Professional Documents
Culture Documents
Week 13 Fingerprints
Week 13 Fingerprints
WEEK 13
FINGERPRINT COMPARISON
It is the process of a careful and a thorough comparison of two or more fingerprints into
After the latent print has been processed and developed from the crime scene, the next
questioned print with those available standard prints on file. Standard prints are either
by law enforcement agencies from a previously arrested law violators or those prints
collected by police when one applies for police clearances. Requested standard on the
other hand, refers to those prints taken by the police from the possible suspects of the
crime investigated.
compared with ridge characteristics of the standard print. A point of similarities must be
the ridges in which most 8 to 12 points identities is sufficient for a tracing identification.
1. Ordinary Method - the marking of the point of identity, and after another which is
drawn to the margin of the photograph latent and standard prints, designated by
a. Simple Method – the identical points of identity in both enlargements are drawn with
a straight line in red ink to the margin. Then the ridge characteristics which were marked
are numbered in consecutive order. Beginning from the two (2) focal points, either the
core or the delta. If the number 1 is the core, the number 2 is the next characteristic and
so on until you have numbered all the identical points in both enlargements.
b. Modified Method – The same process if to applied with that of the simple method
except the line preceding the numbers are the initial of the type of the ridge
characteristics is being indicated, such as; c for core, b for bifurcation and the like.
c. Drawn Method – After marking the ridge characteristics with a straight line, the
numbers are placed about 1 centimeter immediately at the end of the line of the margin
of the photo prints. Usually, a diameter of a circle of 1 inch is placed in which inside the
2. Osborn Method - the two enlarge photograph which has a size of 8 by 10 inches
are
divided into squares, both exactly alike with the squares occupying the identical
positions on each, and examining them in their order, square for square, designating the
3. Seymour Method – this method is done by making first a skeleton, tracing the
questioned prints and that of the standard print of the suspect, by making comparison
them together by holding line. Reflector or side light or projector. Then make the
necessary identification of each ridge characteristics whether they are the same or not.
4. Pricking Method – make enlargement of the same size of the chance impression and
the suspect standard print. Place the photograph of the standard print over the
photograph of the chance impression in the same position. With the use of a needle,
prick the identical points to determine if they coincide with one another.
Photographic enlargement of the same scale of both question and standard prints are
required in this method. Every noticeable ridge characteristic will then be punched with
any pinpoint holes. The enlargement will be reversed and a straight line will then be
drawn connecting one hole to the other. The same procedure will also be a second
enlargement.
on top of the print under scrutiny (Questioned print), then every ridge characteristics
shall be marked with appropriate writing pen in the transparent overlay. The said
overlay is then place on top on the enlargement of the other print (standard print) which
is also having the same scale with the questioned print. Any similarity shall then be
fingerprint examiner.
John Oswald Cruz PERSONAL IDENTIFICATION
BS CRIMINOLOGY 4TH YEAR 2ND SEM
7. Oster burg Grid Method – this method of comparison is somewhat similar to Osborn
method into certain details. The method however, goes beyond simply matching the
microscope to view the two prints at magnifications between 10x and 25x. A reference
grid of hairlines in the microscopic field is used during the preliminary stage of the
examination to scan the prints for similarities and dissimilarities. To establish identity.
Imaginary vertical and horizontal axes are drawn between arbitrary vertical and
horizontal axes are drawn between arbitrary selected ridge characteristics; the other
characteristics are then plotted with respect to their relationship to the axes.
9. Conventional Method – This method is considered as the oldest and the surest
method of demonstrating the identity of the latent print. relationship, in this context, is
not the spatial positioning do not take into consideration the influence of the distortion in
10. Photographic
This involves the use of photographic enlargement. The positioning and alignment of
enlargement of the latent print is then cut in lateral strips and placed over the
John Oswald Cruz PERSONAL IDENTIFICATION
BS CRIMINOLOGY 4TH YEAR 2ND SEM
enlargement of the inked print. The two enlargements must be fastened together in
perfect conjunction. The identity is ten demonstrated by removing the strips of the latent
enlargement one at a time, exposing x's set 4 the inked print below.
The Automated Fingerprint Identification System (AFIS) is the state of the art computer
unknown fingerprints against a database of known and unknown prints. It replaces the
relationships between the characteristics present within the finger or palm friction ridge
skin structures. Modern AFIS systems rapidly extract information from the fingerprint to
establish the pattern type, minute points and the axis of the image. The use of
The latest AFIS systems may also incorporate palm print matching capabilities. In the
majority of operating systems palm print images are divided up into a number of small
segments so that the software can effectively and efficiently code, store and search the
palm data within a reasonable time frame (similar size to a rolled fingerprint impression).
John Oswald Cruz PERSONAL IDENTIFICATION
BS CRIMINOLOGY 4TH YEAR 2ND SEM
AFIS software utilizes the impressions obtained them rolled index fingers or thumbs to
search and match again. Existing ten print records within the database. This matching
The AFIS system may use the rolled impressions of combination of the rolled and flat
impressions of all fingers to compare against the unsolved crime latent database. This
process is used when comparing new arrest finger and palm images against the
unsolved crime latent database or when comparing new crime scene latent evidence
Different systems offer "binary" or "grey-scale" images. Pure black and white images
depicted as binary images frequently allow important data to "drop out" of the image. ie.
the scanner or reader recognized black and white but not the shades of grey. Modern
systems offer grey scale images and, depending on the system, these images may be
captured using up to 256 grey levels which gives the examiner more detailed data to
Latent images can be scanned from physical “lifts” negatives, photographs or uploaded
matching fingerprint images from the print database. The fingerprint examiner verifies
the results and indicates whether an identification has been made against any one of
While the list provided by the AFIS is given in order of decreasing match value (as
fingerprint expert, may not necessarily be among the first few candidates on the list.
Despite the progress made in computer hardware and software, AFIS technology has
not yet eliminated the need for human verification of AFIS match results.
The AFIS database contains several separate databases, each with its own specific
purpose and storage scheme, to facilitate efficient overall system performance. These
include the tenprint, palm print and unsolved crime case image databases (finger and
palm).
1. Tenprint Latent print images are read via scanner and stored in a storage disk. When
the workstation issues an inquiry, the fingerprint-matching processor gets data from the
2. The fingerprint matching processor compares minutiae data detected from search
prints to minutiae data of registered print. Those prints that have resemblance in
3. The position, directions and relations (number of ridge lines between adjacent
minutiae) of the minutiae of the search print and file print are compared. If ay minutiae
resemble each other, these are selected as pair minutiae. If the numbers of pair
minutiae exceed the set value, the degree of resemblance (inquiry score) is calculated
by rotating the search print axis around the file print axis until the most minutiae pairs
are found.
5. The search print image and candidate fingerprint are displayed side by side and are
verified on the fingerprint work station. The fingerprint images can be magnified, rotated
data information.
2. The fingerprint card is sent to the PNP Crime laboratory (AFIS) to confirm the identity
and criminal history of the suspect. After which, the fingerprint card is sent to the
3. The operator conducts a verification of "Near Hit" candidates through the Fingerprint
Matching Processor by entering the search fingerprint on the processor a result of which
is a candidate fingerprint.
future criminal history at the same time replies the suspect's identity and criminal
The AFIS Technology invaded to the Philippine National Police (PNP) Crime laboratory
by virtue of the kind assistance by through Japan the Japanese Government through
Japan Coordinating Agency or JICA on MAY 24, 2005., onal ally1998 the Philippine
Government to grant financial support thru its General Grant Aid Program (GGAP). True
enough, the Japan government responded the request and send their first batch of
experts in the Philippine in 2001 to study the Basic Design of the project and the second
batch on 2002. The expert came up with the basic design in the following year. In May
2005, Japanese Ambassador Ryuichiro Yamazaki formally turnover the project to the
PNP.