Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
Published Date
Displaying 351 - 375 of 540

Approximate Matching: Definition and Terminology

July 2, 2014
Author(s)
Frank Breitinger, Barbara Guttman, Michael McCarrin, Vassil Roussev, Douglas R. White
This document provides a definition of and terminology for approximate matching. Approximate matching is a promising technology designed to identify similarities between two digital artifacts. It is used to find objects that resemble each other or to find

ITL Forensic Science Program

June 5, 2014
Author(s)
Barbara Guttman, Martin Herman, Michaela Iorga, Larry Feldman, Kim Quill
Forensic science provides the methodologies for understanding crime scenes. It is used for analyzing evidence, identifying suspects, and prosecuting and convicting criminals while exonerating innocent people. To maintain the integrity of the U.S. criminal

Identifying Face Quality and Factor Measures for Video

May 20, 2014
Author(s)
Yooyoung Lee, P. Jonathon Phillips, James Filliben, J. R. Beveridge, Hao Zhang
This paper identifies important factors for face recognition algorithm performance in video. The goal of this study is to understand key factors that affect algorithm performance and to characterize the algorithm performance. We evaluate four factor

Guidelines on Mobile Device Forensics

May 15, 2014
Author(s)
Richard Ayers, Sam Brothers, Wayne Jansen
Mobile device forensics is the science of recovering digital evidence from a mobile device under forensically sound conditions using accepted methods. Mobile device forensics is an evolving specialty in the field of digital forensics. This guide attempts

A Model Towards Using Evidence from Security Events for Network Attack Analysis

April 27, 2014
Author(s)
Changwei Liu, Anoop Singhal, Duminda Wijesekera
Constructing an efficient and accurate model from security events to determine an attack scenario for an enterprise network is challenging. In this paper, we discuss how to use evidence obtained from security events to construct an attack scenario and

Adaptive Representations for Video-based Face Recognition Across Pose

March 25, 2014
Author(s)
P. Jonathon Phillips, Yi-Chen Chen, Vishal M. Patel, Rama Chellappa
n this paper, we address the problem of matching faces across changes in pose in unconstrained videos. We pro- pose two methods based on 3D rotation and sparse representation that compensate for changes in pose. The first is Sparse Representation-based

Applications of Surface Metrology in Firearm Identification

January 8, 2014
Author(s)
Xiaoyu Alan Zheng, Johannes A. Soons, Theodore V. Vorburger, Jun-Feng Song, Thomas Brian Renegar, Robert M. Thompson
Surface metrology is commonly used to characterize functional engineering surfaces. The technologies developed offer opportunities to improve forensic toolmark identification. Toolmarks are created when a tool comes into contact with a surface and causes

Applications of Surface Metrology in Toolmark Identification

January 8, 2014
Author(s)
Xiaoyu Alan Zheng, Johannes A. Soons, Theodore V. Vorburger, Jun-Feng Song, Thomas Brian Renegar, Robert M. Thompson
Surface metrology is commonly used to characterize functional engineering surfaces. The technologies developed offer opportunities to improve forensic toolmark identification. In 2009, a report by the National Academies called into question, amongst others

Developmental validation of the PowerPlex 21 System.

December 24, 2013
Author(s)
Carolyn R. Steffen, Martin G. Ensenberger, Robert S. McLaren, Cynthia J. Sprecher, Douglas R. Storts
The PowerPlex(®) 21 System is a STR multiplex that has been optimized for casework samples while still being capable of database workflows including direct amplification. The loci included in the multiplex offer increasing overlap with core loci used in

Creating Integrated Evidence Graphs for Network Forensics

October 18, 2013
Author(s)
Changwei Liu, Anoop Singhal, Duminda Wijesekera
Evidence Graphs model network intrusion evidence and their dependencies, which helps network forensics analyst collate and visualize dependencies. In particular, probabilistic evidence graph provide a way to link probabilities associated with different

Some Journal Metrics for Forensic Science International: Genetics

October 2, 2013
Author(s)
John M. Butler
Forensic Science International: Genetics, which is the official journal of the International Society for Forensic Genetics, has grown in readership and impact factor since its introduction in 2007. This article reviews some metrics of the 32 issues
Was this page helpful?