-
(单词翻译:双击或拖选)
Altered state
Biting the pads off fingertips or surgically3 replacing the fingerprints with toe prints might seem like drastic measures but Anil Jain, a biometrics expert and professor at Michigan State University, says these efforts at deception4 are becoming increasingly common.
“People who go through this process, which can be both expensive and painful, would want to do this only for high-valued scenarios5 and not for cashing a check for $50," Jain says. "So the most common uses of this fingerprint1 alteration6 is people who are seeking asylum7 in the United States or in Europe, because if they have a prior criminal record, they will probably not be granted asylum.”
Popular crime dramas lead many to believe it's easy to confirm a person's identity from a fingerprint. In reality, it's not so simple. A number of factors make identification difficult: whether information has been entered into a specific database, if the specimen8 is smudged or a partial print, and if that print has been altered.
An app for that
Very little research has been done in this last category. Existing software can alert law enforcement if the print image quality is poor. But that isn't much help because many altered prints are of good quality.
Jain's graduate student, Soweon Yoon, was part of a team that designed a precise algorithm that helps software systems identify altered prints.
“The most important feature for fingerprint matching is called minutiae9. So minutiae refers to [a] ridge10 ending point and [a] ridge bifurcation point," Yoon says. "From typical fingerprint impression, we can extract 100 minutiae per each finger.”
While patterns on most of our fingers flow in curves and loops, those who have altered fingerprints have abrupt11, discontinued lines. That generates an unusually high number of minutiae points.
“You can imagine if someone makes a cut here, they will generate a lot of ridge ending points, so that generates [an] excessive number of minutiae,” Yoon says.
While it may seem easy enough to look at a set of fingerprints and tell if it has been altered, Jain says it’s not practical.
“Some of these databases are extremely, extremely large. So the FBI database is an example, has about 70 million subjects. That means there are 700 million fingerprint images if each person has 10 fingers. And so there is no way anybody could manually check whether there are altered fingerprints or not.”
Eliminating the guesswork
As it analyzes12 images, the application does not identify people, it simply alerts officials to an anomaly, so they can perform a secondary inspection13. And, Jain says, it also takes the guesswork out of determining whether or not a print has been altered.
“Different human experts will have different degrees of proficiency14 in identifying (prints), and they get tired and so their decisions are not necessarily going to be consistent. Whereas a computer algorithm is going to be consistently behaving, there is no subjectivity15 in it once you tune16 it, it’s going to behave in the same way.”
The application also helps distinguish between accidental and intentional17 alterations18. Most accidents result in scars on only a few fingers. If there are changes in five or more, that was most likely done on purpose.
The methods for altering fingerprints are becoming more sophisticated every day. Back in 1934, the infamous19 American bank robber John Dillinger burned his fingers with acid, hoping to evade20 identification and capture.
According to Yoon, today's criminals use everything from making a Z-shaped cut on the finger pad and switching the skin flaps, to creating temporary silicon21 overlays, and even triple print switches.
“Recently, three people were charged because of this fingerprint alteration. So one was the patient who received a surgery and then the second one was the broker22, and the third one was the physician who performed that surgery.”
Michigan State University has licensed23 the new application to Morpho, a leading biometrics identification firm based in Paris. The company, which supplies software systems to many of the world's top law enforcement agencies, expects it will be able to market the application easily and quickly.
Meanwhile, Jain and his team are developing algorithms and software, which will one day be able to recover and rebuild fingerprints from altered samples.
1 fingerprint | |
n.指纹;vt.取...的指纹 | |
参考例句: |
|
|
2 fingerprints | |
n.指纹( fingerprint的名词复数 )v.指纹( fingerprint的第三人称单数 ) | |
参考例句: |
|
|
3 surgically | |
adv. 外科手术上, 外科手术一般地 | |
参考例句: |
|
|
4 deception | |
n.欺骗,欺诈;骗局,诡计 | |
参考例句: |
|
|
5 scenarios | |
n.[意]情节;剧本;事态;脚本 | |
参考例句: |
|
|
6 alteration | |
n.变更,改变;蚀变 | |
参考例句: |
|
|
7 asylum | |
n.避难所,庇护所,避难 | |
参考例句: |
|
|
8 specimen | |
n.样本,标本 | |
参考例句: |
|
|
9 minutiae | |
n.微小的细节,细枝末节;(常复数)细节,小事( minutia的名词复数 ) | |
参考例句: |
|
|
10 ridge | |
n.山脊;鼻梁;分水岭 | |
参考例句: |
|
|
11 abrupt | |
adj.突然的,意外的;唐突的,鲁莽的 | |
参考例句: |
|
|
12 analyzes | |
v.分析( analyze的第三人称单数 );分解;解释;对…进行心理分析 | |
参考例句: |
|
|
13 inspection | |
n.检查,审查,检阅 | |
参考例句: |
|
|
14 proficiency | |
n.精通,熟练,精练 | |
参考例句: |
|
|
15 subjectivity | |
n.主观性(主观主义) | |
参考例句: |
|
|
16 tune | |
n.调子;和谐,协调;v.调音,调节,调整 | |
参考例句: |
|
|
17 intentional | |
adj.故意的,有意(识)的 | |
参考例句: |
|
|
18 alterations | |
n.改动( alteration的名词复数 );更改;变化;改变 | |
参考例句: |
|
|
19 infamous | |
adj.声名狼藉的,臭名昭著的,邪恶的 | |
参考例句: |
|
|
20 evade | |
vt.逃避,回避;避开,躲避 | |
参考例句: |
|
|
21 silicon | |
n.硅(旧名矽) | |
参考例句: |
|
|
22 broker | |
n.中间人,经纪人;v.作为中间人来安排 | |
参考例句: |
|
|
23 licensed | |
adj.得到许可的v.许可,颁发执照(license的过去式和过去分词) | |
参考例句: |
|
|