Displaying publications 21 - 40 of 64 in total

Abstract:
Sort:
  1. Jahanirad M, Anuar NB, Wahab AWA
    Forensic Sci Int, 2017 Mar;272:111-126.
    PMID: 28129583 DOI: 10.1016/j.forsciint.2017.01.010
    The VoIP services provide fertile ground for criminal activity, thus identifying the transmitting computer devices from recorded VoIP call may help the forensic investigator to reveal useful information. It also proves the authenticity of the call recording submitted to the court as evidence. This paper extended the previous study on the use of recorded VoIP call for blind source computer device identification. Although initial results were promising but theoretical reasoning for this is yet to be found. The study suggested computing entropy of mel-frequency cepstrum coefficients (entropy-MFCC) from near-silent segments as an intrinsic feature set that captures the device response function due to the tolerances in the electronic components of individual computer devices. By applying the supervised learning techniques of naïve Bayesian, linear logistic regression, neural networks and support vector machines to the entropy-MFCC features, state-of-the-art identification accuracy of near 99.9% has been achieved on different sets of computer devices for both call recording and microphone recording scenarios. Furthermore, unsupervised learning techniques, including simple k-means, expectation-maximization and density-based spatial clustering of applications with noise (DBSCAN) provided promising results for call recording dataset by assigning the majority of instances to their correct clusters.
  2. Khoo LS, Hasmi AH, Mahmood MS, Vanezis P
    Forensic Sci Int, 2016 Sep;266:e4-e9.
    PMID: 27567043 DOI: 10.1016/j.forsciint.2016.08.019
    An underwater disaster can be declared when a maritime accident occurred or when an aircraft is plunged into water area, be it ocean, sea or river. Nevertheless, handling of human remains in an underwater recovery operation is often a difficult and demanding task as working conditions may be challenging with poor to no visibility, location of remains at considerable depths and associated hazards from surrounding water. A case of the recent helicopter crash, into a famous river in Sarawak, domiciled by huge crocodiles, is discussed in this paper. Search and recovery team as well as the combat divers from the Special Elite Troop Commando, known as VAT 69, were deployed to the scene to perform the underwater recovery to search for all the victims on board involving five Malaysians with a pilot of Philippines nationality. This paper highlights the limitations and challenges faced during the underwater search and recovery. All the bodies recovered were in moderate decomposition stage with crushed injuries and mutilated face and body. A simple and conventional fingerprint technique were used to record the fingerprint. The prints impressions were later photographed using a smartphone and transferred back to the RMP headquarters in Kuala Lumpur for fingerprint match by using WhatsApp Messenger, a phone application. All the first five victims were identified within an average of 10min. The last victim recovered was the pilot. For foreign nationals, the Immigration Department of Malaysia will record the prints of both index fingers only. The lifting of the fingerprint of the last victim was the most challenging in which only one index finger left that can be used for comparison. A few techniques were attempted using the black printer's ink, glass and tape techniques for the last victim. Subsequently, images of the prints impression were taken using the same smartphone with additional macro lens attached to it to enhance the resolution. The images were transferred to the RMP headquarters through WhatsApp Messenger. The prints were confirmed to be the pilot 20min later.
  3. Savari M, Abdul Wahab AW, Anuar NB
    Forensic Sci Int, 2016 Sep;266:427-439.
    PMID: 27442454 DOI: 10.1016/j.forsciint.2016.07.001
    Audio forgery is any act of tampering, illegal copy and fake quality in the audio in a criminal way. In the last decade, there has been increasing attention to the audio forgery detection due to a significant increase in the number of forge in different type of audio. There are a number of methods for forgery detection, which electric network frequency (ENF) is one of the powerful methods in this area for forgery detection in terms of accuracy. In spite of suitable accuracy of ENF in a majority of plug-in powered devices, the weak accuracy of ENF in audio forgery detection for battery-powered devices, especially in laptop and mobile phone, can be consider as one of the main obstacles of the ENF. To solve the ENF problem in terms of accuracy in battery-powered devices, a combination method of ENF and phase feature is proposed. From experiment conducted, ENF alone give 50% and 60% accuracy for forgery detection in mobile phone and laptop respectively, while the proposed method shows 88% and 92% accuracy respectively, for forgery detection in battery-powered devices. The results lead to higher accuracy for forgery detection with the combination of ENF and phase feature.
  4. Ismael Al-Sanjary O, Ahmed AA, Sulong G
    Forensic Sci Int, 2016 Sep;266:565-572.
    PMID: 27574113 DOI: 10.1016/j.forsciint.2016.07.013
    Forgery is an act of modifying a document, product, image or video, among other media. Video tampering detection research requires an inclusive database of video modification. This paper aims to discuss a comprehensive proposal to create a dataset composed of modified videos for forensic investigation, in order to standardize existing techniques for detecting video tampering. The primary purpose of developing and designing this new video library is for usage in video forensics, which can be consciously associated with reliable verification using dynamic and static camera recognition. To the best of the author's knowledge, there exists no similar library among the research community. Videos were sourced from YouTube and by exploring social networking sites extensively by observing posted videos and rating their feedback. The video tampering dataset (VTD) comprises a total of 33 videos, divided among three categories in video tampering: (1) copy-move, (2) splicing, and (3) swapping-frames. Compared to existing datasets, this is a higher number of tampered videos, and with longer durations. The duration of every video is 16s, with a 1280×720 resolution, and a frame rate of 30 frames per second. Moreover, all videos possess the same formatting quality (720p(HD).avi). Both temporal and spatial video features were considered carefully during selection of the videos, and there exists complete information related to the doctored regions in every modified video in the VTD dataset. This database has been made publically available for research on splicing, Swapping frames, and copy-move tampering, and, as such, various video tampering detection issues with ground truth. The database has been utilised by many international researchers and groups of researchers.
  5. Hamzah NH
    Forensic Sci Int, 2016 07;264:106-12.
    PMID: 27081766 DOI: 10.1016/j.forsciint.2016.03.050
    The ability to objectify ballistic evidence is a challenge faced by firearms examiners around the world. A number of researchers are trying to improve bullet-identification systems to address deficiencies detailed within the National Academy of Science report (2009). More recently focus has turned to making use of more sophisticated imaging modalities to view entire regions of the projectile and the development of automated systems for the comparison of the topographical surfaces recorded. Projectiles from a newly bought air pistol with 0.177 calibre pellets (unjacketed), fired series of 609 pellets were examined using an optical microscope. A mathematical methodology was developed to pre-process the resultant topographical maps generating point data for comparison, analysed using the principal component analysis (PCA). In most cases limited to reasonable success was achieved. The objective method still requires an operator to identify the Land Engraved Areas to be scanned, however the mathematical alignments were objectively achieved. The PCA results illustrated that the striation marks were neither exclusive nor specific to the LEA regions but rather crossed over regions. This study also proves that a single weapon does not necessarily leave identical marks of projectiles on its surface.
  6. Lee WC, Khoo BE, Abdullah AFL
    Forensic Sci Int, 2016 06;263:1-9.
    PMID: 27061146 DOI: 10.1016/j.forsciint.2016.03.046
    Evidence in crime scenes available in the form of biological stains which cannot be visualized during naked eye examination can be detected by imaging their fluorescence using a combination of excitation lights and suitable filters. These combinations selectively allow the passage of fluorescence light emitted from the targeted stains. However, interference from the fluorescence generated by many of the surface materials bearing the stains often renders it difficult to visualize the stains during forensic photography. This report describes the use of background correction algorithm (BCA) to enhance the visibility of seminal stain, a biological evidence that fluoresces. While earlier reports described the use of narrow band-pass filters for other fluorescing evidences, here, we utilize BCA to enhance images captured using commonly available colour filters, yellow, orange and red. Mean-based contrast adjustment was incorporated into BCA to adjust the background brightness for achieving similarity of images' background appearance, a crucial step for ensuring success while implementing BCA. Experiment results demonstrated the effectiveness of our proposed colour filters' approach using the improved BCA in enhancing the visibility of seminal stains in varying dilutions on selected surfaces.
  7. Jahanirad M, Wahab AW, Anuar NB
    Forensic Sci Int, 2016 May;262:242-75.
    PMID: 27060542 DOI: 10.1016/j.forsciint.2016.03.035
    Camera attribution plays an important role in digital image forensics by providing the evidence and distinguishing characteristics of the origin of the digital image. It allows the forensic analyser to find the possible source camera which captured the image under investigation. However, in real-world applications, these approaches have faced many challenges due to the large set of multimedia data publicly available through photo sharing and social network sites, captured with uncontrolled conditions and undergone variety of hardware and software post-processing operations. Moreover, the legal system only accepts the forensic analysis of the digital image evidence if the applied camera attribution techniques are unbiased, reliable, nondestructive and widely accepted by the experts in the field. The aim of this paper is to investigate the evolutionary trend of image source camera attribution approaches from fundamental to practice, in particular, with the application of image processing and data mining techniques. Extracting implicit knowledge from images using intrinsic image artifacts for source camera attribution requires a structured image mining process. In this paper, we attempt to provide an introductory tutorial on the image processing pipeline, to determine the general classification of the features corresponding to different components for source camera attribution. The article also reviews techniques of the source camera attribution more comprehensively in the domain of the image forensics in conjunction with the presentation of classifying ongoing developments within the specified area. The classification of the existing source camera attribution approaches is presented based on the specific parameters, such as colour image processing pipeline, hardware- and software-related artifacts and the methods to extract such artifacts. The more recent source camera attribution approaches, which have not yet gained sufficient attention among image forensics researchers, are also critically analysed and further categorised into four different classes, namely, optical aberrations based, sensor camera fingerprints based, processing statistics based and processing regularities based, to present a classification. Furthermore, this paper aims to investigate the challenging problems, and the proposed strategies of such schemes based on the suggested taxonomy to plot an evolution of the source camera attribution approaches with respect to the subjective optimisation criteria over the last decade. The optimisation criteria were determined based on the strategies proposed to increase the detection accuracy, robustness and computational efficiency of source camera brand, model or device attribution.
  8. Mahat NA, Zainol-Abidin NL, Nordin NH, Abdul-Wahab R, Jayaprakash PT
    Forensic Sci Int, 2016 Mar;260:9-13.
    PMID: 26779962 DOI: 10.1016/j.forsciint.2015.12.047
    Considering that crimes against animals such as illegal killing and cruelty have been alarmingly increasing and since burning is one of the common ways for disposing cadavers, ability to estimate minimum postmortem interval (PMI) using entomological data merits consideration. Chrysomya megacephala and Chrysomya rufifacies are common necrophagous species recovered from cadavers in many countries including Malaysia. Specific studies focusing on the oviposition and developmental patterns of both species on cadavers manifesting different levels of burn as described by the Crow-Glassman Scale (CGS) remain scarce. In four replicates, rabbit carcasses were burned to CGS levels #1, #2 and #3 by varying the amount of petrol used and duration of burning. Oviposition by C. megacephala and C. rufifacies was delayed by one day in the case of carcasses burned to the CGS level #3 (p<0.05) when compared with that of controls. Such delay in oviposition was not observed in the CGS level #1 and #2 carcasses. No significant differences (p>0.05) in the duration of development were found between control and burned carcasses. These findings deserve consideration while estimating minimum PMI since burning as a mean for disposing animal and human cadavers is gaining popularity.
  9. Damas S, Wilkinson C, Kahana T, Veselovskaya E, Abramov A, Jankauskas R, et al.
    Forensic Sci Int, 2015 Dec;257:504-508.
    PMID: 26482539 DOI: 10.1016/j.forsciint.2015.07.045
    Craniofacial superimposition, although existing for one century, is still a controversial technique within the scientific community. Objective and unbiased validation studies over a significant number of cases are required to establish a more solid picture on the reliability. However, there is lack of protocols and standards in the application of the technique leading to contradictory information concerning reliability. Instead of following a uniform methodology, every expert tends to apply his own approach to the problem, based on the available technology and deep knowledge on human craniofacial anatomy, soft tissues, and their relationships. The aim of this study was to assess the reliability of different craniofacial superimposition methodologies and the corresponding technical approaches to this type of identification. With all the data generated, some of the most representative experts in craniofacial identification joined in a discussion intended to identify and agree on the most important issues that have to be considered to properly employ the craniofacial superimposition technique. As a consequence, the consortium has produced the current manuscript, which can be considered the first standard in the field; including good and bad practices, sources of error and uncertainties, technological requirements and desirable features, and finally a common scale for the craniofacial matching evaluation. Such a document is intended to be part of a more complete framework for craniofacial superimposition, to be developed during the FP7-founded project MEPROCS, which will favour and standardize its proper application.
  10. Ibáñez O, Vicente R, Navega DS, Wilkinson C, Jayaprakash PT, Huete MI, et al.
    Forensic Sci Int, 2015 Dec;257:496-503.
    PMID: 26060056 DOI: 10.1016/j.forsciint.2015.05.030
    As part of the scientific tasks coordinated throughout The 'New Methodologies and Protocols of Forensic Identification by Craniofacial Superimposition (MEPROCS)' project, the current study aims to analyse the performance of a diverse set of CFS methodologies and the corresponding technical approaches when dealing with a common dataset of real-world cases. Thus, a multiple-lab study on craniofacial superimposition has been carried out for the first time. In particular, 26 participants from 17 different institutions in 13 countries were asked to deal with 14 identification scenarios, some of them involving the comparison of multiple candidates and unknown skulls. In total, 60 craniofacial superimposition problems divided in two set of females and males. Each participant follow her/his own methodology and employed her/his particular technological means. For each single case they were asked to report the final identification decision (either positive or negative) along with the rationale supporting the decision and at least one image illustrating the overlay/superimposition outcome. This study is expected to provide important insights to better understand the most convenient characteristics of every method included in this study.
  11. Hashim N, Hemalatha N, Thangaraj K, Kareem A, Ahmed A, Hassan NF, et al.
    Forensic Sci Int, 2015 Aug;253:137.e1-7.
    PMID: 26103928 DOI: 10.1016/j.forsciint.2015.05.020
    A research that tested the methods suitable for comparing ante- and post-mortem radiographic patterns of frontal sinuses concluded that superimposition should be followed as a stringent method for establishing individual identification. We verified the practical relevance of prescribing superimposition by superimposing ante- and post-mortem frontal sinus patterns recorded in case situations as well as simulated ante- and post-mortem of frontal sinus patterns recorded using archived skulls. For superimposition, the wipe facility available in the vision mixer was employed in addition to the mix mode. Ante- and post-mortem radiographic patterns that were available in two earlier cases were not superimposable. Related simulated ante- and post-mortem radiographic patterns of frontal sinuses are superimposable only when the skull that is initially oriented for recording the ante-mortem radiograph is retained in the same posture for recording the post-mortem radiograph also. Once the skull has been removed from the X-ray table, after recording the simulated ante-mortem radiograph, and repositioned for the simulated post-mortem radiograph, even when the intervening time is 1min, the sinus patterns in these radiographs are not superimposable. Superimposition cannot be used as a conditional requirement for side-by-side comparison of radiographic patterns of frontal sinuses.
  12. Jayaprakash PT, Hashim N, Yusop RA
    Forensic Sci Int, 2015 Aug;253:131.e1-10.
    PMID: 26103927 DOI: 10.1016/j.forsciint.2015.04.026
    Video vision mixer based skull-photo superimposition is a popular method for identifying skulls retrieved from unidentified human remains. A report on the reliability of the superimposition method suggested increased failure rates of 17.3 to 32% to exclude and 15 to 20% to include skulls while using related and unrelated face photographs. Such raise in failures prompted an analysis of the methods employed for the research. The protocols adopted for assessing the reliability are seen to vary from those suggested by the practitioners in the field. The former include overlaying the skull- and face-images on the basis of morphology by relying on anthropometric landmarks on the front plane of the face-images and evaluating the goodness of match depending on mix-mode images; the latter consist of orienting the skull considering landmarks on both the eye and ear planes of the face- and skull-images and evaluating the match utilizing images seen in wipe-mode in addition to those in mix-mode. Superimposition of a skull with face-images of five living individuals in two sets of experiments, one following the procedure described for the research on reliability and the other applying the methods suggested by the practitioners has shown that overlaying the images on the basis of morphology depending on the landmarks on the front plane alone and assessing the match in mix-mode fails to exclude the skull. However, orienting the skull relying on the relationship between the anatomical landmarks on the skull- and face-images such as Whitnall's tubercle and exocanthus in the front (eye) plane and the porion and tragus in the rear (ear) plane as well as assessing the match using wipe-mode images enables excluding that skull while superimposing with the same set of face-images.
  13. Darmawan MF, Yusuf SM, Kadir MR, Haron H
    Forensic Sci Int, 2015 Feb;247:130.e1-11.
    PMID: 25540897 DOI: 10.1016/j.forsciint.2014.11.007
    Sex estimation is used in forensic anthropology to assist the identification of individual remains. However, the estimation techniques tend to be unique and applicable only to a certain population. This paper analyzed sex estimation on living individual child below 19 years old using the length of 19 bones of left hand applied for three classification techniques, which were Discriminant Function Analysis (DFA), Support Vector Machine (SVM) and Artificial Neural Network (ANN) multilayer perceptron. These techniques were carried out on X-ray images of the left hand taken from an Asian population data set. All the 19 bones of the left hand were measured using Free Image software, and all the techniques were performed using MATLAB. The group of age "16-19" years old and "7-9" years old were the groups that could be used for sex estimation with as their average of accuracy percentage was above 80%. ANN model was the best classification technique with the highest average of accuracy percentage in the two groups of age compared to other classification techniques. The results show that each classification technique has the best accuracy percentage on each different group of age.
  14. Jayaprakash PT
    Forensic Sci Int, 2015 Jan;246:110-21.
    PMID: 25498986 DOI: 10.1016/j.forsciint.2014.10.043
    Establishing identification during skull-photo superimposition relies on correlating the salient morphological features of an unidentified skull with those of a face-image of a suspected dead individual using image overlay processes. Technical progression in the process of overlay has included the incorporation of video cameras, image-mixing devices and software that enables real-time vision-mixing. Conceptual transitions occur in the superimposition methods that involve 'life-size' images, that achieve orientation of the skull to the posture of the face in the photograph and that assess the extent of match. A recent report on the reliability of identification using the superimposition method adopted the currently prevalent methods and suggested an increased rate of failures when skulls were compared with related and unrelated face images. The reported reduction in the reliability of the superimposition method prompted a review of the transition in the concepts that are involved in skull-photo superimposition. The prevalent popular methods for visualizing the superimposed images at less than 'life-size', overlaying skull-face images by relying on the cranial and facial landmarks in the frontal plane when orienting the skull for matching and evaluating the match on a morphological basis by relying on mix-mode alone are the major departures in the methodology that may have reduced the identification reliability. The need to reassess the reliability of the method that incorporates the concepts which have been considered appropriate by the practitioners is stressed.
  15. Zuha RM, See HW, Disney RH, Omar B
    Forensic Sci Int, 2014 Dec;245:e36-7.
    PMID: 25466156 DOI: 10.1016/j.forsciint.2014.10.034
    Scuttle flies of genus Puliciphora Dahl (Diptera: Phoridae) are recorded for the first time in Malaysia from rabbit carcasses placed in concealed environments. They consist of Puliciphora borinquenensis Wheeler ♂♀, Puliciphora obtecta Meijere ♀ and Puliciphora beckeri Meijere ♀. All species were obtained from rabbit carcasses in used luggage and garbage bin placed at Forensic Science Simulation Site, Universiti Kebangsaan Malaysia, Bangi, Selangor. The specimens were collected from the carcasses using a modified Malaise trap, an entomological aspirator and preserved in 70% ethanol. This report expands the geographical distributions of these species and their microhabitat, suggests its possible important role in forensic entomology.
  16. Hadi H, Wilkinson CM
    Forensic Sci Int, 2014 Apr;237:149.e1-149.e7.
    PMID: 24613011 DOI: 10.1016/j.forsciint.2013.12.014
    The post-mortem resilience of facial creases was studied using donated bodies in order to establish the efficacy of crease analysis for identification of the dead. Creases were studied on normal (pre-embalmed) and bloated (embalmed) cadavers at the Centre for Anatomy and Human Identification (CAHID) to establish whether facial bloating would affect facial crease visibility. Embalming was chosen to simulate the effects produced by post-mortem bloating. The results suggested that creases are resilient and changes were only detected for creases located on the periphery of the face, particularly at areas where the skin is thick, such as at the cheeks. Two new creases not previously classified were identified; these creases were called the vertical superciliary arch line and the lateral nose crease. This research suggests that facial creases may be resilient enough after death to be utilised for human identification.
  17. Khamis MF, Taylor JA, Malik SN, Townsend GC
    Forensic Sci Int, 2014 Jan;234:183.e1-7.
    PMID: 24128748 DOI: 10.1016/j.forsciint.2013.09.019
    Information about the sex of individuals is important for human identification. This study was conducted to quantify classification rates of sex prediction models for Malaysians using odontometric profiles. Mesiodistal (MD) and buccolingual (BL) crown dimensions of the permanent dentition were studied in 400 young adult Malaysians, giving a total of 28 tooth size variables. The sample consisted of three major ethnic groups, the Malays, Chinese and Tamils, since the aim was to assess sex dimorphism in Malaysians as a whole. Results showed that the mesiodistal diameter of the lower canine was the most sexually dimorphic dimension in Malaysian Malays and Tamils. Univariate analyses showed that the magnitude and pattern of sex dimorphism varies between these three ethnic groups, with Malaysian Chinese and Tamils being more dimorphic than the Malaysian Malays. Stepwise discriminant functions were generated bearing in mind their application in practical forensic situations. The range of classification rates was from 70.2% to 78.5% for the composite Malaysian group, and 83.8%, 77.9%, 72.4% for Malaysian Chinese, Malays and Tamils, respectively. The 'Area Under the Receiver Operating Characteristic Curve statistics' indicated good classification rates for three prediction models obtained using a combination of all tooth size variables, mandibular teeth, and mesiodistal dimensions in the composite Malaysian group, and for all tooth size variables in each ethnic group. The present study provides strong support for the value of odontometry as an adjunct scientific method for sex prediction in human identification.
  18. Al-Qershi OM, Khoo BE
    Forensic Sci Int, 2013 Sep 10;231(1-3):284-95.
    PMID: 23890651 DOI: 10.1016/j.forsciint.2013.05.027
    Currently, digital images and videos have high importance because they have become the main carriers of information. However, the relative ease of tampering with images and videos makes their authenticity untrustful. Digital image forensics addresses the problem of the authentication of images or their origins. One main branch of image forensics is passive image forgery detection. Images could be forged using different techniques, and the most common forgery is the copy-move, in which a region of an image is duplicated and placed elsewhere in the same image. Active techniques, such as watermarking, have been proposed to solve the image authenticity problem, but those techniques have limitations because they require human intervention or specially equipped cameras. To overcome these limitations, several passive authentication methods have been proposed. In contrast to active methods, passive methods do not require any previous information about the image, and they take advantage of specific detectable changes that forgeries can bring into the image. In this paper, we describe the current state-of-the-art of passive copy-move forgery detection methods. The key current issues in developing a robust copy-move forgery detector are then identified, and the trends of tackling those issues are addressed.
  19. Jayaprakash PT
    Forensic Sci Int, 2013 Sep 10;231(1-3):403.e1-16.
    PMID: 23849815 DOI: 10.1016/j.forsciint.2013.05.028
    Uniqueness being unprovable, it has recently been argued that individualization in forensic science is irrelevant and, probability, as applied for DNA profiles, should be applied for all identifications. Critiques against uniqueness have omitted physical matching, a realistic and tangible individualization that supports uniqueness. Describing case examples illustrating pattern matches including physical matching, it is indicated that individualizations are practically relevant for forensic science as they establish facts on a definitive basis providing firm leads benefitting criminal investigation. As a tenet of forensic identification, uniqueness forms a fundamental paradigm relevant for individualization. Evidence on the indeterministic and stochastic causal pathways of characteristics in patterns available in the related fields of science sufficiently supports the proposition of uniqueness. Characteristics involved in physical matching and matching achieved in patterned evidence existing in the state of nature are not events amenable for counting; instead these are ensemble of visible units occupying the entire pattern area stretching the probability of re-occurrence of a verisimilitude pattern into infinity offering epistemic support to uniqueness. Observational methods are as respectable as instrumental or statistical methods since they are capable of generating results that are tangible and obviously valid as in physical matching. Applying the probabilistic interpretation used for DNA profiles to the other patterns would be unbefitting since these two are disparate, the causal pathways of the events, the loci, in the manipulated DNA profiles being determinable. While uniqueness enables individualizations, it does not vouch for eliminating errors. Instead of dismissing uniqueness and individualization, accepting errors as human or system failures and seeking remedial measures would benefit forensic science practice and criminal investigation.
Filters
Contact Us

Please provide feedback to Administrator (afdal@afpm.org.my)

External Links