• Brief report
  • Open access
  • Published: 19 May 2020

Collective intelligence in fingerprint analysis

  • Jason M. Tangen 1 ,
  • Kirsty M. Kent 1 &
  • Rachel A. Searston 2  

Cognitive Research: Principles and Implications volume  5 , Article number:  23 ( 2020 ) Cite this article

11k Accesses

7 Citations

10 Altmetric

Metrics details

A Correction to this article was published on 29 September 2023

This article has been updated

When a fingerprint is located at a crime scene, a human examiner is counted upon to manually compare this print to those stored in a database. Several experiments have now shown that these professional analysts are highly accurate, but not infallible, much like other fields that involve high-stakes decision-making. One method to offset mistakes in these safety-critical domains is to distribute these important decisions to groups of raters who independently assess the same information. This redundancy in the system allows it to continue operating effectively even in the face of rare and random errors. Here, we extend this “wisdom of crowds” approach to fingerprint analysis by comparing the performance of individuals to crowds of professional analysts. We replicate the previous findings that individual experts greatly outperform individual novices, particularly in their false-positive rate, but they do make mistakes. When we pool the decisions of small groups of experts by selecting the decision of the majority, however, their false-positive rate decreases by up to 8% and their false-negative rate decreases by up to 12%. Pooling the decisions of novices results in a similar drop in false negatives, but increases their false-positive rate by up to 11%. Aggregating people’s judgements by selecting the majority decision performs better than selecting the decision of the most confident or the most experienced rater. Our results show that combining independent judgements from small groups of fingerprint analysts can improve their performance and prevent these mistakes from entering courts.

Public Significance Statement

Several reports by peak scientific and regulatory bodies have been roundly critical of the dearth of evidence supporting traditional forensic methods and practices such as fingerprint analysis. In response to these criticisms, a number of experiments have now been conducted, demonstrating that professional fingerprint analysts are impressively accurate compared to novices when distinguishing between crime-scene prints from the same and different sources—but they still make mistakes. These mistakes are unavoidable, even in other high stakes, safety-critical domains such as medicine, aviation, or nuclear power. The aim, then, is to build safeguards into these systems that mitigate the impact of these mistakes in practice. In this experiment, we examine one such countermeasure, which exploits the collective intelligence of groups of professional fingerprint analysts. Our results show that pooling the decisions of small, independent groups of examiners can substantially boost the overall performance of these crowds and reduce the influence of errors. Integrating collective intelligence processes into existing forensic identification and verification systems could play a significant role—alongside effective training methods and evidence-based practices—in developing reliable and resilient systems to ensure the rule of law is justly applied.

When a fingerprint is recovered from a crime scene, a computer algorithm is used to compare the print to tens of millions of prints stored in a database. The algorithm then returns a list of potential candidates ranked from the most to the least similar. It is up to a human examiner to work through this list, comparing the overall pattern and flow of the prints as well as the fine details in each, such as ridge endings, bifurcations, contours, islands, dots, breaks, creases, pores, and enclosures. If the examiner has identified a sufficient number of corresponding features to be confident that the two prints came from the same person, then this final “same source” decision is logged into the computer system, which is then typically “verified” by a second examiner who—depending on their jurisdiction—may or may not be blind to the initial examiner’s decision (Thompson, Black, Jain, & Kadane, 2017 ).

Despite the fact that fingerprint examiners have been shown to perform exceptionally well (Searston & Tangen, 2017a ; Searston & Tangen, 2017b ; Tangen, Thompson, & McCarthy, 2011 ; Thompson & Tangen, 2014 ; Ulery, Hicklin, Buscaglia, & Roberts, 2011 ), errors have occurred in the past (Cole, 2005 ). A correct identification can mean the difference between exonerating a criminal or convicting an innocent person. It is clear that forensic analysts are working hard to capture criminals and uphold civil liberties; they have a very high workload, relentlessly coding evidence, supporting detectives, searching and maintaining databases, writing reports, and testifying as expert witnesses. It is also clear that—despite everyone’s best efforts—mistakes happen and will continue to happen, even when people’s lives are at stake. In medical diagnostics for example, roughly 200,000 patients die from preventable medical errors each year (James, 2013 ), and 5% of autopsies reveal lethal diagnostic errors that could have been averted (Shojania, Burton, McDonald, & Goldman, 2003 ). One of the main conclusions of an authoritative report on these errors by the National Institute of Medicine was that these mistakes do not result from individual recklessness or the actions of a particular group. Instead, it is important to design resilient systems that identify and enhance the positive capacities of people (Dekker, 2014 ). Rather than focusing on “bad apples” at the frontline, the report recommended the development of safeguards for people’s fallibility—to “make it harder for people to do something wrong and easier for them to do it right” (Institute of Medicine, 2000 , p. 2).

One such safeguard that has been highly successful across several domains has been to exploit the “collective intelligence” of groups who collaborate to solve problems well. The “wisdom of crowds” phenomenon dates back to Aristotle (see Landemore, 2012 ), it was later investigated by Galton ( 1907 ) and others more formally in the early 20th century (e.g., Gordon, 1924 ). The rise of “crowds” has since been promoted in a series of popular books (e.g., Surowiecki, 2004 ; Rheingold, 2007 ; McAfee & Brynjolfsson, 2017 ) and even in a short-lived crime television drama (Humphrey, 2017 ), and for good reason, since combining judgements from many individuals can be surprisingly accurate in prediction markets, forecasting sporting outcomes, box office success, and geopolitical and climate-related events (Escoffier & McKelvey, 2015 ; Hueffer, Fonseca, Leiserowitz, & Taylor, 2013 ; Tetlock, Mellers, Rohrbaugh, & Chen, 2014 ; Wolfers & Zitzewitz, 2004 ). The benefits of aggregation have also been identified across a range of safety-critical domains including the diagnosis of skin lesions (Kurvers, Krause, Argenziano, Zalaudek, & Wolf, 2015 ), the interpretation of mammograms (Wolf, Krause, Carney, Bogart, & Kurvers, 2015 ), diagnosis in emergency medicine (Kämmer, Hautz, Herzog, Kunina-Habenicht, & Kurvers, 2017 ), and matching unfamiliar faces (Balsdon, Summersby, Kemp, & White, 2018 ).

A useful analogy for thinking about system failures, such as medical mishaps or nuclear meltdowns, is the Swiss cheese model of errors by Reason ( 2000 ), which likens human systems to multiple slices of Swiss cheese layered on top of each other. Each defensive layer (e.g., alarms, physical barriers, automatic shutdowns) could prevent a breach from occurring, but has unintended flaws, or holes, which can all align and cause harm by allowing the hazard to pass through. One can think about the wisdom of crowds in a similar way: each rater is depicted as a slice of Swiss cheese; the fewer and smaller the holes, the more expertise one has, the less chance there is of making an error. As more people are layered on, if their decisions are independent and they approach the problem from different perspectives, then the holes will be misaligned, preventing the error from passing through. On the other hand, if the raters all have the same blind spots—where the “holes” align—then errors may slip through.

In this experiment, we extend this “wisdom of crowds” approach to fingerprint analysis by comparing the performance of individuals and crowds of professional fingerprint analysts. We test whether crowds of novice participants are as collectively wise as experts, and also evaluate the collective intelligence of the groups by comparing three different rules for aggregating people’s responses:

Follow-the-majority . Adopt the judgement with the most support in the group.

Follow-the-most-confident . Adopt the judgement with the highest confidence rating.

Follow-the-most-senior . Adopt the judgment of the most experienced examiner.

Majority and confidence rules have been used successfully in high-stakes domains such as breast and skin cancer detection (Kurvers et al., 2015 ), while the seniority rule is less common (Kämmer et al., 2017 ). Pooling the independent judgments of small groups of diagnosticians substantially increases performance relative to average individual performance, often better than the highest performing member. The best rule often depends on the size of the group, but in general, if the decisions being pooled are unbiased, diverse, and derived independently, then the collective output will typically outperform even the best member of the group (Surowiecki, 2004 ). All three of these decision rules are often used in practice across a range of applied contexts, but they can lead to very different outcomes. But what about fingerprint analysis? Is it more sensible to follow the majority, the most confident, or the most senior examiner?

The methods and materials for this experiment are available and described at length on the Open Science Framework, including our experiment code, video instructions, trial sequences, de-identified data, and analysis scripts ( http://tiny.cc/jbkxcz ).

Thirty-six professional fingerprint examiners from the Australian Federal Police, Queensland Police Service, Victoria Police, and New South Wales Police (13 females and 23 males, mean age = 46 years, SD = 8, mean experience = 16.4 years, SD = 8.6) volunteered their time. Thirty-six novice participants (25 females and 11 males, mean age = 21.6 years, SD = 3.6, with no formal experience with fingerprints) consisting of undergraduate psychology students who participated for course credit and members of the broader communities at The University of Queensland and The University of Adelaide also volunteered their time. A novice control group is important for establishing expertise (Thompson, Tangen, & McCarthy, 2013 ), and allows us to examine whether more domain knowledge makes for a wiser crowd—which may not always be the case (Herzog & Hertwig, 2011 ).

The “crime scene” prints and their matches were collected and developed at The University of Queensland from undergraduate students who left their prints on various surfaces (e.g., wood, plastic, metal, and glass), so unlike genuine crime-scene prints, they had a known true origin (Cole, 2005 ). Simulated prints were dusted by a research assistant (who was trained by a qualified fingerprint expert), photographed, cropped, and isolated in the frame. A qualified expert reported that each simulated print contained sufficient information to make an identification if there was a clear comparison exemplar.

Each of the 36 fingerprint examiners was presented with the same set of 24 fingerprint pairs from the same finger (targets) and 24 highly similar pairs from different fingers (distractors) in a different random order. Each pair consisted of a crime-scene “latent” fingerprint and a fully rolled “arrest” fingerprint, and participants were asked to provide a rating on a 12-point scale ranging from 1 (Sure Different) to 12 (Sure Same). On target trials, when the prints were from the same person, ratings from 7 to 12 count as a “true positive”; on distractor trials, when the prints were from different people, ratings from 7 to 12 count as a “false positive.” The distractors were created by running each latent fingerprint through the National Australian Fingerprint Identification System—which consists of roughly 67 million fingerprints—to return the most similar exemplars from the database (see Tangen et al., 2011 , for a similar methodology). On the first 44 of 48 trials (22 targets, 22 distractors), participants were given 20 s to examine the prints. On the final four trials (two targets, two distractors), they had an unlimited amount of time to make a decision. These four untimed trials were cycled across each of the fingerprint pairs across the 36 participants so that each fingerprint pair was examined by three different participants. After running these 36 fingerprint examiners through the experiment, we presented an identical set of 36 trial sequences with the same fingerprint pairs in the same order to 36 novice participants.

Individual Performance

The individual performance of the 36 novices (yellow) and 36 experts (purple) is illustrated in Fig.  1 . The true-positive rate (on the left) represents each person’s performance when the prints came from the same finger. “False negatives” on these target trials are the sort of mistakes that could potentially lead to false exonerations in practice. The false-positive rate (on the right) represents each person’s performance when the prints came from different fingers. “False positives” on these distractor trials are the sort of mistakes that could potentially lead to false convictions in practice. These results closely replicate previous findings (e.g., Tangen et al., 2011 ; Thompson, Tangen, & McCarthy, 2014 ) in which experts outperformed novices on distractor trials, and performed the same or slightly better than novices on target trials. This benefit of expertise is evident in Fig.  1 a during the 44 trials (22 targets, 22 distractors) in which participants were given 20 s to make a decision, and in Fig.  1 b during the four trials (two targets, two distractors) in which participants had no time limit on making a decision. In the 20-s condition with 44 trials, experts made true-positive decisions 71% (SD = 45%) of the time and false-positive decisions 8.5% (SD = 28%) of the time. Novices, by comparison, made true-positive decisions 71% (SD = 45%) of the time and false-positive decisions 50% (SD = 50%) of the time. In the untimed condition with four trials, experts made true-positive decisions 85% (SD = 36%) of the time and false positives 2.8% (SD = 17%) of the time. Novices, on the other hand, made true-positive decisions 76% (SD = 43%) of the time and false positives 60% (SD = 49%) of the time.

figure 1

True- and false-positive rate for individual novices and experts after 20 s of analysis ( a ) or without a time limit ( b ). Each jittered data point represents the mean proportion of true or false positives for each individual participant. The red shape represents the mean and vertical bars ±1 standard deviation

A 2 (Group: novices vs. experts) × 2 (Rate Type: true vs. false positives) mixed ANOVA confirmed these impressions with significant main effects of Group, F (1, 70) = 61.34, p  < .001, η g 2  = .33, and Rate Type, F (1, 70) = 342.11, p  < .001, η g 2  = .68, along with a significant interaction, F (1, 70) = 84.25, p  < .001, η g 2  = .34 in the 20-s condition. The same pattern was evident in the unlimited condition: significant main effects of Group, F (1, 70) = 27.09, p  < .001, η g 2  = .16, and Rate Type, F (1, 35) = 110.62, p  < .001, η g 2  = .44, as well as a significant interaction, F (1, 70) = 48.47, p  < .001, η g 2  = .26.

Collective Performance

The most popular, transparent, and easiest method of aggregating people’s decisions is the majority rule (Hastie & Kameda, 2005 ). It is based on the commonsense notion that “many heads are better than one,” and is commonly used when making decisions in elections and committees: choose the option that gets more than half of the votes. In the experiment described above, each of the 48 pairs of fingerprints was either judged to be from “same” or “different” fingers by 36 professional fingerprint analysts and 36 novices. For each pair of prints, we took a random sample of three analysts, and tallied the decisions made by this trio using the majority rule. We then took another random group of three analysts, tallied their decisions, and repeated this process 2000 times and for groups of 3, 5, 7, and so on for each odd group size up to 35. The result was 2000 majority decisions for each of the 48 fingerprint pairs (24 targets and 24 distractors) across the 17 different group sizes. We repeated this process for novices as well.

The results of the simulation are illustrated in Fig.  2 . The individual true- and false-positive rates from Fig.  1 are represented as “Group Size, Number of Raters: 1” on the left side of each panel of Fig.  2 , respectively. As we aggregate the 20-s decisions of 3, 5, 7... experts moving along the x -axis of Fig.  2 a and c, the true-positive rate begins to increase and false-positive rate begins to decrease until they begin to level off at nine raters. For novices, however, their true-positive rate improves as more raters are included, but their false-positive rate remains at roughly 50% with a group of 35. When people are given an unlimited amount of time to decide—as illustrated in Fig.  2 b and d—the benefit of expertise is even more pronounced. The true-positive rate increases from 85% for individuals to 96% for groups of three experts, but increases from 76% for individual novices to 79% for novice trios. The false-positive rate is 2.8% for individual experts, and 0% for groups of three experts. The false-positive rate for novices is 60% for individuals, and 79% for groups of three novices.

figure 2

Mean true-positive rates for groups of novices and experts after 20 s of analysis ( a ) or without a time limit ( b ), and mean false positive rates for groups of novices and experts after 20 s of analysis ( c ) or without a time limit ( d )

Pooling the independent judgements of a group of professional fingerprint analysts using a majority rule reduced their false-negative rate by up to 12% and their false-positive rate by up to 8%. Groups of novices, on the other hand, also received a boost in their true-positive rate of up to 19% with the majority rule, but their false-positive rate remained at roughly 50%.

Another way to represent these results is to combine people’s true- and false-positive rates into a single measure of discriminability, which calculates how well they can distinguish between prints from the same finger and prints from different fingers. We use a non-parametric model of discriminability that averages the minimum and maximum proper receiver operating characteristic curves through a point ( A ) for each individual expert and novice participant; an A value of .5 is chance and 1 is perfect discriminability (Zhang & Mueller, 2005 ). As illustrated by the dark purple data points in Fig.  3 , expert discrimination improves when taking the majority decision of small groups of examiners, leveling off at groups of nine, which is mirrored by a similar improvement by novices in dark yellow—just at a much lower level of performance.

figure 3

Mean discriminability scores ( A ) for experts (purple) and novices (yellow) after 20 s of analysis ( a ) or without a time limit ( b ). The different shades of each color represent the three aggregation rules: (1) follow-the-majority; (2) follow-the-most-confident; and (3) follow-the-most-senior

The discriminability scores for the majority rule in Fig.  3 are presented alongside two other aggregation rules: (1) follow-the-most-confident and (2) follow-the-most-senior, which both improved the collective diagnostic performance of medical students (Kämmer et al., 2017 ).

We measured people’s absolute confidence on each trial by first collapsing across same and different on our 12-point scale, which ranged from 1 (Sure Different) to 12 (Sure Same), so each rating ranged from 1 (Unsure) to 6 (Sure). We then adopted the judgment with the highest confidence rating. For example, a random group of five people might provide ratings of 7, 10, 9, 8, and 1, which equates to confidence ratings of 1, 4, 3, 2, and 6. Even though four of the five provide a “Same” judgement, the extreme “Different” rating of 1 is the most extreme, so this highly confident examiner’s decision would be adopted. If people were equally confident about the two options, one was selected at random.

At the beginning of the experiment, each participant was asked to indicate how many years of formal experience they have with fingerprints. Given the follow-the-most-senior rule, we adopted the judgment of the most “senior” examiner in the crowd (i.e., the person with the greatest number of years examining prints). For example, a random group of five examiners might have 7, 10, 9, 18, and 25 years of experience. Even though the four less-experienced examiners each provide a “Same” judgement, since the most experienced examiner with 25 years of experience said, “Different,” this decision would be adopted. If examiners have the same level of experience, the response by one examiner was selected at random. Since none of the novice control participants had any experience with fingerprints, this rule was not applied to their ratings.

The output of these three aggregation rules is depicted in Fig.  3 . All three rules boosted collective performance compared to individual judgements—particularly in the unlimited time condition. For novices, the majority rule produced the largest increase when given 20 s to decide, and the confidence rule produced the largest gains in the unlimited condition. But even the output of the best aggregation rule applied to novice ratings paled in comparison to experts. The majority rule produced the largest collective performance boost for experts followed by the confidence rule followed by the seniority rule—both in the 20 s and unlimited time conditions.

Managing errors when lives and livelihoods are at stake requires resilient systems with safeguards that can tolerate mistakes and withstand their damaging effects (Reason, 2000 ). The wisdom of crowds may provide one such countermeasure to mitigate their impact, which motivated us to explore the role of collective intelligence in fingerprint analysis. Our results showed that individual experts performed exceedingly well, but they still made errors. Yet when we combined their decisions using a simple majority rule, these mistakes disappeared almost entirely. Pooling the decisions from small crowds of professional fingerprint analysts makes this wise group even wiser. Pooling the decisions from small crowds of novices, however, improved their true-positive rate, but at the cost of many more false positives. We tested the effect of two other aggregation methods. The first is to adopt the decision of the most confident person in the crowd and the second is to adopt the decision of the most experienced person in the crowd. Both of these pooling methods produced a slight improvement for experts compared to individual judgements depending on the condition, but the majority rule—which is the most common, transparent, and easiest method to adopt—delivered the most considerable boost in performance.

Our results add to the growing body of evidence that combining independent judgements can greatly improve the quality of decision-making in high-stakes domains. What makes this collective intelligence approach particularly appealing in these contexts is the robustness or “fault tolerance” that is built into the aggregation process. Instead of a single examiner bearing the weight of this important decision, the burden is distributed equally across several individuals. This redundancy provides some assurance that the system will not collapse with a single mistake. Such a system would be straightforward to implement; it embodies a team-based approach to decision-making, and would bring greater peace of mind to analysts, managers, and their organizations. Of course, it is also possible that examiners could feel less responsibility for their collective decisions compared to acting alone, so they may be less conservative or careful than usual if they assume other examiners will catch their mistakes (El Zein, Bahrami, & Hertwig, 2019 ). Despite the promise of a collective intelligence system, courts would need to figure out how to accommodate cases where decision-making is distributed (Kemp, White, & Edmond, in press ). Time and resourcing limitations could also be a consideration in adopting a distributed system, but each expert may not need to replicate the entire analysis that is currently performed by an individual examiner (Ballantyne, Edmond, & Found, 2017 ). Indeed, this experiment was conducted in a tightly controlled setting and should be replicated under typical conditions using actual casework materials, software tools, and timeframes. Assuming that our results generalize to everyday practice, pooling the decisions of crowds of expert analysts may provide an effective safeguard against miscarriages of justice.

Availability of data and materials

The data and code for each individual novice and expert participant used to produce our results and plots are available, with the exception of participants’ years of experience, which have been rank-ordered to preserve the identities of our participants.

Change history

29 september 2023.

A Correction to this paper has been published: https://doi.org/10.1186/s41235-023-00514-w

Ballantyne, K. N., Edmond, G., & Found, B. (2017). Peer review in forensic science. Forensic Science International , 277 , 66–76. https://doi.org/10.1016/j.forsciint.2017.05.020 .

Article   PubMed   Google Scholar  

Balsdon, T., Summersby, S., Kemp, R. I., & White, D. (2018). Improving face identification with specialist teams. Cognitive Research: Principles and Implications , 3 (1), 25. https://doi.org/10.1186/s41235-018-0114-7 .

Cole, S. A. (2005). More than zero: Accounting for error in latent fingerprint identification. The Journal of Criminal Law & Criminology , 95 (3), 985–1078 http://www.jstor.org/stable/3491332 .

Google Scholar  

Dekker, S. (2014). The Field Guide to Understanding ‘Human Error’ . London: Routledge. https://doi.org/10.1201/9781317031833 .

Book   Google Scholar  

El Zein, M., Bahrami, B., & Hertwig, R. (2019). Shared responsibility in collective decisions. Nature Human Behaviour , 3 (6), 554–559. https://doi.org/10.1038/s41562-019-0596-4 .

Article   PubMed   PubMed Central   Google Scholar  

Escoffier, N., & McKelvey, B. (2015). The wisdom of crowds in the movie industry: Towards new solutions to reduce uncertainties. International Journal of Arts Management , 17 (2), 52–73 http://www.jstor.org/stable/24587073 .

Galton, F. (1907). Vox populi. Nature , 75 (7), 450–451. https://doi.org/10.1038/075450a0 .

Article   Google Scholar  

Gordon, K. (1924). Group judgments in the field of lifted weights. Journal of Experimental Psychology , 7 (5), 398–400. https://doi.org/10.1037/h0074666 .

Hastie, R., & Kameda, T. (2005). The robust beauty of majority rules in group decisions. Psychological Review , 112 (2), 494–508. https://doi.org/10.1037/0033-295X.112.2.494 .

Herzog, S. M., & Hertwig, R. (2011). The wisdom of ignorant crowds: Predicting sport outcomes by mere recognition. Judgment and Decision making , 6 (1), 58–72.

Hueffer, K., Fonseca, M. A., Leiserowitz, A., & Taylor, K. M. (2013). The wisdom of crowds: Predicting a weather and climate-related event. Judgment and Decision making , 8 (2), 91–105.

Humphrey, T. (2017). Wisdom of the Crowd . Los Angeles: Columbia Broadcasting System.

Institute of Medicine (2000). To Err Is Human: Building a Safer Health System . Washington, DC: The National Academies Press. https://doi.org/10.17226/9728 .

James, J. T. (2013). A new, evidence-based estimate of patient harms associated with hospital care. Journal of Patient Safety , 9 (3), 122–128. https://doi.org/10.1097/PTS.0b013e3182948a69 .

Kämmer, J. E., Hautz, W. E., Herzog, S. M., Kunina-Habenicht, O., & Kurvers, R. H. (2017). The potential of collective intelligence in emergency medicine: Pooling medical students’ independent decisions improves diagnostic performance. Medical Decision Making , 37 (6), 715–724 https://doi.org/10.1177/0272989X17696998 .

Kemp, R. I., White, D., & Edmond, G. (in press). A proposed solution to the problem of identifying people from CCTV and other images. In M. Toglia, A. Smith, & J. M. Lampinen (Eds.), Methods, measures, and theories in forensic facial-recognition tasks . London: Taylor and Francis.

Kurvers, R. H., Krause, J., Argenziano, G., Zalaudek, I., & Wolf, M. (2015). Detection accuracy of collective intelligence assessments for skin cancer diagnosis. JAMA Dermatology , 151 (12), 1346–1353 https://doi.org/10.1001/jamadermatol.2015.3149 .

Landemore, H. E. (2012). Why the many are smarter than the few and why it matters. Journal of Public Deliberation , 8 (1), 7 https://www.publicdeliberation.net/jpd/vol8/iss1/art7 .

McAfee, A., & Brynjolfsson, E. (2017). Machine, platform, crowd: Harnessing our digital future . New York: WW Norton & Company.

Reason, J. (2000). Human error: models and management. BMJ , 320 (7237), 768–770 https://doi.org/10.1136/bmj.320.7237.768 .

Rheingold, H. (2007). Smart mobs: The next social revolution . New York: Basic books.

Searston, R. A., & Tangen, J. M. (2017a). The emergence of perceptual expertise with fingerprints over time. Journal of Applied Research in Memory and Cognition , 6 (4), 442–451 https://doi.org/10.1016/j.jarmac.2017.08.006 .

Searston, R. A., & Tangen, J. M. (2017b). The style of a stranger: Identification expertise generalizes to coarser level categories. Psychonomic Bulletin & Review , 24 (4), 1324–1329 https://doi.org/10.3758/s13423-016-1211-6 .

Shojania, K. G., Burton, E. C., McDonald, K. M., & Goldman, L. (2003). Changes in rates of autopsy-detected diagnostic errors over time: a systematic review. JAMA , 289 (21), 2849–2856 https://doi.org/10.1001/jama.289.21.2849 .

Surowiecki, J. (2004). The Wisdom of Crowds . New York: Random House.

Tangen, J. M., Thompson, M. B., & McCarthy, D. J. (2011). Identifying fingerprint expertise. Psychological Science , 22 (8), 995–997 https://doi.org/10.1177/0956797611414729 .

Tetlock, P. E., Mellers, B. A., Rohrbaugh, N., & Chen, E. (2014). Forecasting tournaments: Tools for increasing transparency and improving the quality of debate. Current Directions in Psychological Science , 23 (4), 290–295 https://doi.org/10.1177/0963721414534257 .

Thompson, M. B., & Tangen, J. M. (2014). The nature of expertise in fingerprint matching: Experts can do a lot with a little. PLoS One , 9 (12), e114759 https://doi.org/10.1371/journal.pone.0114759 .

Thompson, M. B., Tangen, J. M., & McCarthy, D. J. (2013). Expertise in fingerprint identification. Journal of Forensic Sciences , 58 (6), 1519–1530 https://doi.org/10.1111/1556-4029.12203 .

Thompson, M. B., Tangen, J. M., & McCarthy, D. J. (2014). Human matching performance of genuine crime scene latent fingerprints. Law and Human Behavior , 38 (1), 84–93 https://doi.org/10.1037/lhb0000051 .

Thompson, W., Black, J., Jain, A., & Kadane, J. (2017). Forensic science assessments: A quality and gap analysis – Latent fingerprint examination . Washington, DC: American Association for the Advancement of Science.

Ulery, B. T., Hicklin, R. A., Buscaglia, J., & Roberts, M. A. (2011). Accuracy and reliability of forensic latent fingerprint decisions. Proceedings of the National Academy of Sciences , 108 (19), 7733–7738 https://doi.org/10.1073/pnas.1018707108 .

Wolf, M., Krause, J., Carney, P. A., Bogart, A., & Kurvers, R. H. (2015). Collective intelligence meets medical decision-making: The collective outperforms the best radiologist. PLoS One , 10 (8), e0134269 https://doi.org/10.1371/journal.pone.0134269 .

Wolfers, J., & Zitzewitz, E. (2004). Prediction markets. Journal of Economic Perspectives , 18 (2), 107–126 https://doi.org/10.1257/0895330041371321 .

Zhang, J., & Mueller, S. T. (2005). A note on ROC analysis and non-parametric estimate of sensitivity. Psychometrika , 70 (1), 203–212 https://doi.org/10.1007/s11336-003-1119-8 .

Download references

Acknowledgements

We thank the Australian fingerprint examiners who participated in our research for giving their time and expertise so generously. We thank Amy Cramb and Molly Arendt for their assistance in collecting the data.

This research was supported by grant No. LP170100086 from the Australian Research Council to Tangen and Searston.

Author information

Authors and affiliations.

School of Psychology, The University of Queensland, St Lucia, 4072, Queensland, Australia

Jason M. Tangen & Kirsty M. Kent

School of Psychology, The University of Adelaide, Adelaide, 5005, South Australia, Australia

Rachel A. Searston

You can also search for this author in PubMed   Google Scholar

Contributions

In line with the CRediT taxonomy, JMT contributed to all aspects of the project: conceptualization, data curation, formal analysis, funding acquisition, investigation, methodology, project administration, resources, software, supervision, validation, visualization, writing, and editing. KMK contributed to the conceptualization, investigation, methodology, project administration, validation, writing, and editing. RAS contributed to the data curation, formal analysis, funding acquisition, investigation, project administration, resources, software, supervision, validation, visualization, writing, and editing. The authors read and approved the final manuscript.

Corresponding author

Correspondence to Jason M. Tangen .

Ethics declarations

Ethics approval and consent to participate.

The reported studies were cleared in accordance with the ethical review processes of The University of Queensland and The University of Adelaide and are within the guidelines of the National Statement on Ethical Conduct in Human Research.

Consent for publication

Not applicable.

Competing interests

We declare that we have no conflicts of interest with respect to authorship or the publication of this article.

Additional information

Publisher’s note.

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ .

Reprints and permissions

About this article

Cite this article.

Tangen, J.M., Kent, K.M. & Searston, R.A. Collective intelligence in fingerprint analysis. Cogn. Research 5 , 23 (2020). https://doi.org/10.1186/s41235-020-00223-8

Download citation

Received : 01 October 2019

Accepted : 30 March 2020

Published : 19 May 2020

DOI : https://doi.org/10.1186/s41235-020-00223-8

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Collective intelligence
  • Wisdom of crowds
  • Fingerprints
  • Forensic science

research paper on fingerprint analysis

Methodologies Applied to Fingerprint Analysis

Affiliations.

  • 1 Department of Pharmacy, Federal University of Rio Grande do Sul, 2752 Ipiranga Ave, Lab 605A - Santana, Porto Alegre, 90610-000, RS, Brazil.
  • 2 Identification Group, Brazilian Federal Police, Porto Alegre, 90610-093, RS, Brazil.
  • 3 National Institute of Forensic Science and Technology - INCT FORENSE, 2752 Ipiranga Ave, Lab 605A - Santana, Porto Alegre, 90610-000, RS, Brazil.
  • PMID: 32176818
  • DOI: 10.1111/1556-4029.14313

This systematic review deals with the last 10 years of research in analytical methodologies for the analysis of fingerprints, regarding their chemical and biological constituents. A total of 123 manuscripts, which fit the search criteria defined using the descriptor "latent fingermarks analysis," were selected. Its main instrumental areas (mass spectrometry, spectroscopy, and innovative methods) were analyzed and summarized in a specific table, highlighting its main analytical parameters. The results show that most studies in this field use mass spectrometry to identify the constituents of fingerprints, both to determine the chemical profile and for aging. There is also a marked use of mass spectrometry coupled with chromatographic methods, and it provides accurate results for a fatty acid profile. Additional significant results are achieved by spectroscopic methods, mainly Raman and infrared. It is noteworthy that spectroscopic methods using microscopy assist in the accuracy of the analyzed region of the fingerprint, contributing to more robust results. There was also a significant increase in studies using methods focused on finding new developers or identifying components present in fingerprints by rapid tests. This systematic review of analytical techniques applied to the detection of fingerprints explores different approaches to contribute to future studies in forensic identification, verifying new demands in the forensic sciences and assisting in the selection of studies for the progress of research.

Keywords: forensic identification; forensic science; latent fingermarks; latent fingerprints; mass spectrometry; nanoparticles; spectroscopy.

© 2020 American Academy of Forensic Sciences.

Publication types

  • Systematic Review
  • Chromatography
  • Dermatoglyphics*
  • Fatty Acids / chemistry
  • Forensic Sciences / methods*
  • Immunoassay
  • Lipids / chemistry
  • Mass Spectrometry
  • Nanoparticles
  • Spectrum Analysis
  • Time Factors
  • Fatty Acids

Grants and funding

  • 17/2551-0000839-1/Fundo de Amparo a Pesquisa do Rio Grande do sul - FAPERGS
  • 16/2014/Conselho Nacional de Desenvolvimento Científico e Tecnológico
  • 16/2014/National Institute of Forensic Science and Technology - INCT FORENSE
  • 88882.345923/2019-01/Coordenação de Aperfeiçoamento de Pessoal de Nível Superior
  • Skip to main content
  • Skip to primary sidebar

Criminal Justice

IResearchNet

Academic Writing Services

Fingerprint analysis and databases.

This article delves into the critical role of fingerprint analysis and databases within the United States criminal justice process . Beginning with an exploration of the historical evolution of fingerprint analysis, the article elucidates the unique and permanent nature of fingerprints, encompassing diverse patterns and key identification features. It further examines traditional and modern techniques employed in fingerprint analysis, including ink and paper methods and advanced Automated Fingerprint Identification Systems (AFIS). Legal and ethical considerations surrounding the admissibility of fingerprint evidence in court are discussed, emphasizing the necessity of ensuring reliability and accuracy. Transitioning to fingerprint databases, the article provides an in-depth overview of national and state-level systems, detailing their implementation, integration with forensic databases, and the associated challenges. Real-world examples illustrate the substantial impact of fingerprint analysis on criminal investigations , emphasizing collaboration with other forensic methods. The article concludes by highlighting emerging trends and future advancements in the field, urging sustained research and development for continuous improvement. This comprehensive exploration aims to enhance understanding and awareness of the pivotal role fingerprints play in modern criminal justice.

Introduction

Fingerprint analysis stands as an indispensable pillar within the realm of criminal investigations, playing a pivotal role in identifying and linking individuals to criminal activities. The uniqueness and permanence of fingerprints make them a reliable biometric identifier, contributing significantly to the establishment of individual identity. This section will provide a brief overview of the profound significance that fingerprint analysis holds in aiding law enforcement agencies in solving crimes and bringing perpetrators to justice.

Tracing its roots back to the early 20th century, the historical evolution of fingerprint analysis is a fascinating journey marked by advancements in forensic science. From the pioneering work of Sir Francis Galton to the establishment of fingerprinting as a standard forensic practice, this subsection will illuminate the key milestones that have shaped fingerprint analysis into the sophisticated discipline it is today. Understanding the historical context is crucial for appreciating the continuous refinement and integration of fingerprint analysis within the broader framework of the criminal justice system.

Fingerprint databases serve as repositories of invaluable forensic information, transcending geographical boundaries and facilitating seamless collaboration among law enforcement agencies. This subsection will elucidate the purpose and role of fingerprint databases in enhancing criminal investigations. By detailing how these databases compile, store, and match fingerprint data, we will explore their instrumental role in expediting the identification process and connecting disparate criminal cases.

In summary, this article aims to provide a comprehensive exploration of fingerprint analysis and databases within the context of the US criminal justice process. By examining the historical evolution of fingerprint analysis, detailing the techniques involved, scrutinizing the legal and ethical considerations, delving into the intricacies of fingerprint databases, and assessing their impact on criminal investigations, this discussion seeks to offer a thorough understanding of the multifaceted role fingerprints play in modern forensic science.

Fingerprint Analysis

At the core of fingerprint analysis lies the fundamental principle that each individual possesses a unique and unalterable fingerprint pattern. This subsection will delve into the intricacies of why fingerprints are considered an exceptional biometric identifier, exploring the scientific basis behind their permanence and distinctiveness.

Fingerprint patterns manifest in distinct configurations, commonly classified as loops, arches, and whorls. This section will elucidate the significance of each pattern type, discussing their prevalence in the general population and the forensic importance of identifying and classifying these patterns in the investigative process.

Beyond overall patterns, the identification of specific ridge patterns and minutiae points forms the basis of individual fingerprint recognition. This subsection will explore the microscopic details critical to fingerprint identification, emphasizing the role of ridge patterns and minutiae points in forensic analysis.

Fingerprinting has evolved from traditional ink and paper methods, wherein individuals leave their impressions on paper through ink. This section will discuss the historical roots of this technique and its continued relevance in certain forensic contexts.

The advent of technology has revolutionized fingerprint analysis, with Automated Fingerprint Identification Systems (AFIS) taking center stage. This subsection will explore the technological advancements in AFIS, highlighting their efficiency in processing and matching fingerprints within vast databases.

Despite technological advancements, the expertise of forensic analysts remains crucial in fingerprint analysis. This section will elucidate the role of forensic experts in examining, comparing, and verifying fingerprint evidence, emphasizing the human element in ensuring accuracy and reliability.

Fingerprint evidence’s admissibility in court is a critical legal consideration. This subsection will explore the standards and criteria for admitting fingerprint evidence, addressing the foundational reliability required for its acceptance in legal proceedings.

Fingerprint analysis is not without challenges and controversies. This section will examine issues such as the potential for human error, the limitations of technology, and debates surrounding the infallibility of fingerprint evidence in criminal investigations.

Maintaining the reliability and accuracy of fingerprint examinations is paramount. This subsection will discuss quality assurance measures, standardization efforts, and ongoing research aimed at continually improving the precision of fingerprint analysis in forensic science.

Fingerprint Databases

Fingerprint databases play a crucial role in the modernization of criminal investigations. This section provides an insightful overview of both national and state-level fingerprint databases in the United States. It explores the establishment, purpose, and jurisdictional scope of these databases, emphasizing their collective contribution to enhancing law enforcement capabilities.

The effectiveness of fingerprint databases is contingent upon seamless coordination and collaboration among various law enforcement agencies. This subsection examines the intricate network of information sharing, protocols, and collaborative efforts that underpin the successful operation of fingerprint databases at different levels of governance.

The implementation of fingerprint databases involves systematic processes for the collection and storage of fingerprint data. This section delves into the methods employed by law enforcement agencies to collect and input fingerprint information into databases, emphasizing the standardization of data entry practices to ensure accuracy and reliability.

Fingerprint databases do not operate in isolation; they are integral components of broader forensic ecosystems. This subsection explores the integration of fingerprint databases with other forensic databases and information systems, illustrating how this integration enhances the overall efficacy of criminal investigations.

Real-world examples serve to underscore the impact of fingerprint databases in solving crimes. Through compelling case studies, this section illuminates instances where fingerprint databases have played a pivotal role in identifying perpetrators, connecting criminal activities, and expediting investigations, thereby showcasing their practical effectiveness.

As with any large-scale data repository, fingerprint databases are not immune to privacy concerns and legal limitations. This subsection addresses the ethical considerations surrounding the collection and utilization of fingerprint data, exploring legal frameworks and privacy safeguards designed to protect individual rights.

Fingerprint data is highly sensitive and must be safeguarded against unauthorized access and potential breaches. This section discusses the security measures implemented to protect the integrity of fingerprint data, including encryption protocols, access controls, and ongoing advancements in cybersecurity within the context of fingerprint databases.

Fingerprint databases often involve the collaboration of multiple law enforcement agencies. This subsection investigates the challenges and strategies associated with interagency cooperation, emphasizing the importance of standardization in database practices to ensure consistency and interoperability across jurisdictions. It also explores ongoing efforts to establish common protocols and standards within the field of fingerprint database management.

Impact on Criminal Investigations

Fingerprint analysis has been instrumental in solving a myriad of criminal cases. This section delves into compelling real-world examples where fingerprint evidence played a decisive role in identifying perpetrators and establishing crucial links in investigations. These case studies serve as powerful illustrations of the practical application and impact of fingerprint analysis in criminal justice.

Beyond individual case anecdotes, statistical data provides a quantitative perspective on the success rate of fingerprint analysis. This subsection explores relevant statistics, highlighting the reliability and efficacy of fingerprint analysis in contributing to successful case resolutions. Examining success rates across various types of crimes and demographics enhances our understanding of the broader impact.

Fingerprint analysis is often complemented by other forensic methods, most notably DNA analysis. This section explores collaborative efforts between fingerprint analysis and DNA analysis, showcasing how the integration of these techniques has led to more robust and conclusive evidence in criminal investigations. The synergy between fingerprint and DNA analysis enhances the overall accuracy and reliability of forensic findings.

Fingerprint analysis serves as a cornerstone within the comprehensive forensic toolkit employed by law enforcement agencies. This subsection examines how the integration of fingerprint analysis with other forensic techniques, such as ballistics and digital forensics, contributes to a holistic investigative approach. The combined use of multiple forensic disciplines strengthens law enforcement’s ability to reconstruct events, identify perpetrators, and build compelling cases for prosecution.

Technological advancements continually shape the landscape of fingerprint analysis. This section explores emerging technologies, such as 3D fingerprinting and advanced imaging techniques, and their potential impact on the precision and efficiency of fingerprint analysis. Understanding these innovations provides insights into the evolving capabilities of forensic experts.

Ongoing research and development initiatives play a pivotal role in advancing fingerprint analysis capabilities. This subsection delves into current R&D efforts aimed at enhancing the accuracy, speed, and scope of fingerprint analysis. It highlights collaborative projects between academia, industry, and law enforcement that contribute to the continuous improvement of fingerprint analysis methodologies and technologies.

In conclusion, the multifaceted impact of fingerprint analysis on criminal investigations is evident through its historical successes, statistical validation, and integration with other forensic methods. As technology evolves and research progresses, the future promises further enhancements in the capabilities of fingerprint analysis, solidifying its position as an indispensable tool in the pursuit of justice.

Fingerprint analysis stands as a cornerstone in the criminal justice process, embodying a rich history of forensic science evolution and contributing immeasurably to the resolution of criminal cases. The uniqueness and permanence of fingerprints make them unparalleled biometric identifiers, enabling law enforcement agencies to establish individual identities with a high degree of certainty. This section reiterates the profound significance of fingerprint analysis in criminal investigations, emphasizing its role in not only identifying suspects but also connecting individuals to crime scenes and fostering the overall integrity of the justice system.

The preceding sections of this article have provided a comprehensive examination of fingerprint analysis and databases within the context of the US criminal justice process. Beginning with an exploration of the historical evolution of fingerprint analysis, we delved into the intricate details of fingerprint patterns, minutiae points, and the methods employed in fingerprint analysis. Subsequently, the discussion expanded to cover the establishment and functioning of fingerprint databases, their integration with forensic ecosystems, and the challenges associated with managing such vast repositories of sensitive data. The article also highlighted the substantial impact of fingerprint analysis on criminal investigations, showcasing real-world examples, statistical data, and the collaborative efforts with other forensic methods. Lastly, the future of fingerprint analysis was explored, encompassing emerging technologies and ongoing research initiatives aimed at enhancing its capabilities.

While fingerprint analysis has proven to be an invaluable tool in the criminal justice process, there remains a call to action for continued research and improvement. Technological advancements, such as artificial intelligence and machine learning, offer new frontiers for enhancing the accuracy and efficiency of fingerprint analysis. This subsection advocates for sustained investment in research and development initiatives that focus on refining fingerprint analysis techniques and strengthening the security and interoperability of fingerprint databases. Moreover, the article encourages collaboration among academia, industry, and law enforcement agencies to foster innovation, share best practices, and address the evolving challenges in the realm of fingerprint forensics. By actively engaging in continuous improvement, the criminal justice system can ensure that fingerprint analysis remains a reliable and cutting-edge tool for years to come.

In conclusion, fingerprint analysis represents both a testament to the advancements in forensic science and an ongoing frontier for innovation. As we navigate the complexities of modern criminal investigations, the significance of fingerprints endures, and their analysis remains an indispensable element in the pursuit of justice. Through commitment to research, collaboration, and technological progress, the criminal justice community can further elevate the capabilities of fingerprint analysis, fortifying its role as a linchpin in the relentless pursuit of truth and accountability.

Bibliography

  • Ashbaugh, D. (1999). Quantitative-Qualitative Friction Ridge Analysis: An Introduction to Basic and Advanced Ridgeology. CRC Press.
  • Champod, C., Lennard, C., & Margot, P. (2004). Fingerprints and Other Ridge Skin Impressions. CRC Press.
  • FBI Criminal Justice Information Services Division. (2020). Integrated Automated Fingerprint Identification System (IAFIS) Fact Sheet. Retrieved from https://www.fbi.gov/services/cjis/fingerprints-and-other-biometrics/iafis
  • National Institute of Justice. (2009). Fingerprint Sourcebook. Retrieved from https://nij.ojp.gov/library/publications/fingerprint-sourcebook
  • National Institute of Standards and Technology (NIST). (2014). Standard for the Exchange of Fingerprint Information (ANSI/NIST-ITL 1-2011). Retrieved from https://www.nist.gov/itl/iad/image-group/nist-standard-exchange-fingerprint-information
  • Osterburg, J. W., & Ward, R. H. (2013). Criminal Investigation: A Method for Reconstructing the Past. Anderson Publishing.
  • Paul, R. (2004). Crime Scene Investigation: A Guide for Law Enforcement. U.S. Department of Justice.
  • Ramotowski, R. S. (2016). The Science of Fingerprints: Classification and Uses. CRC Press.
  • Rouse, S. V. (2008). Enhancing AFIS Performance: Emerging Technologies. CRC Press.
  • Schmalleger, F., & Hall, D. E. (2017). Criminal Law Today. Pearson.
  • Stoilovic, M., & Stoilovic, I. (2016). Forensic Fingerprint Identification. Academic Press.
  • US Department of Justice. (2014). Best Practices for Fingerprinting in Criminal Cases. Retrieved from https://www.justice.gov/archives/usao/page/file/1193631/download
  • US Federal Bureau of Investigation. (2014). The Next Generation Identification (NGI) System. Retrieved from https://www.fbi.gov/services/cjis/fingerprints-and-other-biometrics/ngi
  • Wertheim, P. (2014). Advanced Fingerprint Comparison. Elsevier.
  • Wilde, C., & Sterzik, V. (2011). Forensic Science Reform: Protecting the Innocent. CRC Press.

Family-Based Fingerprint Analysis: A Position Paper

  • First Online: 07 September 2022

Cite this chapter

research paper on fingerprint analysis

  • Carlos Diego N. Damasceno   ORCID: orcid.org/0000-0001-8492-7484 10 &
  • Daniel Strüber   ORCID: orcid.org/0000-0002-5969-3521 10 , 11  

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13560))

664 Accesses

1 Citations

1 Altmetric

Thousands of vulnerabilities are reported on a monthly basis to security repositories, such as the National Vulnerability Database. Among these vulnerabilities, software misconfiguration is one of the top 10 security risks for web applications. With this large influx of vulnerability reports, software fingerprinting has become a highly desired capability to discover distinctive and efficient signatures and recognize reportedly vulnerable software implementations. Due to the exponential worst-case complexity of fingerprint matching, designing more efficient methods for fingerprinting becomes highly desirable, especially for variability-intensive systems where optional features add another exponential factor to its analysis. This position paper presents our vision of a framework that lifts model learning and family-based analysis principles to software fingerprinting. In this framework, we propose unifying databases of signatures into a featured finite state machine and using presence conditions to specify whether and in which circumstances a given input-output trace is observed. We believe feature-based signatures can aid performance improvements by reducing the size of fingerprints under analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
  • Available as EPUB and PDF
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

In fact, we would like to thank for this well-crafted introduction that sparked our interest to the topic and led to the initial ideas of the first author’s doctoral thesis.

Aichernig, B.K., Pferscher, A., Tappler, M.: From passive to active: learning timed automata efficiently. In: Lee, R., Jha, S., Mavridou, A., Giannakopoulou, D. (eds.) NFM 2020. LNCS, vol. 12229, pp. 1–19. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-55754-6_1

Chapter   Google Scholar  

Aichernig, B.K., Tappler, M.: Efficient active automata learning via mutation testing. J. Autom. Reason. 63 (4), 1103–1134 (2018). https://doi.org/10.1007/s10817-018-9486-0

Article   MathSciNet   MATH   Google Scholar  

Alrabaee, S., Debbabi, M., Wang, L.: A survey of binary code fingerprinting approaches: taxonomy, methodologies, and features. ACM Comput. Surv. 55 (1), 1–41 (2022). https://doi.org/10.1145/3486860

Article   Google Scholar  

Angluin, D.: Learning regular sets from queries and counterexamples. Inf. Comput. 75 (2), 87–106 (1987). https://doi.org/10.1016/0890-5401(87)90052-6

Apel, S., Batory, D., Kästner, C., Saake, G.: Feature-Oriented Software Product Lines. Springer, Berlin, Heidelberg (2013). https://doi.org/10.1007/978-3-642-37521-7

Benduhn, F., Thüm, T., Lochau, M., Leich, T., Saake, G.: A survey on modeling techniques for formal behavioral verification of software product lines. In: Proceedings of the Ninth International Workshop on Variability Modelling of Software-intensive Systems, pp. 80:80–80:87. VaMoS 2015. ACM, New York (2015). https://doi.org/10.1145/2701319.2701332 , event-place: Hildesheim, Germany

van den Bos, P., Vaandrager, F.: State identification for labeled transition systems with inputs and outputs. Sci. Comput. Program. 209 , 102678 (2021). https://doi.org/10.1016/j.scico.2021.102678

Broy, M., Jonsson, B., Katoen, J.-P., Leucker, M., Pretschner, A. (eds.) Model-Based Testing of Reactive Systems. LNCS, vol. 3472. Springer, Heidelberg (2005). https://doi.org/10.1007/b137241

Classen, A., Cordy, M., Schobbens, P.Y., Heymans, P., Legay, A., Raskin, J.F.: Featured transition systems: foundations for verifying variability-intensive systems and their application to LTL model checking. IEEE Trans. Softw. Eng. 39 (8), 1069–1089 (2013). https://doi.org/10.1109/TSE.2012.86

Damasceno, C.D.N., Mousavi, M.R., da Silva Simao, A.: Learning to reuse: adaptive model learning for evolving systems. In: Ahrendt, W., Tapia Tarifa, S.L. (eds.) IFM 2019. LNCS, vol. 11918, pp. 138–156. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-34968-4_8

Damasceno, C.D.N., Mousavi, M.R., Simao, A.: Learning from difference: an automated approach for learning family models from software product lines [research]. In: Proceedings of the 23rd International Systems and Software Product Line Conference - Volume A. SPLC 2019. ACM, New York (2019). https://doi.org/10.1145/3336294.3336307

Damasceno, C.D.N., Mousavi, M.R., Simao, A.S.: Learning by sampling: learning behavioral family models from software product lines. Empir. Softw. Eng. 26 (1), 1–46 (2021). https://doi.org/10.1007/s10664-020-09912-w

Devroey, X., Perrouin, G., Papadakis, M., Legay, A., Schobbens, P.Y., Heymans, P.: Featured model-based mutation analysis. In: Proceedings of the 38th International Conference on Software Engineering, pp. 655–666. ICSE 2016, New York (2016). https://doi.org/10.1145/2884781.2884821

Elmaghbub, A., Hamdaoui, B.: LoRa device fingerprinting in the wild: disclosing RF Data-driven fingerprint sensitivity to deployment variability. IEEE Access 9 , 142893–142909 (2021). https://doi.org/10.1109/ACCESS.2021.3121606

Fiterau-Brostean, P., Jonsson, B., Merget, R., de Ruiter, J., Sagonas, K., Somorovsky, J.: Analysis of DTLS implementations using protocol state fuzzing. In: 29th USENIX Security Symposium (USENIX Security 20), pp. 2523–2540. USENIX Association, August 2020. https://www.usenix.org/conference/usenixsecurity20/presentation/fiterau-brostean

Fiterău-Broştean, P., Janssen, R., Vaandrager, F.: Combining model learning and model checking to analyze TCP implementations. In: Chaudhuri, S., Farzan, A. (eds.) CAV 2016. LNCS, vol. 9780, pp. 454–471. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-41540-6_25

Fragal, V.H., Simao, A., Mousavi, M.R.: Validated test models for software product lines: featured finite state machines. In: Kouchnarenko, O., Khosravi, R. (eds.) Formal Aspects of Component Software: 13th International Conference, FACS 2016. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-57666-4_13

Fragal, V.H., Simao, A., Mousavi, M.R., Turker, U.C.: Extending HSI test generation method for software product lines. Comput. J. (2018). https://doi.org/10.1093/comjnl/bxy046

Huistra, D., Meijer, J., van de Pol, J.: Adaptive learning for learn-based regression testing. In: Howar, F., Barnat, J. (eds.) FMICS 2018. LNCS, vol. 11119, pp. 162–177. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-00244-2_11

Janssen, E.: Fingerprinting TLS implementations using model learning. Master’s thesis, Radboud Universit, Nijmegen, March 2021

Google Scholar  

Kang, K., Cohen, S., Hess, J., Novak, W., Peterson, A.: Feature-Oriented Domain Analysis (FODA) Feasibility Study. Technical report CMU/SEI-90-TR-021, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA (1990)

Kenner, A., May, R., Krüger, J., Saake, G., Leich, T.: Safety, security, and configurable software systems: a systematic mapping study. In: Proceedings of the 25th ACM International Systems and Software Product Line Conference - Volume A. New York, September 2021. https://doi.org/10.1145/3461001.3471147

Lee, D., Yannakakis, M.: Principles and methods of testing finite state machines-a survey. Proc. IEEE 84 (8), 1090–1123 (1996). https://doi.org/10.1109/5.533956

Neider, D., Smetsers, R., Vaandrager, F., Kuppens, H.: Benchmarks for automata learning and conformance testing. In: Margaria, T., Graf, S., Larsen, K.G. (eds.) Models, Mindsets, Meta: The What, the How, and the Why Not? LNCS, vol. 11200, pp. 390–416. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-22348-9_23

NVD: The National Vulnerability Database (2022). https://nvd.nist.gov/

OpenSSL Foundation Inc: OpenSSL Releases on Github (2022). https://github.com/openssl/openssl/releases

Peldszus, S., Strüber, D., Jürjens, J.: Model-based security analysis of feature-oriented software product lines. In: Proceedings of the 17th ACM SIGPLAN International Conference on Generative Programming: Concepts and Experiences, pp. 93–106 (2018). https://doi.org/10.1145/3278122.3278126

Pereira, J.A., Acher, M., Martin, H., Jézéquel, J.M., Botterweck, G., Ventresque, A.: Learning software configuration spaces: a systematic literature review. J. Syst. Softw. 182 , 111044 (2021). https://doi.org/10.1016/j.jss.2021.111044

Pferscher, A., Aichernig, B.K.: Fingerprinting Bluetooth low energy devices via active automata learning. In: Huisman, M., Păsăreanu, C., Zhan, N. (eds.) FM 2021. LNCS, vol. 13047, pp. 524–542. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-90870-6_28

Rhein, A.V., Liebig, J., Janker, A., Kästner, C., Apel, S.: Variability-aware static analysis at scale: an empirical study. ACM Trans. Softw. Eng. Methodol. 27 (4), 1–33 (2018). https://doi.org/10.1145/3280986

Ruiter, J.: A tale of the OpenSSL state machine: a large-scale black-box analysis. In: Brumley, B.B., Röning, J. (eds.) NordSec 2016. LNCS, vol. 10014, pp. 169–184. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-47560-8_11

Shirani, P., Wang, L., Debbabi, M.: BinShape: scalable and robust binary library function identification using function shape. In: Polychronakis, M., Meier, M. (eds.) DIMVA 2017. LNCS, vol. 10327, pp. 301–324. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-60876-1_14

Shu, G., Lee, D.: A formal methodology for network protocol fingerprinting. IEEE Trans. Parallel Distrib. Syst. 22 (11), 1813–1825 (2011). https://doi.org/10.1109/TPDS.2011.26

Tappler, M., Aichernig, B.K., Bloem, R.: Model-based testing IoT communication via active automata learning. In: 2017 IEEE International Conference on Software Testing, Verification and Validation (ICST), March 2017. https://doi.org/10.1109/ICST.2017.32

Tappler, M., Aichernig, B.K., Larsen, K.G., Lorber, F.: Time to learn – learning timed automata from tests. In: André, É., Stoelinga, M. (eds.) FORMATS 2019. LNCS, vol. 11750, pp. 216–235. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-29662-9_13

Chapter   MATH   Google Scholar  

Tavassoli, S., Damasceno, C.D.N., Khosravi, R., Mousavi, M.R.: Adaptive behavioral model learning for software product lines. In: Proceedings of the 26th International Systems and Software Product Line Conference, SPLC 2022 (2022)

Thüm, T., Apel, S., Kästner, C., Schaefer, I., Saake, G.: A classification and survey of analysis strategies for software product lines. ACM Comput. Surv. 47 (1), 1–45 (2014). https://doi.org/10.1145/2580950

Vaandrager, F.: Model learning. Commun. ACM 60 (2) (2017). https://doi.org/10.1145/2967606

Vaandrager, F., Garhewal, B., Rot, J., Wißmann, T.: A new approach for active automata learning based on apartness. In: Proceedings of the 28th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), January 2022. http://arxiv.org/abs/2107.05419

Walkinshaw, N., Bogdanov, K.: Automated comparison of state-based software models in terms of their language and structure. ACM Trans. Softw. Eng. Methodol. 22 (2), 1–37 (2013). https://doi.org/10.1145/2430545.2430549

Download references

Author information

Authors and affiliations.

Radboud University, Nijmegen, The Netherlands

Carlos Diego N. Damasceno & Daniel Strüber

Chalmers University of Technology, Gothenburg, Sweden

Daniel Strüber

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Carlos Diego N. Damasceno .

Editor information

Editors and affiliations.

Radboud University Nijmegen, Nijmegen, The Netherlands

Nils Jansen

University of Twente, Enschede, The Netherlands

Mariëlle Stoelinga

Petra van den Bos

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Damasceno, C.D.N., Strüber, D. (2022). Family-Based Fingerprint Analysis: A Position Paper. In: Jansen, N., Stoelinga, M., van den Bos, P. (eds) A Journey from Process Algebra via Timed Automata to Model Learning . Lecture Notes in Computer Science, vol 13560. Springer, Cham. https://doi.org/10.1007/978-3-031-15629-8_8

Download citation

DOI : https://doi.org/10.1007/978-3-031-15629-8_8

Published : 07 September 2022

Publisher Name : Springer, Cham

Print ISBN : 978-3-031-15628-1

Online ISBN : 978-3-031-15629-8

eBook Packages : Computer Science Computer Science (R0)

Share this chapter

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research

share this!

April 22, 2024

This article has been reviewed according to Science X's editorial process and policies . Editors have highlighted the following attributes while ensuring the content's credibility:

fact-checked

peer-reviewed publication

trusted source

Advance in forensic fingerprint research provides new hope for cold cases

by Meg Cox, Loughborough University

New hope for cold cases due to breakthrough in forensic fingerprint research

Researchers have unveiled a method capable of detecting drug substances from fingerprints lifted from crime scenes, which could provide fresh insights into unsolved cases. The research is published in the journal Drug Testing and Analysis .

Analytical scientists from Loughborough University have demonstrated for the first time that drug residue—namely the fast-acting sleeping pill Zolpidem, which has been linked to drug-facilitated sexual assault and drink spiking —can be detected on gel-lifted fingerprints.

Dr. Jim Reynolds and Dr. Ayoung Kim say the breakthrough could shed new light on cold cases and unsolved crimes as forensic gel lifters—which transfer prints onto a gelatin surface—are used globally by scenes of crimes officers to preserve and visualize fingerprints.

"This is the first time that analysis of gel-lifted prints for a drug substance has been accomplished, and shows that lifted prints and other forensic marks can be interrogated for useful information," says Dr. Reynolds, the research lead.

"Since gel-lifted prints and marks can be stored for many years, the technique could be of real use in cold cases where additional information may prove useful to either link or exonerate a suspect to the investigation. Working with police forces and applying the method to cold case samples could help bring criminals to justice who may have thought they have got away with it."

A number of tests exist to detect drugs directly from fingerprints, but these face limitations. They can be destructive to the fingerprint, degrade drug residues, and be affected by environmental interferences.

It has long been speculated that gel-lifted prints contain valuable chemical information and could offer more accurate drug detection.

However, traditional techniques used to analyze the chemicals present in a sample have previously not been suitable for gel lifters. This is because they detect all chemicals present, including those that make up the gel, making it difficult to identify specific substances.

The method used by Dr. Reynolds and Dr. Kim, called sfPESI-MS, overcomes this issue using a rapid separation mechanism that distinguishes the drug substance from the background of the gel.

The process involves sampling the chemicals from the gel lifters into tiny liquid droplets. The chemicals extracted into the droplets are then ionized, which means they gain or lose electric charge depending on their chemical properties. The drug substance chemicals are more surface active than the chemicals originating from the gel, which enables them to be separated from the mixture.

This separation method enables the direct detection of a drug substance using mass spectrometry , a technique that identifies chemicals by measuring their molecular weight. The researchers have successfully tested the technique using Zolpidem-laced fingerprints lifted from glass, metal, and paper surfaces in a laboratory setting.

They now hope to work with police forces to analyze stored gel-lifted prints and use the method to identify other substances.

Dr. Reynolds said, "Zolpidem was the focus of our research, but the method could just as easily be applied to other drug substances a person may have been handling and could be applied to other chemicals such as explosives, gunshot residues, paints, and dyes.

"By linking chemical information to the fingerprint, we can identify the individual and link to the handling of an illicit substance which may prove useful in a prosecution. This could be useful to detect individuals who have been spiking drinks; for example, if the drug they are using gets onto their fingertips, then they will leave evidence at the scene."

Dr. Kim, who is the first author of the paper and completed the research as part of her Ph.D. at Loughborough, added, "We would like to apply our method to real samples from criminal investigations; it would be good to know my Ph.D. research has helped bring criminals to justice."

Journal information: Drug Testing and Analysis

Provided by Loughborough University

Explore further

Feedback to editors

research paper on fingerprint analysis

Warming Arctic reduces dust levels in parts of the planet, study finds

17 minutes ago

research paper on fingerprint analysis

Freeze casting—a guide to creating hierarchically structured materials

37 minutes ago

research paper on fingerprint analysis

Scientists replace fishmeal in aquaculture with microbial protein derived from soybean processing wastewater

40 minutes ago

research paper on fingerprint analysis

Advanced cell atlas opens new doors in biomedical research

41 minutes ago

research paper on fingerprint analysis

Cocaine is an emerging contaminant of concern in the Bay of Santos (Brazil), says researcher

42 minutes ago

research paper on fingerprint analysis

Study says it's likely a warmer world made deadly Dubai downpours heavier

research paper on fingerprint analysis

Study shows the longer spilled oil lingers in freshwater, the more persistent compounds it produces

43 minutes ago

research paper on fingerprint analysis

IRIS beamline at BESSY II gets a new nanospectroscopy end station

research paper on fingerprint analysis

The secret to saving old books could be gluten-free glues

research paper on fingerprint analysis

Synthesis of two new carbides provides perspective on how complex carbon structures could exist on other planets

Relevant physicsforums posts, very confused about naunyn definition of acid and base.

Apr 24, 2024

Can you eat the Periodic Table?

Apr 23, 2024

Ideas for a project in computational chemistry?

Apr 21, 2024

New Insight into the Chemistry of Solvents

Apr 17, 2024

Separation of KCl from potassium chromium(III) PDTA

Apr 16, 2024

Zirconium Versus Zirconium Carbide For Use With Galinstan

Mar 29, 2024

More from Chemistry

Related Stories

research paper on fingerprint analysis

Fingerprints, revisited

Mar 13, 2019

research paper on fingerprint analysis

Residues in fingerprints hold clues to their age

Jan 22, 2020

research paper on fingerprint analysis

RaDPi-U: Fast and convenient drug screening with urine samples

Mar 25, 2024

research paper on fingerprint analysis

The hidden data in your fingerprints

Apr 27, 2018

research paper on fingerprint analysis

Scientists develop biocompatible fluorescent spray that detects fingerprints in ten seconds

Feb 26, 2024

research paper on fingerprint analysis

Researchers apply existing method to reveal undesired biological effects of chemicals

Nov 26, 2021

Recommended for you

research paper on fingerprint analysis

Scientists discover method to prevent coalescence in immiscible liquids

4 hours ago

research paper on fingerprint analysis

Synthetic droplets cause a stir in the primordial soup: Chemotaxis research answers questions about biological movement

2 hours ago

research paper on fingerprint analysis

Chemical rope trick at molecular level: Mechanism research helps when 'trial and error' fails

3 hours ago

Let us know if there is a problem with our content

Use this form if you have come across a typo, inaccuracy or would like to send an edit request for the content on this page. For general inquiries, please use our contact form . For general feedback, use the public comments section below (please adhere to guidelines ).

Please select the most appropriate category to facilitate processing of your request

Thank you for taking time to provide your feedback to the editors.

Your feedback is important to us. However, we do not guarantee individual replies due to the high volume of messages.

E-mail the story

Your email address is used only to let the recipient know who sent the email. Neither your address nor the recipient's address will be used for any other purpose. The information you enter will appear in your e-mail message and is not retained by Phys.org in any form.

Newsletter sign up

Get weekly and/or daily updates delivered to your inbox. You can unsubscribe at any time and we'll never share your details to third parties.

More information Privacy policy

Donate and enjoy an ad-free experience

We keep our content available to everyone. Consider supporting Science X's mission by getting a premium account.

E-mail newsletter

U.S. flag

An official website of the United States government

The .gov means it’s official. Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

The site is secure. The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

  • Publications
  • Account settings

Preview improvements coming to the PMC website in October 2024. Learn More or Try it out now .

  • Advanced Search
  • Journal List
  • Investig Genet

Logo of invgen

DNA fingerprinting in forensics: past, present, future

Lutz roewer.

1 Department of Forensic Genetics, Institute of Legal Medicine and Forensic Sciences, Charité - Universitätsmedizin Berlin, Berlin, Germany

DNA fingerprinting, one of the great discoveries of the late 20th century, has revolutionized forensic investigations. This review briefly recapitulates 30 years of progress in forensic DNA analysis which helps to convict criminals, exonerate the wrongly accused, and identify victims of crime, disasters, and war. Current standard methods based on short tandem repeats (STRs) as well as lineage markers (Y chromosome, mitochondrial DNA) are covered and applications are illustrated by casework examples. Benefits and risks of expanding forensic DNA databases are discussed and we ask what the future holds for forensic DNA fingerprinting.

The past - a new method that changed the forensic world

'“I’ve found it! I’ve found it”, he shouted, running towards us with a test-tube in his hand. “I have found a re-agent which is precipitated by hemoglobin, and by nothing else”,’ says Sherlock Holmes to Watson in Arthur Conan Doyle’s first novel A study in Scarlet from1886 and later: 'Now we have the Sherlock Holmes’ test, and there will no longer be any difficulty […]. Had this test been invented, there are hundreds of men now walking the earth who would long ago have paid the penalty of their crimes’ [ 1 ].

The Eureka shout shook England again and was heard around the world when roughly 100 years later Alec Jeffreys at the University of Leicester, in UK, found extraordinarily variable and heritable patterns from repetitive DNA analyzed with multi-locus probes. Not being Holmes he refrained to call the method after himself but 'DNA fingerprinting’ [ 2 ]. Under this name his invention opened up a new area of science. The technique proved applicable in many biological disciplines, namely in diversity and conservation studies among species, and in clinical and anthropological studies. But the true political and social dimension of genetic fingerprinting became apparent far beyond academic circles when the first applications in civil and criminal cases were published. Forensic genetic fingerprinting can be defined as the comparison of the DNA in a person’s nucleated cells with that identified in biological matter found at the scene of a crime or with the DNA of another person for the purpose of identification or exclusion. The application of these techniques introduces new factual evidence to criminal investigations and court cases. However, the first case (March 1985) was not strictly a forensic case but one of immigration [ 3 ]. The first application of DNA fingerprinting saved a young boy from deportation and the method thus captured the public’s sympathy. In Alec Jeffreys’ words: 'If our first case had been forensic I believe it would have been challenged and the process may well have been damaged in the courts’ [ 4 ]. The forensic implications of genetic fingerprinting were nevertheless obvious, and improvements of the laboratory process led already in 1987 to the very first application in a forensic case. Two teenage girls had been raped and murdered on different occasions in nearby English villages, one in 1983, and the other in 1986. Semen was obtained from each of the two crime scenes. The case was spectacular because it surprisingly excluded a suspected man, Richard Buckland, and matched another man, Colin Pitchfork, who attempted to evade the DNA dragnet by persuading a friend to give a sample on his behalf. Pitchfork confessed to committing the crimes after he was confronted with the evidence that his DNA profile matched the trace DNA from the two crime scenes. For 2 years the Lister Institute of Leicester where Jeffreys was employed was the only laboratory in the world doing this work. But it was around 1987 when companies such as Cellmark, the academic medico-legal institutions around the world, the national police, law enforcement agencies, and so on started to evaluate, improve upon, and employ the new tool. The years after the discovery of DNA fingerprinting were characterized by a mood of cooperation and interdisciplinary research. None of the many young researchers who has been there will ever forget the DNA fingerprint congresses which were held on five continents, in Bern (1990), in Belo Horizonte (1992), in Hyderabad (1994), in Melbourne (1996), and in Pt. Elizabeth (1999), and then shut down with the good feeling that the job was done. Everyone read the Fingerprint News distributed for free by the University of Cambridge since 1989 (Figure  1 ). This affectionate little periodical published non-stylish short articles directly from the bench without impact factors and resumed networking activities in the different fields of applications. The period in the 1990s was the golden research age of DNA fingerprinting succeeded by two decades of engineering, implementation, and high-throughput application. From the Foreword of Alec Jeffreys in Fingerprint News , Issue 1, January 1989: 'Dear Colleagues, […] I hope that Fingerprint News will cover all aspects of hypervariable DNA and its application, including both multi-locus and single-locus systems, new methods for studying DNA polymorphisms, the population genetics of variable loci and the statistical analysis of fingerprint data, as well as providing useful technical tips for getting good DNA profiles […]. May your bands be variable’ [ 5 ].

An external file that holds a picture, illustration, etc.
Object name is 2041-2223-4-22-1.jpg

Cover of one of the first issues of Fingerprint News from 1990.

Jeffreys’ original technology, now obsolete for forensic use, underwent important developments in terms of the basic methodology, that is, from Southern blot to PCR, from radioactive to fluorescent labels, from slab gels to capillary electrophoresis. As the technique became more sensitive, the handling simple and automated and the statistical treatment straightforward, DNA profiling, as the method was renamed, entered the forensic routine laboratories around the world in storm. But, what counts in the Pitchfork case and what still counts today is the process to get DNA identification results accepted in legal proceedings. Spectacular fallacies, from the historical 1989 case of People vs. Castro in New York [ 6 ] to the case against Knox and Sollecito in Italy (2007–2013) where literally DNA fingerprinting was on trial [ 7 ], disclosed severe insufficiencies in the technical protocols and especially in the DNA evidence interpretation and raised nolens volens doubts on the scientific and evidentiary value of forensic DNA fingerprinting. These cases are rare but frequent enough to remind each new generation of forensic analysts, researchers, or private sector employees that DNA evidence is nowadays an important part of factual evidence and needs thus intense scrutiny for all parts of the DNA analysis and interpretation process.

In the following I will briefly describe the development of DNA fingerprinting to a standardized investigative method for court use which has since 1984 led to the conviction of thousands of criminals and to the exoneration of many wrongfully suspected or convicted individuals [ 8 ]. Genetic fingerprinting per se could of course not reduce the criminal rate in any of the many countries in the world, which employ this method. But DNA profiling adds hard scientific value to the evidence and strengthens thus (principally) the credibility of the legal system.

The technological evolution of forensic DNA profiling

In the classical DNA fingerprinting method radio-labeled DNA probes containing minisatellite [ 9 ] or oligonucleotide sequences [ 10 ] are hybridized to DNA that has been digested with a restriction enzyme, separated by agarose electrophoresis and immobilized on a membrane by Southern blotting or - in the case of the oligonucleotide probes - immobilized directly in the dried gel. The radio-labeled probe hybridizes to a set of minisatellites or oligonucleotide stretches in genomic DNA contained in restriction fragments whose size differ because of variation in the numbers of repeat units. After washing away excess probe the exposure to X-ray film (autoradiography) allows these variable fragments to be visualized, and their profiles compared between individuals. Minisatellite probes, called 33.6 and 33.15, were most widely used in the UK, most parts of Europe and the USA, whereas pentameric (CAC)/(GTG) 5 probes were predominantly applied in Germany. These so-called multilocus probes (MLP) detect sets of 15 to 20 variable fragments per individual ranging from 3.5 to 20 kb in size (Figure  2 ). But the multi-locus profiling method had several limitations despite its successful application to crime and kinship cases until the middle of the 1990s. Running conditions or DNA quality issues render the exact matching between bands often difficult. To overcome this, forensic laboratories adhered to binning approaches [ 11 ], where fixed or floating bins were defined relative to the observed DNA fragment size, and adjusted to the resolving power of the detection system. Second, fragment association within one DNA fingerprint profile is not known, leading to statistical errors due to possible linkage between loci. Third, for obtaining optimal profiles the method required substantial amounts of high molecular weight DNA [ 12 ] and thus excludes the majority of crime-scene samples from the analysis. To overcome some of these limitations, single-locus profiling was developed [ 13 ]. Here a single hypervariable locus is detected by a specific single-locus probe (SLP) using high stringency hybridization. Typically, four SLPs were used in a reprobing approach, yielding eight alleles of four independent loci per individual. This method requires only 10 ng of genomic DNA [ 14 ] and has been validated through extensive experiments and forensic casework, and for many years provided a robust and valuable system for individual identification. Nevertheless, all these different restriction fragment length polymorphism (RFLP)-based methods were still limited by the available quality and quantity of the DNA and also hampered by difficulties to reliably compare genetic profiles from different sources, labs, and techniques. What was needed was a DNA code, which could ideally be generated even from a single nucleated cell and from highly degraded DNA, a code, which could be rapidly generated, numerically encrypted, automatically compared, and easily supported in court. Indeed, starting in the early 1990s DNA fingerprinting methods based on RFLP analysis were gradually supplanted by methods based on PCR because of the improved sensitivity, speed, and genotyping precision [ 15 ]. Microsatellites, in the forensic community usually referred to short tandem repeats (STRs), were found to be ideally suited for forensic applications. STR typing is more sensitive than single-locus RFLP methods, less prone to allelic dropout than VNTR (variable number of tandem repeat) systems [ 16 ], and more discriminating than other PCR-based typing methods, such as HLA-DQA1 [ 17 ]. More than 2,000 publications now detail the technology, hundreds of different population groups have been studied, new technologies as, for example, the miniSTRs [ 18 ] have been developed and standard protocols have been validated in laboratories worldwide (for an overview see [ 19 ]). Forensic DNA profiling is currently performed using a panel of multi-allelic STR markers which are structurally analogous to the original minisatellites but with much shorter repeat tracts and thus easier to amplify and multiplex with PCR. Up to 30 STRs can be detected in a single capillary electrophoresis injection generating for each individual a unique genetic code. Basically there are two sets of STR markers complying with the standards requested by criminal databases around the world: the European standard set of 12 STR markers [ 20 ] and the US CODIS standard of 13 markers [ 21 ]. Due to partial overlap, they form together a standard of 18 STR markers in total. The incorporation of these STR markers into commercial kits has improved the application of these markers for all kinds of DNA evidence with reproducible results from as less than three nucleated cells [ 22 ] and extracted even from severely compromised material. The probability that two individuals will have identical markers at each of 13 different STR loci within their DNA exceeds one out of a billion. If a DNA match occurs between an accused individual and a crime scene stain, the correct courtroom expression would be that the probability of a match if the crime-scene sample came from someone other than the suspect (considering the random, not closely-related man) is at most one in a billion [ 14 ]. The uniqueness of each person’s DNA (with the exception of monozygotic twins) and its simple numerical codification led to the establishment of government-controlled criminal investigation DNA databases in the developed nations around the world, the first in 1995 in the UK [ 23 ]. When a match is made from such a DNA database to link a crime scene sample to an offender who has provided a DNA sample to a database that link is often referred to as a cold hit. A cold hit is of value as an investigative lead for the police agency to a specific suspect. China (approximately 16 million profiles, the United States (approximately 10 million profiles), and the UK (approximately 6 million profiles) maintain the largest DNA database in the world. The percentage of databased persons is on the increase in all countries with a national DNA database, but the proportions are not the same by the far: whereas in the UK about 10% of the population is in the national DNA database, the percentage in Germany and the Netherlands is only about 0.9% and 0.8%, respectively [ 24 ].

An external file that holds a picture, illustration, etc.
Object name is 2041-2223-4-22-2.jpg

Multilocus DNA Fingerprint from a large family probed with the oligonucleotide (GTG) 5 ( Courtesy of Peter Nürnberg, Cologne Center for Genomics, Germany ).

Lineage markers in forensic analysis

Lineage markers have special applications in forensic genetics. Y chromosome analysis is very helpful in cases where there is an excess of DNA from a female victim and only a low proportion from a male perpetrator. Typical examples include sexual assault without ejaculation, sexual assault by a vasectomized male, male DNA under the fingernails of a victim, male 'touch’ DNA on the skin, and the clothing or belongings of a female victim. Mitochondrial DNA (mtDNA) is of importance for the analyses of low level nuclear DNA samples, namely from unidentified (typically skeletonized) remains, hair shafts without roots, or very old specimens where only heavily degraded DNA is available [ 25 ]. The unusual non-recombinant mode of inheritance of Y and mtDNA weakens the statistical weight of a match between individual samples but makes the method efficient for the reconstruction of the paternal or maternal relationship, for example in mass disaster investigations [ 26 ] or in historical reconstructions. A classic case is the identification of two missing children of the Romanov family, the last Russian monarchy. MtDNA analysis combined with additional DNA testing of material from the mass grave near Yekaterinburg gave virtually irrefutable evidence that the two individuals recovered from a second grave nearby are the two missing children of the Romanov family: the Tsarevich Alexei and one of his sisters [ 27 ]. Interestingly, a point heteroplasmy, that is, the presence of two slightly different mtDNA haplotypes within an individual, was found in the mtDNA of the Tsar and his relatives, which was in 1991 a contentious finding (Figure  3 ). In the early 1990s when the bones were first analyzed, a point heteroplasmy was believed to be an extremely rare phenomenon and was not readily explainable. Today, the existence of heteroplasmy is understood to be relatively common and large population databases can be searched for its frequency at certain positions. The mtDNA evidence in the Romanov case was underpinned by Y-STR analysis where a 17-locus haplotype from the remains of Tsar Nicholas II matched exactly to the femur of the putative Tsarevich and also to a living Romanov relative. Other studies demonstrated that very distant family branches can be traced back to common ancestors who lived hundreds of years ago [ 28 ]. Currently forensic Y chromosome typing has gained wide acceptance with the introduction of highly sensitive panels of up to 27 STRs including rapidly mutating markers [ 29 ]. Figure  4 demonstrates the impressive gain of the discriminative power with increasing numbers of Y-STRs. The determination of the match probability between Y-STR or mtDNA profiles via the mostly applied counting method [ 30 ] requires large, representative, and quality-assessed databases of haplotypes sampled in appropriate reference populations, because the multiplication of individual allele frequencies is not valid as for independently inherited autosomal STRs [ 31 ]. Other estimators for the haplotype match probability than the count estimator have been proposed and evaluated using empirical data [ 32 ], however, the biostatistical interpretation remains complicated and controversial and research continues. The largest forensic Y chromosome haplotype database is the YHRD ( http://www.yhrd.org ) hosted at the Institute of Legal Medicine and Forensic Sciences in Berlin, Germany, with about 115,000 haplotypes sampled in 850 populations [ 33 ]. The largest forensic mtDNA database is EMPOP ( http://www.empop.org ) hosted at the Institute of Legal Medicine in Innsbruck, Austria, with about 33,000 haplotypes sampled in 63 countries [ 34 ]. More than 235 institutes have actually submitted data to the YHRD and 105 to EMPOP, a compelling demonstration of the level of networking activities between forensic science institutes around the world. That additional intelligence information is potentially derivable from such large datasets becomes obvious when a target DNA profile is searched against a collection of geographically annotated Y chromosomal or mtDNA profiles. Because linearly inherited markers have a highly non-random geographical distribution the target profile shares characteristic variants with geographical neighbors due to common ancestry [ 35 ]. This link between genetics, genealogy, and geography could provide investigative leads for investigators in non-suspect cases as illustrated in the following case [ 36 ]:

An external file that holds a picture, illustration, etc.
Object name is 2041-2223-4-22-3.jpg

Screenshot of the 16169 C/T heteroplasmy present in Tsar Nicholas II using both forward and reverse sequencing primers ( Courtesy of Michael Coble, National Institute of Standards and Technology, Gaithersburg, USA ).

An external file that holds a picture, illustration, etc.
Object name is 2041-2223-4-22-4.jpg

Correlation between the number of analyzed Y-STRs and the number of different haplotypes detected in a global population sample of 18,863 23-locus haplotypes.

In 2002, a woman was found with a smashed skull and covered in blood but still alive in her Berlin apartment. Her life was saved by intensive medical care. Later she told the police that she had let a man into her apartment, and he had immediately attacked her. The man was subletting the apartment next door. The evidence collected at the scene and in the neighboring apartment included a baseball cap, two towels, and a glass. The evidence was sent to the state police laboratory in Berlin, Germany and was analyzed with conventional autosomal STR profiling. Stains on the baseball cap and on one towel revealed a pattern consistent with that of the tenant, whereas two different male DNA profiles were found on a second bath towel and on the glass. The tenant was eliminated as a suspect because he was absent at the time of the offense, but two unknown men (different in autosomal but identical in Y-STRs) who shared the apartment were suspected. Unfortunately, the apartment had been used by many individuals of both European and African nationalities, so the initial search for the two men became very difficult. The police obtained a court order for Y-STR haplotyping to gain information about the unknown men’s population affiliation. Prerequisites for such biogeographic analyses are large reference databases containing Y-STR haplotypes also typed for ancestry informative single nucleotide markers (SNP) markers from hundreds of different populations. The YHRD proved useful to infer the population origin of the unknown man. The database inquiry indicated a patrilineage of Southern European ancestry, whereas an African descent was unlikely (Figure  5 ). The police were able to track down the tenant in Italy, and with his help, establish the identity of one of the unknown men, who was also Italian. When questioning this man, the police used the information retrieved from Y-STR profiling that he had shared the apartment in Berlin with a paternal relative. This relative was identified as his nephew. Because of the close-knit relationship within the family, this information would probably not have been easily retrieved from the uncle without the prior knowledge. The nephew was suspected of the attempted murder in Berlin. He was later arrested in Italy, where he had committed another violent robbery.

An external file that holds a picture, illustration, etc.
Object name is 2041-2223-4-22-5.jpg

Screenshot from the YHRD depicting the radiation of a 9-locus haplotype belonging to haplogroup J in Southern Europe.

Information on the biogeographic origin of an unknown DNA could also be retrieved from a number of ancestry informative SNPs (AISNPs) on autosomes or insertion/deletion polymorphisms [ 37 , 38 ] but perhaps even better from so-called mini-haplotypes with only <10 SNPs spanning small molecular intervals (<10 kb) with very low recombination among sites [ 39 ]. Each 'minihap’ behaves like a locus with multiple haplotype lineages (alleles) that have evolved from the ancestral human haplotype. All copies of each distinct haplotype are essentially identical by descent. Thus, they fall like Y and mtDNA into the lineage-informative category of genetic markers and are thus useful for connecting an individual to a family or ancestral genetic pool.

Benefits and risks of forensic DNA databases

The steady growth in the size of forensic DNA databases raises issues on the criteria of inclusion and retention and doubts on the efficiency, commensurability, and infringement of privacy of such large personal data collections. In contrast to the past, not only serious but all crimes are subject to DNA analysis generating millions and millions of DNA profiles, many of which are stored and continuously searched in national DNA databases. And as always when big datasets are gathered new mining procedures based on correlation became feasible. For example, 'Familial DNA Database Searching’ is based on near matches between a crime stain and a databased person, which could be a near relative of the true perpetrator [ 40 ]. Again the first successful familial search was conducted in UK in 2004 and led to the conviction of Craig Harman of manslaughter. Craig Harman was convicted because of partial matches from Harman’s brother. The strategy was subsequently applied in some US states but is not conducted at the national level. It was during a dragnet that it first became public knowledge that the German police were also already involved in familial search strategies. In a little town in Northern Germany the police arrested a young man accused of rape because they had analyzed the DNA of his two brothers who had participated in the dragnet. Because of partial matches between crime scene DNA profiles and these brothers they had identified the suspect. In contrast to other countries, the Federal Constitutional Court of Germany decided in December 2012 against the future court use of this kind of evidence.

Civil rights and liberties are crucial for democratic societies and plans to extend forensic DNA databases to whole populations need to be condemned. Alec Jeffreys early on has questioned the way UK police collects DNA profiles, holding not only convicted individuals but also arrestees without conviction, suspects cleared in an investigation, or even innocent people never charged with an offence [ 41 ]. He also criticized that large national databases as the NDNAD of England and Wales are likely skewed socioeconomically. It has been pointed out that most of the matches refer to minor offences; according to GeneWatch in Germany 63% of the database matches provided are related to theft while <3% related to rape and murder. The changes to the UK database came in the 2012’s Protection of Freedoms bill, following a major defeat at the European Court of Human Rights in 2008. As of May 2013 1.1 million profiles (of about 7 million) had been destroyed to remove innocent people’s profiles from the database. In 2005 the incoming government of Portugal proposed a DNA database containing samples from every Portuguese citizen. Following public objections, the government limited the database to criminals. A recent study on the public views on DNA database-related matters showed that a more critical attitude towards wider national databases is correlated with the age and education of the respondents [ 42 ]. A deeper public awareness on the benefits and risks of very large DNA collections need to be built and common ethical and privacy standards for the development and governance of DNA databases need to be adopted where the citizen’s perspectives are taken into consideration.

The future of forensic DNA analysis

The forensic community, as it always has, is facing the question in which direction the DNA Fingerprint technology will be developed. A growing number of colleagues are convinced that DNA sequencing will soon replace methods based on fragment length analysis and there are good arguments for this position. With the emergence of current Next Generation Sequencing (NGS) technologies, the body of forensically useful data can potentially be expanded and analyzed quickly and cost-efficiently. Given the enormous number of potentially informative DNA loci - which of those should be sequenced? In my opinion there are four types of polymorphisms which deserve a place on the analytic device: an array of 20–30 autosomal STRs which complies with the standard sets used in the national and international databases around the world, a highly discriminating set of Y chromosomal markers, individual and signature polymorphisms in the control and coding region of the mitochondrial genome [ 43 ], as well as ancestry and phenotype inference SNPs [ 44 ]. Indeed, a promising NGS approach with the simultaneous analysis of 10 STRs, 386 autosomal ancestry and phenotype informative SNPs, and the complete mtDNA genome has been presented recently [ 45 ] (Figure  6 ). Currently, the rather high error rates are preventing NGS technologies from being used in forensic routine [ 46 ], but it is foreseeable that the technology will be improved in terms of accuracy and reliability. Time is another essential factor in police investigations which will be considerably reduced in future applications of DNA profiling. Commercial instruments capable of producing a database-compatible DNA profile within 2 hours exist [ 47 ] and are currently under validation for law enforcement use. The hands-free 'swab in - profile out’ process consists of automated extraction, amplification, separation, detection, and allele calling without human intervention. In the US the promise of on-site DNA analysis has already altered the way in which DNA could be collected in future. In a recent decision the Supreme court of the United States held that 'when officers make an arrest supported by probable cause to hold for a serious offense and bring the suspect to the station to be detained in custody, taking and analyzing a cheek swab of the arrestee’s DNA is, like fingerprinting and photographing, a legitimate police booking procedure’ (Maryland v. Alonzo Jay King, Jr.). In other words, DNA can be taken from any arrestee, rightly or wrongly arrested, as a part of the normal booking procedure. Twenty-eight states and the federal government now take DNA swabs after arrests with the aim of comparing profiles to the CODIS database, creating links to unsolved cases and to identify the person (Associated Press, 3 June 2013). Driven by the rapid technological progress DNA actually becomes another metric of quick identification. It remains to be seen whether rapid DNA technologies will alter the way in which DNA is collected by police in other countries. In Germany for example the DNA collection is still regulated by the code of the criminal procedure and the use of DNA profiling for identification purposes only is excluded. Because national legislations are basically so different, a worldwide system to interrogate DNA profiles from criminal justice databases seems currently a very distant project.

An external file that holds a picture, illustration, etc.
Object name is 2041-2223-4-22-6.jpg

Schematic overview of Haloplex targeting and NGS analysis of a large number of markers simultaneously. Sequence data are shown for samples from two individuals and the D3S1358 STR marker, the rs1335873 SNP marker, and a part of the HVII region of mtDNA ( Courtesy of Marie Allen, Uppsala University, Sweden ).

At present the forensic DNA technology directly affects the lives of millions people worldwide. The general acceptance of this technique is still high, reports on the DNA identification of victims of the 9/11 terrorist attacks [ 48 ], of natural disasters as the Hurricane Katrina [ 49 ], and of recent wars (for example, in former Yugoslavia [ 50 ]) and dictatorship (for example, in Argentina [ 51 ]) impress the public in the same way as police investigators in white suits securing DNA evidence at a broken door. CSI watchers know, and even professionals believe, that DNA will inevitably solve the case just following the motto Do Not Ask, it’s DNA, stupid! But the affirmative view changes and critical questions are raised. It should not be assumed that the benefits of forensic DNA fingerprinting will necessarily override the social and ethical costs [ 52 ].

This short article leaves many of such questions unanswered. Alfred Nobel used his fortune to institute a prize for work 'in ideal direction’. What would be the ideal direction in which DNA fingerprinting, one of the great discoveries in recent history, should be developed?

Competing interests

The author declares that he has no competing interests.

  • Doyle AC. A study in scarlet, Beeton’s Christmas Annual. London, New York and Melbourne: Ward, Lock & Co; 1887. [ Google Scholar ]
  • Jeffreys AJ, Wilson V, Thein SL. Individual-specific “fingerprints” of Human DNA. Nature. 1985; 314 :67–74. doi: 10.1038/314067a0. [ PubMed ] [ CrossRef ] [ Google Scholar ]
  • Jeffreys AJ, Brookfield JF, Semeonoff R. Positive identification of an immigration test-case using human DNA fingerprints. Nature. 1985; 317 :818–819. doi: 10.1038/317818a0. [ PubMed ] [ CrossRef ] [ Google Scholar ]
  • University of Leicester Bulletin Supplement August/September 2004.
  • Jeffreys AJ. Foreword. Fingerprint News. 1989; 1 :1. [ Google Scholar ]
  • Lander ES. DNA fingerprinting on trial. Nature. 1989; 339 :501–505. doi: 10.1038/339501a0. [ PubMed ] [ CrossRef ] [ Google Scholar ]
  • Balding DJ. Evaluation of mixed-source, low-template DNA profiles in forensic science. Proc Natl Acad Sci U S A. 2013; 110 :12241–12246. doi: 10.1073/pnas.1219739110. [ PMC free article ] [ PubMed ] [ CrossRef ] [ Google Scholar ]
  • The innocence project. [ http://www.innocenceproject.org ]
  • Jeffreys AJ, Wilson V, Thein SL. Hypervariable 'minisatellite’ regions in human DNA. Nature. 1985; 314 :67–73. doi: 10.1038/314067a0. [ PubMed ] [ CrossRef ] [ Google Scholar ]
  • Schäfer R, Zischler H, Birsner U, Becker A, Epplen JT. Optimized oligonucleotide probes for DNA fingerprinting. Electrophoresis. 1988; 9 :369–374. doi: 10.1002/elps.1150090804. [ PubMed ] [ CrossRef ] [ Google Scholar ]
  • Budowle B, Giusti AM, Waye JS, Baechtel FS, Fourney RM, Adams DE, Presley LA, Deadman HA, Monson KL. Fixed-bin analysis for statistical evaluation of continuous distributions of allelic data from VNTR loci, for use in forensic comparisons. Am J Hum Genet. 1991; 48 :841–855. [ PMC free article ] [ PubMed ] [ Google Scholar ]
  • Roewer L, Nürnberg P, Fuhrmann E, Rose M, Prokop O, Epplen JT. Stain analysis using oligonucleotide probes specific for simple repetitive DNA sequences. Forensic Sci Int. 1990; 47 :59–70. doi: 10.1016/0379-0738(90)90285-7. [ PubMed ] [ CrossRef ] [ Google Scholar ]
  • Wong Z, Wilson V, Patel I, Povey S, Jeffreys AJ. Characterization of a panel of highly variable minisatellites cloned from human DNA. Ann Hum Genet. 1987; 51 :269–288. doi: 10.1111/j.1469-1809.1987.tb01062.x. [ PubMed ] [ CrossRef ] [ Google Scholar ]
  • Jobling MA, Hurles ME, Tyler-Smith C. Human Evolutionary Genetics. Abingdon: Garland Science; 2003. Chapter 15: Identity and identification; pp. 474–497. [ Google Scholar ]
  • Edwards A, Civitello A, Hammond HA, Caskey CT. DNA typing and genetic mapping with trimeric and tetrameric tandem repeats. Am J Hum Genet. 1991; 49 :746–756. [ PMC free article ] [ PubMed ] [ Google Scholar ]
  • Budowle B, Chakraborty R, Giusti AM, Eisenberg AJ, Allen RC. Analysis of the VNTR locus D1S80 by the PCR followed by high-resolution PAGE. Am J Hum Genet. 1991; 48 :137–144. [ PMC free article ] [ PubMed ] [ Google Scholar ]
  • Saiki RK, Bugawan TL, Horn GT, Mullis KB, Erlich HA. Analysis of enzymatically amplified beta-globin and HLA-DQ alpha DNA with allele-specific oligonucleotide probes. Nature. 1986; 324 :163–166. doi: 10.1038/324163a0. [ PubMed ] [ CrossRef ] [ Google Scholar ]
  • Coble MD, Butler JM. Characterization of new miniSTR loci to aid analysis of degraded DNA. J Forensic Sci. 2005; 50 :43–53. [ PubMed ] [ Google Scholar ]
  • Butler JM. Forensic DNA Typing: Biology, Technology, and Genetics of STR Markers. 2. New York: Elsevier Academic Press; 2005. [ Google Scholar ]
  • Gill P, Fereday L, Morling N, Schneider PM. The evolution of DNA databases - Recommendations for new European STR loci. Forensic Sci Int. 2006; 156 :242–244. doi: 10.1016/j.forsciint.2005.05.036. [ PubMed ] [ CrossRef ] [ Google Scholar ]
  • Budowle B, Moretti TR, Niezgoda SJ, Brown BL. CODIS and PCR-based short tandem repeat loci: law enforcement tools. Madison, WI: Promega Corporation; 1998. pp. 73–88. (Proceedings of the Second European Symposium on Human Identification). [ Google Scholar ]
  • Nagy M, Otremba P, Krüger C, Bergner-Greiner S, Anders P, Henske B, Prinz M, Roewer L. Optimization and validation of a fully automated silica-coated magnetic beads purification technology in forensics. Forensic Sci Int. 2005; 152 :13–22. doi: 10.1016/j.forsciint.2005.02.027. [ PubMed ] [ CrossRef ] [ Google Scholar ]
  • Martin PD, Schmitter H, Schneider PM. A brief history of the formation of DNA databases in forensic science within Europe. Forensic Sci Int. 2001; 119 :225–231. doi: 10.1016/S0379-0738(00)00436-9. [ PubMed ] [ CrossRef ] [ Google Scholar ]
  • ENFSI survey on DNA Databases in Europe. December 2011, published 2012-08-18. [ http://www.enfsi.eu ]
  • Roewer L, Parson W. In: Encyclopedia of Forensic Sciences. 2. Siegel JA, Saukko PJ, editor. Amsterdam: Elsevier B.V; 2013. Internet accessible population databases: YHRD and EMPOP. [ Google Scholar ]
  • Calacal GC, Delfin FC, Tan MM, Roewer L, Magtanong DL, Lara MC, Rd F, De Ungria MC. Identification of exhumed remains of fire tragedy victims using conventional methods and autosomal/Y-chromosomal short tandem repeat DNA profiling. Am J Forensic Med Pathol. 2005; 26 :285–291. doi: 10.1097/01.paf.0000177338.21951.82. [ PubMed ] [ CrossRef ] [ Google Scholar ]
  • Coble MD, Loreille OM, Wadhams MJ, Edson SM, Maynard K, Meyer CE, Niederstätter H, Berger C, Berger B, Falsetti AB, Gill P, Parson W, Finelli LN. Mystery solved: the identification of the two missing Romanov children using DNA analysis. PLoS One. 2009; 4 :e4838. doi: 10.1371/journal.pone.0004838. [ PMC free article ] [ PubMed ] [ CrossRef ] [ Google Scholar ]
  • Haas C, Shved N, Rühli FJ, Papageorgopoulou C, Purps J, Geppert M, Willuweit S, Roewer L, Krawczak M. Y-chromosomal analysis identifies the skeletal remains of Swiss national hero Jörg Jenatsch (1596–1639) Forensic Sci Int Genet. 2013; 7 :610–617. doi: 10.1016/j.fsigen.2013.08.006. [ PubMed ] [ CrossRef ] [ Google Scholar ]
  • Ballantyne KN, Keerl V, Wollstein A, Choi Y, Zuniga SB, Ralf A, Vermeulen M, de Knijff P, Kayser M. A new future of forensic Y-chromosome analysis: rapidly mutating Y-STRs for differentiating male relatives and paternal lineages. Forensic Sci Int Genet. 2012; 6 :208–218. doi: 10.1016/j.fsigen.2011.04.017. [ PubMed ] [ CrossRef ] [ Google Scholar ]
  • Budowle B, Sinha SK, Lee HS, Chakraborty R. Utility of Y-chromosome short tandem repeat haplotypes in forensic applications. Forensic Sci Rev. 2003; 15 :153–164. [ PubMed ] [ Google Scholar ]
  • Roewer L, Kayser M, de Knijff P, Anslinger K, Betz A, Caglià A, Corach D, Füredi S, Henke L, Hidding M, Kärgel HJ, Lessig R, Nagy M, Pascali VL, Parson W, Rolf B, Schmitt C, Szibor R, Teifel-Greding J, Krawczak M. A new method for the evaluation of matches in non-recombining genomes: application to Y-chromosomal short tandem repeat (STR) haplotypes in European males. Forensic Sci Int. 2000; 114 :31–43. doi: 10.1016/S0379-0738(00)00287-5. [ PubMed ] [ CrossRef ] [ Google Scholar ]
  • Andersen MM, Caliebe A, Jochens A, Willuweit S, Krawczak M. Estimating trace-suspect match probabilities for singleton Y-STR haplotypes using coalescent theory. Forensic Sci Int Genet. 2013; 7 :264–271. doi: 10.1016/j.fsigen.2012.11.004. [ PubMed ] [ CrossRef ] [ Google Scholar ]
  • Willuweit S, Roewer L. International Forensic Y Chromosome User Group. Y chromosome haplotype reference database (YHRD): update. Forensic Sci Int Genet. 2007; 1 :83–87. doi: 10.1016/j.fsigen.2007.01.017. [ PubMed ] [ CrossRef ] [ Google Scholar ]
  • Parson W, Dür A. EMPOP - a forensic mtDNA database. Forensic Sci Int Genet. 2007; 1 :88–92. doi: 10.1016/j.fsigen.2007.01.018. [ PubMed ] [ CrossRef ] [ Google Scholar ]
  • Roewer L, Croucher PJ, Willuweit S, Lu TT, Kayser M, Lessig R, de Knijff P, Jobling MA, Tyler-Smith C, Krawczak M. Signature of recent historical events in the European Y-chromosomal STR haplotype distribution. Hum Genet. 2005; 116 :279–291. doi: 10.1007/s00439-004-1201-z. [ PubMed ] [ CrossRef ] [ Google Scholar ]
  • Roewer L. Male DNA Fingerprints say more. Profiles in DNA. 2004; 7 :14–15. [ Google Scholar ]
  • Phillips C, Fondevila M, Lareu MV. A 34-plex autosomal SNP single base extension assay for ancestry investigations. Methods Mol Biol. 2012; 830 :109–126. doi: 10.1007/978-1-61779-461-2_8. [ PubMed ] [ CrossRef ] [ Google Scholar ]
  • Pereira R, Phillips C, Pinto N, Santos C, dos Santos SE, Amorim A, Carracedo A, Gusmão L. Straightforward inference of ancestry and admixture proportions through ancestry-informative insertion deletion multiplexing. PLoS One. 2012; 7 :e29684. doi: 10.1371/journal.pone.0029684. [ PMC free article ] [ PubMed ] [ CrossRef ] [ Google Scholar ]
  • Pakstis AJ, Fang R, Furtado MR, Kidd JR, Kidd KK. Mini-haplotypes as lineage informative SNPs and ancestry inference SNPs. Eur J Hum Genet. 2012; 20 :1148–1154. doi: 10.1038/ejhg.2012.69. [ PMC free article ] [ PubMed ] [ CrossRef ] [ Google Scholar ]
  • Maguire CN, McCallum LA, Storey C, Whitaker JP. Familial searching: A specialist forensic DNA profiling service utilising the National DNA Database® to identify unknown offenders via their relatives - The UK experience. Forensic Sci Int Genet. 2013; 8 :1–9. [ PubMed ] [ Google Scholar ]
  • Jeffreys A. Genetic Fingerprinting. Nat Med. 2005; 11 :1035–1039. doi: 10.1038/nm1005-1035. [ PubMed ] [ CrossRef ] [ Google Scholar ]
  • Machado H, Silva S. Would you accept having your DNA profile inserted in the National Forensic DNA database? Why? Results of a questionnaire applied in Portugal. Forensic Sci Int Genet. 2013. Epub ahead of print. [ PubMed ]
  • Parson W, Strobl C, Strobl C, Huber G, Zimmermann B, Gomes SM, Souto L, Fendt L, Delport R, Langit R, Wootton S, Lagacé R, Irwin J. Evaluation of next generation mtGenome sequencing using the Ion Torrent Personal Genome Machine (PGM) Forensic Sci Int Genet. 2013; 7 :632–639. doi: 10.1016/j.fsigen.2013.09.007. [ PubMed ] [ CrossRef ] [ Google Scholar ]
  • Budowle B, van Daal A. Forensically relevant SNP classes. Biotechniques. 2008; 44 :603–608. 610. [ PubMed ] [ Google Scholar ]
  • Allen M, Nilsson M, Havsjö M, Edwinsson L, Granemo J, Bjerke M. Haloplex and MiSeq NGS for simultaneous analysis of 10 STRs, 386 SNPs and the complete mtDNA genome. Melbourne; 2013. (Presentation at the 25th Congress of the International Society for Forensic Genetics). 2–7 September 2013. [ Google Scholar ]
  • Bandelt HJ, Salas A. Current next generation sequencing technology may not meet forensic standards. Forensic Sci Int Genet. 2012; 6 :143–145. doi: 10.1016/j.fsigen.2011.04.004. [ PubMed ] [ CrossRef ] [ Google Scholar ]
  • Tan E, Turingan RS, Hogan C, Vasantgadkar S, Palombo L, Schumm JW, Selden RF. Fully integrated, fully automated generation of short tandem repeat profiles. Investigative Genet. 2013; 4 :16. doi: 10.1186/2041-2223-4-16. [ PMC free article ] [ PubMed ] [ CrossRef ] [ Google Scholar ]
  • Biesecker LG, Bailey-Wilson JE, Ballantyne J, Baum H, Bieber FR, Brenner C, Budowle B, Butler JM, Carmody G, Conneally PM, Duceman B, Eisenberg A, Forman L, Kidd KK, Leclair B, Niezgoda S, Parsons TJ, Pugh E, Shaler R, Sherry ST, Sozer A, Walsh A. DNA Identifications after the 9/11 World Trade Center Attack. Science. 2005; 310 :1122–1123. doi: 10.1126/science.1116608. [ PubMed ] [ CrossRef ] [ Google Scholar ]
  • Dolan SM, Saraiya DS, Donkervoort S, Rogel K, Lieber C, Sozer A. The emerging role of genetics professionals in forensic kinship DNA identification after a mass fatality: lessons learned from Hurricane Katrina volunteers. Genet Med. 2009; 11 :414–417. doi: 10.1097/GIM.0b013e3181a16ccc. [ PubMed ] [ CrossRef ] [ Google Scholar ]
  • Huffine E, Crews J, Kennedy B, Bomberger K, Zinbo A. Mass identification of persons missing from the break-up of the former Yugoslavia: structure, function, and role of the International Commission on Missing Persons. Croat Med J. 2001; 42 :271–275. [ PubMed ] [ Google Scholar ]
  • Corach D, Sala A, Penacino G, Iannucci N, Bernardi P, Doretti M, Fondebrider L, Ginarte A, Inchaurregui A, Somigliana C, Turner S, Hagelberg E. Additional approaches to DNA typing of skeletal remains: the search for “missing” persons killed during the last dictatorship in Argentina. Electrophoresis. 1997; 18 :1608–1612. doi: 10.1002/elps.1150180921. [ PubMed ] [ CrossRef ] [ Google Scholar ]
  • Levitt M. Forensic databases: benefits and ethical and social costs. Br Med Bull. 2007; 83 :235–248. doi: 10.1093/bmb/ldm026. [ PubMed ] [ CrossRef ] [ Google Scholar ]

IMAGES

  1. Research paper (Fingerprint Analysis)

    research paper on fingerprint analysis

  2. (PDF) Some challenges in forensic fingerprint classification and

    research paper on fingerprint analysis

  3. Fingerprint Analysis Laboratory Workbook, Second Edition

    research paper on fingerprint analysis

  4. (PDF) Fingerprint Recognition System : Design & Analysis

    research paper on fingerprint analysis

  5. Fingerprint Analysis

    research paper on fingerprint analysis

  6. (PDF) Review on Fingerprint Recognition

    research paper on fingerprint analysis

VIDEO

  1. Fingerprint Uniqueness: A Myth? 🔍🤔🔎 #ai #fingerprint #shorts

  2. Testimonial About Fingerprint Analysis

  3. Fingerprint Analysis : A Unique Science

  4. #Fingerprint Analysis Vs DNA fingerprinting#class12 #genetics #biology #point to keep in mind #cbse

  5. Unlocking Secrets: The Fascinating World of Dermatoglyphics Revealed!

  6. FORENSIC HANDWRITING ANALYSIS || Document Examination || UGC NET FORENSIC SCIENCE 2024

COMMENTS

  1. Collective intelligence in fingerprint analysis

    When a fingerprint is located at a crime scene, a human examiner is counted upon to manually compare this print to those stored in a database. Several experiments have now shown that these professional analysts are highly accurate, but not infallible, much like other fields that involve high-stakes decision-making. One method to offset mistakes in these safety-critical domains is to distribute ...

  2. Recent Progress in Visualization and Analysis of Fingerprint Level 3

    1. Introduction. Fingerprints refer to patterns on fingertips with friction ridges and recessed furrows being regularly arranged. [1] They have been regarded as one of the most valuable and solid evidence in court due to their uniqueness, immutability and permanence.[2 , 3 , 4 ] Fingerprints carry sufficient and reliable discriminative characteristics which ensure the acceptance of fingerprint ...

  3. (PDF) Fingerprint Biometric Systems

    Fingerprint system is a keenly researched area in biometric technologies [9]. It is one of the most well-known biometrics across the globe for personal recognition and identification of ...

  4. (PDF) Fingerprint Identification: A Literature Review

    The science of Fingerprint identification has come a long way since 1893 when Home Ministry Office, UK accepted that no two individuals have the same fingerprints. This paper is a review paper ...

  5. Fingerprint identification: advances since the 2009 National Research

    This paper will discuss the major developments in the area of fingerprint identification that followed the publication of the National Research Council (NRC, of the US National Academies of Sciences) report in 2009 entitled: Strengthening Forensic Science in the United States: A Path Forward. The report portrayed an image of a field of expertise used for decades without the necessary ...

  6. A Review of Fingerprint Sensors: Mechanism, Characteristics, and

    2. Biometric Recognition Mechanism. Recently, biometrics as a security technique has emerged [].Combining the physiological properties of the human body with computers, optics, and acoustics [] led to the development of a range of biometric technologies, including iris, voice, fingerprint, face, etc., technology.Their comparison is shown in Table 1.

  7. (PDF) Human Identification and Fingerprints: A Review

    The standard methodology used by fingerprint experts to conduct friction ridge examinations is called ACE-V, for analysis, comparison, evaluation, and verification, which are the four fundamental ...

  8. Methodologies Applied to Fingerprint Analysis

    Abstract. This systematic review deals with the last 10 years of research in analytical methodologies for the analysis of fingerprints, regarding their chemical and biological constituents. A total of 123 manuscripts, which fit the search criteria defined using the descriptor "latent fingermarks analysis," were selected.

  9. PDF Contactless Fingerprint Recognition Using Deep Learning A ...

    Concentration on Identification: Authentication and recognition have been the pri-mary focus of deep-learning research in the contactless fingerprint context. Authentication is a comparably easy problem and estimates well for a large number of subjects. However, the more challenging part is the identification problem.

  10. A Systematic Analysis of Fingerprint Matching Techniques for

    The current research paper presents the systematic analysis of the fingerprint matching techniques. The analysis is conducted for the latest and quality contributions of the researchers in terms of the evaluation of efficient techniques, popular datasets, and challenging issues. ... Fingerprints: analysis and understanding. CRC Press, Boca ...

  11. Fingerprint Analysis and Databases

    It further examines traditional and modern techniques employed in fingerprint analysis, including ink and paper methods and advanced Automated Fingerprint Identification Systems (AFIS). Legal and ethical considerations surrounding the admissibility of fingerprint evidence in court are discussed, emphasizing the necessity of ensuring reliability ...

  12. An empirical study of dermatoglyphics fingerprint pattern

    The analysis demonstrates that accuracy is the most commonly used evaluation parameter in fingerprint classification which is used by 33 research papers. Finally, the research gap of analyzed methods is explained, which encourages researchers to develop new effective methods for human behavior analysis using fingerprint pattern classification.

  13. Nanomaterials for latent fingerprint detection: a review

    Forensic investigations mostly involve fingerprint detection. Fingerprint analysis demonstrates numerous basic principles. Latent fingerprint identification has established as the major method for personal identification in forensic science [127].The identification process involves the matching of ridge pattern details and comparison between found the fingerprint from crime scene and control ...

  14. Fingerprint Science: A Review on Historical And ...

    Abstract. The Forensic world has been using fingerprints as the standard for identifying people for more than a century.Even after the discovery of DNA Profiling, science of fingerprint is still ...

  15. Brain fingerprinting: A promising future application for predicting

    1. Introduction. We have recently demonstrated that the individual uniqueness of brain activity, as indexed by functional magnetic resonance imaging (fMRI), predicts subsequent psychological distress in early adolescents (Shan et al., 2022).From this research, we propose that scanning brains to detect individuals' 'brain fingerprint' and utilising this as a predictor of mental health ...

  16. PDF Analysis, Comparison, and Assessment of Latent Fingerprint Image

    ongoing research to assess this critical step in the forensic workflow. Previously we discussed the creation of a new database of latent fingerprint images to support such research. The new contributions of this paper are twofold. First, we implement a study in which a group of trained Latent Print Examiners provide Extended Feature Set

  17. Mobile Contactless Fingerprint Recognition: Implementation, Performance

    The whole capturing, processing, and recognition pipeline discussed in this work is made publicly available for research purposes 1.Moreover, interested researchers are welcome to hand-in and benchmark their algorithms on our acquired database 2.. The rest of the paper is structured as follows: Section 2 gives an overview of contactless end-to-end schemes proposed in the scientific literature.

  18. Family-Based Fingerprint Analysis: A Position Paper

    4 Final Remarks. This paper discusses a generic framework for lifting fingerprint analysis to the family-based level. We suggest that state-based model comparison algorithms [ 40] can aid the creation of concise FFSM representations [ 11, 12] from a set of fingerprints and enable efficient fingerprint analysis.

  19. Advance in forensic fingerprint research provides new hope for cold cases

    The research is published in the journal Drug Testing and Analysis. Researchers have unveiled a method capable of detecting drug substances from fingerprints lifted from crime scenes, which could ...

  20. (PDF) Fingerprint Recognition System : Design & Analysis

    Fingerprint analysis is the most essential part of human identification or human recognition. ... The main idea of this research paper is to find out the 100% correct fingerprint details from any ...

  21. Fingerprint Analysis Research Paper

    8. WORDS. 2317. Cite. View Full Essay. Abstract. This paper discusses the origins of fingerprinting and the usage of fingerprint analysis in the field of forensics. It traces the history of the practice from the 19th century on into the 20th and discusses the methods used to obtain fingerprints from a crime scene.

  22. Research paper (Fingerprint Analysis)

    All gloves were analyzed for the detection of latent fingerprints on the following days and condition: gloves placed outdoors for 13 days and analyzed on the 14th day, analyzed the same day and the following day after use. Research paper (Fingerprint Analysis) - Download as a PDF or view online for free.

  23. DNA fingerprinting in forensics: past, present, future

    The period in the 1990s was the golden research age of DNA fingerprinting succeeded by two decades of engineering, implementation, and high-throughput application. From the Foreword of Alec Jeffreys in Fingerprint News, Issue 1, January 1989: 'Dear Colleagues, […] I hope that Fingerprint News will cover all aspects of hypervariable DNA and ...

  24. (PDF) 'Brain fingerprinting': A critical analysis

    of August, 21, 2004, this claim w as somewhat qualified: "Farw ell Brain Fingerprinting is a revolutionary new. technology for solving crimes, with a record of 100%. accuracy in research with US ...