Skip to content
2000
Volume 3, Issue 1
  • ISSN: 2666-4844
  • E-ISSN: 2666-4852

Abstract

Forensic fingerprint analysis has evolved significantly, becoming indispensable in crime investigation. Recent research has aimed to improve accuracy, efficiency, and reliability in this field, given fingerprints' unique role in linking individuals to crime scenes. This review synthesizes recent advancements in technology, methodology, and applications, notably AFIS, 3D fingerprint imaging, chemical analysis, and nanotechnology. Employing a systematic approach, the review gathers recent literature from various databases, including peer-reviewed articles and conference papers from the past five years. It identifies common themes, trends, challenges, and future directions, highlighting the impact of technological advancements. AFIS improvements have notably enhanced speed, accuracy, and interoperability, while emerging trends, like 3D fingerprint imaging and chemical analysis, offer additional forensic capabilities. However, challenges, such as data security and algorithm biases, persist, necessitating further research and collaboration. Despite these challenges, advancements in AFIS, 3D imaging, chemical analysis, and nanotechnology provide powerful tools for accurate crime investigation. Continued research and collaboration are vital to overcoming existing challenges and fully leveraging forensic fingerprint analysis in the pursuit of justice.

Loading

Article metrics loading...

/content/journals/cfs/10.2174/0126664844338150241202060301
2024-12-26
2025-10-29
Loading full text...

Full text loading...

References

  1. TanwarG.S. PooniaA.S. Live forensics analysis: Violations of business security policy.Proceedings of the International Conference on Contemporary Computing and Informatics (IC3I)27-29 Nov 2014; Mysore, India. IEEE; 2014. pp. 971-6.10.1109/IC3I.2014.7019695
    [Google Scholar]
  2. BoatengY.E.O. Cyber-security challenges with SMEs in developing economies: Issues of confidentiality, integrity & availability (CIA).Aalborg Universitet2013
    [Google Scholar]
  3. JayasinghB.B. PatraM.R. MaheshD.B. Security issues and challenges of big data analytics and visualization.Proceedings of the 2nd International Conference on Contemporary Computing and Informatics (IC3I)14-17 Dec 2016; Greater Noida, India. IEEE; 2016. pp. 204-8.10.1109/IC3I.2016.7917961
    [Google Scholar]
  4. RaghavanS. RaghavanS.V. A study of forensic & analysis tools.Proceedings of the 8th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE)21-22 Nov 2013; Hong Kong, China. IEEE; 2013. pp. 1-5.10.1109/SADFE.2013.6911540
    [Google Scholar]
  5. GuptaA. Privacy preserving efficient digital forensic investigation framework.Proceedings of the Sixth International Conference on Contemporary Computing (IC3)08-10 Aug 2013; Noida, India. IEEE; 2013. pp. 387-92.10.1109/IC3.2013.6612225
    [Google Scholar]
  6. ChaitraB. ReddyP.V.B. A study on digital image forgery techniques and its detection.Proceedings of the International Conference on Contemporary Computing and Informatics (IC3I)12-14 Dec 2019; Singapore. IEEE; 2019. pp. 127-30.10.1109/IC3I46837.2019.9055573
    [Google Scholar]
  7. DarganS. KumarM. Writer identification system based on offline handwritten text in Gurumukhi script.Proceedings of the International Conference on Contemporary Computing and Informatics (IC3I)06-08 Nov 2020; Waknaghat, India. IEEE; 2020. pp. 544-9.10.1109/PDGC50313.2020.9315842
    [Google Scholar]
  8. RamadhaniE. HariyadiD. NastitiF.E. A bibliometrics analysis of digital forensics research in Indonesia based on Scopus index: 2012-2021.Proceedings of the IEEE 7th International Conference on Information Technology and Digital Applications (ICITDA)04-05 Nov 2022; Yogyakarta, Indonesia. IEEE; 2022. pp. 1-6.10.1109/ICITDA55840.2022.9971449
    [Google Scholar]
  9. VaughnR. DampierD. Digital forensics--State of the science and foundational research activity.Proceedings of the 40th Annual Hawaii International Conference on System Sciences (HICSS’07)03-06 Jan 2007; Waikoloa, HI, USA. IEEE; 2007. pp. 263.10.1109/HICSS.2007.174
    [Google Scholar]
  10. ŽagarM. DelijaD. SirovatkaG. Setting up digital forensics laboratory: Experience of zagreb university of applied sciences.Proceedings of the 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)21-25 May 2018; Opatija, Croatia. IEEE; 2018. pp. 0530-3.10.23919/MIPRO.2018.8400101
    [Google Scholar]
  11. KumarA. ChauhanM. JainA.K. JohriP. Analysis on digital forensics challenges and anti-forensics techniques in cloud computing.Proceedings of the 11th International Conference on System Modeling & Advancement in Research Trends (SMART)16-17 Dec 2022; Moradabad, India. IEEE; 2022. pp. 699-702.10.1109/SMART55829.2022.10047629
    [Google Scholar]
  12. WangC. ZhaoY. DongJ. Research on electronic data forensics based on RAM.Proceedings of the 2nd International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)06-08 Aug 2021; Nanjing, China. IEEE; 2021. pp. 141-4.10.1109/ISCEIC53685.2021.00036
    [Google Scholar]
  13. AlshammariH. ElleithyK. Deep fake and digital forensics.Proceedings of the IEEE 14th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)New York, NY, USA. IEEE; 2023. pp. 0283-8.10.1109/UEMCON59035.2023.10315974
    [Google Scholar]
  14. AsasfehA. DmourA.N.A. HamadiA.H. MansoorW. GhazalT.M. Exploring cyber investigators: An in-depth examination of the field of digital forensics.Proceedings of the IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)Abu Dhabi, United Arab Emirates. IEEE; 2023. pp. 84-88.10.1109/DASC/PiCom/CBDCom/Cy59711.2023.10361449
    [Google Scholar]
  15. NanceK. HayB. BishopM. Digital forensics: Defining a research agenda.Proceedings of the 42nd Hawaii International Conference on System Sciences05-08 Jan 2009; Waikoloa, HI, USA. IEEE; 2009. pp. 1-6.10.1109/HICSS.2009.160
    [Google Scholar]
  16. BeckerE. GuptaM. AwayshehF.M. Analyzing edge IoT digital forensics tools: Cyber attacks reconstruction and anti-forensics enhancements.Proceedings of the IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)14-17 Nov 2023; Abu Dhabi, United Arab Emirates. IEEE; 2023. pp. 991-8.10.1109/DASC/PiCom/CBDCom/Cy59711.2023.10361416
    [Google Scholar]
  17. BhandariS. JusasV. The phases based approach for regeneration of timeline in digital forensics.Proceedings of the International Conference on Innovations in Intelligent Systems and Applications (INISTA)24-26 Aug 2020; Novi Sad, Serbia. IEEE; 2020. pp. 1-6.10.1109/INISTA49547.2020.9194649
    [Google Scholar]
  18. LiuX. Visualizing the knowledge domain of intelligent justice research between 2000 and 2019: A bibliometric analysis.Proceedings of the 4th Annual International Conference on Data Science and Business Analytics (ICDSBA)05-06 Sep 2020; Changsha, China. IEEE; 2020. pp. 111-4.10.1109/ICDSBA51020.2020.00036
    [Google Scholar]
  19. CookM. MarneridesA. JohnsonC. PezarosD. A survey on industrial control system digital forensics: Challenges, advances and future directions.IEEE Commun. Surv. Tutor.20232531705174710.1109/COMST.2023.3264680
    [Google Scholar]
  20. CaseyE. PetersonK. PfeifD. SodenC. Motivating STEM+C learning with social impact of cybersecurity and digital forensics research on equity and sustained participation in engineering, computing, and technology (RESPECT).Proceedings of the 10th IEEE International Workshop on Research in Equity and Sustained Participation in Engineering, Computing, and Technology (RESPECT)10-11 Mar 2020; Portland, OR, USA. IEEE; 2020. p. 1-2.10.1109/RESPECT49803.2020.9272465
    [Google Scholar]
  21. LinC. ZhitangL. CuixiaG. Automated analysis of multi-source logs for network forensics.Proceedings of the First International Workshop on Education Technology and Computer Science07-08 Mar 2009; Wuhan, China. IEEE; 2009. p. 660-4.10.1109/ETCS.2009.153
    [Google Scholar]
  22. DuJ. GongS. Research on the clients of network forensics.Proceedings of the 3rd International Conference on Computer Research and Development11-13 Mar 2011; Shanghai, China. IEEE; 2011. p. 466-8.10.1109/ICCRD.2011.5764059
    [Google Scholar]
  23. AmatoG. Face verification and recognition for digital forensics and information security.Proceedings of the 7th International Symposium on Digital Forensics and Security (ISDFS)10-12 Jun 2019; Barcelos, Portugal. IEEE; 2019. p. 1-6.10.1109/ISDFS.2019.8757511
    [Google Scholar]
  24. KumarM. KumarS. GulhaneM. BeniwalR.K. Deep neural network-based fingerprint reformation for minimizing displacement.Proceedings of the 12th International Conference on System Modeling & Advancement in Research Trends (SMART)Moradabad, India. IEEE; 2023. p. 100-5.10.1109/SMART59791.2023.10428379
    [Google Scholar]
  25. RathodV.J. IyerN.C. MeenaS.M. A survey on fingerprint biometric recognition system.Proceedings of the 2015 International Conference on Green Computing and Internet of Things (ICGCIoT)Greater Noida, India. IEEE; 2015. p. 323-6.10.1109/ICGCIoT.2015.7380482
    [Google Scholar]
  26. AgrawalP. KapoorR. AgrawalS. A hybrid partial fingerprint matching algorithm for estimation of equal error rate.Proceedings of the 2014 IEEE International Conference on Advanced Communications, Control and Computing TechnologiesRamanathapuram, India. IEEE; 2014. p. 1295-9.10.1109/ICACCCT.2014.7019308
    [Google Scholar]
  27. Chakravarty AR R Utilization of spatial filtering for enhancement of fingerprint images.Proceedings of the 3rd International Conference on Advancement in Electronics & Communication Engineering (AECE)Ghaziabad, India. IEEE; 2023. p. 707-10.10.1109/AECE59614.2023.10428296
    [Google Scholar]
  28. ChegurP. Separation of overlapped fingerprint images using deep learning.Proceedings of the 2023 International Conference on Advances in Electronics, Communication, Computing and Intelligent Information Systems (ICAECIS)Bangalore, India. IEEE; 2023. p. 233-8.10.1109/ICAECIS58353.2023.10169966
    [Google Scholar]
  29. AgarwalY. RawatP. KathuriaS. SinghR. ChythanyaK.R. SahuM. Artificial intelligence contribution to forensic science crime investigation.Proceedings of the 3rd International Conference on Innovative Sustainable Computational Technologies (CISCT)Dehradun, India. IEEE; 2023. p. 1-5.10.1109/CISCT57197.2023.10351482
    [Google Scholar]
  30. NatarajanS.K. RathinasabapathyR. GopalB. SubramaniK. RamaswamyA. Aravind. OLFV: Harnessing the power of enhanced deep learning model to recognize fingerprints using optimization and classification principles paper.Proceedings of the 2024 International Conference on Advances in Data Engineering and Intelligent Computing Systems (ADICS)Chennai, India. IEEE; 2024. p. 1-7.10.1109/ADICS58448.2024.10533609
    [Google Scholar]
  31. KumarP. SethS. BajajK. RawatS. Diverse security practices and comparison on keystroke dynamics.Proceedings of the 8th International Conference on System Modeling and Advancement in Research Trends (SMART)Moradabad, India. IEEE; 2019. p. 305-9.10.1109/SMART46866.2019.9117401
    [Google Scholar]
  32. QuanY. LiC-T. ZhouY. LiL. Warwick image forensics dataset for device fingerprinting in multimedia forensics.Proceedings of the 2020 IEEE International Conference on Multimedia and Expo (ICME)London, UK. IEEE; 2020. p. 1-6.10.1109/ICME46284.2020.9102783
    [Google Scholar]
  33. BalajiL. MurthyL.R. AshwiniC. BansalH. Shanmugha PriyaR.K. KrishnaB.V. Real-time face recognition using an enhanced VGGNET convolutional neural network.Proceedings of the 2023 4th IEEE Global Conference for Advancement in Technology (GCAT)Bangalore, India. IEEE; 2023. p. 1-5.10.1109/GCAT59970.2023.10353479
    [Google Scholar]
  34. ContiV. MilitelloC. SorbelloF. VitabileS. A frequency-based approach for features fusion in fingerprint and iris multimodal biometric identification systems.IEEE Trans. Syst. Man Cybern. C201040438439510.1109/TSMCC.2010.2045374
    [Google Scholar]
  35. AlvesM.G. SpeglichC. TrevelinL.C. Araújo-MoreiraF.M. Bioinformatics applied to public safety: Improving fingerprint revelation left in crime scenes to criminal identification in real time.Proceedings of the 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC)Seoul, South Korea. IEEE; 2012. p. 2306-11.10.1109/ICSMC.2012.6378085
    [Google Scholar]
  36. SiddiqiM. AllS.T. SivaramanV. Secure lightweight context-driven data logging for bodyworn sensing devices.Proceedings of the 2017 5th International Symposium on Digital Forensic and Security (ISDFS)Tirgu Mures, Romania. IEEE; 2017. p. 1-6.10.1109/ISDFS.2017.7916500
    [Google Scholar]
  37. KasyapV.L.V.S. BhagavanV.S. JagadeeshM.S. Graph neural networks based model for aroma prediction using molecular structures.Proceedings of the 2022 IEEE 3rd Global Conference for Advancement in Technology (GCAT)Bangalore, India. IEEE; 2022. p. 1-6.10.1109/GCAT55367.2022.9971823
    [Google Scholar]
  38. KadhaV. DasS.K. Detecting image manipulation in lossy compression: A multi-modality deep-learning framework.Proceedings of the 2023 IEEE Region 10 Conference (TENCON)Chiang Mai, Thailand. IEEE; 2023. p. 795-800.10.1109/TENCON58879.2023.10322401
    [Google Scholar]
  39. CasinoF. DasaklisT.K. SpathoulasG.P. AnagnostopoulosM. GhosalA. BoroczI. SolanasA. ContiM. PatsakisC. Research trends, challenges, and emerging topics in digital forensics: A review of reviews.IEEE Access202210254642549310.1109/ACCESS.2022.3154059
    [Google Scholar]
  40. BhavsarK. PatelA. ParikhS. Approaches to digital forensics in the age of big data.Proceedings of the 9th International Conference on Computing for Sustainable Global Development (INDIACom)New Delhi, India. IEEE; 2022. p. 449-53.10.23919/INDIACom54597.2022.9763231
    [Google Scholar]
  41. ShayauY.H. AsmawiA. RumS.N.M. AriffinN.A.M. Digital forensics investigation reduction model (DIFReM) framework for Windows 10 OS.Proceedings of the 9th International Conference on System Engineering and Technology (ICSET)Shah Alam, Malaysia. IEEE; 07 Oct 2019. p. 459-64.10.1109/ICSEngT.2019.8906387
    [Google Scholar]
  42. MahendraN.F. KhairunnisaR. Digital forensic analysis of online dating applications on android using the digital forensic research workshop 2001 investigation model.Proceedings of the IEEE International Conference on Cryptography, Informatics, and Cybersecurity (ICoCICs)22-24 Aug 2023; Bogor, Indonesia. IEEE; 2023. p. 218-23.10.1109/ICoCICs58778.2023.10276752
    [Google Scholar]
  43. PatelY. RughaniP.H. DesaiD. Network forensic investigation of collaborative robots: A case study.Proceedings of the 7th International Conference on Mechanical Engineering and Robotics Research (ICMERR)09-11 Dec 2022; Krakow, Poland. IEEE; 2022. p. 51-4.10.1109/ICMERR56497.2022.10097787
    [Google Scholar]
  44. DingF. ShenZ. ZhuG. KwongS. ZhouY. LyuS. ExS-GAN: Synthesizing anti-forensics images via extra supervised GAN.IEEE Trans. Cybern.202353117162717310.1109/TCYB.2022.321029436264736
    [Google Scholar]
  45. JianguoJ. JiumingC. QianY. KunyingL. ChaoL. Research and design of similar file forensics system based on fuzzy hash.Proceedings of the Electronic and Automation Control Conference20-22 May 2016; Chongqing, China. IEEE; 2016. p. 342-6.10.1109/ITNEC.2016.7560378
    [Google Scholar]
  46. SabirE. NandiS. AbdAlmageed W, Natarajan P. BioFors: A large biomedical image forensics dataset.Proceedings of the IEEE/CVF International Conference on Computer Vision (ICCV)10-17 Oct 2021; Montreal, QC, Canada. IEEE; 2021. p. 10943-53.10.1109/ICCV48922.2021.01078
    [Google Scholar]
  47. ZhengJ. TanY-A. ZhangX. LiangC. ZhangC. ZhengJ. An anti-forensics method against memory acquiring for Android devices.Proceedings of the IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)21-24 Jul 2017; Guangzhou, China. IEEE; 2017. p. 214-8.10.1109/CSE‑EUC.2017.45
    [Google Scholar]
  48. StrandbergK. NowdehiN. OlovssonT. A systematic literature review on automotive digital forensics: Challenges, technical solutions and data collection.IEEE Trans. Intell. Veh.2023821350136710.1109/TIV.2022.3188340
    [Google Scholar]
  49. YeJ. A fuzzy decision tree reasoning method for network forensics analysis.Proceedings of the World Automation Congress (WAC)11-15 Oct 2022; San Antonio, TX, USA. IEEE; 2022. p. 41-5.10.23919/WAC55640.2022.9934389
    [Google Scholar]
  50. NaingS.K. OoS.T. OoH.W.Y. LinP.Y. NweK.M. ThwinM.M.S. IoT network forensics based on transport layer.Proceedings of the IEEE Conference on Computer Applications (ICCA)27-28 Feb 2023; Yangon, Myanmar. IEEE; 2023. p. 312-7.10.1109/ICCA51723.2023.10182142
    [Google Scholar]
  51. MgembeP.I. MsongaleliL.D. ChaundharyN.K. Progressive standard operating procedures for darkweb forensics investigation.Proceedings of the 10th International Symposium on Digital Forensics and Security (ISDFS)06-07 Jun 2022; Istanbul, Turkey. IEEE; 2022. p. 1-3.10.1109/ISDFS55398.2022.9800830
    [Google Scholar]
  52. VaughnR.B. DampierD.A. The development of a university-based forensics training center as a regional outreach and service activity.Proceedings of the 40th Annual Hawaii International Conference on System Sciences (HICSS’07)03-06 Jan 2007; Waikoloa, HI, USA. IEEE; 2007. p. 265c.10.1109/HICSS.2007.523
    [Google Scholar]
  53. NanceK. BishopM. Introduction to digital forensics: Education, research, and practice minitrack.Proceedings of the Hawaii International Conference on System Sciences07-10 Jan 2013; Kauai, HI, USA. IEEE; 2013. p. 4879-9.10.1109/HICSS.2013.288
    [Google Scholar]
  54. MoriokaE. SharbafM.S. Digital forensics research on cloud computing: An investigation of cloud forensics solutions.Proceedings of the IEEE Symposium on Technologies for Homeland Security (HST)10-11 May 2016; Waltham, MA, USA. IEEE; 2016. p. 1-6.10.1109/THS.2016.7568909
    [Google Scholar]
  55. ZhangY. LinY. Research on the key technology of secure computer forensics.Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics02-04 Apr 2010; Jian, China. IEEE; 2010. p. 649-52.10.1109/IITSI.2010.134
    [Google Scholar]
  56. PengB. WangW. DongJ. TanT. Image forensics based on planar contact constraints of 3D objects.IEEE Trans. Inf. Forensics Security201813237739210.1109/TIFS.2017.2752728
    [Google Scholar]
  57. TannerA. DancerF.C. HallJ. ParkerN. BishopR. McBrideT. The need for proactive digital forensics in addressing critical infrastructure cyber attacks.Proceedings of the International Conference on Computational Science and Computational Intelligence (CSCI)Las Vegas, NV, USA. IEEE; 2022. p. 976-82.10.1109/CSCI58124.2022.00174
    [Google Scholar]
  58. FernandesR. ColacoR.M. ShettyS. A new era of digital forensics in the form of cloud forensics: A review.Proceedings of the Second International Conference on Inventive Research in Computing Applications (ICIRCA)15-17 Jul 2020; Coimbatore, India. IEEE; 2020. p. 422-7.10.1109/ICIRCA48905.2020.9182938
    [Google Scholar]
  59. LvX. XiaY. ZhaoJ. QiaoP. ZhuB. Research on key technologies of digital multimedia passive forensics.Proceedings of the 7th International Conference on Systems and Informatics (ICSAI)13-15 Nov 2021; Chongqing, China. IEEE; 2021. p. 1-5.10.1109/ICSAI53574.2021.9664045
    [Google Scholar]
  60. BaggiliI. OduroJ. AnthonyK. BreitingerF. McGeeG. Watch what you wear: Preliminary forensic analysis of smart watches.Proceedings of the 10th International Conference on Availability, Reliability and Security24-27 Aug 2015; Toulouse, France. IEEE; 2015. p. 303-11.10.1109/ARES.2015.39
    [Google Scholar]
  61. ZhangH. ChenB. WangJ. ZhaoG. A local perturbation generation method for GAN-generated face anti-forensics.IEEE Trans. Circ. Syst. Video Tech.202333266167610.1109/TCSVT.2022.3207310
    [Google Scholar]
  62. MouhtaropoulosA. LiC-T. GroblerM. Proactive digital forensics: The ever-increasing need for standardization.Proceedings of the European Intelligence and Security Informatics Conference22-24 Aug 2012; Odense, Denmark. IEEE; 2012. p. 289-9.10.1109/EISIC.2012.66
    [Google Scholar]
  63. StoyanovaM. NikoloudakisY. PanagiotakisS. PallisE. MarkakisE.K. A survey on the Internet of Things (IoT) forensics: Challenges, approaches, and open issues.IEEE Commun. Surv. Tutor.20202221191122110.1109/COMST.2019.2962586
    [Google Scholar]
  64. GrisposG. BastolaK. Cyber autopsies: The integration of digital forensics into medical contexts.Proceedings of the 33rd International Symposium on Computer-Based Medical Systems (CBMS)28-30 Jul 2020; Rochester, MN, USA. p. 510-3.10.1109/CBMS49503.2020.00102
    [Google Scholar]
  65. ShehinA.U. SankarD. Adaptive bilateral filtering detection using frequency residuals for digital image forensics.Proceedings of the 29th International Conference on Systems, Signals and Image Processing (IWSSIP)01-03 Jun 2022; Sofia, Bulgaria. p. 1-6.10.1109/IWSSIP55020.2022.9854436
    [Google Scholar]
  66. MehreenS. AslamB. Windows 8 cloud storage analysis: Dropbox forensics.Proceedings of the 12th International Bhurban Conference on Applied Sciences and Technology (IBCAST)13-17 Jan 2015; Islamabad, Pakistan. p. 312-7.10.1109/IBCAST.2015.7058522
    [Google Scholar]
  67. XiongA. HuangY. WuY. ZhangJ. LongL. An adaptive sliding window algorithm for mining frequent itemsets in computer forensics.Proceedings of the 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE)01-03 Aug 2018; New York, NY, USA. p. 1660-3.10.1109/TrustCom/BigDataSE.2018.00246
    [Google Scholar]
  68. GoyalR. Blockchain technology in forensic science: A bibliometric review.Proceedings of the 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N)17-18 Dec 2021; Greater Noida, India. p. 1570-3.10.1109/ICAC3N53548.2021.9725660
    [Google Scholar]
  69. LiuZ. ZhuN. WangK. Recaptured image forensics based on generalized central difference convolution network.Proceedings of the 2nd International Conference on Software Engineering and Artificial Intelligence (SEAI)10-12 Jun 2022; Xiamen, China. p. 59-63.10.1109/SEAI55746.2022.9832331
    [Google Scholar]
  70. GopanG. SubramanianA. The intercorrelation between zero trust, dark web, and its implications in the field of digital forensics.Proceedings of the International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics (IITCEE)27-28 Jan 2023; Bengaluru, India. p. 197-203.10.1109/IITCEE57236.2023.10091054
    [Google Scholar]
  71. QawasmehE. Al-SalehM.I. On producing events timeline for memory forensics: An experimental study.Proceedings of the 7th International Conference on Information Technology Trends (ITT)25-26 Nov 2020; Abu Dhabi, UAE. p. 1-5.10.1109/ITT51279.2020.9396748
    [Google Scholar]
  72. AliM.M.H. MahaleV.H. YannawarP. GaikwadA.T. Overview of fingerprint recognition system.Proceedings of the 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)Chennai, India. IEEE; 2016. p. 1334-8.10.1109/ICEEOT.2016.7754900
    [Google Scholar]
  73. HsuMH HsuYC ChiuCT Tiny partial fingerprint sensor quality assessment.IEEE Sensors Lett2024851410.1109/LSENS.2024.3387419
    [Google Scholar]
  74. AnveshiniD. RevathiV. EswariA. MounikaP. MeghanaK. AparnaD. Pattern recognition-based fingerprint authentication for ATM system.Proceedings of the 2022 International Conference on Electronics and Renewable Systems (ICEARS)Tuticorin, India. IEEE; 2022. p. 1708-13.10.1109/ICEARS53579.2022.9751966
    [Google Scholar]
  75. KnezovićM. ŽagarM. DelijaD. SirovatkaG. MožnikD. Implementation of biometric verification of a fingerprint whose image is taken from a glass surface.Proceedings of the 2023 46th MIPRO ICT and Electronics Convention (MIPRO)Opatija, Croatia. IEEE; 2023. p. 1183-8.10.23919/MIPRO57284.2023.10159796
    [Google Scholar]
  76. AroraS. MaheshwariN. BhatiaM. Spoofed fingerprint detection based on time series fingerprint image analysis.Proceedings of the 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)Jalandhar, India. IEEE; 2018. p. 217-22.10.1109/ICSCCC.2018.8703334
    [Google Scholar]
/content/journals/cfs/10.2174/0126664844338150241202060301
Loading
This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error
Please enter a valid_number test