Brend

Law Enforcement Technology Matches Sketches to Mug Shots

Law enforcement officers often rely on victims and eyewitnesses to help them identify possible suspects. When the crime is serious, such as the Oklahoma City bombing in 1995, forensic artists work with those witnesses to draw the details that can be used to speed up the capture of a perpetrator. Now, researchers at Michigan State University have produced a software program that "reads" facial details and matches them to mug shots in a central database.

MSU Distinguished Professor of Computer Science and Engineering Anil Jain and doctoral student Brendan Klare have developed Local Feature-based Discriminant Analysis (LFDA).

In MSU's Pattern Recognition and Image Processing Lab, Klare collected 159 forensic sketches from the FBI and Michigan State Police. The study also required that the suspects depicted in the sketches were apprehended and their mug shots available from a law enforcement database. Using techniques that describe lines and shading in small patches of sketches, Klare was able to develop the algorithms for the software in about one year. He used a software development kit from Cognitec, which develops face recognition technology, to build LFDA. "We use their system for eye detection; it works with sketches, too," Klare explained.

Jain, director and founder of the PRIP lab, said that the software finds high-level features, such as the structural distribution and the shape of the eyes, nose and chin, from both the sketch and the photo.

LFDA was able to identify the correct person 45 percent of the time, Klare said, noting that one of the limitations of the study was the amount of available data. "We need a forensic sketch and the picture of the person captured. These are hard to find."

Sheila E. Meese, forensic scientist/forensic artist for the Michigan State Police Lansing Crime Lab, provided some of her composite drawings and related mug shots to the project. Michigan State Police currently uses S.N.A.P., or the Statewide Network of Agency Photos, which contains the digital image database of mug shots, scars, marks and tattoos. But not forensic sketches.

Meese said LFDA would have great value for law enforcement. "Anything that can help match my composite to a suspect would be a benefit for everyone involved. It would help bring comfort to the victim, help close an open investigation, increase the success rate of the forensic artists, help the community by getting another bad guy off the street, etc.," she explained.

In addition, such a software program incorporated statewide would provide significant time savings. "For instance, a criminal is arrested in Detroit, gets out of prison and moves to Flint where that police force does not know him. While in Flint, he commits another crime where a composite drawing was done of him. That composite drawing can now be entered into this program and this criminal could be identified much quicker and easier by matching the previous mug shot to the composite," Meese said.

While Klare said the researchers' "ultimate goal is to get this in the hands of law enforcement," much work remains to be done. He has applied for a two-year grant from the National Institute of Justice to further refine the accuracy of the algorithms, develop a prototype system and conduct field testing in Florida.

About the Author

Lisa K. Williams is senior content developer for Security Products.

Featured

  • Impact on Digital Transformation

    A 2023 Statista report projects that by 2030 there will be 30 billion Internet of Things (IoT) devices in use. That is three times as many as there were in 2020. The numbers continue to grow because connecting sensors and systems, especially across a business, promises big efficiency gains and new insights. As such, the IoT and IIoT (Industrial Internet of Things) have become a launching pad for digital transformation -- not only for individual organizations but for entire industries. Read Now

  • Optimizing Security and Business Performance with Clarity and Control

    In recent years, the security sector has experienced a significant influx of innovative technologies that have fundamentally transformed how organizations design, implement, and oversee their security programs. The widespread adoption of cloud-based infrastructure, edge processing, and AI or machine learning (ML) driven analytics has brought about revolutionary changes in applications such as access control, video surveillance and emerging areas like threat detection and drone identification. Read Now

  • Father of Georgia School Shooting Suspect Charged in Connection With Attack

    Colin Gray, the father of the 14-year-old Georgia school shooting suspect, has also been charged in connection with the attack. The 54-year-old father was charged with four counts of involuntary manslaughter, two counts of second-degree murder and eight counts of cruelty to children. More charges are expected. Read Now

  • Enhancing Security and Business Intelligence

    From border security to parking lots, ALPR has gained traction across multiple use cases as the technology becomes more accurate and affordable than ever. I spoke with Jason Cook, business development director at Vaxtor, a leader in ALPR AI-based analytics, and Rui Barbosa, category manager, Surveillance Products at i-PRO, a maker of AI-enabled security cameras, to delve into the latest advancements and applications of ALPR technology. Automated License Plate Recognition (ALPR) has transformed significantly over the years, evolving from a niche technology into a powerful tool for a wide range of applications, particularly in border security. Read Now

Featured Cybersecurity

Webinars

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3