Download file to see previous pages...
Table of Contents
List of Tables vii
Table of Illustrations viii
Chapter I: Introduction
Background of the Study
Purpose and Objectives of the Study
Rationale of the Study
Definition of Terms
Limitations of the Study
Summary of Remaining Chapters
Chapter II: Literature Review
The Process of Fingerprinting
Defining Digital Fingerprinting
Link between Crime Control and Digital Fingerprinting
Chapter III: Methodology
Description of the Patents
Description of the Instrument
This study is based on research questions that will aim to examine the use of digital fingerprinting and such other techniques in crime control and crime investigation and how the methods of storage of digital fingerprints in databases could have an impact on the information accessibility in general. The study will draw on several questions and research objectives and analyze other similar research studies that have dealt with an explanation of digital fingerprinting, its storage and classification systems and its general use in gathering evidential information in forensic science (Kirby, 1990).
The study will use data from patents on equipment and methods used for digital fingerprinting and analysis and two such patents for fingerprinting techniques are analysed here.
The problem that is studied here includes the uses and applications of digital fingerprinting and the differences in equipment, classification and storage of fingerprints. It is also examined how these issues affect accessibility to information and especially crime related investigation.
The objectives of this research project would be to investigate and link the relations between digital fingerprinting techniques, data storage and classification and the accessibility to evidential information using equipment or patented technology (Kirby 1990, Lofyenberg 2001).
The objective is to study the relation between technology and crime and criminal evidence, the use and application of digital fingerprinting, how these are accessed, stored and classified, what classification techniques are appropriate and how the entire process benefits the forensic sciences, especially in matters of criminal evidence and investigation.
...Download file to see next pagesRead More
It is reported that the security agency monitors close to five million tweets on a daily basis. The justification given by the CIA on its action is that, the agency gathers fact in several languages to build an instantaneous image of the mood of various territories in the world.
There are many different base pairs in a human being and these base pairs are used for identification of people. Due to a lot of base pairs the tasks of identification becomes very time consuming so that’s the reason why scientists use repeating patterns in DNA.DNA profiling is basically used with DNA testing.
The structures and imaging techniques and the functions and processing and transmission of images are discussed, along with a comparative analysis of two relevant techniques. The two techniques show differences in fingerprinting methods as the first patent deals with identification of fingerprints and its applications and the second technique deals with transmission and storage of fingerprints through a mobile device.
But is fingerprint identification a real science this is the controversy that is going to be addressed in this paper.
Not before long, fingerprints were taken by the traditional method of ink and paper impression, but nowadays with the advanced technology its enough to do a computer scan to record such a print which will be saved in the system to be retrieved and easily cross referenced for future use.
The law offers protection from the wilful misuse of intellectual property whether in the form of theft, imitation or modification; copyright law also protects the rights of the author of a work to be identified as such. Intellectual property rights can be protected, exploited, modified and transferred through contract.
Fingerprint databases are still turned to frequently by police and investigators.
Each fingerprint is unique. That is why it can be so effective as evidence. They are often left inadvertently and can show what a person has done and where
One does this by embedding the true message within a seemingly innocuous communication, such as audio, image, video, email, text, empty sections of disks, or executable files (Armistead, 2011 and Janczewski,
2). DNA is found in all the cells that make up a human being’s body; “all the information in the cells is stored responsible for the formation of one’s body is stored in the form of DNA” (Routh 2008, p. 2). DNA looks like a ladder with two sides that are connected
In the era of digital technology and PINs (Personal International Identification numbers), there are extensive possibilities that would either complement or replace the fingerprint (Chandos & Piosenka, 1991; Jain, Ross, & Prabhakar, 2004). In a world that is increasingly
1 Pages(250 words)Essay
GOT A TRICKY QUESTION? RECEIVE AN ANSWER FROM STUDENTS LIKE YOU!
Let us find you another Essay on topic Digital fingerprinting for FREE!