Deep domain adaptation for describing people based on fine-grained clothing attributes. In: Proceedings of the IEEE computer society conference on computer vision and pattern recognition, 07–12-June, 5315–5324.https://doi.org/10.1109/CVPR.2015.7299169 Chen Q, Huang J, Feris R, Brown LM, Dong J, Yan S (2015) Deep domain adaptation for describing people based on fine-grained clothing attributes. In: Proceedings of the IEEE computer society conference on computer vision and pattern recognition, 07–12-June, 5315–5324.https://​doi.​org/​10.​1109/​CVPR.​2015.​7299169
86.
go back to reference Loia V, Mattiucci M, Senatore S, Veniero M (2009) Computer crime investigation by means of fuzzy semantic maps. In: Proceedings - 2009 IEEE/WIC/ACM international conference on web intelligence and intelligent agent technology - workshops, WI-IAT Workshops 2009, 3, 183–186. https://doi.org/10.1109/WI-IAT.2009.258 Loia V, Mattiucci M, Senatore S, Veniero M (2009) Computer crime investigation by means of fuzzy semantic maps. In: Proceedings - 2009 IEEE/WIC/ACM international conference on web intelligence and intelligent agent technology - workshops, WI-IAT Workshops 2009, 3, 183–186. https://​doi.​org/​10.​1109/​WI-IAT.​2009.​258
87.
go back to reference Olsen D, Shi Y (2006) Introduction to business data mining. McGraw-Hill/Irwin Olsen D, Shi Y (2006) Introduction to business data mining. McGraw-Hill/Irwin
96.
go back to reference Shanmugavadivu R, Nagarajan DN (2011) Network intrusion detection system using fuzzy logic. Indian J Comput Sci Eng 2(1):101–111 Shanmugavadivu R, Nagarajan DN (2011) Network intrusion detection system using fuzzy logic. Indian J Comput Sci Eng 2(1):101–111
101.
go back to reference Amato G, Falchi F, Gennaro C, Massoli FV, Passalis N, Tefas A, Trivilini A, Vairo C (2019) Face verification and recognition for digital forensics and information security. In: 7th International Symposium on Digital Forensics and Security, ISDFS 2019, 1–6. https://doi.org/10.1109/ISDFS.2019.8757511 Amato G, Falchi F, Gennaro C, Massoli FV, Passalis N, Tefas A, Trivilini A, Vairo C (2019) Face verification and recognition for digital forensics and information security. In: 7th International Symposium on Digital Forensics and Security, ISDFS 2019, 1–6. https://​doi.​org/​10.​1109/​ISDFS.​2019.​8757511
103.
Metadata
Title
A Comprehensive Review on Computer Vision and Fuzzy Logic in Forensic Science Application
Authors
Prarthi Thakkar
Darshil Patel
Isha Hirpara
Jinesh Jagani
Smit Patel
Manan Shah
Ameya Kshirsagar
Publication date
22-06-2022
Publisher
Springer Berlin Heidelberg
Published in
Annals of Data Science / Issue 3/2023
Print ISSN: 2198-5804
Electronic ISSN: 2198-5812
DOI
https://doi.org/10.1007/s40745-022-00408-6

Other articles of this Issue 3/2023

Annals of Data Science 3/2023 Go to the issue

Premium Partner